ISCOM2600G (A) Series Command Reference (Rel - 04)
ISCOM2600G (A) Series Command Reference (Rel - 04)
ISCOM2600G (A) Series Command Reference (Rel - 04)
com
-----------------------------------------------------------------------------------------------------------------------------------------
Notice
Copyright 2016
Raisecom
All rights reserved.
No part of this publication may be excerpted, reproduced, translated or utilized in any form or by any means,
electronic or mechanical, including photocopying and microfilm, without permission in Writing from Raisecom
Technology Co., Ltd.
Preface
Objectives
This document describes commands supported by the ISCOM2600G series switch in aspects
of function, format, parameters, default conditions, command mode, usage guidelines, related
commands, as well as provided examples. The index of this document lists all commands in
an alphabetical order, which facilitates learning commands quickly.
This document helps you master related commands and facilitates you in configuring the
ISCOM2600G series switch according to provided examples.
Versions
The following table lists the product versions related to this document.
Conventions
Symbol conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Indicate a hazard with a medium or low level of risk which, if
not avoided, could result in minor or moderate injury.
Symbol Description
Indicate a tip that may help you solve a problem or save time.
General conventions
Convention Description
Times New Roman Normal paragraphs are in Times New Roman.
Arial Paragraphs in Warning, Caution, Notes, and Tip are in Arial.
Boldface Buttons and navigation path are in Boldface.
Italic Book titles are in italics.
Lucida Console Terminal display is in Lucida Console.
Command conventions
Convention Description
Boldface The keywords of a command line are in boldface.
Italic Command arguments are in italics.
[] Items (keywords or arguments) in square brackets [ ] are
optional.
{ x | y | ... } Alternative items are grouped in braces and separated by
vertical bars. Only one is selected.
[ x | y | ... ] Optional alternative items are grouped in square brackets and
separated by vertical bars. One or none is selected.
{ x | y | ... } * Alternative items are grouped in braces and separated by
vertical bars. A minimum of one or a maximum of all can be
selected.
[ x | y | ... ] * Optional alternative items are grouped in square brackets and
separated by vertical bars. A minimum of none or a maximum
of all can be selected.
interface-number Interface ID, the range of the value varies based on different
model and interface type, which is shown as below:
vlan: 1-4094
loopback: 1-16
tunnel: 1/1/1-1/1/1024
gigaethernet unit/slot/port: 1/1/1-1/1/24 (1000 Mbit/s
physical interface)
tengigaethernet unit/slot/port.sub-interface: 1/1/25-1/1/28
(10 Gbit/s physical interface)
fastethernet: 1/0/1
port-channel: 1-16
Change history
Updates between document versions are cumulative. Therefore, the latest document version
contains all updates made to previous versions.
Issue 04 (2016-05-12)
Fourth commercial release
Added contents about POE.
Issue 03 (2016-02-18)
Third commercial release
Upgraded software version to V3.10
Issue 02 (2015-11-05)
Second commercial release
Optimized the document.
Fixed known bugs.
Issue 01 (2015-08-15)
Initial commercial release
Contents
5 PoE................................................................................................................................................ 332
5.1.1 poe enable ........................................................................................................................................... 332
5.1.2 poe force-power .................................................................................................................................. 333
5.1.3 poe legacy enable ................................................................................................................................ 334
11 Security...................................................................................................................................... 614
11.1 Secure MAC ............................................................................................................................................... 614
11.1.1 clear port-security.............................................................................................................................. 614
11.1.2 no port-security shutdown ................................................................................................................. 615
11.1.3 port-security recovery-time ............................................................................................................... 616
11.1.4 port-security aging-time .................................................................................................................... 618
11.1.5 switchport port-security aging-type................................................................................................... 619
11.1.6 show port-security mac-address ........................................................................................................ 620
11.1.7 show port-security ............................................................................................................................. 622
11.1.8 switchport port-security .................................................................................................................... 624
11.1.9 switchport port-security mac-address ................................................................................................ 625
11.1.10 switchport port-security mac-address sticky ................................................................................... 626
11.1.11 switchport port-security mac-address sticky vlan............................................................................ 628
11.1.12 switchport port-security maximum ................................................................................................. 629
11.1.13 switchport port-security trap enable ................................................................................................ 630
11.1.14 switchport port-security violation ................................................................................................... 632
11.2 ACL ............................................................................................................................................................ 633
1 Basic configuration
1.1 BootROM
1.1.1 t
Function
To upgrade the system software to the device, use this command.
Format
t
Parameters
N/A
Default conditions
N/A
Command mode
Bootrom
User level
N/A
Usage guidelines
Scenario
When upgrading the device using Bootrom, you have to download the system software from
the FTP or TFTP server through the Bootrom command and save the software in the device.
The device supports dual system, so you need to choose to override which old system files
with the new ones while using this command.
Prerequisite
After starting the device, you can press Space to enter the Bootrom command mode at the
prompt of the "Press space into Bootstrap menu".
The FTP or TFTP server should be well configured, including:
Configure the directory in which downloaded files will be saved.
Configure the IP address of the server and ensure that the server and the device are in the
same network segment.
Connect the server to the SNMP interface first and then start downloading. Because only
that interface can be initialized in the Bootrom command mode.
Follow-up procedure
N/A
Precaution
Use it with caution.
Examples
This example shows how to download system softwares from the TFTP server.
[Raisecom]:t
ipaddr: 192.168.5.100
serverip: 192.168.5.1
filename: uImage
Field Description
ipaddr IP address of the device
serverip IP address of the TFTP server
Partition number Partition number
name File name of the new system
Size Size
Related commands
b
R
1.1.2 m
Function
To upgrade Boot software to the device, use this command.
Format
m
Parameters
N/A
Default conditions
N/A
Command mode
BootROM
User level
N/A
Usage guidelines
Scenario
You can use this command to rapidly load Boot software and start the device.
Prerequisite
After starting the device, you can press Space to enter BootROM mode at the prompt of the
"Press space into Bootstrap menu" and execute related configurations. You can use this
command to start the device and enter the system after completion of configurations.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to download Boot files to the device.
[Raisecom]:m
ipaddr: 192.168.5.100
serverip: 192.168.5.1
filename: uImage mboot.bin
press y to confirm: y
Related commands
N/A
1.1.3 b
Function
To read and load system files from the device, use this command.
Format
b
Parameters
N/A
Default conditions
N/A
Command mode
BootROM mode
User level
N/A
Usage guidelines
Scenario
After configuring the BootROM module, you can use this command to rapidly load system
files and start the device.
Prerequisite
After starting the device, you can press Space to enter BootROM mode at the prompt of the
"Press space into Bootstrap menu" and execute related configurations. You can use this
command to start the device and enter the system after completion of configurations.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to rapidly start the device.
[Raisecom]:b
Loading ISCOM2600.0.20130104 (System index 1)...
Decompress start...
CRC Checking...OK
Entering....
Related commands
N/A
1.1.4 s
Function
To configure the sequence of system files which are to be loaded while starting the device,
use this command.
Format
S
Parameters
N/A
Default conditions
N/A
Command mode
BootROM
User level
N/A
Usage guidelines
Scenario
You can use this command to configure the sequence of system files which are to be loaded
while starting the device.
Prerequisite
After starting the device, you can press Space to enter BootROM mode at the prompt of the
"Press space into Bootstrap menu".
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the sequence of system files which are to be loaded
while starting the device.
[Raisecom]:s
Current system partiton info:
Partition number Name Size
----------------------------------------------------
1 iscom2600_image 16320072
2 None 0
Related commands
N/A
1.1.5 e
Function
To clear environment variables, use this command.
Format
E
Parameters
N/A
Default conditions
N/A
Command mode
BootROM
User level
N/A
Usage guidelines
Scenario
You can use this command to delete the configured variables and this action will take effect
after the device is rebooted.
Prerequisite
After starting the device, you can press Space to enter BootROM mode at the prompt of the
"Press space into Bootstrap menu".
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to clear environment variables.
[Raisecom]:e
press y to confirm: y
Done
Please reboot to apply these changes!
Related commands
N/A
1.1.6 r
Function
To reboot the device, use this command.
Format
r
Parameters
N/A
Default conditions
N/A
Command mode
BootROM mode
User level
N/A
Usage guideline
Scenario
After configuring the BootROM module, you can use this command to reboot the device.
Prerequisite
After starting the device, you can press Space to enter BootROM mode at the prompt of the
"Press space into Bootstrap menu" and execute related configurations. You can use this
command to reboot the device after completion of configurations.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to reboot the device in the BootROM mode.
[Raisecom]:r
resetting ...
BOOTROM starting ..
Bootrom Version 1.8 (based upon U-Boot 2012.10) Aug 12 2015 - 17:11:26
*** Warning - bad CRC, using default environment
Saving Environment to SPI Flash...
Erasing SPI flash...Writing to SPI flash...done
Press space key to enter boot menu: 0
Saving Environment to SPI Flash...
Erasing SPI flash...Writing to SPI flash...done
Booting system1
Saving Environment to SPI Flash...
Erasing SPI flash...Writing to SPI flash...done
Starting kernel ...
Related commands
N/A
1.1.7 p
Function
To configure the password of BootROM, use this command.
Format
p
Parameters
N/A
Default conditions
N/A
Command mode
BootROM mode
User level
N/A
Usage guidelines
Scenario
You must input the password to execute BootROM after configuring the BootROM module.
Prerequisite
After starting the device, you can press Space to enter BootROM mode at the prompt of the
"Press space into Bootstrap menu" and execute related configurations. You can use this
command to reboot the device after completion of configurations.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the password in BootROM command mode.
[Raisecom]:p
No password!
Related commands
e
1.1.8 ?/h
Function
To show information about system files, use this command.
Format
?/h
Parameters
N/A
Default conditions
N/A
Command mode
BootROM mode
User level
N/A
Usage guidelines
Scenario
You can use this command to check names of all system files, used space, free space, etc.
Prerequisite
After starting the device, you can press Space to enter BootROM mode at the prompt of the
"Press space into Bootstrap menu"
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to show information about system files.
[Raisecom]:?
Related commands
N/A
Function
To clear all information displayed on the terminal screen, use this command.
Format
clear
Parameters
N/A
Default conditions
N/A
Command mode
Any command
User level
0
Usage guidelines
Scenario
You will be prevented from executing configurations when the information displayed on the
screen is too much. In this case, you can use this command to clear it. It can be used to clear
the information displayed on the screen only instead of clearing the previous configurations.
After clearing the displayed information, you can continue to enter commands from the first
line on the screen.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to clear the information displayed on the screen in global
configuration mode.
Raisecom#config
Raisecom(config)#clear
Related commands
N/A
1.2.2 config
Function
To enter global configuration mode, use this command.
Format
config [ terminal ]
Parameters
Parameter Description
terminal Configuration terminal
Default conditions
N/A
Command mode
Privileged EXEC
User level
0
Usage guidelines
Scenario
When configuring the device, you can use this command to enter global configuration mode
to execute commands.
Prerequisite
N/A
Follow-up procedure
After entering global configuration mode, you can use related commands to configure
the device.
You can enter "?" to view commands supported in global configuration mode.
You can use the list command to view details of all commands in global configuration
mode.
Precaution
N/A
Examples
This example shows how to enter global configuration mode.
Raisecom>enable
Password:
Raisecom#config
Raisecom(config)#
Related commands
N/A
Function
To enable command log, use this command. To disable this function, use the disable form of
this command.
Format
command-log { enable | disable }
Parameters
Parameter Description
enable Enable command log.
disable Disable command log.
Default conditions
The command log is enabled.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure command log for recording commands entered by all
users instead of those by the current users.
Prerequisite
N/A
Follow-up procedure
You can use the show command-log command to check the history commands.
Precaution
N/A
Examples
This example shows how to enable command log.
Raisecom#config
Raisecom(config)#command-log enable
Set successfully.
Related commands
N/A
1.2.4 enable
Function
To configure the user privilege, use this command.
Format
enable [ privilege ]
Parameters
Parameter Description
privilege User privilege, an integer, ranging from 1 to 15
Default conditions
N/A
Command mode
Privileged EXEC
User level
0
Usage guidelines
Scenario
You can use this command to configure the user privilege. By default, the user privilege is
configured to 15 when no basic parameter is specified.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
When upgrading privileges, you need to input the login password of the user with privilege of
15.
Examples
This example shows how to configure the user privilege to 11.
Raisecom#enable 11
Current privilege:11
Related commands
N/A
Function
To modify the password for entering privileged EXEC mode, use this command. To return to
the default condition, use the no form of this command.
Format
enable password
no enable password
Parameters
N/A
Default conditions
The password for entering privileged EXEC mode is raisecom.
Command mode
Privileged EXEC
User level
15
Usage guidelines
Scenario
When you wish to modify the password for entering privileged EXEC mode, you can use this
command.
It supports the password to be null, which means that you press Enter for two successive
times while modifying the password. When you log in to the device again, you can use the
enable command and press Enter to log in to privileged EXEC mode.
Prerequisite
Only after you use the enable command to enter privileged EXEC mode can you modify the
password.
Follow-up procedure
You can use the no enable password command to return the password to the default
configuration.
Precaution
The entered password must be a ciphertext password and you have to enter the password
twice with consistent spellings. Otherwise, configurations fail.
The new password takes effect when you enter privileged EXEC mode again.
Examples
This example shows how to modify the password for entering privileged EXEC mode.
Raisecom#enable password
please input password:******
please input password again:******
Set successfully.
Related commands
password
1.2.6 end
Function
To return to privileged EXEC mode, use this command.
Format
end
Parameters
N/A
Default conditions
N/A
Command mode
Global configuration/Physical layer interface configuration/VLAN configuration
User level
0
Usage guidelines
Scenario
You can use this command to return to privileged EXEC mode after completing
configurations in a certain command mode.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to return to privileged EXEC mode from physical layer interface
configuration mode.
Raisecom(config-gigaethernet1/1/1)#end
Raisecom#
This example shows how to return to privileged EXEC mode from VLAN configuration
mode.
Raisecom(config-vlan1)#end
Raisecom#
Related commands
exit
quit
1.2.7 exit
Function
To return to the latest configuration mode, use this command.
Format
exit
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
0
Usage guidelines
Scenario
You can use this command to return to the latest configuration mode after completion of
configurations in a specified configuration mode. This command is similar to the quit
command.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
If you use this command in user EXEC mode or privileged EXEC mode, you will be logged
out.
Examples
This example shows how to return to the latest configuration mode respectively after entering
global configuration mode and physical layer interface configuration mode in a row.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#exit
Raisecom(config)#exit
Raisecom#
Related commands
quit
end
1.2.8 help
Function
To show system help information, use this command.
Format
help
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
0
Usage guidelines
Scenario
You can use this command to view descriptions of system help.
Two types of help information are provided by the system software:
When you wish to obtain all parameters and related descriptions of a specified command,
enter this command followed by a space and a "?". For example, by entering "show ?",
all parameters in the show command are listed.
When you wish to obtain all parameters prefixed with certain characters of a specified
command, enter this command followed by related characters and a "?". For example, by
entering "show m?", all parameters starting with "m" in the show command are listed.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to show system help.
Raisecom#help
Raisecom software provides advanced help. Anytime when you need help,
please press '?' at the command line.
If nothing matches, the help list will be empty. You must backspace
your command until the available options are shown when entering
a '?'.
Two styles of help are provided by Raisecom:
1. Full help is available when entering a command followed by a
space and a '?'. Help of this style show all arguments and their
meanings to you. For example, by entering 'show ?', all arguments
of 'show' command are listed.
2. Partial help is provided when an argument's prefix immediately
followed by a '?' is entered. Help of this style show you all the
command's arguments that match the input prefix. For example, by
entering 'show m?', the arguments begin with 'm' are listed.
Related commands
N/A
1.2.9 history
Function
To show history commands, use this command.
Format
history
Parameters
N/A
Default conditions
The latest 20 history commands can be displayed.
Command mode
Any configuration except user EXEC
User level
0
Usage guidelines
Scenario
You can use this command to show commands used by the current user since login.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to show the history commands.
Raisecom#history
logout
enable
config
exit
Related commands
N/A
1.2.10 hostname
Function
To configure the device name, use this command. To return to the default configuration, use
the no form of this command.
Format
hostname name
no hostname
Parameters
Parameter Description
name Device name, a string of 1 to 32 characters
Default conditions
The device name is Raisecom.
Command mode
Privileged EXEC
User level
11
Usage guidelines
N/A
Examples
This example shows how to configure the device name to A.
Raisecom#hostname A
Set successfully.
Related commands
N/A
1.2.11 language
Function
To show descriptions of command lines in English or Chinese, use this command.
Format
language { chinese | english }
Parameters
Parameter Description
Default conditions
The CLI is in English.
Command mode
Any command
User level
0
Usage guidelines
Scenario
While using help information, you can use this command to switch the description into
English or Chinese to facilitate users in understanding.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to show the description of command lines in Chinese.
Raisecom#language chinese
This example shows how to show the description of command lines in English.
Raisecom#language english
Set successfully
Related commands
N/A
1.2.12 list
Function
To show all commands in the current command mode in form of a list, use this command.
Format
list
Parameters
N/A
Default conditions
N/A
Command mode
Any command
User level
5
Usage guidelines
Scenario
While configuring the device, if you are not sure about the command word or format which is
to be input, you can use this command to show all executable commands in the current mode.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to show all executable commands in user EXEC mode.
Raisecom>list
The current view mode number:2
visitor(priority:0-4) command:
Num PRI Command
1 0 clear
2 0 enable
3 0 exit
4 0 help
5 0 history
6 0 language (english | chinese)
7 0 list
8 0 quit
monitor(priority:5-10) command:
Num PRI Command
9 5 terminal history <1-20>
10 5 terminal time-out <0-65535>
operator(priority:11-14) command:
Num PRI Command
administrator(priority:15) command:
Num PRI Command
Related commands
N/A
1.2.13 logout
Function
To log out, use this command.
Format
logout
Parameters
N/A
Default conditions
N/A
Command mode
Privileged EXEC
User level
0
Usage guidelines
Scenario
You can use this command to log out after completion of configurations.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to log out.
Raisecom#logout
Login:
Related commands
N/A
1.2.14 quit
Function
To return to the latest configuration mode, use this command.
Format
quit
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
0
Usage guidelines
Scenario
You can use this command to return to the latest command mode after completion of
configurations in certain command mode. It is the same as the exit command.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
You will log out if you use this command in user EXEC mode and privileged EXEC mode.
Examples
This example shows how to return to the latest configuration mode respectively after entering
global configuration mode and physical layer interface configuration mode in a row.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#quit
Raisecom(config)#quit
Raisecom#
Related commands
exit
end
1.2.15 reboot
Function
To reboot the device, use this command.
Format
reboot [ now ]
Parameters
Parameter Description
Default conditions
N/A
Command mode
Privileged EXEC
User level
15
Usage guidelines
Scenario
You can use this command to reboot the device.
Prerequisite
N/A
Follow-up procedure
You need to input yes for confirmation if the input command is without now.
Precaution
Use it with caution. Rebooting the device will interrupt services. It is recommended that you
use the write command to save the existing configurations before rebooting the device.
Examples
This example shows how to reboot the device.
Raisecom#reboot
Please input 'yes' to confirm:yes
Rebooting ...
Related commands
N/A
Function
To check the login connection of terminal users, use this command.
Format
show terminal
Parameters
N/A
Default conditions
N/A
Command mode
Any command
User level
5
Usage guidelines
N/A
Examples
This example shows how to check the login connection of terminal users.
Raisecom#show terminal
Terminal State Time-out User IP
-------------------------------------------------------------------------
console active 600sec Not Login LOCAL
*telnet-1 active 600sec raisecom 172.16.70.190
telnet-2 inactive - - -
telnet-3 inactive - - -
telnet-4 inactive - - -
telnet-5 inactive - - -
telnet-6 inactive - - -
telnet-7 inactive - - -
telnet-8 inactive - - -
telnet-9 inactive - - -
telnet-10 inactive - - -
ssh-1 inactive - - -
ssh-2 inactive - - -
ssh-3 inactive - - -
ssh-4 inactive - - -
ssh-5 inactive - - -
Field Description
Terminal Terminal
State State
Time-out Timeout, in units of second
User Login user
Field Description
IP IP address
Related commands
N/A
Function
To show information about delayed reboot, use this command.
Format
show reboot info
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
Scenario
After configuring delayed reboot, you can use this command to show information about
delayed reboot and the remaining time of delayed reboot.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to show information about delayed reboot.
Raisecom#show reboot info
Set time: 100 min
Remain time: 50 min
Related commands
N/A
Function
To enable page-break, use this command. To disable this function, use the disable form of this
command.
Format
terminal page-break { enable | disable }
Parameters
Parameter Description
enable Enable page-break.
disable Disable page-break.
Default conditions
The page-break is enabled.
Command mode
Privileged EXEC
User level
5
Usage guidelines
Scenario
While you are using some commands, there is much echo information which cannot be
displayed on one page, such as the list command. However, after enabling the page-break,
you can press Space to control the echo information check. If the function is disabled, you
can roll to display all information.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable page-break.
Raisecom#terminal page-break enable
Set successfully
Related commands
N/A
Function
To configure the number of history commands to be saved in the system, use this command.
Format
terminal history number
Parameters
Parameter Description
number Number of commands, an integer, ranging from 1 to 20
Default conditions
The system will save the latest 20 commands in the buffer memory.
Command mode
Privileged EXEC
User level
5
Usage guidelines
Scenario
You can use this command to configure the number of history commands to be saved in the
system.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the number of history commands to be saved in the
system to be 10.
Raisecom#terminal history 10
Set successfully.
Related commands
N/A
Function
To configure the logout waiting time of terminal timeout, use this command.
Format
terminal time-out second
Parameters
Parameter Description
second Logout waiting time of terminal timeout, an integer, ranging from 0 to
6553, in units of second
Default conditions
The logout waiting time of terminal timeout is 600s.
Command mode
Privileged EXEC
User level
5
Usage guidelines
Scenario
You can use this command to configure the logout waiting time of terminal timeout. For the
sake of safety, the system terminal will automatically log out if you do not operate on the
system for a long time. But you still need to input your password when you log in next time.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure logout waiting time of terminal timeout to 1000s.
Raisecom#terminal time-out 1000
Set successfully.
Related commands
show terminal
1.2.21 write
Function
To write current configurations into the memory of the device, use this command.
Format
write[ backup-config ]
Parameters
Parameter Description
Default conditions
N/A
Command mode
Privileged EXEC
User level
15
Usage guidelines
Scenario
After completion of configurations, you need to save them to the device to override the
original ones. The new configurations can take effect after the device is rebooted. The device,
when rebooted, will continue to execute original configurations if the new configurations are
not saved to it.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Use it with caution. When you use this command, new configurations may override original
ones. And there may be errors in new configurations which may lead to the malfunction of the
device.
Examples
This example shows how to save current configurations.
Raisecom#write
Saving current configuration..
Save current configuration successfully.
Related commands
reboot
Function
To generate a SSH key pair, use this command.
Format
generate ssh-key [ length ]
Parameters
Parameter Description
length Key pair length of the SSH server, an integer, ranging from 512 to 2048, in
units of bit
Default conditions
The key pair length of the SSH server is 512 bits.
Command mode
Global configuration
User level
15
Usage guidelines
Scenario
You can use this command to generate SSH key pairs for encrypting communication data
while logging in to the SSH server. The key pairs, after being generated, will be automatically
saved to the Flash of the device. The longer the key pairs are, the safer the server will be.
Correspondently, the longer the generating time is, the lower the authentication efficiency will
be.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
After key pairs are generated, they will occupy the CPU which may cause the outrage of
services. Therefore, we recommend you to generate the length of key pairs according to your
actual need.
Examples
This example shows how to generate key pairs of the SSH server.
Raisecom#config
Raisecom(config)#generate ssh-key
Generate and save rsa key done!
Related commands
show ssh2 { server | session }
Function
To show the SSH public key, use this command.
Format
show ssh2 public-key [ authentication ]
Parameters
Parameter Description
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show the SSH public key.
Raisecom#show ssh2 public-key authentication
RSA public key :---- BEGIN SSH2 PUBLIC KEY ----
Comment: "rsa-key"
AAAAB3NzaC1yc2EAAAADAQABAAAAgnstYB4ratus5c5RcHu/2/Avc0bkeYv4
fjUM9s9oyMyoOvnrKH2FJl/Z/whG214SN0GQacYRkoZukQ8WeFCMdbu1rbJQ
SAQG7F9NA8ql7ipcIMUXP96sjXjML9hYVwJ2tJyfxihHF8MkF0ewT+r8pfJW
/yruqWKgwBWTqrE/gWHLaqE=
Fingerprint: md5 70:16:00:30:08:e3:80:40:1f:a2:ee:41:a3:69:ec:91
---- END SSH2 PUBLIC KEY ----
Related commands
N/A
Function
To show configurations and sessions of the SSH server, use this command.
Format
show ssh2 { server | session }
Parameters
Parameter Description
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show configurations of the SSH server.
Raisecom#show ssh2 server
SSH server information:
---------------------------------------------------------------------
State: Enable
Version: ssh-2
Authentication method(default:local user-password ): local user-password
Authentication timeout(default 600): 600s
Authentication retries(default 20): 20
Max client count(default 5): 5
Current client count: 0
Current channel count: 0
Listen port on (default 22): 22
Field Description
State Enabled state of the SSH
Version SSH version
Authentication method(default:local Authentication mode (default: local user
user-password ) password
Authentication timeout(default 600) Authentication timeout (600s by default)
Authentication retries(default 20) Number of authentication retries (20 times by
default)
Max client count(default 5) Maximum number of clients (5 by default)
Current client count Current number of clients
Current channel count Current number of Channels
Listen port on (default 22) Listening port number (22 by default)
Field Description
ID ID
Ver SSH version
Cipher(IN/OUT) Encryption (in/out)
Con-Time Period for establishing connections
State SSH connection status
UserId User name
Ip IP address of SSH Clients
Related commands
N/A
Function
To show configurations of Telnet Server, use this command.
Format
show telnet-server
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
11
Usage guidelines
N/A
Examples
This example shows how to show configurations of Telnet Server.
Raisecom#show telnet-server
Accept port-list: gigaethernet1/1/1
gigaethernet1/1/2 gigaethernet1/1/3
gigaethernet1/1/4 gigaethernet1/1/5 gigaethernet1/1/6
gigaethernet1/1/7 gigaethernet1/1/8 gigaethernet1/1/9
gigaethernet1/1/10 gigaethernet1/1/11 gigaethernet1/1/12
gigaethernet1/1/13 gigaethernet1/1/14 gigaethernet1/1/15
gigaethernet1/1/16 gigaethernet1/1/17 gigaethernet1/1/18
gigaethernet1/1/19 gigaethernet1/1/20 gigaethernet1/1/21
gigaethernet1/1/22 gigaethernet1/1/23 gigaethernet1/1/24
gigaethernet1/1/25 gigaethernet1/1/26 gigaethernet1/1/27
gigaethernet1/1/28
Using session-list: --
Field Description
Accept port-list SSHv2 session lists allowed
Field Description
Using session-list Session lists in use
Related commands
N/A
Function
To show user information of the device, use this command.
Format
show user { active | table }
Parameters
Parameter Description
active Show information about login users.
table Show user information lists.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
15
Usage guidelines
N/A
Examples
This example shows how to show information about login users.
Raisecom#show user active
Username : raisecom
Priority : 15
Server IP : --
Terminal IP : 0.0.0.0
Login Type : telnet-1
Field Description
Username User name
Priority User priority, with the value ranging from 0 to 15
The bigger the value is, the higher the level is, the higher the
privileges will be, and the more the commands which can be used.
Server IP Server IP address
Terminal IP Terminal IP address
Login Type Login modes
telnet
console
SSH2
Field Description
Username User name
Priority User priority, with the value ranging from 0 to 15
The bigger the value is, the higher the level is, the higher the privileges will
be, and the more the commands which can be used.
Server Login authentication modes
Local: login by the password and user name saved in the local server.
Radius: login by the password and user name saved in the RADIUS server.
Tacacs: login by the password and user name saved in the TACACS+
server.
Related commands
user name
user { allow-exec | disallow-exec }
Function
To enable the SSHv2 server, use this command. To disable this function, use the no form of
this command.
Format
ssh2 server
no ssh2 server
Parameters
N/A
Default conditions
SSH server is disabled.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
The SSHv2 is a network security protocol which can protect the network security by
encrypting network data. It can provide safe remote login and other safe services in an unsafe
network environment.
Users need to enable the SSHv2 server function before configuring the SSHv2
Prerequisite
The local SSHv2 key pair is generated through the generate ssh-key command.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable the SSH server.
Raisecom#config
Raisecom(config)#ssh2 server
Set successfully.
Related commands
show ssh2 { server | session }
Function
To configure the SSHv2 authentication mode, use this command.
Format
ssh2 server authentication { password | rsa-key }
Parameters
Parameter Description
password Use local user name and password to authenticate SSH Clients.
rsa-key Use "host key pairs + local user name and password" to authenticate
SSH Clients.
Default conditions
The device uses local user name and password to authenticate SSH Clients.
Command mode
Global configuration
User level
15
Usage guidelines
Scenario
When the device works in password authentication mode, it will authenticate clients by
the user name and password specified through the user command.
When the device works in rsa-key authentication mode, it will authenticate clients by the
user name and password specified through the user command and the secret key.
Prerequisite
When the device is in rsa-key authentication mode, it needs to generate host public key
through terminal emulator. You need to use the ssh2 server authentication public-key
command to record the host public key to the device.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the login authentication mode of SSH users to rsa-key.
Raisecom#config
Raisecom(config)#ssh2 server authentication rsa-key
Set successfully.
Related commands
show ssh2 { server | session }
Function
To save the host public key of SSHv2 client for logging in to authentication key to the device
when the rsa-key authentication mode is in use, use this command.
Format
ssh2 server authentication public-key-name public-key [ public key ]
Parameters
Parameter Description
public-key-name Public key name
public key Public key contents
Default conditions
N/A
Command mode
Global configuration
User level
15
Usage guidelines
Scenario
When the device works in rsa-key authentication mode, you need to record the public key of
Client to the device. The Client sends packets which are encrypted with private keys of the
host to the device. After the device receives the packets, it will use the public key to decrypt
them. If the packets are successfully decrypted, the Client will pass the authentication.
Otherwise, it fails the authentication.
Prerequisite
You need to generate the key pairs (including host public key and private key) for login
authentication at the SSH Clients and save the host private key in the SSH Clients.
Follow-up procedure
You need to open the public key generated at the SSH Client (with "pub" as the suffix) and
copy the public key to the terminal emulation program. You can save the public key by
"Ctrl+S" and cancel the current input by "Ctrl+Z".
Precaution
N/A
Examples
This example shows how to save the host public key A1 of SSH Client login key to the device.
Raisecom#config
Raisecom(config)#ssh2 server authentication A1 public-key
Related commands
show ssh2 public-key
Function
To configure the number of failures allowed in the SSHv2 authentication, use this command.
To return to the default condition, use the no form of this command.
Format
ssh2 server authentication-retries counts
no ssh2 server authentication-retries
Parameters
Parameter Description
counts Number of failures allowed in SSH authentication, an integer, ranging
from 1 to 100
Default conditions
The number of failures allowed in the SSH authentication is 20.
Command mode
Global configuration
User level
15
Usage guidelines
Scenario
To defend the authentication exhaustion attacks from the SSH Clients, the device refuses to
continue the authentication and disconnects with the Client when the number of failures
exceeds the threshold.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the number of failures in the SSH authentication to 3.
Raisecom#config
Raisecom(config)#ssh2 server authentication-retries 3
Set successfully.
Related commands
show ssh2 { server | session }
Function
To configure SSH authentication timeout, use this command. To return to the default
condition, use the no form of this command.
Format
ssh2 server authentication-timeout second
no ssh2 server authentication-timeout
Parameters
Parameter Description
second SSH authentication timeout, an integer, ranging from 100 to 65535, in
units of second
Default conditions
The SSH authentication timeout is 600s.
Command mode
Global configuration
User level
15
Usage guidelines
Scenario
To defend the authentication exhaustion attacks from the SSH Clients, the device refuses to
continue the authentication and disconnect with the client when the authentication timeout
exceeds this threshold.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the SSH authentication timeout to 300s.
Raisecom#config
Raisecom(config)#ssh2 server authentication-timeout 300
Set successfully.
Related commands
show ssh2 { server | session }
Function
To configure the listening port number, use this command. To return to the default condition,
use the no form of this command.
Format
ssh2 server port port-id
no ssh2 server port
Parameters
Parameter Description
port-id SSH listening port number, an integer, ranging from 1 to 65535
Default conditions
The SSH listening port number is 22.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
To avoid conflicts with port numbers of other protocols, users can use the SSH listening port
number specified by the command. After configuring the SSH listening port number, the
device will monitor the SSH packets based on the port number specified by the user.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
When you are configuring the SSH listening port number, the parameters you input will not
come into effect until the reboot of the SSH server.
It is recommended that the SSH listening port should not be the famous ones to avoid
affecting other services.
Examples
This example shows how to configure the listening port number of the SSH server to 2000.
Raisecom#config
Raisecom(config)#ssh2 server port 2000
Set successfully.
Related commands
show ssh2 { server | session }
Function
To configure the SSH ACL number, use this command. To return to the default condition, use
the no form of this command.
Format
ssh access-list { ip access-list number | ipv6 access-list number }
no ssh access-list
Parameters
Parameter Description
ip access-list IPv4 standard ACL number, an integer, ranging from 1000 to 1999
number
ipv6 access-list IPv6 ACL number, an integer, ranging from 6000 to 6999
number
Default conditions
The listening port number is 22.
Command mode
Global configuration
User level
15
Usage guidelines
Scenario
You can use this command to configure the IPv4 or IPv6 ACL number.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the SSH ACL number to 1200.
Raisecom#config
Raisecom(config)#ssh access-lis
t 1200
Set successfully.
Related commands
show ssh2 { server | session }
Function
To disable the specified SSH2 session, use this command.
Format
ssh2 server close session session-number
Parameters
Parameter Description
session-number SSH2 session ID, an integer, ranging from 1 to 10
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to disconnect the SSH2 server with the client of corresponding
session number. Then the client of the corresponding session number will not interact with
SSH2 server.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure to disconnect the specified SSH2 session 1.
Raisecom#config
Raisecom(config)#ssh2 server close session 1
Set successfully.
Related commands
show ssh2 session
Function
To configure the maximum number of SSH2 sessions, use this command.
Format
ssh2 server max-session session-number
Parameters
Parameter Description
session-number Maximum number of sessions, an integer, ranging from 0 to 10
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the maximum SSH2 sessions which can be
established by the server. When the number of actual sessions reaches to the maximum, new
sessions cannot be established.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the maximum number of SSH2 sessions supported by
the device to 5.
Raisecom#config
Raisecom(config)#ssh2 server max-session 5
Set successfully.
Related commands
show ssh2 server
Function
To configure the version of SSH2, use this command.
Format
ssh2 server version { both | v1 | v2 }
Parameters
Parameter Description
both Support V1 and V2.
v1 Support V1.
v2 Support V2.
Default conditions
The device supports SSH2 V1 and V2.
Command mode
Global configuration
User level
15
Usage guidelines
N/A
Examples
This example shows how to configure the version of SSH2 as V2.
Raisecom#config
Raisecom(config)#ssh2 server version v2
Set successfully.
Related commands
N/A
1.3.16 telnet
Function
To configure this device as Telnet Client to remotely log in to other devices, use this
command.
Format
telnet ip-address [ port port-id ]
Parameters
Parameter Description
ip-address IP address of the remote destination device, in dotted decimal notation,
such as 10.10.1.1
port TCP port number
port-id TCP port number corresponding to Telnet service which is provided by the
remote destination device, an integer, ranging from 1 to 65535
Default conditions
N/A
Command mode
Privileged EXEC
User level
11
Usage guidelines
Scenario
Telnet involves in two types: the Telnet Client and the Telnet Server.
Telnet Client: it means that you can use the device as a Client. The user can establish a
connection with the device through the terminal emulation program or Telnet Client on the PC
and then use this command to remotely log in to other devices to implement management and
control.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
You need to configure route reachable between local and remote devices if they are in
different network segments.
Examples
This example shows how to remotely log in to the device with the IP address of 10.0.0.1.
Raisecom#telnet 10.0.0.1
Related commands
N/A
Function
To configure interfaces to support Telnet, use this command. To disable this function, use the
no form of this command.
Format
telnet-server accept interface-type interface-number
no telnet-server accept interface-type interface-number
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
All interfaces support Telnet.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure an interface to the one through which the client is
allowed to communicate with the Telnet server.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure interfaces that support Telnet as 1000 Mbit/s interface
1/1/1 to 1000 Mbit/s interface 1/1/3.
Raisecom#config
Raisecom(config)#telnet-server accept gigaethernet 1/1/1-3
Set successfully.
Related commands
show telnet-server
Function
To configure interfaces that support Telnet, use this command. To disable this function, use
the no form of this command.
Format
telnet-server accept interface-type interface-number
no telnet-server accept interface-type interface-number
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure an interface through which the customer can
communicate with the Telnet server.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The number of Telnet sessions must be within the maximum value; otherwise, new sessions
cannot be established.
Examples
This example shows how to configure interface 1/1/1 to support Telnet.
Raisecom#config
Raisecom(config)#telnet-server accept gigaethernet 1/1/1
Set successfully.
Related commands
show telnet-server
Function
To disconnect the specified Telnet connections, use this command.
Format
telnet-server close terminal-telnet session-number
Parameters
Parameter Description
session-number Session number, an integer, ranging from 1 to 5
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to disconnect the Telnet connection of the corresponding session
number in global configuration, and then the user of the corresponding number cannot keep
communicating with the Telnet server.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure to disconnect specified Telnet connections.
Raisecom#config
Raisecom(config)#telnet-server close terminal-telnet 1
Set successfully.
Related commands
show telnet-server
Function
To configure the maximum number of Telnet connections, use this command.
Format
telnet-server max-session session-number
Parameters
Parameter Description
session-number Maximum number of connections, an integer, ranging from 0 to 10
Default conditions
The maximum number of Telnet connections supported by the device is 10.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the maximum number of Telnet connections. If the
number of actual connections to be established exceeds this ceiling, new Telnet connections
will not be established.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the maximum number of Telnet connections supported
by the device to be 4.
Raisecom#config
Raisecom(config)#telnet-server max-session 4
Set successfully.
Related commands
show telnet server
Function
To configure rules for users to execute commands of different priorities, use this command.
To disable this function, use the no form of this command.
Format
user user-name { allow-exec | disallow-exec } first-keyword [ second-keyword ]
no user user-name { allow-exec | disallow-exec } first-keyword [ second-keyword ]
Parameters
Parameter Description
user-name User name, a string of 1 to 16 characters
Parameter Description
allow-exec Allow users to execute commands with priorities higher than theirs.
disallow-exec Disallow users execute commands with priorities lower than theirs.
first-keyword First keyword of the command
second-keyword Second keyword of the command
Default conditions
N/A
Command mode
Privileged EXEC
User level
15
Usage guidelines
Scenario
Generally, users are not allowed to execute commands with priorities superior to their own.
They are only allowed to execute commands with same priority or lower priority. However,
using this command can break the limits. Users are allowed to execute some commands with
priorities higher than theirs and are forbidden to execute some commands with priorities
lower than theirs.
Prerequisite
Specified users are created through the user name command.
Follow-up procedure
N/A
Precaution
This command cannot be applied to administrators with privilege 15. Otherwise,
configurations fail.
Specified users must exist, otherwise, configurations fail.
Examples
This example shows how to allow raisecom1 to execute commands with priorities higher than
its own and the first keyword of write.
Raisecom#user raisecom1 allow-exec write
Set successfully
This example shows how to forbid raisecom1 to execute commands with priorities lower than
its own and the first keyword of show.
Related commands
show user
Function
To add users, configure the initial login password for new users or modify users' privilege, use
this command. To delete users, use the no form of this command.
Format
user name user-name password password
user name user-name privilege privilege
no username user-name
Parameters
Parameter Description
user-name User name, a string of 1 to 16 characters
password password Login password, a string of 1 to 16 characters
privilege privilege User privilege, an integer, ranging from 1 to 15
Default conditions
The privilege of new users is 15.
Command mode
Privileged EXEC
User level
15
Usage guidelines
Scenario
You can use the user name username password password command to add new users and
configure the initial login password. The privilege of users is the default value.
When you need to modify the privilege, you can use the user name username privilege
privilege command.
Prerequisite
N/A
Follow-up procedure
You can use the password command to modify the login password.
Precaution
Reserve at least one user with privilege 15 among device users. Only users with privilege 15
can use this command.
Users cannot modify the privilege of users in login status.
Examples
This example shows how to add a new user with the name of raisecom1 and login password
of Raisecom1.
Raisecom#user name raisecom1 password raisecom1
Set successfully
This example shows how to modify the privilege of the user with the name of raisecom1 to 1.
Raisecom#user name raisecom1 privilege 1
Set successfully
This example shows how to delete the user with the name of raisecom1.
Raisecom#no username raisecom1
Set successfully
Related commands
show user
Function
To configure the user login authentication mode, use this command.
Format
user login { local-radius | local-user | radius-local | radius-user | local-tacacs | tacacs-local
| tacacs-user }
Parameters
Parameter Description
local-radius When local authentication coexist with RADIUS authentication, use
local authentication in preference to RADIUS.
Parameter Description
local-user Use local authentication.
radius-local When local authentication coexist with RADIUS authentication
concurrently, use RADIUS authentication in preference to local
authentication.
radius-user Use RADIUS authentication.
local-tacacs When local authentication coexist with TACACS+ authentication, use
local authentication in preference to TACACS+ authentication.
tacacs-local When local authentication coexist with TACACS+ authentication, use
TACACS+ authentication in preference to local authentication.
tacacs-user Use TACACS+ authentication.
Default conditions
The user login mode is local-user.
Command mode
Privileged EXEC
User level
15
Usage guidelines
Scenario
Only after being authenticated and authorized can users log in to the network and have the
right to access the network, and obtain network resources. All these authentications and
authorizations will be saved in the remote RADIUS server, remote TACACS server, and
Network Access Server (NAS), namely, local device. You can use this command to configure
the authentication mode for user login.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The newly configured login mode will take effect next time.
While using Radius and Tacas+ servers, make sure that the device and the server are well
connected and the login information is already saved in the server. Otherwise, users cannot
log in to the device.
Examples
This example shows how to configure user login mode as local-radius.
Raisecom#user login local-radius
Set User Login Method successfully.
Related commands
enable login
Function
To configure user login mode, use this command.
Format
user login { radius-local | tacacs-local } server-no-response
Parameters
Parameter Description
radius-local When local authentication coexist with RADIUS authentication
concurrently, use RADIUS authentication in preference to local
authentication.
tacacs-local When local authentication coexist with TACACS+ authentication, use
TACACS+ authentication in preference to local authentication.
Default conditions
N/A
Command mode
Privileged EXEC
User level
15
Usage guidelines
Scenario
You can use this command to configure user login authentication mode when there is no
response from the remote server. Only when no response is received from the remote server
can the authentication mode be switched to Local.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The newly configured authentication mode will take effect next time.
Examples
This example shows how to configure the user login authentication mode as RADIUS.
Raisecom#user login radius-local server-no-response
Set User Login Method successfully.
Related commands
N/A
Function
To configure service type of users, use this command. To disable this function, use the no
form of this command.
Format
user user-name service-type { lan-access | ssh | telnet | web | console | all }
no user user-name service-type { lan-access | ssh | telnet | web | console | all }
Parameters
Parameter Description
user-name User name, a string of 1 to 16 characters
lan-access LAN access
ssh SSH session
telnet Telnet session
web Web connection
console Console connection
all All service types
Default conditions
The service type of the newly added local user is "--" and the service type of the default user
raisecom is all.
Command mode
Privileged EXEC
User level
15
Usage guidelines
Scenario
You have to configure the service type for newly added local users. Only when users support
the service can they be authenticated.
Prerequisite
Specified users are created through the user name command.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the service type of user raisecom1 as telnet.
Raisecom#user raisecom1 service-type telnet
Set successfully.
Related commands
user name
show user
Function
To delete specified files saved in the device, use this command.
Format
erase [ file-name ]
Parameters
Parameter Description
file-name File name
If you do not configure the parameter, the startup_config.conf will be
deleted by default.
Default conditions
N/A
Command mode
Privileged EXEC
User level
5
Usage guidelines
Scenario
You can use this command to delete specified files saved in the device.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Use it with caution. The device may not work normally and service may be interrupted if you
delete files.
Examples
This example shows how to delete the files with the name of text in the device.
Raisecom#erase text
Erase file successfully.
Related commands
N/A
1.4.2 dir
Function
To show information about files saved in the Flash of the device, use this command.
Format
dir
Parameters
N/A
Default conditions
N/A
Command mode
Privileged EXEC
User level
5
Usage guidelines
Scenario
You can use this command to show the name, size, and creation time of system files saved in
the system.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to show information about files saved in the Flash of the device.
Raisecom#dir
TYPE SIZE(B) FILENAME
--------------------------------------
file 1618 startup_config.conf
file 2155 syslog.txt
file 5824 alarmClearedFile.b
file 796 trace.txt
file 200 alarmActiveFile.b
Related commands
N/A
Function
To show the current configurations of the system, use this command.
Format
show running-config
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show system configurations.
Raisecom#show running-config
System current configuration:
!command in view_mode
!command in config_mode first-step
ip routing
!command in aclmap_mode
!command in enable_mode
watchdog disable
!command in service_mode
!command in evc mode
!command in aggregation_mode
!command in port_mode
interface gigaethernet 1/1/1
oam active
!command in vlan configuration mode
!command in dhcp-pool mode
!command in dhcp6-pool mode
!command in ip interface mode
interface ip 0
ip vlan 100
ip address 1.1.1.1 255.0.0.0
!command in loopback interface mode
!command in traffic policer mode
!command in cmap_mode
!command in pmap_mode
!command in pmap_vlan_mode
!command in pmap_cos_mode
!command in keychain_mode
!command in qos mapping mode
mls qos mapping cos-remark 1
!command in wred mode
!command in tdm port mode
!command in config_mode
management-port ip address 192.168.27.93 255.255.255.0
sla private-tlv enable
!command in clkmgmt_mode
!command in cespw mode
Related commands
N/A
Function
To show configurations about system startup, use this command.
Format
show startup-config
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show configurations about system startup.
Raisecom#show startup-config
Current start up configuration :
!Software Version 2.0.03.20130124
!command in view_mode
!command in config_mode first-step
ip routing
mpls-tp cfm md-level enable
!command in aclmap_mode
!command in enable_mode
watchdog disable
!command in service_mode
!command in vlan_group_mode
!command in evc mode
!command in aggregation_mode
!command in port_mode
interface gigaethernet 1/1/1
oam active
oam enable
!command in vlan configuration mode
!command in dhcp-pool mode
!command in dhcp6-pool mode
!command in ip interface mode
interface ip 0
ip vlan 100
ip address 1.1.1.1 255.0.0.0
!command in loopback interface mode
!command in traffic policer mode
!command in cmap_mode
!command in pmap_mode
!command in pmap_vlan_mode
!command in pmap_cos_mode
!command in keychain_mode
!command in qos mapping mode
mls qos mapping cos-remark 1
!command in wred mode
!command in tdm port mode
!command in config_mode
management-port ip address 192.168.27.93 255.255.255.0
sla private-tlv enable
alarm inverse tdm 1/4,6 auto
alarm inverse tdm 2/1,3,5 auto
alarm inverse tdm 1/2-3,7-8 manual
alarm inverse tdm 2/2,4,6-7 manual
!command in clkmgmt_mode
!command in cespw mode
!NEVER change the NOTATION
!end
Related commands
N/A
Function
To show information about system startup files, use this command.
Format
show multisystem
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show information about the current startup files.
Raisecom#show multisystem
Priority Name Version Size
----------------------------------------------------------
1* system1.z SYSTEM_3.00.22 16439440
2 system2.z SYSTEM_3.00.22 1643944
Related commands
N/A
Function
To configure the boot sequence for system files, use this command.
Format
boot sequence
Parameters
N/A
Default conditions
N/A
Command mode
Privileged EXEC
User level
15
Usage guidelines
Scenario
You can use this command to configure boot files.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure booting system1.z first among all the boot files.
Raisecom#boot sequence
Please select the system file which boot priority is 1:
1*system1.z 1.1.1
Please input <1-1>:1
Set successfully.
Related commands
N/A
1.4.7 copy
Function
To copy configuration files, use this command.
Format
copy { backup-config startup-config | startup-config {backup-config| running-config } }
Parameters
Parameter Description
Default conditions
N/A
Command mode
Privileged EXEC
User level
5
Usage guidelines
Scenario
You can use the command to copy between master configuration file and backup
configuration file.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to copy the backup configuration to the master configuration file.
Raisecom#copy backup-config startup-config
Operation successfully.
Related commands
N/A
Function
To download system files from the server or upgrade other relevant files to the device, use
this command.
Format
download system-boot { ftp ip-address user-name password file-name | tftp ip-address file-
name } { system1.z | system2.z }
download { bootstrap | file | license | dhcplease | patch | startup-config | backup-config }
tftp ip-address file-name [ dir ]
download { bootstrap | file | license | dhcplease | patch | startup-config | backup-config }
ftp ip-address user-name password file-name [ dir ]
Parameters
Parameter Description
bootstrap Download bootstrap files.
file Download files.
license Download License files.
dhcplease Download DHCP leases files.
patch Download patch files.
system-boot Download system files.
startup-config Download the loading master configuration file during system startup.
backup-config Download the loading backup configuration file during system startup.
tftp Download files using TFTP.
ftp Download files using FTP.
ip-address IP address of the server
user-name User name of the FTP server
password Password of the FTP server
Parameter Description
file-name Downloaded file name
dir Path of files
Default conditions
N/A
Command mode
Privileged EXEC
User level
15
Usage guidelines
Scenario
You can use this command to download the relevant files to the device while the system is
being upgraded.
Prerequisite
The FTP or TFTP server should be pre-configured.
The FTP or TFTP server should be well connected to the device through network.
Follow-up procedure
N/A
Precaution
Use it with caution. The outage of the device and interruption of services may occur if you
download new system softwares. It is recommended that you should back up the original files
through the upload command before downloading new files.
Examples
This example shows how to download configuration files from the TFTP server with the IP
address of 10.0.0.1 by TFTP during system startup.
Raisecom#download startup-config tftp 10.0.0.1 config
Waiting...Start
Downloading 1K
Success
Related commands
show multi-system
show version
Function
To show the version of the system, use this command.
Format
show version
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show the version of the system.
Raisecom#show version
Product Version: ISCOM2600-4GF P200R003C00
Software Version: 5.2.1_20131112
RITP Version: 5.2
Bootstrap Version: BOOTSTRAP_5.1.4_20130822
FPGA Version: FPGA_ra.23.59.1.9.0.20131104
Hardware Version: 1.4
Field Description
Product Version Product version
Software Vesion Software version
Bootstrap Version System bootstrap version
FPGA Version FPGA version
Hardware Version Hardware version
System MacAddress System MAC address
Serial number Serial number
DRAM System memory capacity
Flash Memory Flash memory capacity
Related commands
N/A
1.5.3 upload
Function
To upload files to the backup server, use this command.
Format
upload system-boot { ftp ip-address user-name password file-name | tftp ip-address file-
name } { system1.z | system2.z }
upload { bootstrap | logging-file | license | dhcplease | paf | command-log | patch |
startup-config | backup-config } tftp ip-address file-name [ dir ]
upload { bootstrap | logging-file | license | dhcplease | paf | command-log | patch |
startup-config | backup-config } ftp ip-address user-name password file-name [ dir ]
Parameters
Parameter Description
bootstrap Upload bootstrap files.
logging-file Upload login files.
license Upload License files.
dhcplease Upload DHCP leases files.
paf Upload paf files.
system-boot Upload system files.
startup-config Upload master configuration files during system startup.
Parameter Description
backup-config Upload backup configuration files during system startup.
tftp Upload files by TFTP.
ftp Upload files by FTP.
ip-address IP address of the server
user-name User name of the FTP server
password Password of the FTP server
file-name The name of the downloaded files
dir File path
Default conditions
N/A
Command mode
Privileged EXEC
User level
15
Usage guidelines
Scenario
To back up system files, you can use this command to upload relevant files to the backup
server.
Prerequisite
You need to pre-configure the FTP server or TFTP server and ensure that the connection
between the server and the device is normal.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to upload the system start-up configuration file to the TFTP server
with the IP address of 10.0.0.1.
Raisecom#upload startup-config tftp 10.0.0.1 config
Waiting...Start
Uploading 1K/1K
Success
Related commands
N/A
Function
To clear the configuration files in the buffer, use this command.
Format
clear buffer_config
Parameters
N/A
Default conditions
N/A
Command mode
Global configuration
User level
15
Usage guidelines
Scenario
You can use this command to clear the configuration files in the buffer.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to clear the configuration files in the buffer.
Raisecom#config
Raisecom(config)#clear buffer_config
Set successfully.
Related commands
show buffer_config
Function
To enable automatically updating versions and configurations, use this command. To disable
this function, use the disable form of this command.
Format
auto_config { enable | disable }
Parameters
Parameters Description
enable Enable automatically updating versions and configurations
disable Disable automatically updating versions and configurations
Default conditions
Enabled
Command mode
VLAN interface configuration
User level
15
Usage guidelines
Scenario
You can use this command to start the process of DHCP Client applying for an IP address,
system software upgrade, automatic update of configurations.
Prerequisite
You need to pre-configure the FTP server or TFTP server and ensure that the connection
between the server and the device is normal before downloading.
Follow-up procedure
N/A
Precaution
Use it with caution. The outage of the device and interruption of services may occur if you
download new system softwares. We recommend you backing up the original files through
the upload command before downloading new files.
Examples
This example shows how to disable automatically updating versions and configurations.
Raisecom#config
Raisecom(config)#vlan 1
Raisecom(config-vlan1)#auto_config disable
Set successfully.
Related commands
show auto-config
Function
To enable automatically saving the configuration, use this command. To disable this function,
use the disable form of this command.
Format
auto_save { enable | disable }
Parameters
Parameters Description
enable Enable automatically updating versions and configurations
disable Disable automatically updating versions and configurations
Default conditions
Disabled
Command mode
Global configuration
User level
15
Usage guidelines
Scenario
You can obtain the IP address of the TFTP server through DHCP and load configuration files
which will be automatically saved after being loaded.
Prerequisite
You need to pre-configure the FTP server or TFTP server and ensure that the connection
between the server and the device is normal.
Follow-up procedure
N/A
Precaution
Use it with caution. The outage of the device and interruption of services may occur if you
download new system softwares. We recommend you backing up the original files through
the upload command before downloading new files.
Examples
This example shows how to enable automatically saving the configuration.
Raisecom#config
Raisecom(config)#auto_save enable
Set successfully.
Related commands
show auto-config
Function
To enable successfully load configuration files and configure auto-save time, use this
command.To disable this function, use the no form of this command.
Format
auto_load time hour minute second
no auto_load time hour minute second
Parameters
Parameters Description
hour Hour, an integer, ranging from 0 to 23
minute Minute, an integer, ranging from 0 to 59
second Second, an integer, ranging from 0 to 59
Default conditions
Current configurations are saved upon the configuration files are successfully loaded.
Command mode
Global configuration
User level
15
Usage guidelines
Scenario
You can obtain the IP address of the TFTP server through DHCP and load configuration files
which will be automatically saved after being loaded.
Prerequisite
You need to pre-configure the FTP server or TFTP server and ensure that the connection
between the server and the device is normal.
Follow-up procedure
N/A
Precaution
Use it with caution. The outage of the device and interruption of services may occur if you
download new system softwares. It is recommended that you should back up the original files
through the upload command before downloading new files.
Example
This example shows how to configure the auto-save time to 3 hours, 15 minutes, and 20
seconds.
Raisecom#config
Raisecom(config)#auto_load time 3 15 20
Set successfully.
Related commands
show auto-config
Function
To show information about versions and configurations updated automatically, use this
command.
Format
show auto_config
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
15
Usage guidelines
Scenario
You can use this command to show information about versions and configurations updated
automatically.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to show information about versions and configurations updated
automatically.
Raisecom#show auto_config
Index 0 Auto config:disable
Auto save:enable
Config-saving time:0:0:0
System update state :Idle
Config update state:Idle
System upgrade result:successful
Cfg update result:successful
System file name:
Configuration file name:
Related commands
auto_config enable
Function
To show the configuration files in the buffer, use this command.
Format
show buffer_config
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
15
Usage guidelines
Scenario
You can use this command to show the the configuration files in the buffer.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to show the configuration files in the buffer.
Raisecom#show buffer_config
Configuration file name:
Configuration: (null
Related commands
clear buffer_config
Function
To configure description of the interface, use this command. To disable this function, use the
no form of this command.
Format
description string
no description
Parameters
Parameter Description
string Description, a string of 1 to 64 characters
Default conditions
The interface is not configured with description information.
Command mode
Physical interface configuration/VLAN interface configuration/Loopback interface
configuration/Tunnel interface configuration/Aggregation group configuration
User level
11
Usage guidelines
Scenario
You can use this command to add description of the interface for remarking and describing
the interface.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the description of loopback interface 1 as test.
Raisecom#config
Raisecom(config)#interface loopback 1
Raisecom(config-loopback1)#description test
Set successfully.
Related commands
show interface
Function
To show information about the interface, use this command.
Format
show interface [ interface-type interface-number ]
Parameters
Parameter Description
interface-type Interface type:
vlan: logical interface, VLAN interface
loopback: logical interface, loopback interface
port-channel: logical interface, LAG interface
tengigaethernet: physical interface, 10 Gbit/s interface
gigaethernet: physical interface, 1000 Mbit/s interface
fastethernet: physical interface, 100 Mbit/s interface
interface-number Interface ID, the value vary with different models and interface
types:
vlan: 1 to 4094
loopback: 1 to 16
port-channel: 1 to 8; 1.x to 8.x (x = 1 to 4094)
gigaethernet: 1/1/1 to 1/1/24
fastethernet: 1/0/1
ten gigaethernet: 1/1/25 to 1/1/28
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show configurations about 1000 Mbit/s interface 1.
Raisecom#show interface gigaethernet 1/1/1
loopback1 is UP, administrative status is UP
Internet Address is 0.0.0.0/0
MTU 16436 bytes, BW 0 Kbit, DLY 0 usec
Field Description
Admin status Interface configuration status
Hardware Interface hardware status
MAC MAC address of the interface
Internet Address IP address of the interface
Route Port Routed interface
TPID Interface TPID
MTU Maximum transmission unit on the interface
Field Description
Duplex Duplex mode
Speed Speed
Flowcontrol Flow control status
Input Statistics Received statistics
InOctets Number of bytes received
InUcastPkts Number of unicast packets received
InMulticastPkts Number of multicast packets received
InBroadcastPkts Number of broadcast packets received
Error Statistics (Both Input Error statistics received and sent
And Output)
DiscardEvents(Pkts) Number of dropped packets
CRCAlignErrors(Pkts) Number of error packets
UndersizePkts Number of undersized packets
OversizePkts Number of oversized packets
Fragments(Pkts) Number of fragmented packets
Jabbers(Pkts) Number of Jabber packets
Collisions(Pkts) Number of collision packets
TooLongPkts(Pkts) Number of oversized packets
Output Statistics Tx normal packet statistics
OutOctets Total bytes of Tx data. The unit is Byte.
OutUcastPkts Number of Tx unicast packets
OutMulticastPkts Number of multicast packets sent
OutBroadcastPkts Number of broadcast packets sent
Output Error Statistics Error statistics sent
OutputError(Pkts) Number of error packets
OutputDiscard(Pkts) Number of dropped packets
Abort(Pkts) Number of packets lost
Deferred(Pkts) Number of delayed packets
LateCollisions(Pkts) Number of late collision packets
NoCarrier(Pkts) Number of packets without carrier
LostCarrier(Pkts) Number of packets with carrier loss
Field Description
MacTransmitError(Pkts) MAC transmission error packets
Related commands
show interface
1.7.3 shutdown
Function
To disable the physical interface, use this command. To enable the interface, use no form of
this command.
Format
shutdown
no shutdown
Parameters
N/A
Default conditions
The interface is on.
Command mode
Physical interface configuration/VLAN interface configuration/Loopback interface
configuration/Tunnel interface configuration/Aggregation group configuration
User level
5
Usage guidelines
Scenario
The interface cannot receive and send packets after being disabled.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to disable 1000 Mbit/s interface 1.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#shutdown
Set successfully.
Related commands
show interface
Function
To enter 100 Mbit/s SNMP physical interface configuration mode, use this command.
Format
interface fastethernet interface-number
Parameters
Parameter Description
interface-number In form of unit/slot/port, with the value of unit being 1,
The Slot is the number of slot which houses the interface,
an integer, with the value being 0
The port is the interface ID, an integer, with the value of 1
Default conditions
N/A
Command mode
Global configuration/Physical layer interface configuration/VLAN interface
configuration/Loopback interface configuration/Tunnel interface configuration/Aggregation
group configuration
User level
11
Usage guidelines
N/A
Examples
This example shows how to enter SNMP interface configuration mode in global configuration
mode.
Raisecom#config
Raisecom(config)#interface fastethernet 1/0/1
Raisecom(config-fastethernet1/0/1)#
Related commands
N/A
Function
To enter 1000 Mbit/s physical interface configuration mode, use this command.
Format
interface gigaethernet interface-number
Parameters
Parameter Description
interface-number In form of unit/slot/port
The value varies with interface type.
Default conditions
N/A
Command mode
Global configuration/Physical layer interface configuration/VLAN interface
configuration/Loopback interface configuration/Tunnel interface configuration/Aggregation
group configuration
User level
11
Usage guidelines
N/A
Examples
This example shows how to enter 1000 Mbit/s interface 1.
Raisecom#config
Related commands
N/A
Function
To enter 10 Gbit/s interface configuration mode, use this command.
Format
interface tengigaethernet interface-number
Parameters
Parameter Description
interface-number In form of unit/slot/port
The value varies with interface type.
Default conditions
N/A
Command mode
Global configuration/Physical layer interface configuration/VLAN interface
configuration/Loopback interface configuration/Tunnel interface configuration/Aggregation
group configuration
Usage guidelines
N/A
Examples
This example shows how to enter 10 Gbit/s interface 1.
Raisecom#config
Raisecom(config)#interface tengigaethernet 1/3/1
Raisecom(config-tengigaethernet1/3/1)#
Related commands
N/A
Function
To enter VLAN interface configuration mode, use this command.
Format
interface vlan vlan-id
Parameters
Parameter Description
vlan-id VLAN ID, an integer, ranging from 1 to 4094
Default conditions
N/A
Command mode
Global configuration/Physical layer interface configuration/VLAN interface
configuration/Loopback interface configuration/Tunnel interface configuration/Aggregation
group configuration
User level
11
Usage guidelines
Scenario
You can use this command to enter VLAN interface configuration mode.
Prerequisite
VLAN is created through the vlan command or create vlan command.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to create VLAN and enter VLAN interface 1 configuration mode.
Raisecom#config
Raisecom(config)#create vlan 1 active
Raisecom(config)#interface vlan 1
Raisecom(config-vlan1)#
Related commands
show interface
Function
To enter or to create and enter tunnel interface configuration mode, use this command.
Format
interface tunnel interface-number
Parameters
Parameter Description
The Slot is the number of slot which houses the interface,
interface-number
an integer, with the value being 1
The port is the interface ID, an integer, with value ranging
from 1 to 128
Default conditions
N/A
Command mode
Global configuration/Physical layer interface configuration/VLAN interface
configuration/Loopback interface configuration/Tunnel interface configuration/Aggregation
group configuration
User level
11
Usage guidelines
N/A
Examples
This example shows how to enter Tunnel interface 1.
Raisecom#config
Raisecom(config)#interface tunnel 1/1/1
Raisecom(config-tunnel1/1/1)#
Related commands
show interface
Function
To enter or to create and enter aggregation group interface configuration mode, use this
command.
Format
interface port-channel channel-number
Parameters
Parameter Description
port-channel channel-number Aggregation group interface ID, an integer, ranging
from 1 to 32
Default conditions
N/A
Command mode
Global configuration/Physical layer interface configuration/VLAN interface
configuration/Loopback interface configuration/Tunnel interface configuration/Aggregation
group configuration
User level
11
Usage guidelines
N/A
Examples
This example shows how to enter aggregation group configuration mode of aggregation group
1.
Raisecom#config
Raisecom(config)#interface port-channel 1
Raisecom(config-gigaethernet-channel1)#
Related commands
N/A
Function
To enter or to create and enter loopback interface configuration mode, use this command.
Format
interface loopback interface-number
Parameters
Parameter Description
interface-number Loopback interface ID, an integer, ranging from 1
Default conditions
N/A
Command mode
Global configuration/Physical layer interface configuration/VLAN interface
configuration/Loopback interface configuration/Tunnel interface configuration/Aggregation
group configuration
User level
11
Usage guidelines
N/A
Examples
This example shows how to enter loopback interface1.
Raisecom#config
Raisecom(config)#interface loopback 1
Raisecom(config-loopback1)#
Related commands
show interface
1.7.11 port-type
Function
To configure SFP interface connection mode, use this command.
Format
port-type { 1000base_t1 | 1000base_t2 | 1000base_x | 100base_fx | 100base_tx |
10Gbase_r }
Parameters
Parameter Description
Default conditions
N/A
Command mode
Physical layer interface configuration mode
User level
15
Usage guidelines
N/A
Examples
This example shows how to configure interface 1/1/25 as 1000 Mbit/s optical interface.
Raisecom#config
Raisecom(config)#interface gigaethernet1/1/25
Raisecom(config-gigaethernet1/1/25)#port-type 1000base_x
Set successfully.
Related commands
show interface
1.7.12 duplex
Function
To configure the duplex mode for the interface, use this command.
Format
duplex { auto | full | half }
Parameters
Parameter Description
Default conditions
The duplex mode of electrical interfaces and 1000 Mbit/s optical interfaces is auto-
negotiation.
The duplex mode of 100 Mbit/s optical interfaces is full duplex.
Command mode
Physical layer interface configuration mode
User level
5
Usage guidelines
Scenario
The working mode of the Ethernet physical layer is divided into half duplex and full duplex.
In half duplex mode, the interface can only receive or send data. However, in full duplex
mode, the interface can receive and send data concurrently at any time. Auto-negotiation
means that the device at the ends of the physical links can automatically choose duplex modes
through information exchanging. Once negotiated, they can use the same duplex mode to
transmit data.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The 100 Mbit/s and 1000 Mbit/s optical interfaces cannot be configured to half duplex mode.
Examples
This example shows how to configure the duplex mode on interface 1/9 to half duplex mode.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/9
Raisecom(config-gigaethernet1/1/9)#duplex half
Set successfully.
Related commands
show interface port
speed
Function
To enable L2 protocol Peer STP, use this command. To disable the function, use the no form
of this command.
Format
l2protocol peer stp
no l2protocol peer stp
Parameters
N/A
Default conditions
The L2protocol Peer STP is disabled.
Command mode
Physical interface configuration/Aggregation group configuration
User level
11
Usage guidelines
Scenario
To interwork with the device which sends STP packets with the destination MAC address of
0180.C200.0008, you need to configure L2Protocol Peer STP. When you enable the function,
the BPDU destination MAC address sent by the STP will be 0180.C200.0008. Otherwise, it
will be 0180.C200.0000.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable L2protocol Peer STP on interface 1/1/9.
Raisecom#config
Raisecom(config)#interface gigaethernet1/1/9
Raisecom(config-gigaethernet1/1/9)#l2protocol peer stp
Set successfully.
Related commands
show l2protocol peer stp port
1.7.14 flowcontrol on
Function
To enable or disable 802.3x flow control on the interface, use this command.
Format
flowcontrol { receive | send } { off | on }
Parameters
Parameter Description
Default conditions
The flow control on all interfaces is disabled.
Command mode
Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
IEEE 802.3x is a method for controlling traffic on the full duplex Ethernet data link layer.
After the flow control is enabled by this command, the local end will send Pause frames to the
remote ends if network congestions occur for deferring data transmission.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable the flow control over data to be received on the interface.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#flowcontrol receive on
Set successfully.
Related commands
show interface
1.7.15 medium-priority
Function
To configure priority for Combo interface (which means to choose optical interface over
electrical interface or vice versa), use this command.
Format
medium-priority { copper | fiber }
Parameters
Parameter Description
copper Electrical interface
fiber Optical interface
Default conditions
Electrical interface is preferred.
Command mode
Physical layer interface configuration mode
User level
15
Usage guidelines
Scenario
You can use this command to configure the priority for Combo interface to choose optical
interface or electrical interface as the preferential mode.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure Combo interface 1/1/25 to be in electrical mode in
preference to the other mode.
Raisecom#config
Raisecom(config)#interface gigaethernet1/1/25
Raisecom(config-gigaethernet1/1/25)#medium-priority fiber
Set successfully.
Related commands
show combo configuration
1.7.16 mdi
Function
To configure MDI/MDIX on electrical interfaces, use this command.
Format
mdi { xover | auto | normal }
Parameters
Parameter Description
xover Crossover mode
auto Auto MDI/MDIX mode
normal Normal straight-through mode
Default conditions
N/A
Command mode
Physical layer interface configuration mode
User level
15
Usage guidelines
Scenario
Ethernet cables are classified into two categories: straight-through cables and cross-over
cables. The straight-through cable is connected to the Medium Dependent Interface (MDI)
while the cross-over cable is connected to the Medium Dependent Interface cross-over (MDI-
X).
MDI provides a physical and circuit connection between the terminal device and the relaying
devices. MDIX is used for connection between same devices (the terminal device and the
terminal device). Hosts and routers support MDI while hubs and switches support MDI-X. In
general, the straight-through cable is used to connect two different devices while the cross-
over cable is used to connect two same devices.
With the Auto MDI, you can connect two devices regardless of whether straight-through
cables or cross-over cables are used. We recommend you to choose this mode for its
applicability. When you must choose from a straight-through cable or a crossover cable to
connect devices, you can choose the normal mode or the across mode.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The command takes effect only on the condition that the ISCOM2600G switch uses 10BASE-
T, 100BASE-TX, and 1000BASE-T electrical interface module.
MDI wiring configurations will affect the operating status of interface and MDI wirings. If
MDI configurations are mismatched, the interface may be in Link Down status.
Examples
This example shows how to configure using cross mode on interface 1/1/1.
Raisecom#config
Raisecom(config)#interface gigaethernet1/1/1
Raisecom(config-gigaethernet1/1/1)#mdi xover
Set successfully.
Related commands
show interface port
1.7.17 media-type
Function
To configure the electrical/optical mode on Combo interface, use this command.
Format
media-type { auto | fiber | copper }
Parameters
Parameter Description
Default conditions
The optical/electrical mode on Combo interface is auto.
Command mode
Physical layer interface configuration mode
User level
15
Usage guidelines
Scenario
Combo interface can automatically and mandatorily choose transmission media. If the
interface is configured with automatic selection mode, and the optical cable and electrical
cable are well connected, it will select one from the two to serve as transmission media. In
this case, if the current transmission media fails, the interface will automatically choose the
other transmission media to continue transmitting data. However, if the interface is configured
with mandatory selection of optical interface or electrical interface, it will only use the
transmission media selected to transmit data.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure using optical interface on interface 1/1/25.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/25
Raisecom(config-gigaethernet1/1/25)#media-type fiber
Set successfully.
Related commands
show combo configuration
1.7.18 speed
Function
To configure the rate on the physical interface, use this command.
Format
speed { auto | 10 | 100 | 1000 | 10000 }
Parameters
Parameter Description
auto Auto-negotiation
10 Mandatorily 10 Mbit/s
100 Mandatorily 100 Mbit/s
1000 Mandatorily 1000 Mbit/s
10000 Mandatorily 10000 Mbit/s
Default conditions
The rate on electrical interfaces and 1000 Mbit/s optical interfaces is auto negotiable.
The rate on 100 Mbit/s optical interfaces is 100 Mbit/s.
Command mode
Physical layer interface configuration mode
User level
5
Usage guidelines
Scenario
When the rate on the interfaces of two connected devices is not in conformity, the
communication between the two devices may be disconnected. However, you can use this
command to configure the interface rate to match them.
Auto-negotiation means that the device at the ends of the physical link automatically choose
rate through information exchanges, once negotiated, the devices will transmit data at the
same rate.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The rate on 100 Mbit/s electrical interfaces can not be configured as 1000 Mbit/s.
The rate on 100 Mbit/s optical interfaces can be only configured as 100 Mbit/s.
Examples
This example shows how to configure the rate on interface 1 as 10 Mbit/s.
Raisecom#config
Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#speed 10
Set successfully.
Related commands
duplex
show interface port
1.7.19 mtu
Function
To configure the Maximum Transmission Unit (MTU) on the interface, which means the
interface will fragment IP packets once the length of them exceeds the MTU, use this
command. To disable this function, use the no form of this command.
Format
mtu max-frame-length
no mtu
Parameters
Parameter Description
max-frame-length Maximum frame length, an integer, ranging from 46 to 9600, in
units of B
Default conditions
The MTU on the interface is 1500.
Command mode
VLAN interface configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the MTU on the physical layer interface or
aggregation group interface. The MTU on the peer interface should be taken into
consideration while interfaces are transmitting packets mutually.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the MTU on 1000 Mbit/s interface 1 to 1800 B.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#mtu 1800
Set successfully.
Related commands
show interface
1.7.20 tpid
Function
To configure the Tag Protocol Identifier (TPID) on the interface, use this command.
Format
tpid { 8100 | 9100 | 88a8 }
Parameters
Parameter Description
8100 Configure the TPID value to 0x8100.
9100 Configure the TPID value to 0x9100.
88a8 Configure the TPID value to 0x88a8.
Default conditions
The TPID on the interface is 0x8100.
Command mode
Physical interface configuration/Aggregation group configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the TPID on the interface.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the TPID on 1000 Mbit/s interface 1 to 0x88a8.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet 1/1/1)#tpid 88a8
Set successfully.
Related commands
show interface
1.7.21 jumboframe
Function
To configure the maximum length of frame allowed on the interface, use this command.
Format
jumboframe frame-size
Parameters
Parameter Description
frame-size Maximum length of frame, an integer, ranging from 1522 to
13312 bytes, with the length being 13312 bytes by default
Default conditions
N/A
Command mode
Physical interface configuration/Aggregation group configuration
User level
11
Usage guidelines
Scenario
Jumbo Frame is a standard MTU size frame format defined by vendors, which is used for
solving the problem of the transmission efficiency of fast Ethernet. The definition of frame
size is vendor-dependent. Therefore, you need to adjust the maximum length of frame while
connecting the device to devices from other vendors to ensure communication between them.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the maximum length of frame allowed on 1000 Mbit/s
interface 1 to 2046 bytes.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#jumboframe 2046
Set successfully.
Related commands
show interface
1.7.22 vibration-suppress
Function
To configure the suppression period for interface vibration, use this command.
Format
vibration-suppress peroid second
Parameters
Parameter Description
peroid second Suppression period, an integer, ranging from 1 to 600s
Default conditions
The suppression period is 3s.
Command mode
Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
In the network application, interfaces will be in Up and Down status alternately caused by
various reasons such as physical interface interference and configuration errors in link layer,
which may lead to the repeated vibration of routing protocols, thus leading to the crash of
some devices and unavailability of network.
You can use this command to configure the suppression period for interface vibration to
reduce the frequency of Up and Down alternation.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the suppression period for interface vibration to 60s.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#vibration-suppress peroid 60
Set successfully.
Related commands
show interface
Function
To show L2protocol Peer STP status on the interface, use this command.
Format
show l2protocol peer stp interface-type interface-number
Parameters
Parameter Description
interface-number Interface ID
The form and value depend on the interface type.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
You can use this command to show L2protocol Peer STP status:
When L2protocol Peer STP is enabled, the destination MAC address for sending STP
BPDU is 0180.C200.0008.
When L2protocol Peer STP is disabled, the destination MAC address for sending STP
BPDU is 0180.C200.0000.
Examples
This example shows how to show L2protocol Peer STP status on interface 1/1/1.
Raisecom#show l2protocol peer stp gigaethernet1/1/1 1
PORT ID STP dst mac change state
--------------------------------------------------
gigaethernet1 disable
Field Description
Port ID Physical interface ID
STP dst mac change L2protocol Peer STP status
state enable: enabled
disable: disabled
Related commands
N/A
Function
To enable interface statistics, use this command. To disable this function, use the no form of
this command.
Format
statistics { enable | disable }
Parameters
Parameter Description
enable Enable interface statistics.
disable Disable interface statistics.
Default conditions
The statistics of physical interface is enabled while the statistics of logical interface is
disabled.
Command mode
VLAN interface configuration
User level
11
Usage guidelines
Scenario
You can use this command to enable statistics of logical interface.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable statistics of VLAN subinterfaces.
Raisecom#config
Raisecom(config)#interface vlan 1
Raisecom(config-vlan1)#statistics enable
Set successfully.
Related commands
show interface
Function
To clear interface statistics, use this command.
Format
clear interface statistics
Parameters
N/A
Default conditions
N/A
Command mode
Global configuration/Physical layer interface configuration/VLAN interface
configuration/Loopback interface configuration/Tunnel interface configuration/Aggregation
group configuration
User level
11
Usage guidelines
Scenario
You can use this command to clear interface statistics.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
History records cannot be recovered once statistics is cleared. Use it with caution.
Examples
This example shows how to clear Ethernet interface statistics.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#clear interface statistics
Set successfully.
Related commands
show interface
Function
To show configurations on the Combo interface, use this command.
Format
show combo configuration interface-type interface-number
Parameters
Parameter Description
interface-number Interface ID
The form and value depend on the interface type.
Default conditions
N/A
Command mode
Any command
User level
5
Usage guidelines
N/A
Examples
This example shows how to show configurations on Combo interface 1/1/25.
Raisecom#show combo configuration gigaethernet1/1/25
f:Fiber
c:copper
Combo priority: Fiber
Media-type Mode: Auto
Port Status speed/duplex mdi flowcontrol(R/S)
--------------------------------------------------------------
gigaethernet1/1/25(f) inactive 1000/full -- off/off
gigaethernet1/1/25(c) active 100/full auto on/on
Field Description
f:Fiber Optical interface
c:copper Electrical interface
Combo priority Optical/electrical priority on Combo interface
Fiber: prefer optical interface
Copper: prefer electrical interface
Media-type Mode Optical/electrical selection mode
Copper-forced: mandatorily use electrical interface
Fiber-forced: mandatorily use optical interface
Auto: automatically choose modes
Port Interface ID
Status Status of physical interface
Only one type of the Combo interface is in active status.
active: in active status
inactive: in inactive status
speed/duplex Speed on Combo interface and duplex mode
mdi MDI/MDIX mode when the Combo interface is an
electrical interface
flowcontrol(R/S) Flow control status of Combo interface (receive/send)
Related commands
N/A
Function
To enable the Console interface, use this command. To disable this function, use the close
form of this command.
Format
console { close | open }
Parameters
Parameter Description
close Disable the Console interface.
open Enable the Console interface.
Default conditions
The Console interface is disabled.
Command mode
Global configuration
User level
15
Usage guidelines
Scenario
You can use this command to enable or disable the Console interface in non-Console sessions.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
You cannot disable Console interface in console sessions.
The Console interface will be unavailable once it is disabled through the console close
command. Use it with caution.
Examples
This example shows how to enable the Console interface.
Raisecom#config
Raisecom(config)#console open
Set successfully.
Related commands
N/A
Function
To enable users to send trap during login or logout, use this command. To disable this
function, use the no form of this command.
Format
login-trap { enable | disable }
Parameters
Parameter Description
enable Enable users to send Trap during login or logout.
disable Disable users to send Trap during login or logout.
Default conditions
Disabled
Command mode
Global configuration
User level
15
Usage guidelines
Scenario
You can use this command to control the device to send or not send Trap during login or
logout.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the device to send Trap during user login.
Raisecom#config
Raisecom(config)#login-trap enable
Set successfully.
Related commands
N/A
Function
Configure the system clock display mode, use this command.
Format
clock display { default | utc }
Parameters
Parameter Description
default Default mode
utc UTC mode
Default conditions
The system clock display mode is default.
Command mode
Privileged EXEC
User level
11
Usage guidelines
Scenario
You can use this command to configure the system clock display mode.
The Universal Time Coordinated (UTC) is the Greenwich Mean Time (GMT).
Default mode: 2014-04-09,12:14:50.099
UTC mode: 09.04.2014-12:24:52-CCT
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the system display mode as UTC mode.
Raisecom#clock display utc
Set Successfully
Related commands
show clock
Function
To configure the system time and date, use this command.
Format
clock set hour minute second year month day
Parameters
Parameter Description
hour Hour, an integer, ranging from 0 to 23
minute Minute, an integer, ranging from 0 to 59
second Second, an integer, ranging from 0 to 59
year Year, an integer, ranging from 2000 to 2099
month Month, an integer, ranging from 1 to 12
day Day, an integer, ranging from 1 to 31
Default conditions
The system time is "1970-01-01,08:00:00".
Command mode
Privileged EXEC
User level
11
Usage guidelines
Scenario
You can use this command to configure the system time for the device. Configurations will be
invalid once the device is powered off.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the current system time to 1/12013 08:00:00.
Raisecom#clock set 8 0 0 2013 1 1
Set successfully
Related commands
show clock
Function
To enable Daylight Saving Time (DST), use this command. To disable this function, use the
disable form of this command.
Format
clock summer-time { enable | disable }
Parameters
Parameter Description
enable Enable DST.
disable Disable DST.
Default conditions
DST is disabled.
Command mode
Privileged EXEC
User level
11
Usage guidelines
Scenario
DST is a convention established by people for saving resources. It is earlier in summer than in
winter at sunrise. To reduce evening usage of incandescent lighting and save energy, clocks
are adjusted forward.
Prerequisite
N/A
Follow-up procedure
You can use the clock summer-time recurring command to configure related parameters of
DST.
Precaution
When DST is enabled, all synchronized time obtained through SNTP will be translated into
local DST.
Examples
This example shows how to enable DST.
Raisecom#clock summer-time enable
Set successfully
Related commands
show clock summer-time recurring
Function
To configure the start time, end time and time offset of DST, use this command.
Format
clock summer-time recurring { start-week | last } { sun | mon | tue | wed | thu | fri | sat }
start-month hour minute { end-week | last } { sun | mon | tue | wed | thu | fri | sat } end-
month- hour minute offset
Parameters
Parameter Description
start-week Week when DST begins, an integer, ranging from 1 to 4
last DST begins or ends in the last week of a month.
Parameter Description
sun DST begins or ends on Sunday of a week.
mon DST begins or ends on Monday of a week.
tue DST begins or ends on Tuesday of a week.
wed DST begins or ends on Wednesday of a week.
thu DST begins or ends on Thursday of a week.
fri DST begins or ends on Friday of a week.
sat DST begins or ends on Saturday of a week.
start-month Month when DST begins, an integer, ranging from 1 to 12
hour Hour when DST begins or ends, an integer, ranging from 0 to 23
minute Minute when DST begins or ends, an integer, ranging from 0 to 59
end-week Week of the month when DST ends, an integer, ranging from 1 to 4
end-month Month when DST ends, an integer, ranging from 1 to 12
offset Time offset of DST, an integer, ranging from 1 to 1440, in units of second
Default conditions
N/A
Command mode
Privileged EXEC
User level
11
Usage guidelines
Scenario
After DST is enabled, the system time will be adjusted forward according to the configured
time offset when DST begins. When DST ends, the system time will automatically returns to
the Coordinated Universal Time (UTC).
Prerequisite
The DST is enabled through the clock summer-time enable command.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure DST to begin at 02:00 am, the second Sunday of April,
and end at 02:00 am, the second Sunday of September. During this period, the clock is
adjusted forward an hour.
Raisecom#clock summer-time recurring 2 sun 4 2 0 2 sun 9 2 0 60
Set successfully
Related commands
clock summer-time enable
show clock summer-time recurring
Function
To configure the time zone of the system time, use this command. To return to the default
condition, use the no form of this command.
Format
clock timezone { + | - } hour minute timezone-name
no clock timezone
Parameters
Parameter Description
+ Time zones in the Eastern Hemisphere
- Time zones in the Western Hemisphere
hour Time zone offset hour, an integer, ranging from 0 to 11
minute Time zone offset minute, an integer, ranging from 0 to 59
timezone-name Time zone name, a string of 1 to 7 characters
Default conditions
The system time is GMT + 8:00.
Command mode
Privileged EXEC
User level
11
Usage guidelines
Scenario
You can use this command to configure the time zone of the system time. The time offset of
both the Eastern and Western Hemispheres is based on the Greenwich Mean Time (GMT).
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the system time being in the time zone of Western
Hemisphere and how to set the time offset to 05:40:00.
Raisecom#clock timezone - 5 40 CCT
Set successfully
This example shows how to return the system time zone to the default condition.
Raisecom#no clock timezone
Set successfully
Related commands
show clock
Function
To configure the IP address of the device's peer (regard the device as a main peer) in the peer
working mode, use this command. To delete this configuration, use the no form of this
command.
Format
ntp peer ip-address [ version version-number ]
no ntp peer ip-address
Parameters
Parameter Description
ip-address IP address of the remote peer, in dotted decimal notation, such as
10.10.1.1
Parameter Description
version NTP version
The default value is v3 if the parameter is not configured.
version-number Version number, the value is v1, v2 or v3
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
This device supports two NTP working modes: peer mode and Client/Server mode
The peer is divided into initiative peer and passive peer in the peer mode, the two can
synchronize mutually, and the peer with small number of layers synchronizes with the peer
with large number of layers.
You just need to configure the NTP command at the initiative peer and are of no need to
configure it at the passive peer in the peer mode. If you wish to configure this device as
initiative peer (such as A) and configure the end-to-end and peer-to-peer IP address (such as
B), you can use this command. The initiative peer (A) will send synchronous request packets,
it will be synchronized to A if the layer number of A is less than that of B after the opposite
end (B) receives it.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The same device cannot be configured as an initiative peer by this command and concurrently
as a master clock server using the ntp refclock-master command.
One device can only be configured with the IP address of one master peer, if configured more,
the last IP address takes effect.
Examples
This example shows how to configure the end-to-end and peer-to-peer IP address as 10.0.0.1.
Raisecom#config
Related commands
show ntp associations
Function
To configure the IP address of the remote server in Client/server mode, use this command. To
disable this function, use the no form of this command.
Format
ntp server ip-address [ version version-number ]
no ntp server ip-address
Parameters
Parameter Description
ip-address IP address of the remote server, in dotted decimal notation, such as
10.10.1.1
version Version of the NTP
The default version is v3 if the parameter is not configured.
version-number Version number, value is v1, v2 or v3
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
The device supports two NTP work modes: Client/server mode and peer mode.
In Client/server mode, only the Client is synchronized to the server instead of vice versa. In
this mode, you just need to configure the Client (configure the master clock on the server end).
After completion of configurations, the Client will send synchronization request packets to
the remote server. When the remote server receives the request packets, it will automatically
work in the server mode and send response packets. When the Client receives response
packets, it will filter and choose clocks, and synchronize the clock to the server.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
If you already used the ntp refclock-master command to configure the device as the NTP
master clock, configurations through this command will fail. This is because the same device
cannot be configured as the NTP master clock to serve as a server and meanwhile configured
as a Client to configure the IP address for the remote server concurrently. You can use the no
ntp refclock-master command to delete the NTP main clock before using this command.
Examples
This example shows how to configure the IP address of the NTP server as 10.0.0.1.
Raisecom#config
Raisecom(config)#ntp server 10.0.0.1
Set successfully.
Related commands
show ntp associations
Function
To configure the device as the NTP master clock (reference clock source) and serve as a
server in the Client/server mode, use this command. To disable this function, use the no form
of this command.
Format
ntp refclock-master [ ip-address ] [ stratum ]
no ntp refclock-master
Parameters
Parameter Description
ip-address IP address of the local reference clock, in dotted decimal notation,
with IP address ranging from 127.127.1.0 to 127.127.1.2
Take the local clock as the NTP master clock. The defaulted value
should be local clock 127.127.1.0 if the parameter is not configured.
stratum The layer of the tree-type NTP network topology in which the device
is, ranging from 2 to 15
The lower the layer is, the more accurate the clock is. The default
value is 8 if the parameter is not configured.
Default conditions
The device is not the NTP reference clock source.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the device as the NTP master clock and to serve as a
clock server. The Client in Clinet/server mode can be synchronized to the master clock but the
master clock cannot be synchronized to the Client.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The layer where the master clock is in must be lower than that of the Client which is to
be synchronized. Otherwise, the master clock cannot synchronize the Client. It is not
recommended that you modify the default value of the layer unless required.
If you have already used the ntp peer or ntp server command, configurations will fail.
You can use the no ntp peer or no ntp server command to delete the configuration
before reconfiguring the NTP master clock.
Examples
This example shows how to configure the device as the NTP master clock.
Raisecom#config
Raisecom(config)#ntp refclock-master
Set successfully.
Related commands
show ntp status
Function
To show system time, use this command.
Format
show clock [ summer-time-recurring ]
Parameters
Parameter Description
summer-time-recurring Show configurations about DST.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show the current system time.
Raisecom#show clock
clock display mode: default
Current system time: 1970-01-01,08:00:00
Timezone offset: -02:33-e
Field Description
clock display mode Clock display mode
Current system time Current system time, in units of millisecond
Timezone offset Time zone offset, the time in the following example is
Beijing time
Field Description
Summer time recurring DST functional status, it is enabled in the example.
Summer time start Time when the DST begins
Summer time end Time when the DST ends
Summer time Offset DST time offset
Related commands
N/A
Function
To show configurations about NTP Server or NTP Peer, use this command.
Format
show ntp associations [ detail ]
Parameters
Parameter Description
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show the connection information about the device
Raisecom#show ntp associations
Server(ip) refid stratum poll when delay offset
dispersion mode reach
(u)10.0.0.1 0.0.0.0 16 6 28 0.000000 0.000000
16.000000 0 0
(null) refid stratum poll when delay offset
dispersion mode reach
(u)10.0.0.2 0.0.0.0 16 6 18 0.000000 0.000000
16.000000 0 0
Field Description
Server(ip) IP address of clock synchronization source
refid Synchronize the synchronous clock source of the clock source.
stratum Layer of synchronization source
poll Polling period, namely, the maximum interval between two neighbor
messages, in units of second
when The period since the clock was synchronized till now, accurate to second.
delay Internet delay
offset Clock offset
dispersion Clock dispersion, that is, the maximum time error between local clock and
the reference clock.
mode Remote server mode
reach Response indicator
Related commands
ntp peer
ntp server
Function
To show the NTP status, use this command.
Format
show ntp status
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show the NTP status.
Raisecom#show ntp status
Clock status : unsynchronized
NTP peer : 0.0.0.0
NTP version : 3
NTP mode : ntpSlave
Leap : 3
Poll : 6
Stratum : 16
Precision : 2**-20
Reference clock : 0.0.0.0
Reference time : 00000000.00000000(Thu 1970-01-01,08:00:00)
Current time : 00ac1301.00000000(Mon 1970-05-11,20:30:57)
Root delay : 0.000000
Root dispersion : 0.000000
Related commands
ntp refclock-master
Function
To show SNTP configurations, use this command.
Format
show sntp
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show SNTP configurations.
Raisecom#show sntp
SNTP server address:1.1.1.1
SNTP Server Stratum Version Synchronize Time.
---------------------------------------------------------
Field Description
SNTP server address Address of the ISNTP server
SNTP Server SNTP server
Stratum Reference layer
Version Version
Synchronize Time Synchronize time.
Related commands
N/A
Function
To configure the IP address for the SNTP server in SNTP Client mode, use this command. To
disable this function, use the no form of this command.
Format
sntp server ip-address
no ntp server ip-address
Parameters
Parameter Description
ip-address IP address of the SNTP server, in dotted decimal notation, such as
10.10.1.1
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
The Simple Network Time Protocol (SNTP) is the simplified one of the Network Time
Protocol (NTP) in RFC1361. Compared with NTP, SNTP only supports server/Client mode.
You can use this command to configure the IP address of the SNTP server for devices
working in the Client mode.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the IP address of the SNTP server as 10.0.0.1.
Raisecom#config
Raisecom(config)#sntp server 10.0.0.1
Set successfully.
Related commands
show sntp
Function
To create the table item for the schedule list and execute certain command using schedule list
periodically, use this command.
Format
schedule-list list-number start date-time { mm-dd-yyyy hh:mm:ss [ every { day | week }
stop mm-dd-yyyy hh:mm:ss ] | every days-interval time-interval [ stop mm-dd-yyyy
hh:mm:ss ] }
schedule-list list-number start up-time days-after-startup hh:mm:ss [ every days-interval
time-interval [ stop days-after-startup hh:mm:ss ] ]
no schedule-list list-number [ command { command-number | all } ]
Parameters
Parameter Description
list-number Schedule number, an integer, ranging from 0 to 99
start Time when schedule begins, start executing certain command.
stop Time when schedule ends, stop executing certain command.
date-time Absolute time, start or end scheduling when the system time is the same
as the configured time.
up-time Relative time, start timing after the system is booted and start or end
scheduling after a period of configured time.
mm-dd-yyyy Date of absolute time in a format of month-day-year, such as 01-02-
2011.
Parameter Description
hh:mm:ss Time of absolute time in a format of hour-minute-second, such as
23:01:10.
days-after- Relative period, an integer, ranging from 0 to 365, in units of day, it
startup means that after how long you can start or end scheduling since the
system is booted.
every Schedule period, the frequency of scheduling
day Once a day
week Once a week
days-interval Interval, an integer, ranging from 0 to 365, in units of day, the frequency
of scheduling
time-interval Time interval, in form of hh:mm:ss, perform scheduling every how many
days and hours
command Delete schedule information of specified commands from the schedule
list. It means this command is not used for scheduling.
If you do not choose this parameter, the entire schedule list will be
deleted.
command- Command number, an integer, ranging from 0 to 99
number
all Delete the schedule information of all commands from the schedule list.
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to create a schedule list which defines the start time, end time, and
the schedule period for executing certain commands. If a command quotes from a schedule
list, the command will work periodically and automatically.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to create schedule list 1 which uses absolute time with the start time
of 01:00:00, 01-01-2011, the period of once a day, and the end time of 01:00:00, 01-01-2012.
Raisecom#config
Raisecom(config)#schedule-list 1 start date-time 01-01-2011 01:00:00
every day stop 01-01-2012 01:00:00
Set successfully.
Related commands
show schedule-list
Function
To bind the command line which needs to be periodically executed and also supports the
schedule list with the schedule list, use this command.
Format
command-string schedule-list list-number
Parameters
Parameter Description
command-string Command line character string
list-number Schedule list number, an integer, ranging from 0 to 99
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
N/A
Examples
This example shows how to bind the mls qos enable command to schedule list 2.
Raisecom#config
Raisecom(config)#mls qos enable schedule-list 2
Set successfully.
Related commands
schedule-list
Function
To show information about the schedule list, use this command.
Format
show schedule-list [ list-number ]
Parameters
Parameter Description
list-number Schedule list number, an integer, ranging from 0 to 99
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show information about the schedule list.
Raisecom#show schedule-list 1
Schedule list information
---------------------------------------------------------
Schedule list : 1
TypeReal time
Field Description
Schedule list Schedule list number
Start Time from Time when schedule starts
Period Schedule period
Stop Time Time when schedule ends
Attached Command Number of commands associated with the schedule list,
Number namely, the number of commands that use the schedule list
Command next execute Time for executing next schedule
Time
Attached commands info Attached command information
No. Number
Cnt. Schedule times
Mode Command mode
command str Command string
Related commands
schedule-list
1.10 Banner
1.10.1 banner enable
Function
To enable Banner information display, use this command. To disable this function, use the no
form of this command.
Format
banner { enable | disable }
Parameters
Parameter Description
enable Enable Banner information display.
disable Disable Banner information display.
Default conditions
The Banner information display is disabled.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
After Banner information display is enabled, the system interface will display the pre-
configured Banner information when a user log in or log out.
Prerequisite
The Banner content is configured through the banner login word message word command.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable Banner information display.
Raisecom#config
Raisecom(config)#banner enable
Set successfully
Related commands
show banner login
Function
To configure Banner content, use this command.
Format
banner login word
Enter text message followed by the character 'word' to finish. User can stop configuration by
inputting 'Ctrl+C'
message word
Parameters
Parameter Description
word Start and end marks of Banner, in form of characters, with the length of 1
The start mark and the end mark must use the same character.
message Banner content, a string of 1 to 2560 characters
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
Banner is a prompt, such as notices and disclaimers, displayed on the system interface when
users log in to or log out the device.
When users log in to or log out from the device, the pre-configured Banner will display on the
system interface. You can use this command to configure Banner content.
Prerequisite
N/A
Follow-up procedure
You can use the banner enable command to enable Banner information display.
Precaution
If the message to be shown through the show running-config or show startup-config
command contains a space, carriage return, or line break, use "" to embrace it.
If you wish to end configuring parameters of message, you can use "Ctrl+C".
Examples
This example shows how to configure the content of the Banner as: Welcome To Raisecom,
and the word parameter is @.
Raisecom#config
Raisecom(config)#banner login @
Enter text message followed by the character @ to finish.User can stop
configuration by inputing Ctrl+c;
Welcome To Raisecom @
Set successfully.
Related commands
show banner login
Function
To clear Banner contents, use this command.
Format
clear banner login
Parameters
N/A
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to clear the pre-configured Banner content.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to clear Banner content.
Raisecom#config
Raisecom(config)#clear banner login
Raisecom(config)#
Related commands
show banner login
Function
To show the enabled status and contents of Banner, use this command.
Format
show banner login
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
11
Usage guidelines
N/A
Examples
This example shows how to show the enabled status and Banner content.
Raisecom#config
Raisecom(config)#show banner login
login: Enable
Related commands
banner enable
banner login
clear banner login
1.11 Watchdog
1.11.1 watchdog enable
Function
To enable Watchdog, use this command. To disable this function, use the disable form of this
command.
Format
watchdog { enable | disable }
Parameters
Parameter Description
enable Enable Watchdog.
disable Disable Watchdog.
Default conditions
Watchdog is enabled.
Command mode
Privileged EXEC
User level
11
Usage guidelines
Scenario
The Watchdog can prevent the program from infinite circulation which can result in endless
loop. It can be used in solving the timeout issue of receiving and sending packets, thus
protecting data and circuit.
Task suspension, infinite circulation, or without kicking the dog within a period will hamper
the running of the device. However, when the device is enabled with Watchdog, the system
will automatically reboot to avoid infinite circulation and improve system stability.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable Watchdog.
Raisecom#watchdog enable
Set successfully.
Related commands
show watchdog
Function
To show Watchdog status, use this command.
Format
show watchdog
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show Watchdog status.
Raisecom#show watchdog
Watchdog function: Enable!
Field Description
Watchdog function Watchdog status
Enable: Watchdog is enabled.
Disable: Watchdog is disabled.
Related commands
N/A
2 Ethernet
2.1 MAC
2.1.1 clear mac-address
Function
To clear entries in the MAC address table, use this command.
Format
clear mac-address{ all | blackhole | static }
Parameters
Parameter Description
all Clear all MAC address entries.
blackhole Clear blackhole MAC address entries.
dynamic Clear dynamic MAC address entries.
static Clear static MAC address entries.
vlan vlan-id Clear the MAC address entry from the specified VLAN.
The vlan-id is an integer ranging from 1 to 4094.
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to clear all MAC address entries of specified type.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Executing this command will clear information about related MAC address entries and they
cannot be recovered. Use it with caution.
Examples
This example shows how to clear all MAC address entries.
Raisecom#config
Raisecom(config)#clear mac-address all
Set successfully.
Related commands
N/A
Function
To clear dynamic MAC address entries, use this command.
Format
clear mac-address dynamic { port-channel channel-number.sub-Interface ID | gigaethernet
interface-number | tengigaethernet interface-number | vlan vlan-id | mac-address}
Parameters
Parameter Description
port-channel channel- LAG interface ID, an integer, ranging from 1 to 8
number.sub-interface ID The sub-interface ID refers to sub-interface ID which is
an integer ranging from 1 to 4094.
vlan vlan-id VLAN ID, an integer, ranging from 1 to 4094
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
gigaethernet 1000 Mbit/s interface
ten interface gigaethernet 10 Gbit/s interface
mac-address Unicast MAC address, in dotted hexadecimal notation,
such as "000E.5E12.3456"
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to clear MAC address entries of specified type when maintaining
the MAC address table.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Deleting effective MAC address entries by mistake will affect the packet forwarding
performance. Use it with caution.
Examples
This example shows how to clear MAC address entries in VLAN 1.
Raisecom#config
Raisecom(config)#clear mac-address dynamic vlan 1
Set successfully.
Related commands
show mac-address
Function
To configure the aging time of MAC address entries, use this command. To return to the
default condition, use the no form of this command.
Format
mac-address aging-time second
no mac-address aging-time
Parameters
Parameter Description
second Aging time, an integer, the value ranging from 0 to 1000000 or
10 to 1000000s among which 0 means no aging.
Default conditions
The aging time is 300s.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
The aging mechanism is for updating the MAC address table to solve the issue of its limited
capacity. When the MAC address table learns and creates a dynamic entry, the aging timer
starts timing; if the MAC address table does not receive the dynamic entry within the aging
time, the entry will be deleted; otherwise, the aging timer will restart timing.
To fully utilize the address forwarding table, we can use the aging mechanism to update the
MAC address table. However, the aging mechanism of the MAC address table only takes
effect when dynamic entries are involved.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Static MAC address entries will not be aged.
Examples
This example shows how to configure the aging time of the MAC address to 600s.
Raisecom#config
Raisecom(config)#mac-address aging-time 600
Set successfully.
Related commands
show running-config
Function
To create VLAN-based blackhole MAC address entries, use this command. To disable this
function, use the no form of this command.
Format
mac-address blackhole mac-address vlan vlan-id
no mac-address blackhole mac-address vlan vlan-id
Parameters
Parameter Description
mac-address MAC address, in dotted hexadecimal notation
vlan vlan-id VLAN ID, an integer, ranging from 1 to 4094
Default conditions
N/A
Command mode
Global configuration
User level
15
Usage guidelines
Scenario
The blackhole MAC address entry can be regarded as a special static MAC address entry,
which does not have the aging time and needs to be added or deleted manually. When the
destination MAC address or source MAC address of the packet matches with the blackhole
MAC address table, the packet will be discarded. The blackhole MAC address entry is used
for preventing illegal users from sending or receiving packets, thus ensuring network security.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
When the MAC address is configured as a blackhole MAC address entry, packets with this
kind of source MAC address or destination MAC address will be discarded. Use it with
caution.
Examples
This example shows how to create a VLAN-based blackhole MAC address entry with the
MAC address of 000e.5e12.3456 and the attached VLAN of VLAN 3.
Raisecom#config
Raisecom(config)#mac-address blackhole 000e.5e12.3456 vlan 3
Set successfully.
Related commands
show mac-address blackhole
Function
To enable suppression on MAC address flapping globally, use this command. To disable this
function, use the disable form of this command.
Format
mac-address move-restrain { enable | disable }
Parameters
Parameter Description
enable Enable suppression on MAC address flapping globally.
disable Disable suppression on MAC address flapping globally.
Default conditions
The suppression on MAC address flapping globally is disabled.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
After suppression on MAC address flapping globally is enabled, interface 2 will not relearn
the MAC address if certain "MAC address + VLAN" is learned first on interface 1 and the
"source MAC address + VLAN" of the packet received on interface 2 is the same as the
"MAC address + VLAN" learned first on interface 1, which means that the original entries in
the MAC address table will not be covered. After receiving that kind of packets, interface 2
will report them to the CPU and discard them instead of forwarding them. If suppression on
MAC address flapping globally is disabled, MAC address flapping will occur and will not be
supressed.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure enabling suppression on MAC address flapping
globally.
Raisecom#config
Raisecom(config)#mac-address move-restrain enable
Set successfully.
Related commands
N/A
Function
To enable MAC address learning, use this command. To disable this function, use the disable
form of this command.
Format
mac-address learning { enable | disable }
Parameters
Parameter Description
enable Enable MAC address learning on the physical interface.
disable Disable MAC address learning on the physical interface.
Default conditions
The MAC address learning is enabled.
Command mode
VLAN configuration/Physical layer interface configuration/Aggregation group interface
configuration
User level
11
Usage guidelines
Scenario
Generally, dynamic MAC address entries are created and maintained by MAC address
learning.
When there are packets entering the interface, the device will look up to the MAC address
table for the interface associated with the destination MAC address of the packets, forward
packets out the associated interface, associate the source MAC address with the interface ID
and VLAN ID of the ingress interface, and record them to the MAC address table.
When packets on other interfaces are destined for that learned MAC address, the device can
forward the packets directly to the corresponding interface according to the MAC address
table. If the device does not find the corresponding interface for the packets with this
destination MAC address in the MAC address table, it will forward the packets out all
interfaces except the receiving interface and record the source MAC address to the MAC
address table.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable MAC address learning based on interface GE 1/1/1.
Raisecom#config
This example shows how to enable MAC address learning based on VLAN 2.
Raisecom#config
Raisecom(config)#vlan 2
Raisecom(config-vlan)#mac-address learning enable
Set successfully.
Related commands
show mac-address learning
show mac-address learning interface
Function
To configure the threshold of dynamic MAC address learning, use this command. To disable
this function, use the no form of this command.
Format
mac-address threshold threshold-value
no mac-address threshold
Parameters
Parameter Description
threshold threshold-value Threshold of dynamic MAC address learning, an integer,
ranging from 1 to 16383
Default conditions
N/A
Command mode
Physical interface configuration/Aggregation group interface configuration/VLAN
configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure dynamic MAC address learning threshold which is
based on the interface and VLAN.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure MAC address learning threshold to 200 based on
interface GE 1/1/1.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#mac-address threshold 200
Set successfully.
This example shows how to configure dynamic MAC address learning threshold to 300 based
on interface VLAN 2.
Raisecom#config
Raisecom(config)#vlan 2
Raisecom(config-vlan)#mac-address threshold 300 vlan 2
Set successfully.
Related commands
show mac-address threshold
Function
To configure an action for the MAC address table to drop unknown multicast packets, use this
command. To disable this function, use the no form of this command.
Format
mac-address multicast drop-unknown { reserved-address | vlan vlan-list }
no mac-address multicast drop-unknown { reserved-address | vlan vlan-list }
Parameters
Parameter Description
Parameter Description
vlan vlan-list Forward unregistered multicast packets within VLAN.
The vlan-list is an integer ranging from 1 to 4094.
It supports specific values, such as "1,2,3"; it also supports a
range, such as "1-3".
Default conditions
The action is reserved-address.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to discard unknown multicast packets.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the action of discarding unknown multicast packets as
reserved-address.
Raisecom#config
Raisecom(config)#mac-address multicast drop-unknown reserved-address
Set successfully.
Related commands
show mac-address multicast
Function
To create static MAC address entries, use this command. To delete this configuration, use the
no form of this command.
Format
mac-address static
unicast mac-address vlan vlan-id interface-type interface-number
no mac-address static
unicast mac-address vlan vlan-id
Parameters
Parameter Description
mac-address MAC address, in dotted hexadecimal notation
vlan-id VLAN ID, an integer, ranging from 1 to 4094
unicast Unicast address
interface-type Egress interface ID, an integer, ranging from 1 to the maximum
interface-number interface ID
Default conditions
The static MAC address is not configured.
Command mode
Global configuration
User level
15
Usage guidelines
Scenario
When the device automatically establishes a dynamic MAC address through source MAC
address learning, it cannot tell whether packets are from legal users or hackers, thus bringing
hidden danger. If hackers disguise the source MAC address of attack packets as the MAC
address of legal users and send the attack packets to the device through other interfaces, the
device will learn wrong MAC address entries and forward the packets (which should be
forwarded to users) to hackers.
To enhance the interface security, users can manually add static MAC address entries to the
MAC address table and bind the device with the interface, thus preventing hackers from
stealing data illegally.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to create static MAC entries with unicast MAC address
0001.0001.0001, attached VLAN 1, and egress interface 1/1/1.
Raisecom#config
Raisecom(config)#mac-address static unicast 0001.0001.0001 vlan 1
gigaethernet1/1/1
Set successfully.
Related commands
show mac-address static
Function
To show MAC address entries, use this command.
Format
search mac-address mac-address { all | dynamic | static } [ interface-type interface-number ]
[ vlan vlan-id ]
Parameters
Parameter Description
mac-address MAC address, in dotted hexadecimal notation
all Show all types of MAC address.
dynamic Show dynamic MAC address.
static Show static MAC address.
Parameter Description
interface-type interface- Interface ID
number The interface-type refers to interface type.
The interface-number refers to three-dimensional
interface ID.
vlan Show MAC address entries of specified VLAN.
vlan-id VLAN ID, an integer, ranging from 1 to 4094
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to show MAC address entries, if found, information about "MAC
address, interface, VLAN, and flag." will be displayed.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to show information about the entry with MAC address of
F04D.A22D.7805 in the MAC address table.
Raisecom#config
Raisecom#search mac-address F04D.A22D.7805 all
Mac Address Port Vlan Flags
---------------------------------------------------
F04D.A22D.7805 port 1 1 dynamic
Field Description
Mac Address MAC address showed
Port Interface ID
Vlan VLAN ID
Flags Type of MAC address entries
dynamic: dynamic entries with aging time
static: static entries without aging time
Related commands
N/A
Function
To show the aging time of the MAC address, use this command.
Format
show mac-address aging-time
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show the aging time of the MAC address.
Raisecom#show mac-address aging-time
Aging time: 300 seconds
Field Description
Aging time Aging time of the MAC address
Related commands
mac-address aging-time
Function
To show the number of MAC address entries, use this command.
Format
show mac-address count [ vlan vlan-id ] [ interface-type interface-number ]
Parameters
Parameter Description
vlan vlan-id VLAN ID, an integer, ranging from 1 to 4094
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show the number of MAC address entries of VLAN 2.
Raisecom#show mac-address count vlan 2
Dynamic MAC address count of VLAN 2: 0
Static MAC address count of VLAN 2: 3
Field Description
Dynamic MAC address count of VLAN 2 Number of dynamic MAC addresses of
VLAN 2
Static MAC address count of VLAN 2 Number of static MAC addresses of
VLAN 2
Blackhole MAC address count of VLAN 2 Number of blackhole MAC addresses of
VLAN 2
Other MAC address count of VLAN 2 Number of other MAC addresses of
VLAN 2
Total MAC address count of VLAN 2 Total number of MAC addresses of VLAN
2
Related commands
mac-address static
Function
To show the enabled state of MAC address automatic learning, use this command.
Format
show mac-address learning vlan-list
show mac-address learning [ interface-type interface-number ]
Parameters
Parameter Description
vlan-list VLAN list, an integer, ranging from 1 to 4094
It supports specific values, such as "2,3,4"; it also supports a range,
such as "2-4".
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Any configuration except user EXEC
Command level
5
Usage guidelines
N/A
Examples
This example shows how to show the enabled state of MAC address learning on interfaces.
Raisecom#show mac-address learning
port mac-learning-status
-----------------------------------------------
gigaethernet1/1/1 enable
gigaethernet1/1/2 enable
gigaethernet1/1/3 enable
gigaethernet1/1/4 enable
gigaethernet1/1/5 enable
gigaethernet1/1/6 enable
gigaethernet1/1/7 enable
gigaethernet1/1/8 enable
gigaethernet1/1/9 enable
Related commands
N/A
Function
To show configurations about the limit on the number of MAC address learning, use this
command.
Format
show mac-address threshold { interface-type interface-number | vlan-list }
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Parameter Description
vlan-list VLAN ID, an integer, ranging from 1 to 4094
It supports specific values, such as "1,2,3"; it also supports a
range, such as "1-3".
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show configurations about the threshold on the number of MAC
address learning.
Raisecom#show mac-address threshold
--------------------------------------------------------
Field Description
port Interface type and interface ID
Field Description
thredshold Threshold on the number of MAC address learning
Related commands
N/A
Function
To show multicast MAC address entries, use this command.
Format
show mac-address multicast [ vlan vlan-id ] [ count ]
Parameters
Parameter Description
vlan Show MAC address entries of the specified VLAN.
vlan-id VLAN ID, an integer, ranging from 1 to 4094
count Show statistics.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
Scenario
You can use the following commands to show multicast MAC address entries:
Use the show mac-address-table multicast command to show multicast MAC address
entries of all VLANs.
Use the show mac-address-table multicast vlan vlan-id command to show multicast
MAC address entries of the specified VLAN.
Use the show mac-address-table multicast count command to show statistics of
multicast MAC address entries of all VLANs.
Use the show mac-address-table multicast vlan vlan-id count command to show
statistics of multicast MAC address entries of the specified VLAN.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to multicast MAC address entries.
Raisecom#show mac-address multicast
Multicast filter mode: flood-all.
Vlan Group Address Ports[Static](Hardware)
-------------------------------------------------------
3 0100.5E05.0600 port 1 [port 1]
Field Description
Multicast filter mode Action taken for filtering multicast packets according to
the MAC address table
Filter-all: discard unregistered multicast packets
Flood-all: flood unregistered multicast packets
Vlan Attached VLAN
Group Address Multicast address
Ports[Static] (Hardware) Egress interface
This example shows how to show statistics of multicast MAC address entries.
Raisecom#show mac-address multicast count
Filter mode for unknown multicast: flood all
Current multicast address entries for all vlans: 0
Max count of multicast address entries supported by hardware:102
Field Description
Filter mode for unknownn multicast Action taken for filtering multicast packets
according to the MAC address table
Filter-all: discard unregistered multicast packets
Flood-all: flood unregistered multicast packets
Current multicast address entries for Number of current multicast address entries
all vlans
Field Description
Max count of multicast address Maximum number of multicast addresses
entries supported by hardware supported by hardware
Related commands
N/A
Function
To show MAC address entries, use this command.
Format
show mac-address { all | static | dynamic } [ vlan vlan-id ] [ interface-type interface-
number ]
Parameters
Parameter Description
all Show all MAC address entries.
static Show static MAC address entries.
dynamic Show dynamic MAC address entries.
blackhole Show blackhole MAC address entries.
vlan vlan-id VLAN ID, an integer, ranging from 1 to 4094
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
mac-address mac-address MAC address, in dotted hexadecimal notation, such as
"000E.5E12.3456"
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show static MAC address entries of VLAN 2.
Raisecom#show mac-address static vlan 2
Port Vlan Static Mac Address Priority Mac-policy None-Rate-Limit
----------------------------------------------------------------
Tu2 2 000E.5E12.3410 -- Disable --
Lo2 2 000E.5E12.3411 -- Disable --
Lo2 2 000E.5E12.3458 -- Disable --
Field Description
Port Interface ID
Vlan VLAN
Static Mac Address Static MAC address
Priority Priority
Mac-policy MAC address policy
None-Rate-Limit Non rate-limiting policy
Related commands
mac-address static
2.2 VLAN
2.2.1 create vlan
Function
To create VLAN, use this command. To delete VLAN, use the no form of this command.
Format
create vlan vlan-list active
no vlan { all | vlan-list }
Parameters
Parameter Description
vlan vlan-list VLAN list, an integer, ranging from 1 to 4094
It supports specific values, such as "2,3,4"; it also supports a
range, such as "2-4".
active VLAN is in an active status, which allows packets to pass.
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
The Virtual Local Area Network (VLAN) is a network integrating all hosts with same
properties, which shares same features with the common physical LAN.
Different hosts in the VLAN can be located at different physical locations, which can break
the limitations of traditional LAN. Different VLANs are independent and isolated from each
other, which can prevent the dissemination of broadcast storm and is conducive to the
network safety management. The internetworking between VLANs can be only realized
through switching boards or routers. You can use this command to create the static VLAN and
concurrently configure the VLAN status and priority.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to create and activate VLAN 4.
Raisecom#config
Raisecom(config)#create vlan 4 active
Set successfully
Related commands
show vlan
2.2.2 name
Function
To configure the VLAN name, use this command. To return to the default condition, use the
no form of this command.
Format
name vlan-name
no name
Parameters
Parameter Description
vlan-name VLAN name, a string of 1 to 32 characters
Default conditions
The VLAN name is in form of character string "VLAN plus 4-bit VLAN ID". For example,
the default name of VLAN 10 is "VLAN0010"; the default name of VLAN 4094 is
"VLAN4094".
Command mode
VLAN configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the VLAN name to show its specific meaning to
facilitate you in distinguishing and understanding it. For example, the VLAN name of certain
human resource department can be configured as "HR".
Prerequisite
VLAN is created by using the create vlan command.
Use the vlan command to enter VLAN configuration mode.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the name of VLAN 10 as "HR".
Raisecom#config
Raisecom(config)#create vlan 10 active
Raisecom(config)#vlan 10
Raisecom(config-vlan)#name HR
Set successfully
This example shows how to restore the name of VLAN 10 to the default condition.
Raisecom(config-vlan)#no name
Set successfully
Related commands
show vlan
Function
To show configurations and status of all VLANS or the specified VLAN, use this command.
Format
show vlan [ vlan-list | static | dynamic ] detail
Parameters
Parameter Description
vlan-list VLAN ID list, an integer, ranging from 1 to 4094
It supports specific values, such as "1,2,3"; it also supports a
range, such as "1-3".
static Show the static VLAN.
dynamic Show GVRP dynamic VLAN.
detail Show details.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show configuration and status of VLAN 2.
Raisecom#show vlan 2
Switch Mode: --
VLAN Name State Status Priority Member-Ports
2 VLAN0002 active static
Field Description
VLAN VLAN ID
Name Name
State State
Status Property
Priority Priority
Member-Ports Member interfaces
Related commands
create vlan
state
Function
Show switching configurations on the interface, use this command.
Format
show switchport interface interface-type interface-number
Parameters
Parameter Description
interface-type Interface type
Parameter Description
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show switching configurations of the 1000 Mbit/s interface (rack
1/slot 3/interface 1).
Raisecom#show switchport interface gigaethernet 1/1/1
Interface: gigaethernet1/1/1
Switch Mode: router
Reject frame type: none
Administrative Mode: access
Operational Mode: access
Access Mode VLAN: 0
Administrative Access Egress VLANs:
Operational Access Egress VLANs:
Trunk Native Mode VLAN: 0
Administrative Trunk Allowed VLANs:
Operational Trunk Allowed VLANs:
Administrative Trunk Untagged VLANs:
Operational Trunk Untagged VLANs:
Administrative private-vlan host-association:
Administrative private-vlan mapping:
Operational private-vlan: --
Field Description
Interface Interface
Switch Mode Switching mode
Reject frame type Packets which are forbidden in the egress
direction
Field Description
Administrative Mode Administrative mode
Operational Mode Operational mode
Access Mode VLAN Interface Access VLAN
Administrative Access Egress VLANs Egress VLAN list that are allowed to pass in
Access mode of administrative status
Operational Access Egress VLANs Egress VLAN list that are allowed to pass in
Access mode of operating status
Trunk Native Mode VLAN Native VLAN of Trunk interface
Administrative Trunk Allowed VLANs VLAN that are allowed to pass in Trunk mode
of administrative status
Operational Trunk Allowed VLANs VLAN that are allowed to pass in Trunk mode
of operating status
Administrative Trunk Untagged VLANs Untagged VLAN list that are allowed to pass
in Trunk mode of administrative status
Operational Trunk Untagged VLANs Untagged VLAN list that are allowed to pass
in Trunk mode of operating status
Administrative private-vlan host- Master/slave VLAN association in PVLAN of
association administrative status
Administrative private-vlan mapping Master/slave VLAN mapping in PVLAN of
administrative status
Operational private-vlan Master/slave VLAN in PVLAN of operational
status
Related commands
N/A
Function
To configure the interface as Access VLAN, use this command. To return to the default
condition, use the no form of this command.
Format
switchport access vlan vlan-id
no switchport access vlan
Parameters
Parameter Description
vlan vlan-id VLAN ID, an integer, ranging from 1 to 4094
The Access interface tags default VLAN Tags for Untagged packets and
accepts Tagged packets whose tags are the same as that of the default
VLAN but refuses Tagged packets whose tags are different from that of
the default VLAN.
Default conditions
All interfaces are Access VLAN 1.
Command mode
Physical interface configuration/Aggregation group configuration
User level
11
Usage guidelines
Scenario
When the interface is configured to Access, you need to use this command to configure
interface Access VLAN. When the VLAN Tag of the packet is the same as that of the Access
VLAN, it will be allowed to pass.
Prerequisite
You can use the portswitch command to switch the interface from the Layer 3 physical
interface mode to Layer 2 physical interface mode.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure interface GE 1/1/1 as Access interface and configure
the Access VLAN to VLAN 100.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#switchport access vlan 100
Set successfully.
Related commands
show switchport interface
switchport mode
Function
To configure the VLAN list allowed to pass through Access interface, use this command. To
return to the default condition, use the no form of this command.
Format
switchport access egress-allowed vlan { all | vlan-list } [ confirm ]
switchport access egress-allowed vlan { add | remove } vlan-list
no switchport access egress-allowed vlan
Parameters
Parameter Description
all Access interface allows all VLANs to pass.
vlan-list VLAN list allowed to pass through Access interface, an integer,
ranging from 1 to 4094
It supports specific values, such as "1,2,3"; it also supports a
range, such as "1-3".
confirm Confirmed
add Add VLANs which are allowed to pass through the interface to
the old VLAN list.
remove Delete VLANs which are allowed to pass through the interface
from the old VLAN list.
Default conditions
N/A
Command mode
Physical interface configuration/Aggregation group interface configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the VLAN list allowed to pass through the interface
in Access mode. The VLAN allowed to pass through the interface in Access mode are all
Untagged VLAN. This configuration is only effective to static VLAN but ineffective to
cluster VLANs and GVRP dynamic VLAN.
Prerequisite
The interface is configured as Access mode through the switchport mode access command.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure interface GE 1/1/1 as Access interface and configure it
to allow VLAN 100 and VLAN 200 to pass.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#switchport access egress-allowed vlan
100,200
Please input 'y' to confirm set allowed vlan: y
Set successfully.
Related commands
show switchport interface
switchport mode
Function
To configure the current interface to Access mode or Trunk mode, use this command. To
return to the default condition, use the no form of this command.
Format
switchport mode { access | trunk | private-vlan }
no switchport mode
Parameters
Parameter Description
access Configure the interface to Access mode.
trunk Configure the interface to Trunk mode.
private-vlan Configure the interface as a private VLAN.
Default conditions
All interfaces are in Access mode.
Command mode
Physical interface configuration/Aggregation group configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure interface modes.
Prerequisite
You can use the portswitch command to switch the interface from the Layer 3 physical
interface mode to Layer 2 physical interface mode.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure interface GE 1/1/1 to Access mode.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#switchport mode access
Set successfully.
Related commands
show switchport interface
Function
To configure VLAN lists allowed on the Trunk interface, use this command. To return to the
default condition, use the no form of this command.
Format
switchport trunk allowed vlan { all | vlan-list } [ confirm ]
Parameters
Parameter Description
all All VLANs are allowed.
vlan-list VLAN list, an integer, ranging from 1 to 4094
It supports specific values, such as "1,2,3"; it also supports a
range, such as "1-3".
confirm Confirmed
add Add VLANs allowed on the Trunk interface to the old VLAN
list.
remove Delete VLANs allowed on the Trunk interface from the old
VLAN list.
Default conditions
VLAN 1 is allowed to pass.
Command mode
Physical interface configuration/Aggregation group configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure VLAN lists allowed by the interface in Trunk mode,
namely, Trunk allowed list. Trunk allowed list is a reference for the Trunk interface on how to
handling packets.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure interface GE 1/1/1 as Trunk interface which allows
VLAN 100 and VLAN 200 to pass.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#switchport trunk allowed vlan 100,200
Please input 'y' to confirm set allowed vlan:[y]y
Set successfully.
Related commands
show switchport interface
Function
To configure the Native VLAN of the Trunk interface, use this command. To return to the
default condition, use the no form of this command.
Format
switchport trunk native vlan vlan-id
no switchport trunk native vlan
Parameters
Parameter Description
vlan vlan-id VLAN ID, an integer, ranging from 1 to 4094
Default conditions
The Native VLAN of Trunk interface is VLAN 1, it means only VLAN 1 is allowed to pass.
Command mode
Physical interface configuration/Aggregation group configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the Native VLAN of the Trunk interface. Native
VLAN is a reference for the Trunk interface on how to handling packets.
By default, the Native VLAN is VLAN 0. And this default Native VLAN is called default
VLAN.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure interface GE 1/1/1 as Trunk interface and VLAN 100
as Native VLAN.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#switchport trunk native vlan 100
Set successfully.
Related commands
show switchport interface
Function
To configure Untagged VLAN lists allowed on the interface in Trunk mode, use this
command. To return to the default condition, use the no form of this command.
Format
switchport trunk untagged vlan { all | vlan-list } [ confirm ]
switchport trunk untagged vlan { add | remove } vlan-list
no switchport trunk untagged vlan
Parameters
Parameter Description
all The VLAN Tag of Tagged packets sent by all Trunk interfaces are stripped
and the packets turn into untagged frames.
vlan-list VLAN list, an integer, ranging from 1 to 4094
It supports specific values, such as "1,2,3"; it also supports a range, such as
"1-3".
confirm Confirmed
Parameter Description
add Add VLAN whose Tag needs to be stripped to the old VLAN list.
remove Delete VLAN whose Tag needs to be stripped from the old
VLAN list.
Default conditions
No Tags of VLANs are stripped except that of Native VLAN.
Command mode
Physical interface configuration/Aggregation group configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the Untagged VLAN list allowed on the Trunk
interface, namely, the Trunk untagged list. The Trunk untagged list is a reference for the
Trunk interface on how to handle packets. For details, see the switchport mode command.
You can also configure this command even when the interface is not in Trunk mode.
Prerequisite
You can use the portswitch command to switch the interface from the Layer 3 physical
interface mode to Layer 2 physical interface mode.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure Untagged VLAN lists allowed on interface GE 1/1/1 in
Trunk mode to VLAN 100 and VLAN200.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#switchport trunk untagged vlan 100,200
Please input 'y' to confirm set allowed vlan:[y]y
Set successfully.
Related commands
show switchport interface
2.2.11 vlan
Function
To enter VLAN configuration mode and create VLAN automatically if it is not created, use
this command. To delete the specified VLAN, use the no form of this command.
Format
vlan vlan-id
no vlan { all | vlan-id }
Parameters
Parameter Description
vlan-id VLAN ID, an integer, ranging from 1 to 4094
all All VLANs (except the default VLAN)
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to enter VLAN configuration mode and configure a VLAN. If the
VLAN is not created, it will be created automatically.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enter the configuration mode of VLAN 100.
Raisecom#config
Raisecom(config)#vlan 100
Raisecom(config-vlan)#
Related commands
show vlan state
2.3 QinQ
2.3.1 dot1q-tunnel
Function
To enable basic QinQ on the interface, use this command. To disable this function on the
interface, use the no form of this command.
Format
dot1q-tunnel
no dot1q-tunnel
Parameters
N/A
Default conditions
Disabled
Command mode
Interface configuration
User level
11
Usage guidelines
Scenario
Basic QinQ is a simple Layer 2 VPN tunnel technology. It encapsulates outer VLAN Tag in
the private packets at the access side of the carrier, making the packets with double VLAN
Tag traverse the carrier backbone network. In the public network, packets are transmitted
according to their outer VLAN Tag while the private network VLAN Tag is transmitted as
part of the packet.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable basic QinQ on the interface.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#dot1q-tunnel
Set successfully.
Related commands
show switchport qinq
2.3.2 tpid
Function
To configure the TPID for the outer VLAN Tag, use this command. To return to the default
condition, use the no form of this command.
Format
tpid tpid
no tpid
Parameters
Parameter Description
tpid TPID value, in dotted hexadecimal notation, an integer, ranging from
0x0600 to 0xFFFF
Default conditions
The TPID of the outer VLAN Tag is 0x8100 which means that the packet is 802.1q protocol
packet.
Command mode
Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
To interwork devices from different vendors, the protocol type of the outer VLAN Tag on the
QinQ interface should be recognizable by the device connected to the QinQ interface.
The TPID value is generally configured on the network-side interface, which is for specifying
the TPID value adopted by carriers.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the TPID value of the outer VLAN Tag to 0x1000.
Raisecom#config
Raisecom(config)#interface gigaethernet1/1/1
Raisecom(config-gigaethernet1/1/1)# tpid 9100
Set successfully.
Related commands
N/A
Function
To configure the packet type which is forbidden by the interface, use this command. To
disable this function, use the no form of this command.
Format
switchport reject-frame { tagged | untagged }
no switchport reject-frame
Parameters
Parameter Description
Default conditions
N/A
Command mode
Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
After the command is configured, the responding packets will be discarded.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
When the interface is enabled with QinQ, all packets will be treated as Untagged packets. If
you configure the function of discarding Untagged packets at the same time, the Tagged
packets will be discarded either.
Examples
You can use this command to configure the interface to forbid forwarding packets with Tag.
Raisecom#config
Raisecom(config)#interface gigaethernet1/1/1
Raisecom(config-gigaethernet1/1/1)#switchport reject-frame tagged
Set successfully.
Related commands
show interface switchport
Function
To configure the selective QinQ based on the user VLAN and add the outer VLAN to the
packet according to its inner VLAN, use this command. To disable this function, use the no
form of this command.
Format
switchport vlan-mapping cvlan { custom-vlan-list | custom-vlan-id }[ cos cos-value ] add-
outer outer-vlan-id
no switchport vlan-mapping cvlan [ custom-vlan-list ]
Parameters
Parameter Description
cvlan custom-vlan-list User VLAN ID list, an integer, ranging from 1 to 4094
It supports specific values, such as "1,2,3"; it also
supports a range, such as "1-3".
add-outer outer-vlan-id Added outer VLAN ID, an integer, ranging from 1 to
4094
cos cos-value CoS value corresponding to the inner Tag, an integer,
ranging from 0 to 7
Default conditions
The selective QinQ on the interface is disabled.
Command mode
Physical interface configuration/Aggregation group configuration
User level
11
Usage guidelines
Scenario
The selective QinQ is an enhanced application of basic QinQ, which can be used to add
different outer VLAN Tags to packets received on the same interface according to their inner
VLAN Tags.
Compared with the selective QinQ, the basic QinQ has limitations, for example, it tags
packets received on the same interface with the same VLAN Tags.
You can use the following commands to achieve different goals:
Use the switchport vlan-mapping cvlan custom-vlan-list add-outer outer-vlan-id
command to configure the selective QinQ to add the outer VLAN ID to the packet
according to its inner VLAN.
Use the switchport vlan-mapping cvlan custom-vlan-id [ cos cos-value ] add-outer
outer-vlan-id [ cos cos-value ] command to configure the selective QinQ to add the outer
VLAN ID to the packet according to its inner VLAN and modify the CoS value of both
the inner and outer VLAN.
Use the switchport vlan-mapping cvlan custom-vlan-id add-outer outer-vlan-id
[ translate custom-vlan-id ] command to configure the selective QinQ to add the outer
VLAN ID to the packet according to its inner VLAN and convert the packet's inner
VLAN ID.
Use the switchport vlan-mapping cvlan custom-vlan-id add-outer outer-vlan-id
[ remove ] command to configure the selective QinQ to add the outer VLAN ID to the
packet according to its inner VLAN and delete the packet's inner VLAN.
Use the switchport vlan-mapping cvlan custom-vlan-id [ cos cos-value ] add-outer
outer-vlan-id [ cos cos-value ] [ remove ] command to configure the selective QinQ to
add the outer VLAN ID to the packet according to its inner VLAN, configure the CoS
value of the inner and outer VLAN, and delete the inner VLAN.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Do not configure the QinQ and VLAN mapping concurrently on the interface.
The cos cos-value command and the translate custom-vlan-id command cannot be configured
concurrently, and so are the cos cos-value command and the remove command.
Examples
This example shows how to add outer VLAN Tag 77 to the packet with inner VLAN Tag 7
and configure the value of CoS to 3 on interface 1.
Raisecom#config
Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#switchport vlan-mapping cvlan 7 add-
outer 77 cos 3
Set successfully.
Related commands
show switchport vlan-mapping add-outer
Function
To configure adding the TAG VLAN mapping rule based on the selective QinQ of EtherType,
use this command. To disable this function, use the no form of this command.
Format
switchport vlan-mapping ethertype { arp | eapol | flowcontro l ip | ipv6 | loopback | mpls
| mpls-mcast | pppoe | pppoedisc | user-define protocol id | x25 | x75 }add-outer outer-
vlan-id
no switchport vlan-mapping ethertype { arp | eapol | flowcontro l ip | ipv6 | loopback |
mpls | mpls-mcast | pppoe | pppoedisc | user-define protocol id | x25 | x75 }
Parameters
Parameters Description
arp Address resolution protocol
eapol EAPOL PAE/802.1x protocol
flowcontrol 802.3x flow control protocol
ip Internet protocol
ipv6 IP version 6
loopback Loop protocol
mpls MPLS unicast protocol
mpls-mcast MPLS multicast protocol
pppoe PPPOE session protocol
pppoedisc PPPOE discovery protocol
x25 X.25 Layer 3 protocol
x75 X.75 interconnection protocol
user-define User-defined protocol number
protocol id
add-outer outer- Added outer layer VLAN ID, an integer, ranging from 1 to 4049
vlan-id
Default conditions
The selective QinQ on the interface is disabled.
Command mode
Physical interface configuration
User level
11
Usage guidelines
Scenario
In physical interface configuration mode, you can use this command to configure adding the
TAG VLAN mapping rule based on the selective QinQ of EtherType.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The number of VLAN mapping rules cannot exceed the threshold. As for the same interface,
if the VLAN list in VLAN mapping rules conflicts with the existed VLAN mapping rules,
configurations will fail; if the VLAN added according to VLAN mapping rules is repetitive,
then the newly configured VLAN mapping rule will override the old one.
Examples
This example shows how to configure the selective QinQ based on EtherType with a mapping
rule of map the internal ARP to VLAN 2.
Raisecom#config
Raisecom(config)#interface gigaethernet1/1/1
Raisecom(config-gigaethernet1/1/1)#switchport vlan-mapping ethertype arp
add-outer 2
Set successfully.
Related commands
show interface switchport
Function
To configure discarding Tagged packets which do not match with the selective QinQ or
VLAN mapping rules on the interface, use this command. To disable this function, use the no
form of this command.
Format
switchport vlan-mapping-miss discard
no switchport vlan-mapping-miss
Parameters
N/A
Default conditions
N/A
Command mode
Physical layer interface configuration/Aggregation group configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the interface to filter Tagged packets according to the
selective QinQ or VLAN mapping rules to control packets.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
If not configured with the selective QinQ or VLAN mapping rules, the interface will discard
all Tagged packets upon being configured with this feature.
Examples
This example shows how to configure the interface to discard Tagged packets which do not
match with the selective QinQ or VLAN mapping rules.
Raisecom#config
Raisecom(config)#interface gigaethernet1/1/1
Raisecom(config-gigaethernet1/1/1)# switchport qinq dot1q-tunnel default-
cvlan 2
Set successfully.
Related commands
show switchport vlan-mapping translate
Function
To enable basic QinQ on the interface, add double TAG, and specify CVLAN and SVLAN to
use PVID, use this command. To disable this function, use the no form of this command.
Format
switchport qinq dot1q-tunnel default-cvlan vlan-id
no switchport qinq dot1q-tunnel default-cvlan vlan-id
Parameters
Parameter Description
vlan-id User VLAN ID, an integer, ranging from 1 to 4094
Default conditions
N/A
Command mode
Physical layer interface configuration/Aggregation group configuration
User level
15
Usage guidelines
Scenario
You can use this command to configure the default user VLAN.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure VLAN 2 as the default user VLAN.
Raisecom#config
Raisecom(config)#interface gigaethernet1/1/1
Raisecom(config-gigaethernet1/1/1)# switchport qinq default-cvlan 2
Set successfully.
Related commands
show switchport vlan-mapping translate
Function
To configure the rules of adding outer VALN bidirectionally, use this command. To disable
this function, use the no form of this command.
Format
switchport vlan-mapping both{ priority-tagged | cvlan custom-vlan-list | custom-vlan-
id }add-outer outer-vlan-id {remove | translate vlan-id }
switchport vlan-mapping both { untag | inner inner -vlan-id }add-outer outer-vlan-id
Parameters
Parameter Description
cvlan custom-vlan- User VLAN ID list, an integer, ranging from 1 to 4094.
list It supports specific values, such as "1,2,3"; it also supports a range,
such as "1-3".
add-outer outer- Add outer VLAN ID, an integer, ranging from 1 to 4094
vlan-id
remove Remove inner Tag.
Translate vlan-id Modify VLAN ID of inner Tag, an integer, ranging from 1 to 4094
inner -vlan-id Inner VLAN ID, an integer, ranging from 1 to 4094
untag Without tags
Default conditions
Disabled
Command mode
Physical layer interface configuration/Aggregation group configuration
User level
11
Usage guidelines
Scenario
The bidirectional selective QinQ is an enhanced application of basic QinQ, which can be used
to add different outer VLAN Tags to packets received on the same interface according to their
inner VLAN Tags.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Do not configure QinQ and VLAN mapping rules on the same interface concurrently.
Examples
This example shows how to add outer VLAN Tag 77 to user VLAN Tag packets 7 on GE1/1/1
interface and modify inner Tag as follows.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#switchport vlan-mapping cvlan 7 add-
outer 77 translate 3
Set successfully.
Function
To show bidirectional QinQ configurations on the interface, use this command.
Format
show vlan-mapping both interface interface-type interface-number
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show VLAN mapping rules on interface 1/1/2.
Raisecom# show vlan-mapping both interface gigaethernet 1/1/1
Both Direction VLAN QinQ mapping rule:
Interface : GE1/1/2
Default cvlan: --
--------------------------------
Hardware-IngressID: 0
Hardware-EgressID: 0
Original Outer VLANs: --
Original Outer COS: --
Original Inner VLANs: --
Original Inner COS: --
Vlan mapping Mode: C-UNTAG-S-ADD
New Outer-VID: 1
New Outer-COS: --
New Inner-VID: --
New Inner-COS: --
---------------------------
Field Description
Interface Interface ID
Default cvlan Default port cvlan
Hardware-IngressID Ingress hardware ID
Hardware-EgressID Egress hardware ID
Original Outer VLANs Original Outer VLANs
Original Outer COS Original Outer COS
Original Inner VLANs Original Inner VLANs
Vlan mapping Mode Translation action
New Outer-VID Translated outer VID
New Outer-COS Translated outer COS
New Inner-VID Translated inner VID
New Inner-COS Translated inner COS
Related commands
N/A
Function
To show QinQ configurations on the interface, use this command.
Format
show vlan-mapping interface interface-type interface-number{ add-outer | egress translate
| ingress translate }
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
add-outer Add outer Tag.
egress translate Egress translation
ingress translate Ingress translation
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show QinQ ingress rules on interface 1/1/2.
Raisecom# show vlan-mapping interface gigaethernet 1/1/8 ingress
translate
Based outer-inner VLAN QinQ mapping rule:
-----------------------------------------
Interface : gigaethernet1/1/8
Hardware-ID: 2
Original Outer VLANs: 10
Original Outer COS: --
Original Inner VLANs: --
Original Inner COS: --
Outer-tag Mode: Translate
New Outer-VID: 20
New Outer-COS: --
Inner-tag Mode: --
New Inner-VID: --
New Inner-COS: --
The following table describes fields in the command output.
Field Description
Interface Interface ID
Hardware-ID Hardware-ID
Original Outer VLANs Original Outer VLAN
Original Outer COS Original Outer CoS
Original Inner VLAN Original inner VLAN
Original Inner COS Original Inner CoS
New VLAN Outer-VID Translated outer VLAN
New Inner-VID Translated inner VLAN
New Inner-VID Translated inner VLAN
New Inner-COS Translated inner CoS
Related commands
N/A
Function
To show configurations of basic QinQ on the interface, use this command.
Format
show dot1q-tunnel
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
Scenario
You can use this command to show configurations of basic QinQ on the interface, including
outer Tag TPID and basic QinQ status.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to show basic QinQ configuration.
Raisecom#show dot1q-tunnel
Interface QinQ Status Outer TPID on port Cos override Vlan-map-miss
drop
-------------------------------------------------------------------------
---
PC1 -- 0x8100 -- --
PC2 -- 0x8100 -- --
GE1/1/1 -- 0x8100 -- --
GE1/1/2 -- 0x8100 -- --
GE1/1/3 -- 0x8100 -- --
GE1/1/4 -- 0x8100 -- --
GE1/1/5 -- 0x8100 -- --
GE1/1/6 -- 0x8100 -- --
GE1/1/7 -- 0x8100 -- --
GE1/1/8 -- 0x8100 -- --
GE1/1/9 -- 0x8100 -- --
GE1/1/10 -- 0x8100 -- --
GE1/1/11 -- 0x8100 -- --
GE1/1/12 -- 0x8100 -- --
GE1/1/13 -- 0x8100 -- --
GE1/1/14 -- 0x8100 -- --
GE1/1/15 -- 0x8100 -- --
GE1/1/16 -- 0x8100 -- --
GE1/1/17 -- 0x8100 -- --
GE1/1/18 -- 0x8100 -- --
GE1/1/19 -- 0x8100 -- --
GE1/1/20 -- 0x8100 -- --
GE1/1/21 -- 0x8100 -- --
GE1/1/22 -- 0x8100 -- --
GE1/1/23 -- 0x8100 -- --
GE1/1/24 -- 0x8100 -- --
TGE1/1/25 -- 0x8100 -- --
TGE1/1/26 -- 0x8100 -- --
TGE1/1/27 -- 0x8100 -- --
TGE1/1/28 -- 0x8100 -- --
Notice: Only 2 TPID values can be used as outer TPID on ports(Except
0x8100 and 0x9100),
Already used 0 TPID values: --, left:2 TPID value can be use.
Field Description
Interface Interface ID
QinQ Status Basic QinQ status
Dot1q-tunnel: basic QinQ is enabled.
--: neither basic QinQ nor double Tag is enabled.
Outer TPID on por Outer tag TPID on the port
Cos override Override the COS value.
Vlan-map-miss drop VLAN map miss drop
Related commands
N/A
Function
To configure VLAN mapping rules based on outer Tag and only translating outer VLAN, use
this command. To disable this function, use the no form of this command.
Format
switchport vlan-mapping {egress |ingress } outer-vlan-id translate outer-new-vlan-id
no switchport vlan-mapping {egress |ingress } translate outer-new-vlan-id
Parameters
Parameter Description
outer-vlan-id Outer VLAN ID, an integer, ranging from 1 to 4094
egress In egress direction
ingress In ingress direction
outer-new-vlan-id Translated outer VLAN ID, an integer, ranging from 1 to 4094
Default conditions
N/A
Command mode
Physical layer interface configuration/Aggregation group configuration
User level
15
Usage guidelines
Scenario
You can use this command to configure VLAN mapping rules based on outer VLAN rules.
The device judges whether the VLAN is the outer VLAN by the first VLAN Tag of the packet.
If the TPID is the same as the user-defined TPID, the VLAN will be regarded as the outer
VLAN and will be translated according to the specified rules. Otherwise, the device will
ignore it.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Do not configure QinQ and VLAN mapping rules on the same interface concurrently.
Examples
This example shows how to configure VLAN mapping rules in the ingress direction of
interface 1 and translate the VLAN ID of the outer VLAN to 3 based on VLAN ID 2.
Raisecom#config
Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#switchport vlan-mapping ingress outer
2 translate 3
Set successfully.
Related commands
show switchport vlan-mapping translate
Function
To configure VLAN mapping rules in the ingress direction based on double Tag, namely, to
translate the VLAN based on the inner VLAN and outer VLAN and concurrently translate the
inner VLAN and outer VLAN, use this command. To disable this function, use the no form of
this command.
Format
switchport vlan-mapping ingress outer {all | outer-vlan-id } inner {all | inner-vlan-id }
translate outer outer-new-vlan-id
no switchport vlan-mapping [ inner inner -vlan-id ]
Parameters
Parameter Description
all All VLAN IDs
outer-vlan-id Outer VLAN ID, an integer, ranging from 1 to 4094
inner -vlan-id Inner VLAN ID, an integer, ranging from 1 to 4094
outer-new-vlan-id Translated outer VLAN ID, an integer, ranging from 1 to 4094
inner-new-vlan-id Translated inner VLAN ID, an integer, ranging from 1 to 4094
Default conditions
N/A
Command mode
Physical layer interface configuration/Aggregation group configuration
User level
15
Usage guidelines
Scenario
You can use the show command to show information about VLAN mapping rules on the
interface. If you do not specify the inner VLAN list as all, the interface will replace the
VLAN ID in the outer TAG of the packets (with 2 TAGs and the VLAN ID in the inner or
outer layer of the TAG complies with the VLAN mapping rule) with the specified VLAN. If
you specify the inner VLAN list as all, the interface will replace the VLAN ID in the outer
TAG of the packets (the VLAN ID in the outer TAG complies with the VLAN mapping rule),
including packets with just one TAG but complies with the mapping rule, with the specified
VLAN.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
You can use this command to configure VLAN mapping rules. The number of VLAN
mapping rules shall not exceed the threshold. As for the same interface, if the VLAN list in
VLAN mapping rules conflicts with existed VLAN mapping rules, configurations will fail; if
the VLAN added according to VLAN mapping rules is repetitive, then the newly configured
VLAN mapping rule will override the old one.
Do not configure QinQ and VLAN mapping rules on the same interface concurrently.
Examples
This example shows how to configure VLAN mapping rules in the ingress direction of
interface 1 and translate outer VLAN ID 2 to VLAN ID 3 and inner VLAN ID 3 to inner
VLAN ID 4.
Raisecom#config
Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#switchport vlan-mapping ingress outer
2 inner 3 translate 3 4
Set successfully.
Related commands
show switchport vlan-mapping translate
Function
To configure VLAN mapping rules in the egress direction based on double Tag, namely, to
translate the VLAN based on the inner VLAN and outer VLAN and concurrently translate the
inner VLAN and outer VLAN, use this command. To disable this function, use the no form of
this command.
Format
switchport vlan-mapping egress outer {all | outer-vlan-id } {inner inner-vlan-id| outer
outer-vlan-id }{ translate vlan-id | remove | tagged | unchanged }{ inner |
outer }{translate vlan-id | remove | tagged }]
no switchport vlan-mapping egress outer {all | vlan-id}} [inner vlan-id]
Parameters
Parameter Description
all All VLAN IDs
outer-vlan-id Outer VLAN ID, an integer, ranging from 1 to 4094
inner -vlan-id Inner VLAN ID, an integer, ranging from 1 to 4094
outer-new-vlan-id Translated outer VLAN ID, an integer, ranging from 1 to 4094
inner-new-vlan-id Translated inner VLAN ID, an integer, ranging from 1 to 4094
remove Remove the outer TAG.
Parameter Description
tagged Reserve the outer TAG.
unchanged Unchanged
translate Translated
Default conditions
N/A
Command mode
Physical layer interface configuration/Aggregation group configuration
User level
15
Usage guidelines
Scenario
You can use the show command to show information about VLAN mapping rules on the
interface. If you do not specify the inner VLAN list as all, the interface will replace the
VLAN ID in the outer TAG of the packets (with 2 TAGs and the VLAN ID in the inner or
outer layer of the TAG complies with the VLAN mapping rule) with the specified VLAN. If
you specify the inner VLAN list as all, the interface will replace the VLAN ID in the outer
TAG of the packets (the VLAN ID in the outer TAG complies with the VLAN mapping rule),
including packets with just one TAG but complies with the mapping rule, with the specified
VLAN.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
You can use this command to configure VLAN mapping rules. The number of VLAN
mapping rules shall not exceed the threshold. As for the same interface, if the VLAN list in
VLAN mapping rules conflicts with existed VLAN mapping rules, configurations will fail; if
the VLAN added according to VLAN mapping rules is repetitive, then the newly configured
VLAN mapping rule will override the old one.
Do not configure QinQ and VLAN mapping rules on the same interface concurrently.
Examples
This example shows how to configure VLAN mapping rules in the ingress direction of
interface 1 and translate outer VLAN ID 2 to VLAN ID 3 and inner VLAN ID 3 to inner
VLAN ID 4.
Raisecom#config
Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#switchport vlan-mapping ingress outer
2 inner 3 translate 3 4
Set successfully.
Related commands
show switchport vlan-mapping translate
Function
To configure bidirectional VLAN mapping rules based on inner or outer VLANs, use this
command. To disable this function, use the no form of this command.
Format
switchport vlan-mapping both add-outer vlan-id [ inner inner -vlan-id ] translate outer
vlan-id [ inner inner -vlan-id ]
no switchport vlan-mapping both add-outer vlan-id
Parameters
Parameters Description
inner vlan-id Inner VLAN ID, an integer, ranging from 1 to 4049
outer outer-vlan-id Outer VLAN ID, an integer, ranging from 1 to 4049
Default conditions
N/A
Command mode
Physical layer interface configuration/Aggregation group configuration
User level
15
Usage guidelines
Scenario
You can use this command to configure 1:1 bidirectional VLAN mapping rules.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Do not configure QinQ and VLAN mapping rules on the same interface concurrently.
Examples
This example shows how to.configure bidirectional VLAN mapping and translate outer
VLAN 50 into outer VLAN 100
Raisecom#config
Raisecom(config)#interface gigaethernet1/1/1
Raisecom(config-gigaethernet1/1/1)#switchport vlan-mapping both outer 50
translate outer 100
Set successfully.
Related commands
show switchport vlan-mapping translate
2.5 STP
2.5.1 instance vlan
Function
To configure the mapping between the MSTI (MST instance) and the VLAN, use this
command. To delete the mapping, use the no form of this command.
Format
instance instance-id vlan vlan-list
no instance instance-id [ vlan vlan-list ]
Parameters
Parameter Description
instance-id MSTI number, an integer, ranging from 0 to 4095
vlan-list VLAN list, an integer, ranging from 1 to 4094
It supports specific values, such as "1,2,3"; it also supports a range,
such as "1-3".
While using the no form of this command, the MSTI will be deleted if
the parameter is not configured; If the parameter is configured, certain
VLAN corresponding to the MSTI will be deleted.
Default conditions
N/A
Command mode
MST region configuration
User level
11
Usage guidelines
Scenario
One switched network can be classified into multiple MST regions with each containing
multiple independent MSTIs. One VLAN is corresponded to one MSTI but one MSTI can be
corresponded to multiple VLANs. You can use this command to configure the mapping
between the MSTI and the VLAN. If the configured MSTI does not exist, the device will
create one automatically and meanwhile map it to the VLAN; if there is a MSTI, the VLAN
will be directly mapped to it.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to map VLAN 10 and VLANs 100-200 to MSTI 1.
Raisecom#config
Raisecom(config)#spanning-tree region-configuration
Raisecom(config-region)#instance 1 vlan 10,100-200
Set successfully.
Related commands
show spanning-tree region-configuretion
2.5.2 name
Function
To configure the MST region name, use this command. To delete the name, use the no form of
this command.
Format
name name
no name
Parameters
Parameter Description
name MST region name, a string of 1 to 32 characters
Default conditions
N/A
Command mode
MST region configuration
User level
11
Usage guidelines
Scenario
One network can be classified into multiple MST regions. You can use this command to
configure MST region names for distinguishing MST regions.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the MST region name as mst1.
Raisecom#config
Raisecom(config)#spanning-tree region-configuration
Raisecom(config-region)#name mst1
Set successfully.
Related commands
show spanning-tree region-configuration
2.5.3 revision-level
Function
To configure the revision level of the MST region, use this command. To return to the default
condition, use the no form of this command.
Format
revision-level level
no revision-level
Parameters
Parameter Description
level Revision level, an integer, ranging from 0 to 65535
Default conditions
The revision level of the MST region is 0.
Command mode
MST region configuration
User level
11
Usage guidelines
Scenario
One network can be classified into multiple MST regions. You can use this command to
configure the revision level of MST regions.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the revision level of the MST region to 20.
Raisecom#config
Raisecom(config)#spanning-tree region-configuration
Raisecom(config-region)#revision-level 20
Set successfully.
Related commands
show spanning-tree region-configuration
Function
To show information about the Multiple Spanning Tree Instance (MSTI), use this command.
Format
show spanning-tree [ instance instance-id ] [ detail ]
Parameters
Parameter Description
Show information about the specified MSTI if the parameter is
instance
configured.
Show information about all MSTIs if the parameter is not configured.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show basic information about the MSTP.
Raisecom#show spanning-tree
Spanning-tree admin state: enable
Spanning-tree protocol mode: MSTP
MST ID: 0
-----------------------------------------------------------
BridgeId: Mac 000E.5E00.0001 Priority 32768
RegionalRoot: Mac 000E.5E00.0001 Priority 32768 InternalRootCost 0
Root: Mac 000E.5E00.0001 Priority 32768 RootCost 0
Operational: HelloTime 2 ForwardDelay 15 MaxAge 20
Configured: HelloTime 2 ForwardDelay 15 MaxAge 20 TransmitLimit 3
MaxHops 20 Diameter 7
Port PortState PortRole PathCost PortPriority LinkType
TrunkPort
-------------------------------------------------------------------------
1 discarding disabled 200000 128 point-to-point no
2 discarding disabled 200000 128 point-to-point no
23 discarding disabled 200000 128 point-to-point no
24 forwarding designated 200000 128 point-to-point no
Parameter Description
Spanning-tree admin state STP state
Enable: enabled
Disable: disabled
Parameter Description
Configured Configured reference value
HelloTime Time interval for sending BPDU
ForwardDelay Forward latency
MaxAge The maximum age of BPDU configurations
TransmitLimit The maximum number of packets allowed to send
within the Hello Time
MaxHops The maximum number of hops within the MST region
Diameter Configure the diameter for the switched network,
namely, the maximum number of hops between any
two terminal devices.
PortId Interface ID
PortState Interface status
Disable: the interface is blocked and cannot
participate in packets forwarding.
Discarding: when the topology is stable, the blocked
link
TrunkPort LAG interfaces
yes: the interface is a LAG interface
no: the interface is a non-LAG interface
Parameter Description
Spanning-tree STP state
Enable: enabled
admin state
Disable: disabled
MST ID: 1
-----------------------------------------------------------
BridgeId: Mac 000E.5E03.7DEB Priority 32768
Port 1
No spanning-tree infomation available in port 1 for instance 1
Port 2
No spanning-tree infomation available in port 2 for instance 1
Port 3
No spanning-tree infomation available in port 3 for instance 1
Port 24
No spanning-tree infomation available in port 24 for instance 1
Related commands
N/A
Function
To show interface information in MSTI, use this command.
Format
show spanning-tree [ instance instance-id ] interface-type interface-number [ detail ]
Parameters
Parameter Description
Show information about the specified interface in MSTI if the
instance
parameter is configured.
Show information about all interfaces in MSTI if the parameter is
not configured.
instance-id MSTI number, an integer, ranging from 0 to 4095
port-list Interface list, an integer, ranging from 1 to 28
It supports specific values, such as "1,2,3"; it also supports a range,
such as "1-3".
Show details about the interface in MSTI if the parameter is
detail
configured.
Show basic information about the interface in MSTI if the
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show information about interface 1 in MSTI 1.
Raisecom#show spanning-tree instance 1 port-list 1
port1
PortEnable: admin: enable oper: enable
Rootguard: disable
Loopguard: disable
ExternPathCost:200000
EdgedPort: admin: auto oper: no BPDU Filter: disable
LinkType: admin: auto oper: point-to-point
Partner MSTP Mode: mstp
Bpdus send: 0 (TCN<0> Config<0> RST<0> MST<0>)
Bpdus received:0 (TCN<0> Config<0> RST<0> MST<0>)
Instance PortState PortRole PortCost(admin/oper) PortPriority
----------------------------------------------------------
Parameter Description
port1 Interface ID
PortEnable The MSTP enabled status on the interface
Enable: enabled
Disable: disabled
admin Administrative status
oper Operational status
Rootguard Root interface protection status
Enable: enabled
Disable: disabled
Loopguard Loop interface protection status
Enable: enabled
Disable: disabled
ExternPathCost External path cost
EdgedPort Whether the interface is edge interface or not
auto: automatically detect whether it is an edge interface
force-true: forced to be an edge interface
force-false: forced to be a non-edge interface
Parameter Description
LinkType The interface-connected link type
auto: automatically detect the type of the link connected with
the interface
point-to-point: point-to-point links
share: shared links
Related commands
N/A
Function
To show configurations about the Multiple Spanning Tree (MST) region, use this command.
Format
show spanning-tree region-configuration
Parameters
N/A
Default conditions
N/A
Command mode
MST region configuration
User level
5
Usage guidelines
N/A
Examples
This example shows how to show configurations about the MST region.
Raisecom#config
Raisecom(config)#spanning-tree region-configuration
Raisecom(config-region)#show spanning-tree region-configuration
Configurate Information:
-----------------------------------Name:
Revision level: 0
Instances configurate: 1
Digest: Instance Vlans Mapped
-------- ------------------------------
0 1-4094
Operational Information:
-----------------------------------
Name:
Revision level: 0
Instances running: 1
Digest: 0XAC36177F50283CD4B83821D8AB26DE62
Instance Vlans Mapped
-------- ------------------------------
0 1-4094
Parameter Description
Configured Region configurations
Operational Region operational status
Name Region name
Revision level Region revision level
Instances configured Number of MSTIs configured
Instances running Number of the running MSTIs
Parameter Description
Digest Digest of the mapping between the MSTI and the VLAN
Instance MSTI number
Vlans Mapped VLANs mapped
Related commands
N/A
Function
To show the operational information about the MST region, use this command.
Format
show spanning-tree region-operation
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show the operational information about the MST region.
Raisecom#show spanning-tree region-operation
Operational Information:
-----------------------------------------------
Name:
Revision level: 0
Instances running: 2
Digest: 0x870555C957F1B44530B7D56FD4716ADF
Parameter Description
Operational Operational information of the region
Name Region name
Revision level Region revision level
Instances running Number of the running MSTIs
Digest Digest of the mapping between the MSTI and the VLAN
Instance MSTI number
Vlans Mapped VLANs mapped
Related commands
N/A
Function
To configure the diameter for the switched network, namely, the maximum number of hops
between any two terminal devices in the network, use this command. To return to the default
condition, use the no form of this command.
Format
spanning-tree bridge-diameter max-number
no spanning-tree bridge-diameter
Parameters
Parameter Description
max-number Network diameter, an integer, ranging from 2 to 7
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
Any two terminal devices in the switched network are connected to each other through
specified links which are formed by a series of devices. The network diameter is the
maximum number of hops between any two terminals. The longer the diameter is, the larger
the network scale will be.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the network diameter to 5.
Raisecom#config
Raisecom(config)#spanning-tree bridge-diameter 5
Set successfully.
Related commands
show spanning-tree
Function
To clear the MSTP statistics on the interface, use this command.
Format
spanning-tree clear statistics
Parameters
N/A
Default conditions
N/A
Command mode
Physical layer interface configuration mode
User level
11
Usage guidelines
N/A
Examples
This example shows how to clear the MSTP statistics on interface 1.
Raisecom#config
Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#spanning-tree clear statistics
Set successfully.
Related commands
N/A
Function
To enable the Spanning Tree Protocol (STP) globally or on the interface, use this command.
To disable this function, use the disable form of this command.
Format
spanning-tree { enable | disable }
Parameters
Parameter Description
Default conditions
The STP is enabled.
Command mode
Global configuration/Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
STP is used for Layer 2 network loop detection, which has two features: first, it can block
redundant links in Layer 2 networks by pruning the network into tree shape, thus eliminating
loops and suppressing broadcast storm; second, it can back up links.
In global configuration mode, you can use this command to enable/disable the STP over
devices. In physical layer configuration mode, you can use this command to enable/disable
the STP on interfaces.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable the global STP.
Raisecom#config
Raisecom(config)#spanning-tree enable
Set successfully.
Related commands
show spanning-tree
Function
To configure the interface as an edge interface, use this command.
Format
spanning-tree edged-port { auto | force-true | force-false }
Parameters
Parameter Description
Default conditions
All interfaces will detect whether they are edge interfaces.
Command mode
Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
The edge interface refers to the interface which is directly connected to the user. When the
network topology changes, no temporary loops will occur on the edge interface, therefore, if
you configure the interface as the edge interface, it can rapidly enter the forwarding state.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure interface 1 to an edge interface.
Raisecom#config
Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#spanning-tree edged-port force-true
Set successfully.
Related commands
show spanning-tree port
Function
To configure the BPDU filter, use this command. To disable this function, use the disable
form of this command.
Format
spanning-tree edged-port bpdu-filter { enable | disable }
Parameters
Parameter Description
enable Enable the BPDU filter on the edge interface.
disable Disable the BPDU filter on the edge interface.
all All interfaces
Default conditions
The BPDU filter is disabled.
Command mode
Physical layer interface configuration mode
User level
15
Usage guidelines
Scenario
The edge interface refers to the interface which is directly connected to the user. After the
edge interface is enabled with BPDU filtering, it will directly discard BPDU packets upon
receiving them and will not send BPDU packets either.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure BPDU filtering.
Raisecom#config
Raisecom(config)interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#spanning-tree edged-port bpdu-filter
enable
Set successfully.
Related commands
show spanning-tree port
Function
To configure external path cost, use this command. To return to the default condition, use the
no form of this command.
Format
spanning-tree extern-path-cost cost
no spanning-tree extern-path-cost
Parameters
Parameter Description
cost Path cost value, an integer, ranging from 0 to 200000000
Default conditions
The external path cost is 0.
Command mode
Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
The external path cost refers to the accumulative path cost from the attached MST regional
root of the device to the CIST root. The external path cost reserved on all devices in the MST
region is the same. If the CIST root device is within the MST region, the external path cost
reserved on all devices within the region is 0.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the external path cost on interface 1 to 10.
Raisecom#config
Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#spanning-tree extern-path-cost 10
Set successfully.
Related commands
show spanning-tree
Function
To configure the Spanning Tree Protocol (STP) forward-delay period, use this command. To
return to the default condition, use the no form of this command.
Format
spanning-tree forward-delay period
no spanning-tree forward-delay
Parameters
Parameter Description
period Forward-delay period, an integer, ranging from 4 to 30, in units of
second
Default conditions
The STP forward-delay period is 15s.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
The STP should be recalculated when the network topology changes. However, a certain
period is needed for the new configurations to be propagated through the whole network. If
the newly elected root interface and the specified interface forward data immediately,
temporary loops may occur. Therefore, interfaces need to experience an intermediate state
(learning state) before retransmitting data. After waiting for some time (the forward-delay
period) in the learning state, the interface will transition to the forwarding state. You can use
this command to configure the forward-delay period to ensure that all configurations are
propagated through the whole network. When the network topology does not change a lot,
you can properly shorten the forward-delay time. Otherwise, extend the time.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The forward-delay time will be automatically calculated while configuring the network
diameter, max-age, or hello-time. If you do not wish to use the automatically calculated delay
time, you need to pre-configure the network diameter, max-age, or hello-time and then
configure the forward-delay time. Otherwise, the user-defined forward-delay value will be
modified.
Examples
You can use this command to configure the STP forward-delay time to 10s.
Raisecom#config
Raisecom(config)#spanning-tree forward-delay 10
Set successfully.
Related commands
spanning-tree max-age
spanning-tree priority
show spanning-tree
Function
To configure the STP Hello Time, namely, the interval for sending the Bridge Protocol Data
Units (BPDUs), use this command. To return to the default condition, use the no form of this
command.
Format
spanning-tree hello-time period
no spanning-tree hello-time
Parameters
Parameter Description
period Interval for sending BPDUs, an integer, ranging from 1 to 10, in units of
second
Default conditions
The STP Hello Time is 2s.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
The Hello Time is used in the STP for sending configurations periodically to maintain the
stability of the spanning tree and detect loop faults. If the device does not receive BPDU
packets within a period, the STP will recalculate the spanning tree. When the device becomes
a root device, you can use this command to configure the Hello Time to send BPDUs at
regular intervals, while the non-root devices will adopt the Hello Time configured on the root
device.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
You can adjust the Hello Time according to the network condition. When there is a high
probability of BPDU packets loss, you can properly shorten the period of Hello Time to
guarantee greater STP robustness. While if you extend the period of Hello Time, the STP will
occupy less CPU resources. Therefore, the rational Hello Time ensures that the device
discovers network faults in time with no need of occupying too much network resources.
While configuring the network diameter, the value of the Hello Time will be automatically
restored to the default value. Therefore, you should configure the network diameter first
followed by the Hello Time in case the value of the Hello Time to be modified.
Examples
This example shows how to configure the STP Hello Time to 3s.
Raisecom#config
Raisecom(config)#spanning-tree hello-time 3
Set successfully.
Related commands
spanning-tree forward-delay
spanning-tree max-age
show spanning-tree
Function
To configure the internal path cost on the interface, use this command. To return to the default
condition, use the no form of this command.
Format
spanning-tree [ instance instance-id ] inter-path-cost cost
no spanning-tree [ instance instance-id ] inter-path-cost
Parameters
Parameter Description
instance-id MSTI number, an integer, ranging from 0 to 4095
cost Cost, an integer, ranging from 0 to 200000000
Default conditions
The internal path cost on the interface is 0.
Command mode
Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
The IST Master is the closest one to the common root within the domain. The internal path
cost is the accumulative path cost from the interface to the IST Master. You can use this
command to configure the value of the internal path cost.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the internal path cost on interface 1 in MSTI 1 to 10.
Raisecom#config
Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#spanning-tree instance 1 inter-path-
cost 10
Set successfully.
Related commands
show spanning-tree
Function
To configure the link type of the specified interface, use this command.
Format
spanning-tree link-type { auto | point-to-point | shared }
Parameters
Parameter Description
auto Automatically detect whether the link connected to the interface is a
point-to-point link.
point-to-point The link connected to the current interface is a point-to-point link.
shared The link connected to the current interface is a shared link.
Default conditions
The link type is configured as auto. The device configures the link types on the interface
according to the duplex state. The full duplex interface is deemed as the point-to-point link
while the half duplex interface is deemed as the shared link.
Command mode
Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
There are two types of links of the specified interface: point-to-point and shared links.
In the point-to-point link, the specified interface just shakes hands once with the network
bridge in the downlink direction and then immediately transitions to the forwarding state.
In the shared link connecting over 3 network bridges, the bridge in the downlink direction
will not respond to the handshake request sent by the specified interface in the uplink
direction. The specified interface can enter forwarding state after waiting for a period twice of
the Forward Delay time. Compared with the network with point-to-point links, the network
with shared links needs a longer time to be converged.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
If the interface is configured as point-to-point link, but it is a shared link actually, then
temporary loops may occur. It is recommended to configure the type to auto, which means to
let the system automatically discovers the link type of the interface.
Examples
This example shows how to configure the link type on interface 1 as point-to-point.
Raisecom#config
Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#spanning-tree link-type point-to-point
Set successfully.
Related commands
show spanning-tree
Function
To enable loop guard, use this command. To disable this function, use the disable form of this
command.
Format
spanning-tree loopguard { enable | disable }
Parameters
Parameter Description
enable Enable loop guard.
disable Disable loop guard.
Default conditions
Disabled
Command mode
Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
The spanning tree has two functions: loop avoidance and link backup. By blocking redundant
links, it can prevent loops. While when some links fail, it can release the redundant links, thus
protecting the network. STP will send BPDU packets periodically, if the interface does not
receive the BPDU packets within a certain period, it may deem that the link fails, then the
STP will be recalculated by the STP algorithm to release the blocked links. However, in the
actual application, the link failure may not be caused by the failure of receiving BPDU
packets. Therefore, if the STP releases redundant links at this time, it may cause link failure.
However, when the interface is enabled with loop guard, it will maintain as it is when it
cannot receive BPDU packets within a certain period.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The loop guard and the link backup cannot coexist, which means loop guard avoids loops at
the cost of losing link backup.
Examples
This example shows how to enable loop guard on interface 1.
Raisecom#config
Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#spanning-tree loopguard enable
Set successfully.
Related commands
show spanning-tree port
Function
To enable BPDU guard on an edge interface, use this command. To disable this function, use
the disable form of this command.
Format
spanning-tree bpduguard { enable | disable }
Parameters
Parameter Description
enable Enable BPDU guard on the interface.
disable Disable BPDU guard on the interface.
Default conditions
Disabled
Command mode
Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
You can use this command to enable edge interfaces with BPDU guard.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
If BUDU Guard is enabled, the switch will disable edge interfaces after they have received
BPDU packets and inform the NMS. The disabled interfaces can be only recovered manually
by the network administrator.
Examples
This example shows how to enable BPDU guard on interface 1.
Raisecom#config
Raisecom(config)#interface gigaethernet1/1/1
Raisecom(config-gigaethernet1/1/1)#spanning-tree bpduguard enable
Set successfully.
Related commands
show spanning-tree port
Function
To configure the maximum living time of the BPDU on the device, use this command. To
return to the default condition, use the no form of this command.
Format
spanning-tree max-age period
no spanning-tree max-age
Parameters
Parameter Description
period Time value, an integer, ranging from 6 to 40, in units of second
Default conditions
The STP max-age is 20s.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
The BPDU configuration message is for calculating and maintaining the spanning tree. The
message has a maximum living time on the device, once the time expires, the spanning tree
will be recalculated. If the living time is configured too short, the spanning tree will be
calculated frequently. While if it is configured too long, the STP will be unable to adapt to the
topology change.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Configuring the network diameter or Hello Time will trigger the automatic calculation of
max-age. Therefore, if you wish to use self-defined max-age, you need to configure the
network diameter and Hello Time first followed by the max-age. Otherwise, the value of max-
age will be modified.
Examples
This example shows how to configure the STP max-age to 30s.
Raisecom#config
Raisecom(config)#spanning-tree max-age 30
Set successfully.
Related commands
spanning-tree hello-time
show spanning-tree
Function
To configure the maximum number of hops within the MST region, use this command. To
return to the default condition, use the no form of this command.
Format
spanning-tree max-hops hops
no sapnning-tree max-hops
Parameters
Parameter Description
hops Maximum number of hops, an integer, ranging from 1 to 40
Default conditions
The maximum number of hops within the MST region is 20.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
The scale of the MST region depends on the number of hops in the MST region. The
maximum number of hops configured in the region root will be regarded as the maximum
number of hops in the MST region. Starting from the spanning tree root switch in the MST
region, the number of hops will be reduced by 1 each time the BPDU messages pass a device.
If the number of hops of the message is 0, then the message will be discarded, which makes
the devices beyond the maximum number of hops unable to participate in the spanning tree
calculation, thus limiting the scale of the MST region.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the maximum number of hops within the MST region
to10.
Raisecom#config
Raisecom(config)#spanning-tree max-hops 10
Set successfully.
Related commands
N/A
Function
To configure the operation mode, use this command.
Format
spanning-tree mode { stp | mstp | rstp }
Parameters
Parameter Description
STP The device is working in the global STP-compatible mode.
MSTP The device is working in the global MSTP mode.
RSTP The device is working in the global RSTP mode.
Default conditions
The STP operation mode is MSTP.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure STP working modes: STP-compatible mode and
MSTP mode. In the STP-compatible mode, the spanning tree does not support the fast
conversion from the Alternate interface (the backup interface of the root interface) to root
interface and the expedited forwarding on the interface. It just receives STP BPDU and TCN
BPDU packets and will drop RST BPDU or MST BPDU packets. If the peer interface of this
device runs STP, it will transition from the MSTP mode to the STP-compatible mode.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the protocol operation mode as STP.
Raisecom#config
Raisecom(config)#spanning-tree mode stp
Set successfully.
Related commands
show spanning-tree
Function
To configure the system priority or interface priority, use this command. To return to the
default condition, use the no form of this command.
Format
spanning-tree [ instance instance-id ] priority priority
no spanning-tree [ instance instance-id ] priority
Parameters
Parameter Description
instance Configure the priority for the specified MSTI system or for the interface
if the parameter is configured. Otherwise, the default configuration is
MSTI 0, which is the priority of the IST system or interface.
instance-id MSTI number, an integer, ranging from 0 to 4095
priority Priority
The value of system priority ranges from 0 to 61440 in increments of
4096, such as 0, 4096, 8192.
The value of interface priority ranges from 0 to 240 in increments of 16,
such as 0, 16, 32
Default conditions
The system priority is 32768 and the interface priority is 128.
Command mode
Global configuration/Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
By comparing the priority vector information while nodes are exchanging BPDU packets, the
STP calculates the spanning tree. While electing the root switch, it needs to compare the
system ID. While the system ID has 64 bits among which the high-order 16 bits is the system
priority and the rest is the MAC address. You can use this command to configure the system
priority in global configuration mode, the smaller the value is, the higher the priority is, and
the more likely the node will become the root switch. While electing the root interface and
specified interface, it needs to compare the interface ID. While the interface ID has 16 bits
among which the high-order 8 bits is the interface priority and the rest is the interface ID. You
can use this command to configure the interface priority in interface mode, the smaller the
value is, the higher the priority is, the more likely the interface will become the root interface
or specified interface.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the system priority in MSTP instance 1 to 8192.
Raisecom#config
Raisecom(config)#spanning-tree instance 1 priority 8192
Set successfully.
This example shows how to configure the priority on interface 1 in MSTP instance 1 to 64.
Raisecom#config
Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#spanning-tree priority 64
Set successfully.
Related commands
show spanning-tree port
spanning-tree root primary
spanning-tree root secondary
Function
To enter MST region configuration mode and configure the region information, use this
command.
Format
spanning-tree region-configuration
Parameters
N/A
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
One switched network can be classified into multiple MST regions. You can use this
command to configure a MST region, including information such as region name, VLAN
mapping list, MST region revision level, through which the device can be classified into a
specified MST region.
Prerequisite
N/A
Follow-up procedure
You can use the name command to configure the region name.
You can use the instance vlan command to configure the mapping between the MSTI
and the VLAN.
You can use the revision-level command to configure the MST region revision level.
Precaution
N/A
Examples
This example shows how to enter region configuration mode.
Raisecom#config
Raisecom(config)#spanning-tree region-configuration
Raisecom(config-region)#
Related commands
N/A
Function
To configure a device as the primary root device or backup root device, use this command.
Format
spanning-tree root { primary | secondary }
Parameters
Parameter Description
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
In one MSTI, you can just configure one root device but you can configure many backup root
devices.
When the switch fails or is turned off. The backup root switch can replace the root switch to
become the MSTI root switch. If you configure many backup root devices, the one with the
lowest MAC address will become the root device.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the device as the MSTI primary device.
Raisecom#config
Raisecom(config)#spanning-tree root primary
Set successfully.
Related commands
N/A
Function
To enable RootGuard on the interface, use this command. To disable this function, use the
disable form of this command.
Format
spanning-tree rootguard { enable | disable }
Parameters
Parameter Description
enable Enable RootGuard on the interface.
disable Disable RootGuard on the interface.
Default conditions
The RootGuard on the interface is disabled.
Command mode
Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
In the STP, the spanning tree will be recalculated when the switch receives packets with
higher priority, which affects the connectivity of the network and consumes the CPU
resources. In the network enabled with the MSTP feature, if someone sends BPDU packets
with higher priority, the network will repeatedly calculates the spanning tree, which results in
network instability. In general, the switch priorities are preconfigured during network
planning, namely, the closer the switch to the edge, the lower its priority is. Therefore,
interfaces in the downlink direction will not receive packets with priority higher than that of
the switch unless someone is sending attack packets maliciously. If so, you can use this
command to enable those interfaces with RootGuard feature. After being enabled with
RootGuard feature, they will reject packets with priority higher than that of the switch and be
blocked for a while to prevent links in upper layers from being damaged.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable RootGuard on interface 1.
Raiseocm#config
Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#spanning-tree rootguard enable
Set successfully.
Related commands
show spanning-tree port
Function
To configure the maximum number of BPDU packets allowed to send by the interface within
the Hello Time, use this command. To return to the default condition, use the no form of this
command.
Format
spanning-tree transit-limit max-num
no spanning-tree transit-limit
Parameters
Parameter Description
max-num Maximum number of packets, an integer, ranging from 1 to 10
Default conditions
The interface can only send 3 BPDU packets at most within the Hello Time.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
Hello Time is used for sending BPDUs at regular intervals to maintain the stability of the
spanning tree. If the device cannot receive BPDUs within a period, it will recalculate the
spanning tree. You can use this command to configure the maximum number of BPDUs
within the Hello Time. The bigger the value is, the more the BPDUs will be sent within the
Hello Time, and the more bandwidth resources will be occupied. Therefore, configuring the
value properly can prevent the bandwidth from being occupied by BPDUs when the network
topology changes.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the maximum number of BPDU packets sent by the
interface within the Hello Time to 10.
Raisecom#config
Raisecom(config)#spanning-tree transmit-limit 10
Set successflly.
Related commands
show spanning-tree
Function
To clear statistics of loop detection, use this command.
Format
clear loopback-detection statistic [ interface-type interface-number ]
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
N/A
Examples
This example shows how to clear statistics of loop detection.
Raisecom#config
Raisecom(config)#clear loopback-detection statistic
Set successfully.
Related commands
N/A
2.6.2 loopback-detection
Function
To configure packet VLAN, period for sending packets, recovery time, and loop action (the
interface is automatically enabled with loopback detection after those configurations), use this
command. To disable this function, use the no form of this command.
Format
loopback-detection[[detect-vlanlist vlanlist ] [ pkt-vlan { untag | vlan-id } ] [ hello-time
second ] [ restore-time second ] [ action { block | trap-only | shutdown } ] [ log-interval
log-interval time]
no loopback-detection
Parameters
Parameter Description
untag Specify packets to not carry Tag.
vlan-list VLAN list, an integer, ranging from 1 to 4049.
Support multiple VLAN input form, such as., 2, 3, 4 and 2-
4.
Parameter Description
vlan-id VLAN ID, an integer, ranging from 1 to 4094
hello-time second Loop detection period, an integer, ranging from 1 to 3600, in
units of second
restore-time second Loop recovery time, an integer, ranging from 1 to 18000, in units
of second
block Send alarms and block the interface upon detection of a loop.
trap-only Send alarms only upon detection of a loop.
shutdown Send alarms and shut down the interface upon detection of a
loop.
log-interval time Log time interval, an integer, ranging from 0 to 1440, in units of
minute, 0 represents no periodic report.
Default conditions
The loop detection feature on the interface is disabled but it will automatically be enabled
after the interface is configured with this feature. By default, the pkt-vlan is untag; the hello-
time is 1s; the restore-time is 5 times of the hello-time; the action is block.
Command mode
Physical layer interface configuration
User level
11
Usage guidelines
Scenario
Loop detection means that the interface detects whether there are loops by periodically
sending Hello packets. The period of sending Hello packets is also the period of loop
detection.
The period and recovery time should be configured properly. If the period is too long, loops
cannot be detected in time. However, the interface will send Hell packets too frequently if the
period is too short, which increases the burden of internet and the device.
Loops occur when the following two conditions are met:
The device receives packets from itself and the ID of the sending interface is smaller or
equal to that of the receiving interface.
The device receives packets from other devices and the source MAC address of the
packet is smaller than that of the local device.
After detecting the loop, the interface will act based on the following actions:
trap-only: send alarms only
block: send alarms and block the interface
Examples
This example shows how to configure the VLAN ID of loop detection packets to 5, detection
period to 3s, reply time to 15s, and loop action as block.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#loopback-detection pkt-vlan 5 hello-
time 3 restore-time 15 action block
Set successfully.
Related commands
show loopback-detection
Function
To manually open the interface which is blocked for detecting loops, use this command.
Format
loopback-detection manual restore
Parameters
N/A
Default conditions
N/A
Command mode
Physical interface configuration/Aggregation group interface configuration
User level
11
Usage guidelines
Scenario
When the device detects loops, it will block certain interface. You can use this command to
manually open the blocked interface.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to manually open blocked interface 1.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#loopback-detection manual restore
Set successfully.
Related commands
show loopback-detection
Function
To show information about loop detection, use this command.
Format
show loopback-detection [ statistics ] [ interface-type interface-number ] [ detail ]
Parameters
Parameter Description
statistics Show statistics of loop detection.
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
detail Show details.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show information about loop detection.
Raisecom#show loopback-detection gigaethernet 1/1/1
Interface pktVlan hellotime restoretime loop-act Status loop-srcMAC loop-
srcPort
---------------------------------------------------------------
GE1/1/1 5 3 15 block no 0000.0000.0000
(null)
Field Description
Interface Interface ID
pktVlan Packet VLAN ID
hellotime Loop detection period
restoretime Loop recovery time
loop-act Loop action
Status Loop status
loop-srcMAC Loop source MAC address
If no loop is detected, it will show 0000.0000.0000.
Field Description
loop-srcPort Loop source interface
If no loops are detected or the name of the packet-sending
ifindex interface cannot be found, it will display null.
Related commands
N/A
Function
To show protection configurations on the interface, use this command.
Format
show switchport protect
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show protection configurations on the interface.
GE1/1/1 disable
GE1/1/2 disable
GE1/1/3 disable
GE1/1/4 disable
GE1/2/1 disable
GE1/2/2 disable
GE1/2/3 disable
GE1/2/4 disable
GE1/2/5 disable
GE1/2/6 disable
GE1/2/7 disable
GE1/2/8 disable
GE1/2/9 disable
GE1/2/10 disable
GE1/2/11 disable
GE1/2/12 disable
Field Description
Port Interface
Protected State Protection status
enable: enabled
disable: disabled
Related commands
N/A
Function
To enable interface protection, use this command. To disable this function, use the no form of
this command.
Format
switchport protect
no switchport protect
Parameters
N/A
Default conditions
Protection on all interfaces is disabled.
Command mode
Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
Through interface protection, you can add the interface which needs to be controlled to an
interface protection group, which can implement the isolation of Layer 2 and Layer 3 data
among interfaces within the same interface protection group. This not only enhances the
network security but also provides users with flexible networking solutions.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable protection on interface GE 1/1/1.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#switchport protect
Set successfully.
Related commands
show switchport protect
Function
To enable port mirroring group, use this command. To disable this function, use the no form
of this command.
Format
mirror-group group-id
no mirror-group group-id
Parameters
Parameter Description
group-id Mirror group ID, an integer, ranging from 1 to 4
Default conditions
N/A
Command mode
Global configuration
User level
15
Usage guidelines
Scenario
Port mirroring refers to copy packets from the specified source port to the specified
monitoring port without affecting the normal packet forwarding. You can monitor the traffic
status on certain interface and analyse the network condition.
Prerequisite
N/A
Follow-up procedure
You can use the mirror-group monitor-port command and the mirror-group source-port
command to configure the monitoring port and mirroring port.
Precaution
N/A
Examples
This example shows how to create port mirroring group.
Raisecom#config
Raisecom(config)#mirror-group 1
Set Successfully.
Related commands
mirror-group monitor-port
mirror-group source-port
show mirror-group
Function
To configure the monitoring port with mirroring feature, use this command. To return to the
default condition, use the no form of this command.
Format
mirror-group group-id monitor-port
no mirror-group monitor-port
Parameters
Parameter Description
group-id Mirroring group ID, an integer, ranging from 1 to 4
Default conditions
N/A
Command mode
Physical interface configuration/Aggregation group interface configuration
User level
15
Usage guidelines
Scenario
You can copy the packets on the mirroring port according to the configured rule to the
monitoring port to monitoring the network performance.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
There can be many mirroring ports but only one monitoring port. The mirroring port and
the monitoring port cannot be the same one.
The monitoring port can be the monitoring port and service port concurrently. It is not
recommended to use the monitoring port as the service port.
Examples
This example shows how to configure interface 1/1/2 as the monitoring port.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#mirror-group 1 monitor-port
Set Successfully.
Related commands
mirror-group source-port
show mirror-group
Function
To configure the mirroring port and mirroring rules, use this command. To delete them, use
the no form of this command.
Format
mirror-group group-id source-port [ ingress | egress ]
no mirror-group source-port
Parameters
Parameter Description
group-id Mirroring group ID, an integer, ranging from 1 to 4
ingress Mirror packets received by the source port.
egress Mirror packets sent from the source interface.
Default conditions
N/A
Command mode
Physical layer interface configuration mode
User level
15
Usage guidelines
Scenario
After the mirroring feature is enabled, the packets on the mirroring port in the ingress/egress
direction will be copied to the monitoring interface. When the mirroring port and mirroring
rules are configured, the device can mirror the packets on the interface in the ingress/egress
direction and can also mirror the packets from the specified ingress interface to the specified
egress interface. When the direction of the packets on the interface is not specified, the device
will mirror packets on the interface in the ingress and egress direction concurrently.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
There can be many mirroring ports but only one monitoring port. The mirroring port and the
monitoring port cannot be the same one.
Examples
This example shows how to configure interface 1/1/1 as the mirroring port and mirroring
incoming packets.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#mirror-group 1 source-port ingress
Set Successfully.
Related commands
show mirror-group
mirror-group monitor-port
Function
To show basic information about mirroring, use this command.
Format
show mirror-group [ group-id ]
Parameters
Parameter Description
group-id Mirror group ID, an integer, ranging from 1 to 4
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show basic information about mirroring.
Raisecom#show mirror-group
Mirror Group 1:
Monitor port:
gigaethernet 1/1/1
Source port:
gigaethernet 1/1/2: ingress
gigaethernet 1/1/3: egress
Field Description
Mirror Group Mirrorring group number
Monitor port Monitoring port ID
Source port Mirrorring port ID
Related commands
mirror-group monitor-port
mirror-group source-port
Function
To configure mirrorring all CPU packets, use this command. To delete the mirroring rules, use
the no form of this command.
Format
mirror-group group-id source-cpu [ ingress | egress ]
no mirror-group source-cpu
Parameters
Parameter Description
group-id Mirroring group ID, an integer, ranging from 1 to 4
ingress (Optional) mirror packets received by the source port.
It mirrors packets from both ingress and egress directions when this
parameter is not configured.
egress (Optional) mirror packets sent from the source interface.
It mirrors packets from both ingress and egress directions when this
parameter is not configured.
Default conditions
N/A
Command mode
Global configuration
User level
15
Usage guidelines
Scenario
After mirroring takes effect, all CPU packets will be copied to the monitor port.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to mirror CPU ingress packets.
Raisecom#config
Raisecom(config)#mirror-group 1 source-cpu ingress
Set Successfully.
Related commands
show mirror-group
2.9 L2CP
2.9.1 l2cp-process profile
Function
To create a profile when there is no profile and enter profile mode or to enter profile mode
directly when there is a profile, use this command. To disable this function, use the no form of
this command.
Format
l2cp-process profile profile-number
no l2cp profile [profile-number]
Parameters
Parameter Description
profile-number L2CP profile ID, an integer, ranging from 1 to 16
Default conditions
The L2CP profile is not applied to the interface. All L2CP packets will be handled as data
packets, which means that they will be forwarded transparently.
Command mode
Physical interface configuration/Global configuration
User level
15
Usage guidelines
Scenario
You can use this command to apply the established L2CP profile to the interface.
Prerequisite
The L2CP profile is created through the l2cp-profile command.
Follow-up procedure
After the global L2CP is enabled by the l2cp enable command, the profile on the interface
will take effect.
Precaution
The same interface can only use one L2CP profile at one time.
Examples
This example shows how to apply profile 1 to interface 2.
Raisecom#config
Raisecom(config)#interface gigaethernet1/1/1
Raisecom(config-gigaethernet1/1/1)#l2cp profile 1
Set successfully.
Related commands
show l2cp-process
show l2cp-process profile
Function
To configure the destination MAC address of transparently transmitted packets, use this
command. To disable this function, use the no form of this command.
Format
l2cp-process tunnel destination-address mac-address
no l2cp-process tunnel destination-address
Parameters
Parameter Description
mac-address MAC address, in dotted hexadecimal notation
Specify packets with destination MAC addresses in the range from
0180.c200.0004 to 0180.c200.0006, 0180.c200.0008 to
0180.c200.000d, 0180.c200.000f or 0180.c200.0020 (including
0180.c200.0020 to 0180.c200.002f)
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the destination MAC address of transparently
transmitted packets.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The destination MAC address of transparently transmitted packets must be a multicast
address.
Examples
This example shows how to configure the MAC address of transparent packets to
0180.c200.0004.
Raisecom#config
Raisecom(config)#l2cp-process tunnel destination-address 0180.c200.0004
Set successfully.
Related commands
show l2cp-process
Function
To configure L2CP packets processing action, use this command. To disable this function, use
the no form of this command.
Format
l2cp-process protocol { oam | stp | dot1x | lacp | lldp | cdp | vtp | pvst |all } action { tunnel
| drop | peer }
no l2cp-process protocol { oam | stp | dot1x | lacp | lldp | cdp | vtp | pvst |all }
Parameters
Parameter Description
oam OAM packets
Parameter Description
stp STP packets
dot1x Dot1x packets
lacp LACP packets
lldp LLDP packets
cdp CDP packets
vtp VTP packets
pvst PVST packets
all All L2CP packets
tunnel Tunnel transmits packets and gathers statistics.
drop Discard packets.
peer Submit to CPU and make statistics.
Default conditions
The default actions oam, stp, dot1x, lacp, lldp, and cdp of profile 1 belong to peer type and
the type of other protocols is drop. The default actions oam and lldp of profile 2 is peer type
and the type of other protocols is tunnel. The default oam of other created profiles is peer and
the type of others is tunnel.
Command mode
l2cp-profile configuration
User level
15
Usage guidelines
Scenario
You can use this command to configure the action for processing L2CP packets, among the
parameters of Layer 2 control packets:
Lldp includes LLDP and PTP.
Stp includes STP, RSTP, and MSTP.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
You can use this command to configure processing action for slow protocol packets as a
whole and you can also configure processing action for the sub-protocol types of slow
protocol packets respectively. The action of the configured sub-protocol will be executed as a
priority. The slow protocol packets which are not configured with sub-protocol types will be
executed according to the processing action for slow protocol packets.
When you do not configure the action of slow protocols but only configure the processing
action of sub-protocol types, the statistics of packets will be gathered separately. When you
just configure the action of slow protocols but not the processing action of sub-protocol types,
the statistics of packets will be gathered uniformly. If you configure them concurrently, then
statistics of packets which match the sub-protocol type will be gathered alone and for
statistics of those mismatching the sun-protocol type will be gathered uniformly.
Examples
This example shows how to configure sending all packets in profile 1 to the CPU.
Raisecom#config
Raisecom(config)#l2cp-process profile 1
Raisecom(config-l2cp-profile)#l2cp-process protocol all action peer
Set successfully.
Related commands
show l2cp-process tunnel statistics
2.9.4 name
Function
To configure the L2CP profile name, use this command. To disable this function, use the no
form of this command.
Format
name string
no name
Parameters
Parameter Description
string Description of L2CP profile, a character string starts with letter or number,
with length ranging from 0 to 32
Default conditions
L2CP profile name is null.
Command mode
l2cp-profile configuration
User level
11
Usage guidelines
Scenario
You can describe the profile information after creating it.
Prerequisite
The L2CP profile is created through the l2cp profile command.
Follow-up procedure
You can use the show l2cp-profile command to show the description of L2CP profile.
Precaution
The description of the L2CP profile must be in form of character string which starts with
letters or numbers.
Examples
This example shows how to create L2CP profile epl.
Raisecom#config
Raisecom(config)#l2cp-profile 1
Raisecom(config-l2cpprofile)#name epl
Set successfully.
Related commands
show l2cp-process profile
Function
To configure specified VLANs of transparent transmission, use this command. To disable this
function, use the no form of this command.
Format
tunnel vlan vlan-id
no tunnel vlan vlan-id
Parameters
Parameter Description
vlan-id VLAN ID, an integer, ranging from 1 to 4094
Default conditions
The VLAN is not specified.
Command mode
l2cp-profile configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure specified VLANs of transparent transmission.
Prerequisite
The L2CP profile is created through the l2cp-profile command.
Follow-up procedure
N/A
Precaution
You can use this command in profile mode. However, do not modify the specified VLAN
when the interface is using the profile.
Examples
This example shows how to configure the specified VLAN to VLAN 20.
Raisecom#config
Raisecom(config)#l2cp-profile 1
Raisecom(config-l2cp-profile)#tunnel vlan 20
Set successfully.
Related commands
show l2cp-process profile
Function
To configure the specified egress interface of transparent transmission, use this command. To
disable this function, use the no form of this command.
Format
tunnel interface-type interface-number
no tunnel vlan port
Parameters
Parameter Description
interface-type Interface types:
port-channel: logical interface, LAG interface
tengigaethernet: physical interface, 10 Gbit/s interface
gigaethernet: physical interface, 1000 Mbit/s interface
interface-number Interface ID, with the value varying with the device models and
interface types:
port-channel: 1 to 8; 1.x to 8.x (x = 1 to 4094)
gigaethernet: 1/1/1 to 1/1/24
ten gigaethernet: 1/1/25 to 1/1/28
Default conditions
The outbound interface is not specified.
Command mode
l2cp-profile configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the specified interface of transparent transmission.
Prerequisite
The L2CP profile is created through the l2cp-profile command.
Follow-up procedure
N/A
Precaution
In profile mode, you can use this command. However, when the profile is in use, you are not
allowed to modify the specified VLAN.
Examples
This example shows how to configure outbound interface 1/1/2.
Raisecom#config
Raisecom(config)#l2cp-profile 1
Raisecom(config-l2cp-profile)#tunnel gigaethernet 1/1/2
Set successfully.
Related commands
show l2cp-process profile
Function
To clear statistics of L2CP packets on the interface, use this command.
Format
clear l2cp-process tunnel statistics [interface-type interface-number ]
Parameters
Parameter Description
interface-type Interface types:
port-channel: logical interface, LAG interface
tengigaethernet: physical interface, 10 Gbit/s interface
gigaethernet: physical interface, 1000 Mbit/s interface
interface-number Interface ID, with the value varying with the device models and
interface types:
port-channel: 1 to 8; 1.x to 8.x (x = 1 to 4094)
gigaethernet: 1/1/1 to 1/1/24
ten gigaethernet: 1/1/25 to 1/1/28
Default conditions
N/A
Command mode
Global configuration
User level
15
Usage guidelines
N/A
Examples
This example shows how to clear packets statistics on all interfaces.
Raisecom#config
Raisecom(config)#clear l2cp-process tunnel statistics
Set successfully.
Related commands
show l2cp-process tunnel statistic
Function
To configure the tunnel type of transparent transmission, use this command. To disable this
function, use the no form of this command.
Format
tunnel tunnel-type mac
no tunnel tunnel-type
Parameters
N/A
Default conditions
In flooding state
Command mode
l2cp-profile configuration
User level
15
Usage guidelines
Scenario
You can use this command to configure the tunnel type of transparent transmission as mac.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
You can use this command in profile mode. However, do not modify the specified VLAN
while the interface is using the profile.
Examples
This example shows how to enable global L2CP.
Raisecom#config
Raisecom(config)#l2cp-profile 1
Raisecom(config-l2cp-profile)#tunnel tunnel-type mac
Set successfully.
Related commands
show l2cp-process profile
Function
To show L2CP configurations, use this command.
Format
show l2cp-process [interface-type interface-number ]
Parameters
Parameter Description
interface-type Interface types:
port-channel: logical interface, LAG interface
tengigaethernet: physical interface, 10 Gbit/s interface
gigaethernet: physical interface, 1000 Mbit/s interface
interface-number Interface ID, with the value varying with the device models and
interface types:
port-channel: 1 to 8; 1.x to 8.x (x = 1 to 4094)
gigaethernet: 1/1/1 to 1/1/24
ten gigaethernet: 1/1/25 to 1/1/28
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
10
Usage guidelines
N/A
Examples
This example shows how to show L2CP configurations.
Field Description
Port Interface ID
ProfileID L2CP profile number
BpduType Protocol type
Mac-address MAC address
L2cp-process L2CP action
Related commands
N/A
Function
To show L2CP profile configurations, use this command.
Format
show l2cp-process profile [ profile-number ]
Parameters
Parameter Description
profile-number L2CP profile ID, an integer, ranging from 1 to 16
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
10
Usage guidelines
N/A
Examples
This example shows how to show L2CP profile configurations.
Raisecom#show l2cp-process profile 1
Destination MAC Address for Encapsulated Packets: 010E.5E00.0003
ProfileId: 1
Name:
BpduType Mac-address l2cp-process Mac-vlan EgressPort tunneltype
-------------------------------------------------------------------------
-------------
stp 0180.C200.0000 tunnel -- -- none
dot1x 0180.C200.0003 peer -- -- none
lacp 0180.C200.0002 peer -- -- none
oam 0180.C200.0002 peer -- -- none
cdp 0100.0CCC.CCCC drop -- -- none
vtp 0100.0CCC.CCCC drop -- -- none
pvst 0100.0CCC.CCCD drop -- -- none
lldp 0180.C200.000E peer -- -- none
elmi 0180.C200.0007 peer -- -- none
udld 0100.0CCC.CCCC drop -- -- none
pagp 0100.0CCC.CCCC drop -- -- none
Field Description
Profile L2CP profile number
name L2CP profile name
Bpudtype Protocol type
Mac-address MAC address
L2cp-process L2CP action
Mac-Vlan Specified VLAN
EgressPort Specified egress interface
Related commands
N/A
Function
To show statistics of L2CP packets, use this command.
Format
show l2cp-process [ tunnel statistics ] [ interface-type interface-number]
Parameters
Parameter Description
interface-type Interface types:
port-channel: logical interface, LAG interface
tengigaethernet: physical interface, 10 Gbit/s interface
gigaethernet: physical interface, 1000 Mbit/s interface
interface-number Interface ID, with the value varying with the device models and
interface types:
port-channel: 1 to 8; 1.x to 8.x (x = 1 to 4094)
gigaethernet: 1/1/1 to 1/1/24
ten gigaethernet: 1/1/25 to 1/1/28
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
10
Usage guidelines
N/A
Examples
This example shows how to show statistics of L2CP packets on the interface.
Raisecom#show l2cp-process tunnel statistics
tunnel statistics informatiom
Port BpduType Encapsulation Decapsulation Drop
Counter Counter Counter
-------------------------------------------------------------------------
-----
PC1 stp 0 0 0
dot1x 0 0 0
lacp 0 0 0
oam 0 0 0
cdp 0 0 0
vtp 0 0 0
pvst 0 0 0
lldp 0 0 0
elmi 0 0 0
udld 0 0 0
pagp 0 0 0
PC2 stp 0 0 0
dot1x 0 0 0
lacp 0 0 0
oam 0 0 0
cdp 0 0 0
vtp 0 0 0
pvst 0 0 0
Field Description
Port Interface ID
BpduType Protocol type
Encapsulation Encapsulation packets
Decapsulation Decapsulation packets
Discard Discard packets.
Related commands
N/A
3.1 G.8032
3.1.1 clear ethernet ring-protection command
Function
To disable Ethernet Ring Protection Swithing (FS, MS, WTR timer timeout, and WTB timer
timeout) command, use this command.
Format
clear ethernet ring-protection ring-id command
Parameters
Parameter Description
ring-id Ethernet ring ID, an integer, ranging from 1 to 255
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to disable Ethernet Ring Protection Switching (FS, MS, WTR
timer timeout, and WTB timer timeout) command.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Executing this command will disable the ERPS command. Use it with caution.
Examples
This example shows how to clear ERPS on protection ring 1.
Raisecom#config
Raisecom(config)#clear ethernet ring-protection 1 command
Set successfully.
Related commands
N/A
Function
To clear ring protection statistics, use this command.
Format
clear ethernet ring-protection ring-id statistics
Parameters
Parameter Description
ring-id Ethernet ring ID, an integer, ranging from 1 to 255
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
N/A
Examples
This example shows how to clear statistics of protection ring 1.
Raisecom#config
Raisecom(config)#clear ethernet ring-protection 1 statistics
Set successfully.
Related commands
N/A
Function
To create G.8032 protection ring or sub-ring, use this command. To delete the ring, use the no
form of this command.
Format
ethernet ring-protection ring-id east { interface-type interface-number | port-channel port-
channel-number } west { interface-type interface-number | port-channel port-channel-
number } [ node-type { rpl-owner | rpl-neighbour } rpl { east | west } ] [ not-revertive ]
[ protocol-vlan vlan-id ] [ block-vlanlist vlan-list ]
ethernet ring-protection ring-id { east | west } { interface-type interface-number | port-
channel port-channel-number } [ node-type { rpl-owner | rpl-neighbour } ] [ not-
revertive ] [ protocol-vlan vlan-id ] [ block-vlanlist vlan-list ]
no ethernet ring-protection ring-id
Parameters
Parameter Description
ring-id Ethernet ring ID, an integer, ranging from 1 to 255
east Eastbound interface
west Westbound interface
interface-type Interface ID
interface-number The interface-type means interface type.
The interface-number refers to the three dimensional interface
ID.
port-channel port- LAG ID, an integer, ranging from 1 to 32
channel-number
Parameter Description
rpl-owner The node type is RPL Owner
Located at one end of RPS. It is in interface blocking state when
the link is normal. When fault occurs, it will transition to active
state automatically.
rpl-neighbour Located at one end of RPS
Node type is Neighbor.
It is in interface blocking state when the link is normal.
not-revertive The protection ring transitions to non-revertive mode.
When the link is recovering from fault, the traffic will be
switched from the protection link to the working link if the
device is in revertive mode; the traffic will not be switched if
the device is in non-revertive mode; if the parameter is not
configured, the device is in revertive mode by default.
protocol-vlan Protocol VLAN, used for transmitting ERPS packets
vlan-id VLAN ID, an integer, ranging from 1 to 4094
block-vlanlist Blocked VLAN lists
vlan-list VLAN ID list, an integer, ranging from 1 to 4094,
It supports specific values, such as "1,2,3"; it also supports a
range, such as "1-3".
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
G.8032, by defining different roles for the nodes on the ring, blocks loop to avoid broadcast
storm under normal condition. When faults occur on the links or nodes, it can immediately
switch the traffic to the backup link, thus implementing loop avoidance, protection switching
(with switching time less than 50ms which meets the requirement of carrier-grade
networking), and automatic recovery. It supports single ring, tangent ring, and intersecting
ring networking.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Only one device is allowed to be configured as RPL Owner and one as RPL Neighbor on the
ring. Other devices can be only configured as forwarding nodes.
The ethernet ring-protection ring-id east { interface-type interface-number | port-
channel port-channel-number } west { interface-type interface-number | port-channel
port-channel-number } node-type { rpl-owner | rpl-neighbour } rpl { east | west }
[ not-revertive ] [ protocol-vlan vlan-id ] [ block-vlanlist vlanlist ] command is for
configuring the RPL Owner or RPL Neighbour. Therefore, you need to use therpl { east|
west } command to specify the interface on which the RPL is.
The ethernet ring-protection ring-id east { interface-type interface-number | port-
channel port-channel-number } west { interface-type interface-number | port-channel
port-channel-number } [ not-revertive ] [ protocol-vlan vlan-id ] [ block-vlanlist
vlanlist ] is for configuring common forwarding nodes on the ring. Therefore, it is of no
need to specify RPL interface.
The tangent ring is formed by two separate single rings and is created the same as ordinary
single ring. The intersecting ring is divided into the master ring and sub ring. The way of
creating the master ring is the same as that of the sub ring and the way of creating the non-
intersecting nodes in the intersecting ring is the same as that of the single ring. The ways to
create the intersecting nodes in the sub ring are as follow:
Use the ethernet ring-protection ring-id { east | west } { interface-type interface-
number | port-channel port-channel-number } node-type { rpl-owner | rpl-neighbour }
[ not-revertive ] [ protocol-vlan vlan-id ] [ block-vlanlist vlanlist ] command to
configure the intersecting node in the sub ring as RPL Owner or RPL Neighbor. One
interface on the intersecting node in the intersecting node belongs to the master ring.
Therefore, you can just configure to switch traffic to the eastbound interface or
westbound interface. As a result, you don't need to use the rpl { east| west } command to
specify the RPL interface.
The ethernet ring-protection ring-id { east | west } { interface-type interface-number |
port-channel port-channel-number } [ not-revertive ] [ protocol-vlan vlan-id ] [ block-
vlanlist vlanlist ] is used for configuring the intersecting node in the sub link as the
common forwarding node. One interface on the intersecting node in the intersecting node
belongs to the master ring. Therefore, you can just configure to switch traffic to the
eastbound interface or westbound interface.
While configuring the intersecting ring, you need to configure the master ring first and
then the sub ring. Otherwise, the sub ring cannot find the master ring interface, which
will result in the failure of establish sub-ring virtual path.
The sub ring ID must be bigger than that of the master ring.
Examples
This example shows how to create G.8032 protection ring 1 and configure it as the
RPLOwner node.
Raisecom#config
Raisecom(config)#ethernet ring-protection 1 east gigaethernet 1/1/1 west
gigaethernet 1/1/2 node-type rpl-owner rpl east
Set successfully.
Related commands
show ethernet ring-protection
Function
To forcedly switch the traffic to the eastbound or westbound interface, use this command.
Format
ethernet ring-protection ring-id FS { east | west }
Parameters
Parameter Description
ring-id Ethernet ring ID, an integer, ranging from 1 to 255
east Block eastbound interface and forcedly switch traffic to the
westbound interface.
west Block westbound interface and forcedly switch traffic to the
eastbound interface.
Default conditions
When faults occur on the working link, the traffic will be automatically switched to the
protection link.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
When no fault occurs in the network but you wish to make some adjustments, you can use
this command to forcedly switch the traffic to the eastbound or westbound interface.
Prerequisite
Protection ring is created through the ethernet ring-protection command. Otherwise,
configurations fail.
Follow-up procedure
You can use the clear ethernet ring-protection command to disable the function after the
completion of adjustments.
Precaution
N/A
Examples
This example shows how to configure protection ring 1, block eastbound interface, and
forcedly switch the traffic to the westbound interface.
Raisecom#config
Raisecom(config)#ethernet ring-protection 1 FS east
Set successfully.
Related commands
show ethernet ring-protection
Function
To configure ring guard timer, use this command. To return to the default condition, use the
no form of this command.
Format
ethernet ring-protection ring-id guard-time guard-time
no ethernet ring-protection ring-id guard-time
Parameters
Parameter Description
ring-id Ethernet ring ID, an integer, ranging from 1 to 255
guard-time Value of guard timer, an integer, ranging from 20 to 2000, in units of
ms
Default conditions
The value of the Guard timer is 500ms.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
If the node recovers immediately from faults in a large-scale ring network, it may receive the
fault notification sent by itself from neighboring nodes and be Down again. However, after
the guard timer is configured, the node with faults will not process APS packets within a
period.
Prerequisite
The protection ring should be created through the ethernet ring-protection command.
Otherwise, configurations fail.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the Guard timer on protection ring 1 to 1000ms.
Raisecom#config
Raisecom(config)#ethernet ring-protection 1 guard-time 1000
Set successfully.
Related commands
show ethernet ring-protection
Function
To configure ring Holdoff timer, use this command. To return to the default condition, use the
no form of this command.
Format
ethernet ring-protection ring-id holdoff-time holdoff-time
no ethernet ring-protection ring-id holdoff-time
Parameters
Parameter Description
ring-id Ethernet ring ID, an integer, ranging from 1 to 255
holdoff-time Value of Holdoff timer, an integer, ranging from 0 to 100, in units of
100ms
Default conditions
The value of HOLDOFF timer is 0ms.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
After the Holdoff timer is configured, the system will delay to report faults when the working
link fails, which means that the traffic will be switched to the protection link after a delayed
period, thus avoiding frequent switching caused by working link oscillation.
Prerequisite
Protection ring is created through the ethernet ring-protection command. Otherwise,
configurations fail.
Follow-up procedure
N/A
Precaution
If the value of the Holdoff timer is configured too big, it will affect the 50ms switching
performance. Therefore, it is recommended to use the default value "0".
Examples
This example shows how to configure the Holdoff timer on protection ring 1 to 100ms.
Raisecom#config
Raisecom(config)#ethernet ring-protection 1 holdoff-time 1
Set successfully.
Related commands
show ethernet ring-protection
Function
To configure to manually switch traffic to the eastbound interface or westbound interface on
the ring, use this command.
Format
ethernet ring-protection ring-id MS { east | west }
Parameters
Parameter Description
ring-id Ethernet ring ID, an integer, ranging from 1 to 255
east Block eastbound interface and forcedly switch traffic to the
westbound interface.
west Block westbound interface and forcedly switch traffic to the
eastbound interface.
Default conditions
The traffic will be automatically switched to the protection link while the working link fails.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
When the link is working well, but you wish to switch the service to another link, you can use
this command to do it manually.
Prerequisite
The ring protection should be created through the ethernet ring-protection command.
Otherwise, configurations fail.
Follow-up procedure
After the completion of network adjustment, you need to use the clear ethernet ring-
protection command command to disable the command in time.
Precaution
The priority of manual switches is lower than that of forced switches and automatic protection
switching.
Examples
This example shows how to configure G.8032 protection ring 1 to block westbound interface
and manually switch the traffic to the eastbound interface.
Raisecom#config
Raisecom(config)#ethernet ring-protection 1 MS west
Set successfully.
Related commands
show ethernet ring-protection
Function
To configure the protection ring name, use this command. To delete the name, use the no form
of this command.
Format
ethernet ring-protection ring-id name string
no ethernet ring-protection ring-id name
Parameters
Parameter Description
ring-id Ethernet ring ID, an integer, ranging from 1 to 255
string Protection ring name, a string of 1 to 32 characters
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the name of the protection ring for identification
Prerequisite
The ring protection should be created through the ethernet ring-protection command.
Otherwise, configurations fail.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the name of protection ring 1 as Raisecom.
Raisecom#config
Raisecom(config)#ethernet ring-protection 1 name Raisecom
Set successfully.
Related commands
show ethernet ring-protection
Function
To enable ring protection Propagate feature on the intersecting node, use this command. To
disable this function, use the disable form of this command.
Format
ethernet ring-protection ring-id propagate { enable | disable }
Parameters
Parameter Description
ring-id Ethernet ring ID, an integer, ranging from 1 to 255
enable Enable Propagate on the ring.
disable Disable Propagate on the ring.
Default conditions
The Propagate on the ring is disabled.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
The data in the sub ring will be forwarded through the master ring. Therefore, there will be a
MAC address table on the device in the master ring. When the sub ring fails, the master ring
can be immediately informed through Propagate to refresh the MAC address table, thus
avoiding traffic loss.
Prerequisite
The ring protection should be created through the ethernet ring-protection command.
Otherwise, configurations fail.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable Propagate on the intersecting node in sub ring 1.
Raisecom#config
Raisecom(config)#ethernet ring-protection 1 propagate enable
Set successfully.
Related commands
show ethernet ring-protection
Function
To configure the mode of sub-ring virtual channel, use this command. To return to the default
condition, use the no form of this command.
Format
ethernet ring-protection ring-id raps-vc { with | without }
no ethernet ring-protection ring-id raps-vc
Parameters
Parameter Description
ring-id Ethernet ring ID, an integer, ranging from 1 to 255
with Adopt with mode.
without Adopt without mode.
Default conditions
It adopts with mode.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
The mode of the sub-ring virtual path should be configured on the intersecting node. The links
between the intersecting nodes belong to the master ring. Therefore, the transmission modes
of the protocol packets in the sub ring are different from that of the master ring, as listed
below.
with: protocol packets in the sub ring are forwarded through the master ring.
without: protocol packets in the sub ring are forwarded through the sub-ring protocol
VLAN.
Prerequisite
Protection ring is created through the ethernet ring-protection command. Otherwise,
configurations fail.
Follow-up procedure
N/A
Precaution
The sub-ring virtual path mode of the two intersecting nodes must be configured the same.
Examples
This example shows how to configure the mode of sub-ring 1 virtual path as without.
Raisecom#config
Raisecom(config)#ethernet ring-protection 1 raps-vc without
Set successfully.
Related commands
show ethernet ring-protection
Function
To configure the protocol type, use this command.
Format
ethernet ring-protection ring-id version { 1 | 2 }
Parameters
Parameter Description
ring-id Ethernet ring ID, an integer, ranging from 1 to 255
1 Protocol version1
2 Protocol version2
Default conditions
Protocol version 2 is in use.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to enable all nodes on the same ring with the same version of
protocols. Otherwise, they cannot communicate with each other normally.
Prerequisite
The ring protection should be created through the ethernet ring-protection command.
Otherwise, configurations fail.
Follow-up procedure
N/A
Precaution
Version 1 distinguishes rings from each other through protocol VLAN. Therefore, different
rings should be configured with different protocol VLANs. It is recommended to configure
different rings with different protocol VLANs even though you use protocol version 2.
Examples
This example shows how to configure the version of protocol on protection ring 1 to 2.
Raisecom#config
Raisecom(config)#ethernet ring-protection 1 version 2
Set successfully.
Related commands
show ethernet ring-protection
Function
To configure WTR timer on the ring, use this command. To return to the default condition,
use the no form of this command.
Format
ethernet ring-protection ring-id wtr-time wtr-time
no ethernet ring-protection ring-id wtr-time
Parameters
Parameter Description
ring-id Ethernet ring ID, an integer, ranging from 1 to 255
wtr-time Value of WTR timer, an integer, ranging from 1 to 12, in units of second
Default conditions
The value of WTR timer is 5min.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
In revertive mode, the traffic will be switched to the working link when the WTR timer
timeout expires. You can use this command to adjust the WTR value to avoid frequent link
switching.
Prerequisite
The ring protection should be created through the ethernet ring-protection command.
Otherwise, configurations fail.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure WTR timers on protection ring 1 to 10min.
Raisecom#config
Raisecom(config)#ethernet ring-protection 1 wtr-time 10
Set successfully.
Related commands
show ethernet ring-protection
Function
To show configurations of G.8032 ring protection, use this command.
Format
show ethernet ring-protection
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
11
Usage guidelines
N/A
Examples
This example shows how to show configurations of ring protection.
Raisecom#show ethernet ring-protection
Id/Name Role Proto-Vlan Proto-Ver Revertive-Mode Status FS/MS RAPS-VC
East(Rpl/State) West(Rpl/State) Guard(ms) Wtr(m)
Wtb(s) Holdoff(100ms) Pro Trap
-------------------------------------------------------------------------
Raisecom Owner 1 V2 Revert Force-switch East/East With
Field Description
Id/Name Protection ring ID/name
Role RPL node type
Owner: master node
Neighbour: neighboring nodes
Transfer: transmitting node
Field Description
Holdoff(100ms) Value of Holdoff timer
Pro Propagate status
enable: enabled
disable: disabled
Trap Failure Trap status
enable: enabled
disable: disabled
Related commands
N/A
Function
To show statistics of ring protection, use this command.
Format
show ethernet ring-protection statistic
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
11
Usage guidelines
N/A
Examples
This example shows how to show ring protection statistics.
Raisecom#show ethernet ring-protection statistics
Id/Name Direction State Link-State Last-Occur(ago) ApsTx ApsRx sc
------------------------------------------------------------------------
Field Description
Id/Name Protection ring ID/name
Show the name of the protection ring if it is configured with
name. Otherwise, check the ID.
Direction Link direction
East: eastbound
West: westbound
State Interface state
Block: in blocking state
Forward: in forwarding state
Related commands
N/A
Function
To show protection ring status, use this command.
Format
show ethernet ring-protection status
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
11
Usage guidelines
N/A
Examples
This example shows how to show protection ring status.
Raisecom#show ethernet ring-protection status
Id/Name Bridge-State Last Occur(ago) East-State West-State sc
Traffic-vlanlist
-------------------------------------------------------------------------
Raisecom Force-switch 0 days,1:59:57:480 Block N/A 1
1-4094
2 Protection 0 days,9:10:37:230 Block N/A 0
1-4094
Field Description
Id/Name Protection ring ID/name
Bridge-State Bridge state
Idle: idle
Protection: protecting
Manual-Switch: manual switch
Force-Switch: forced switch
Pending: in the pending recovery state
Related commands
N/A
4 IP service
4.1 ARP
4.1.1 arp
Function
To configure the static ARP, use this command. To delete one entry of ARP, use the no form
of this command.
Format
arp ip-address mac-address
no arp ip-address
Parameters
Parameter Description
ip-address IP address, in dotted decimal notation, such as 10.10.10.1
mac-address MAC address, in dotted hexadecimal notation, such as
000E.5E12.3456
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the static ARP.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure static ARP with the IP address of 192.168.27.26 and
the corresponding MAC address of 000e.5e12.3456.
Raisecom#config
Raisecom(config)#arp 192.168.27.26 000e.5e12.3456
Set successfully.
Related commands
show arp
Function
To configure the aging time of dynamic ARP entries, use this command. To return to the
default condition, use the no form of this command.
Format
arp aging-time time
no arp aging-time
Parameters
Parameter Description
time Aging time, an integer, ranging from 60 to 2147483, in units of
second
Default conditions
The aging time of dynamic ARP entries is 1200 seconds.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the aging time of dynamic ARP entries.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the aging time of dynamic ARP entries to 1500 seconds.
Raisecom#config
Raisecom(config)#arp aging-time 1500
Set successfully.
Related commands
show arp
Function
To enable the interface with the function of dynamically learning the ARP, use this command.
To disable this function, use the disable form of this command.
Format
arp learning { enable | disable }
Parameters
Parameter Description
enable Enable the interface with the function of dynamically
learning the ARP.
Parameter Description
disable Disable the function of dynamically learning the ARP on
the interface.
Default conditions
The function of dynamically learning ARP on the interface is enabled.
Command mode
Physical interface configuration/Aggregation group interface configuration
User level
11
Usage guidelines
Scenario
When the dynamic ARP learning is disabled on the interface:
The interface will respond to the ARP Request packet with the ARP Reply packet but
will not learn ARP.
You need to configure static ARP if you wish the interface to communicate with other
devices/interfaces normally.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to disable dynamic ARP learning on the interface within VLAN 1.
Raisecom#config
Raisecom(config)#interface vlan 1
Raisecom(config-vlan1)#arp learning disable
Set successfully.
Related commands
show arp
Function
To configure the maximum number of ARPs to be dynamically learned on the interface, use
this command.
Format
arp max-learning-num number
Parameters
Parameter Description
number Maximum number, an integer, ranging from 1 to 768
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the maximum number of ARPs to be dynamically
learned on the interface.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the maximum number of ARPs to be dynamically
learned on the interface within VLAN 1 to 100.
Raisecom#config
Raisecom(config)#arp max-learning-num 100
Set successfully.
Related commands
show run
Function
To configure the ARP mode, use this command.
Format
arp mode { learn-all | learn-reply-only }
Parameters
Parameter Description
learn-all Learn MAC addresses contained in the reply packets of all
hosts.
learn-reply-only Learn the MAC address contained in the reply packet from
the requested host.
Default conditions
Learning MAC addresses contained in the reply packets of all hosts is enabled.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the ARP mode.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the ARP mode to learning MAC addresses contained in
the reply packets of all hosts.
Raisecom#config
Raisecom(config)#arp mode learn-all
Set successfully.
Related commands
show arp
Function
To clear all ARP entries, use this command.
Format
clear arp [ip-address | interface interface-type interface-number ]
Parameters
Parameter Description
ip-address IP address, in dotted decimal notation, such as 10.10.10.1
interface Clear ARP entries on the interface.
interface-type The interface-type means interface type.
interface-number The interface-number refers to interface ID.
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to shorten the aging time of invalid ARP entries while maintaining
the ARP list.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Clearing entries will affect the packets forwarding performance when there are a huge amount
of dynamic ARP entries. We recommend you to use the command of clearing a single entry.
Examples
This example shows how to clear ARP entries.
Raisecom#config
Raisecom(config)#clear arp
Set successfully.
Related commands
show arp
4.1.7 gratuitous-arp-learning
Function
To enable gratuitous ARP learning on the interface, use this command. To disable this
function, use the disable form of this command.
Format
gratuitous-arp-learning { enable | disable }
Parameters
Parameter Description
enable Enable gratuitous ARP learning on the interface.
disable Disable gratuitous ARP learning on the interface.
Default conditions
The gratuitous ARP learning on the interface is enabled.
Command mode
Physical interface configuration/VLAN interface configuration
User level
11
Usage guidelines
Scenario
When the dynamic ARP learning on the interface is disabled, the interface just checks address
conflicts but does not learn ARP packets while it receives gratuitous ARP.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to disable gratuitous ARP learning on the interface within VLAN1.
Raisecom#config
Raisecom(config)#interface vlan 1
Raisecom(config-vlan1)#gratuitous-arp-learning disable
Set successfully.
Related commands
show run
Function
To show information about ARP, use this command.
Format
show arp [ ip-address | interface vlan vlan-id | static ]
Parameters
Parameter Description
ip-address Show ARP information about the IP address.
static Show static ARP.
interface vlan vlan-id Show ARP information on the VLAN interface.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show global ARP.
Raisecom#show arp
ARP aging-time: 1200 seconds(default: 1200s)
ARP mode: Learn all
ARP table:
Total: 0 Static: 0 Dynamic: 0
Field Description
ARP aging-time Aging time of the dynamic ARP
ARP mode ARP mode
ARP table Statistics of ARP entries
Total Total
Static Number of static ARPs
Dynamic Number of dynamic ARPs
IP Address IP address
Mac Address MAC address
Interface Interface
Type ARP type
Age(s) ARP timing
Status Status
Related commands
N/A
Function
To configure the IP address of the VLAN interface, use this command. To delete the IP
address, use the no form of this command.
Format
ip address ip-address [ ip-mask ] [ sub ]
no ip address ip-address [ sub ]
Parameters
Parameter Description
ip-address IP address, in dotted decimal notation, such as 10.0.0.1
ip-mask Mask of IP address, in dotted decimal notation, such as
255.0.0.0
sub Sub-IP address
Default conditions
The interface is not configured with IP address.
Command mode
VLAN interface configuration/Loopback interface configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the IP address of the interface which supports Layer3
physical configuration mode for transmitting and receiving IP packets.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure loopback interface 1 with the IP address of
192.168.11.101 and mask of 255.255.0.0.
Raisecom#config
Raisecom(config)#interface loopback 1
Raisecom(config-loopback1)#ip address 192.168.11.101 255.255.0.0
Set successfully.
Related commands
show interface
Function
To configure the IPv6 address of the interface, use this command. To delete the default
gateway, use the no form of this command.
Format
ipv6 address ipv6-address/prefix-length [ sub ]
no ipv6 address ipv6-address
Parameters
Parameter Description
ipv6-address/prefix-length IPv6 address with prefix length, in form of A:B::C:D/M
sub Sub-IPv6 address
Default conditions
N/A
Command mode
VLAN interface configuration/Loopback interface configuration
User level
11
Usage guidelines
Scenario
In interface configuration mode, you can use this command to configure the IPv6 address of
the device and associate it with a VLAN.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The number of VLANs associated with each interface shall be no more than 1024.
Examples
This example shows how to configure the IPv6 address of VLAN1 to 1030:0::48AA:1A2B,
with the prefix length of 60.
Raisecom#config
Raisecom(config)#interface vlan 1
Raisecom(config-vlan)#ipv6 address 1030:0::48AA:1A2B/60
Set successfully
Related commands
show ipv6 interface
Function
To show configurations of the IP address, use this command.
Format
show ip interface brief
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
15
Usage guidelines
N/A
Examples
This example shows how to show configurations of the IP address.
Raisecom#show ip interface brief
VRF IF Address NetMask
Catagory
-------------------------------------------------------------------------
------------------------------
Default-IP-Routing-Table fastethernet1/0/1 192.168.0.1
255.255.255.0 primary
Parameter Description
VRF VRF name
IF IP interface ID
Address IP address
NetMask Network mask
Source Type
Catagory Primary and subordinate IP address
primary: primary IP address
sub: subordinate IP address
Related commands
N/A
Function
To show configurations of the TPv6 address, use this command.
Format
show ipv6 interface brief
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
15
Usage guidelines
N/A
Examples
This example shows how to show configurations of the IPv6 address.
Raisecom#show ipv6 interface brief
IF Source Type Address
------------------------------------------------------------
0 negotiate link-local FE80::20E:5EFF:FE00:16/64
1 negotiate link-local FE80::20E:5EFF:FE00:16/64
2 negotiate link-local FE80::20E:5EFF:FE00:16/64
3 negotiate link-local FE80::20E:5EFF:FE00:16/64
Field Description
IF IP interface ID
Source Source
assigned: IP address configured statically
negotiate: address obtained from the protocol stack
dhcp: IP address obtained from the DHCP server
Type Type
global-unicast: global unicast address
link-local: link local address
Address IPv6 address
Related commands
N/A
Function
To create a static route, use this command. To delete the static route, use the no form of this
command.
Format
ip route ip-address { masklength | ip-mask } next-hop-ip-address
no ip route ip-address{ masklength | ip-mask } next-hop-ip-address
Parameters
Parameter Description
ip-address Destination IP address, in dotted decimal notation, such as 10.0.0.1
Delete the IP static route if the parameter is configured in no form.
Delete all static routes if the parameter is not configured.
masklength Mask length, an integer, ranging from 0 to 32
ip-mask Mask length, in dotted decimal notation, such as 255.255.255.255
next-hop-ip- Next-hop IP address, in dotted decimal notation, such as 10.0.0.1
address
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
When the network topology is simply, you can create static routes manually to realize the
communication between devices.
The static route will not be affected by the topology change. It remains the same when the
topology changes.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The next hop of the route must be directly connected to the device while using this
command to create a static route. Otherwise, configurations fail.
The mask must match with the IP address. Otherwise, configurations fail.
Examples
This example shows how to add a route with destination IP address being 10.0.0.1 and the IP
address of the next hop being10.0.1.2.
Raisecom#config
Raisecom(config)#ip route 10.0.0.1 255.0.0.0 10.0.1.2
Set successfully.
Related commands
show ip route
Function
To configure the default administrative distance of the static route, use this command. To
disable this function, use the no form of this command.
Format
ip route static distance distance
no ip route static distance
Parameters
Parameter Description
distance Administrative distance, an integer, ranging from 1 to 255
Default conditions
The administrative distance is 1.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
While configuring static routes, the priority of the administrative distance from high to low is:
the specified administrative distance while configuring static routes and the default
administrative distance configured.
Using this command to modify the default administrative distance of the static route will not
affect the configured static route. If you save the configuration, the administrative distance of
the static route maintains the same after the device is rebooted.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the default administrative distance of the static route to
2.
Raisecom#config
Raisecom(config)#ip route static distance 2
Set successfully.
Related commands
show ip route
Function
To show information about the IPv4 routing table, use this command.
Format
show ip route [ detail ]
Parameters
Parameter Description
detail Show details about the IPv4 routing table
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
11
Usage guidelines
N/A
Examples
This example shows how to show details about the IPv4 routing table.
Raisecom#show ip route detail
Routing Tables: Default-IP-Routing-Table
Destination: 192.168.0.0/24
Protocol: connected Process ID: 0
Distance: 0 Metric: 0
NextHop: 192.168.0.1 Neighbour: 0.0.0.0
RelayNextHop: 0.0.0.0 Interface: FE1/0/1
Label: 0 TunnelID:
State: Active Fib Age: 2d07h36m
Tag: 0 XC Index: 0
Destination: 192.168.0.1/32
Protocol: connected Process ID: 0
Distance: 0 Metric: 0
NextHop: 192.168.0.1 Neighbour: 0.0.0.0
RelayNextHop: 0.0.0.0 Interface: FE1/0/1
Label: 0 TunnelID:
State: Active Fib Age: 2d07h36m
Tag: 0 XC Index: 0
Field Description
Destination Destination IP address/mask length
Proto Protocol type
Process ID Process ID
Field Description
Distance Administrative distance
Metric Metric value
Nexthop Next-hop IP address
Neighbour Neighbor
RelayNextHop Recursive to the next hop
Interface Interface ID
Label Label
TunnelID Tunnel ID
State State
Age Time-to-leave
Tag Tag
XC Index XC index
Related commands
N/A
4.4 NDP
4.4.1 clear ipv6 neighbors
Function
To clear information of all IPv6 neighbors, use this command.
Format
clear ipv6 neighbors
Parameters
N/A
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to clear information of all IPv6 neighbors.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Executing this command will clear information of all IPv6 neighbors and the information
cannot be recovered. Use it with caution.
Examples
This example shows how to clear the NDP neighbor information of the IPv6.
Raisecom#config
Raisecom(config)#clear ipv6 neighbors
Set successfully
Related commands
show ipv6 neighbors
Function
To configure static neighbor entries, use this command. To disable this function, use the no
form of this command.
Format
ipv6 neighbor ipv6-address mac-address interface-type interface-number
no ipv6 neighbor ipv6-address
Parameters
Parameter Description
ipv6-address IPv6 unicast address, in colon hexadecimal notation
Parameter Description
mac-address MAC address, in dotted hexadecimal notation
It shall not be a multicast MAC address or an address with all bytes
being 0
interface-type Interface type:
vlan: logical interface, VLAN interface
loopback: logical interface, loopback interface
port-channel: logical interface, LAG interface
tengigaethernet: physical interface, 10 Gbit/s interface
gigaethernet: physical interface, 1000 Mbit/s interface
fastethernet: physical interface,100 Mbit/s Ethernet interface
interface-number Interface ID, the value varies with different models and interface
types:
vlan: 1 to 4094
loopback: 1 to 16
port-channel: 1 to 8; 1.x to 8.x (x = 1 to 4094)
gigaethernet: 1/1/1 to 1/1/24
fastethernet: 1/0/1
ten gigaethernet: 1/1/25 to 1/1/28
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure static neighbor table entries, and add the mapping
between IPv6 address and MAC address (which will not be aged) to the address mapping
table. You cannot use the no ipv6 neighbor ipv6-address command to clear dynamic
neighbor entries.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure a static neighbor entry with IPv6 address and MAC
address of VLAN 1 being 2001::3 and 000E.5E12.3456 respectively.
Raisecom#config
Raisecom(config)#ipv6 neighbor 2001::3 000E.5E12.3456 vlan 1
Set successfully
Related commands
show ipv6 neighbors
Function
To configure times for sending NS while checking whether the address is occupied, use this
command. To return to the default condition, use the no form of this command.
Format
ipv6 nd dad attempts value
no ipv6 nd dad attempts
Parameters
Parameter Description
value Times for sending NS, an integer, ranging from 0 to 600 where 0
means forbidding checking whether the address is occupied
Default conditions
The time is 1.
Command mode
VLAN interface configuration
User level
11
Usage guidelines
Scenario
When obtaining an IPv6 address, the device uses the function to make sure whether the
address is occupied by other devices.
You can use this command to configure times for sending NS while the device is checking
whether the address is occupied by other devices. After sending the NS for specified times,
the device will be sure that the address is usable if it receives no response.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure times of sending NS while VLAN 1 interface IP 1 is
checking whether the address is occupied by other devices to 5.
Raisecom#config
Raisecom(config)#interface vlan 1
Raisecom(config-vlan)#ipv6 nd dad attempts 5
Set successfully
Related commands
show ipv6 interface nd
Function
To configure the maximum number of NDPs allowed to be learned on the VLAN interface,
use this command. To return to the default condition, use the no form of this command.
Format
ipv6 neighbors max-learning-num number
no ipv6 neighbors max-learning-num
Parameters
Parameter Description
number The maximum number of NDPs, an integer, ranging from 1 to 1024
Default conditions
The maximum number of NDP allowed to be learned on the VLAN interface is 512.
Command mode
VLAN interface configuration
User level
11
Usage guidelines
Scenario
The switch can obtain the link layer address of neighboring nodes through NS and NA
messages and include the address in the neighbor information table. However, if the size of
the dynamically obtained neighbor information table is too large, the forwarding performance
of the device may decrease.
You can use this command to configure the maximum number of NDPs allowed to be learned
on the interface. When then number of dynamic neighbors learned on the VLAN interface
exceeds the maximum, the VLAN interface will stop learning neighbour information.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the maximum number of NDPs allowed to be learned
on interface IP 2 within VLAN 1 to 4.
Raisecom#config
Raisecom(config)#interface vlan 1
Raisecom(config-vlan)#ipv6 neighbors max-learning-num 4
Set successfully
Related commands
show ipv6 interface nd
Function
To show IPv6 neighbors configuration, use this command.
Format
show ipv6 neighbors [ ipv6-address | vlan vlan-id | static ]
Parameters
Parameter Description
ipv6-address Show neighbors configuration of specified IPv6 address, in
colon hexadecimal notation
vlan vlan-id VLAN ID, an integer, ranging from 1 to 4094
static Show static IPv6 neighbors configuration
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
Scenario
You can use the following commands to show IPv6 neighbors configuration.
Use the show ipv6 neighbors command to show all neighbors configurations, including
information obtained dynamically and configured statically.
Use the show ipv6 neighbors ipv6-address command to show neighbors information of
specified IPv6.
Use the show ipv6 neighbors ip if-number command to show neighbors information on
specified Layer 3 interface.
Use the show ipv6 neighbors static command to show neighbors information
configured statically.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to show information about all IPv6 neighbors.
Raisecom#show ipv6 neighbors
Aging time of dynamic neighbors(s): 1200
Total: 1
Static: 1
Dynamic:0
Field Description
Aging time of dynamic Aging time of dynamic neighbor (s), system default
neighbors(s) configuration
IPv6 Address IPv6 address of the neighbor
Mac Address MAC address of the neighbor
Interface Layer 3 interface which is connected to the neighbor device
State State of neighbors
Type Type of neighbor information
static: in static status
dynamic: in dynamic status
Age Age
When the Type display information is static, it shows "--".
When the Type display information is dynamic, it shows the
time since packets were sent to neighbors the latest time till
now.
Total Total amount of neighbor information
Static Amount of static neighbor information
Dynamic Amount of dynamic neighbor information
Related commands
N/A
Function
To show information about IPv6 prefix, use this command.
Format
show ipv6 interface prefix [ interface-type interface-number ]
Parameters
Parameter Description
interface-type Interface types:
vlan: logical interface, VLAN interface
loopback: logical interface, loopback interface
tengigaethernet: physical interface, 10 Gbit/s interface
gigaethernet: physical interface, 1000 Mbit/s interface
interface-number Interface ID, the value varies with different models and interface
types:
vlan: 1 to 4094
loopback: 1 to 16
gigaethernet: 1/1/1 to 1/1/24
ten gigaethernet: 1/1/25 to 1/1/28
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
Scenario
You can use this command to show information about IPv6 prefix, including prefix length,
prefix sources, prefix on-link flag, prefix automatic configuration flag, prefix preferred time,
and prefix lifetime.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to show information about IPv6 prefix of IP 0.
Raisecom#show ipv6 interface prefix ip 0
Field Description
Interface Interface ID
Prefix Prefix information
PrefixLen Prefix length
Origin Origin
OnLinkFlag Onlink flag displays the status of the prefix
on-link: directly connected and reachable
off-link: indirectly connected and reachable
AutoFla Automatic configuration flag
PreferredLifetime Preferred time, namely, the preferred life time of the
prefix for stateless address configuration
ValidLifetime Valid lifetime of the prefix
Related commands
N/A
Function
To show information about ND configured on the interface, use this command.
Format
show ipv6 interface nd [ interface-type interface-number ]
Parameters
Parameter Description
interface-type Interface type:
vlan: logical interface, VLAN interface
loopback: logical interface, loopback interface
tengigaethernet: physical interface, 10 Gbit/s interface
gigaethernet: physical interface, 1000 Mbit/s interface
Parameter Description
interface-number Interface ID, the value varies with different models and interface
types:
vlan: 1 to 4094
loopback: 1 to 16
gigaethernet: 1/1/1 to 1/1/24
ten gigaethernet: 1/1/25 to 1/1/28
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
Scenario
You can use this command to show ND configurations on Layer 3 interfaces, including
Layer3 interface ID, times of sending NS, and the maximum number of neighbors.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure ND configurations on Layer 3 interface IP 0.
Raisecom#show ipv6 interface nd ip 0
Interface NS number MaxNbr Number
-----------------------------------------------
0 7 5
Field Description
Interface Layer three interface ID
Field Description
NS number Times of sending NS
MaxNbr Number Maximum number of neighbors
Related commands
ipv6 nd dad attempts
ipv6 neighbors max-learning-num
5 PoE
Function
To enable PoE on the interface, use this command. To disable this function, use the disable
form of this command.
Format
poe { enable | disable }
Parameters
Parameter Description
enable Enable PoE on the interface.
disable Disable PoE on the interface.
Default conditions
Enabled
Command mode
Physical interface configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure PoE on the interface.
Enable PoE on the interface after which the interface can supply power and transmit data
concurrently.
Disable PoE on the interface after which the interface stops supplying power.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable PoE on interface 1/1/3.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/3
Raisecom(config-gigaethernet1/1/3)#poe enable
Set successfully.
Related commands
show poe port-list
Function
To configure force-power on the interface, use this command. To disable this function, use the
no form of this command.
Format
poe force-power
no poe force-power
Parameters
N/A
Default conditions
Disabled
Command mode
Physical interface configuration
User level
11
Usage guidelines
Scenario
When the normal power supply is not enough for the device to run normally, you can enable
the force-power.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
When using the PoE switch to supply power for the remote PD, we recommend using the
standard PD, pre-standard PD, or Cisco PD. If you use other non-standard PDs, it may
damage the PD if you enable the force-power. Therefore, contact Raisecom technical support
for confirmation before using the PD.
Examples
This example shows how to enable force-power on interface 1/1/3.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/3
Raisecom(config-gigaethernet1/1/3)#poe porce-power
Set successfully.
Related commands
show poe port-list
Function
To enable the PSE with a feature of identifying the non-standard PD, use this command.
Format
poe legacy { enable | disable }
Parameters
Parameter Description
enable Enable the PSE with a feature of identifying the non-standard PD.
disable Disable the PSE from identifying the non-standard PD.
Default conditions
Disabled
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
The PSE is connected downstream to the non-standard PDs.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
When using a non-standard PD, we recommend confirming parameters, such as the power
supply, voltage, and current, of the non-standard PD. In this case, you can configure the
proper maximum output power on the PSE to avoid damaging the PD.
Examples
This example shows how to enable a PSE with the feature of identifying the non-standard PD.
Raisecom#config
Raisecom(config)#poe legacy enable
Set successfully.
Related commands
show poe pse
Function
Configure the maximum output power of the interface, use this command. To disable this
function, use the no form of this command.
Format
poe max-power max-power-value
no poe max-power
Parameters
Parameter Description
max-power-value Maximum output power, an integer, ranging from 4000 to
30000, in units of mW
Default conditions
The maximum output power is 30000 mW.
Command mode
Physical interface configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the maximum output power of the interface.
After the maximum output power of the interface is configured, the configured value is
the maximum output power that can be provided by the PD connected to that interface.
After the interface PoE is enabled, only the power within the range can be provided to
the connected PD.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the PoE maximum output power on interface 1/1/3 to
6050 mW.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/3
Raisecom(config-gigaethernet1/1/3)#poe max-power 6050
Actual power: 6050, Set successfully.
Related commands
show poe port-list
Function
To configure the power supply priority on the interface, use this command. To return to the
default condition, use the no form of this command.
Format
poe priority { critical | high | low }
no poe priority
Parameters
Parameter Description
critical Critical priority
high High priority
low Low priority
Default conditions
Low priority
Command mode
Physical interface configuration
User level
11
Usage guidelines
Scenario
The PoE interface priority should be used in conjunction with the PoE power supply mode.
Automatic mode: when the switch supplies power nearly to the fullest extent, it powers the
device in the following sequence: PD connected to the critical interface > PD connected to
the high interface > PD connected to the low interface. If the PoE interface is with the same
priority, then the one with a smaller ID will be powered first.
Manual mode: when the switch supplies power nearly to the fullest extent, it will not supply
power according to the sequence of PD access instead of priority.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the PoE power supply priority on interface 1/1/3 to
high.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/3
Raisecom(config-gigaethernet1/1/3)#poe priority high
Set successfully.
Related commands
show poe port-list
Function
To configure the PSE power threshold ratio, use this command.
Format
poe pse power-thredshold percent
Parameters
Parameter Description
percent Threshold ratio, an integer, ranging from 1 to 99, indicating 1%
to 99%
Default conditions
99%
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
When the power utilization rate of the PSE exceeds or is below the configured threshold, the
system will send Trap messages.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the PSE power supply threshold ratio to 60%.
Raisecom#config
Raisecom(config)#poe pse power-thredshold 60
Set successfully.
Related commands
show poe pse
Function
To enable global Trap, use this command. To disable this function, use the disable form of
this command.
Format
poe pse trap { enable | disable }
Parameters
Parameter Description
enable Enable global Trap.
Parameter Description
disable Disable global Trap.
Default conditions
Enabled
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
When the global Trap is enabled, the device will send Trap messages to the NMS in the case
of overtemperature, PSE power crossing the threshold, or changes of PoE interface power
supply status.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable global Trap.
Raisecom#config
Raisecom(config)#poe pse trap enable
Set successfully.
Related commands
show poe pse
Function
To enable temperature-protection of the switch, use this command. To disable this function,
use the disable form of this command.
Format
poe temperature-protection { enable | disable }
Parameters
Parameter Description
enable Enable temperature-protection of the switch.
disable Disable temperature-protection of the switch.
Default conditions
Enabled
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure temperature protection of the switch.
When the temperature within the switch exceeds 65C, the PoE on the interface is
disabled. The device sends Trap messages to the NMS.
When the temperature within the switch is below 60 C, the temperature-protection of
the switch is removed. The interface is enabled with PoE and the device sends Trap
messages to the NMS.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable temperature-protection of the switch.
Raisecom#config
Raisecom(config)#poe temperature-protection enable
Set successfully.
Related commands
show poe pse
Function
To configure the power management mode of the switch, use this command.
Format
poe power-management { auto | manual }
Parameters
Parameter Description
auto Automatic control
manual Manual control
Default conditions
auto
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the power management mode of the switch.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the power management mode of the switch to manual.
Raisecom#config
Raisecom(config)#poe power-management manual
Set successfully.
Related commands
show poe port-list
Function
To show the power status of a specified interface, use this command.
Format
show poe interface-type interface-number [ detail ]
Parameters
Parameter Description
interface-type interface- Interface ID, an integer, ranging from 1 to the maximum PoE
number interface ID
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show the power status of interface GE1/1/3.
Raisecom#show poe gigaethernet1/1/3
Port: gigaethernet1/1/3
-------------------------------------------------
POE administrator status: Enable
POE force-power status: Disable
Field Description
Port Interface
PoE administrator status Interface PoE management status
POE force-power status Interface PoE force-power status
PoE operation status Interface PoE operation status
PoE protect status Interface PoE protection status
DetectStatus Power detection status
Max Power Maximum power, in units of mW
Output Power Output power, in units of mW
Output Current Output current, in units of mA
Output Voltage Output voltage, in units of V
This example shows how to show the detailed power information of interface 1/1/3.
Raisecom#show poe gigaethernet1/1/3 detail
Port: gigaethernet1/1/3
-------------------------------------------------
POE administrator status: Enable
POE force-power status: Disable
POE operation status: Enable
Power detection status:Searching
POE Power Pairs mode:Signal
PD power classification:Class0
POE power Priority:Low
POE power max:30000 (mW)
POE power output:0 (mW)
POE power average:0 (mW)
POE power peak:0 (mW)
POE current output:0 (mA)
POE voltage output:0 (V)
Field Description
Port Interface
PoE administrator status Interface PoE management status
POE force-power status Interface PoE force-power status
Field Description
PoE operation status Interface PoE operation status
Power detection status Power detection status
PoE Power Pairs mode PoE interface power pairs mode
PD power classification PD power classification
PoE power Priority PoE power priority
PoE power max PoE interface maximum power, in units of mW
PoE power output PoE interface current output power, in units of mW
PoE power average PoE interface average power, in units of mW
PoE power peak PoE interface peak power, in units of mW
PoE current output PoE interface output current, in units of mA
PoE voltage output PoE interface output voltage, in units of V
PoE protect status PoE interface protection status
Related commands
N/A
Function
To show configurations and realtime running information about the PSE, use this command.
Format
show poe pse [ detail ]
Parameters
Parameter Description
detail Show the detailed configurations about the PSE.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show configurations and realtime running information about the
PSE.
Raisecom#show poe pse
PSE ID: 1
PSE operation status: ON
PSE legacy detection: Enable
Switch temperature-protection:Enable
Power Mode Wattage Rating(W) Output Power(W) Peak Power(mW)
Average Power(mW)
-------------------------------------------------------------------------
----
Auto 120 0 0 0
Field Description
PSE ID For distinguishing PSE.
PSE operation status PSE operation status
PSE legacy detection Enable/Disable the feature of PSE to detect non-
standard PDs.
Switch temperature-protection Enable/Disable switch temperature-protection.
Power Mode Power management mode
Wattage Rating Rated power, in units of mW
Output Power Current power, in units of mW
Peak Power Peak power, in units of mW
Average Power Average power, in units of mW
This example shows how to show configurations and the realtime running information about
the PSE.
Raisecom#show poe pse detail
PSE ID: 1
PSE legacy detection:Enable
PSE power mode:Auto
PSE operation status:ON
PSE wattage rating:120 (W)
PSE power current:0 (W)
PSE power peak:0 (mW)
Field Description
PSE ID Interface PoE management status
PSE legacy detection Enable/Disable the feature of PSE to detect non-
standard PDs.
PSE power mode PSE power management mode
PSE operation status PSE operation status
PSE wattage rating PSE rated power, in units of mW
PSE power current PSE current power, in units of mW
PSE power peak PSE power peak value, in units of mW
PSE power average PSE average power, in units of mW
PSE power-threshold ratio PSE power threshold ratio
PSE trap Enable/Disable PSE trap.
Switch temperature-protection Enable/Disable temperature-protection of the switch.
Switch temperature status Switch temperature status
Related commands
N/A
6 DHCP
Function
To enable the DHCP Client, use this command. To release the IP address obtained from the
DHCP server and meanwhile disable the DHCP Client, use the no form of this command.
Format
ip address dhcp [ server-ip ip-address ]
no ip address dhcp
Parameters
Parameter Description
server-ip IP address of the specified DHCP server
Only the specified server assigns IP address if the parameter is
configured.
ip-address IP address, in dotted decimal notation, such as 10.0.0.1
Default conditions
The DHCP Client is disabled.
Command mode
VLAN interface configuration
User level
11
Usage guidelines
Scenario
Assigning IP address dynamically facilitates users in intensively managing and configuring IP
address, and improving IP utilization. When DHCP Client is enabled through this command,
the device will obtain the IP address assigned by the DHCP server automatically.
You can use the no ip address dhcp command to release the IP address and meanwhile
disable DHCP Client.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The IP address obtained from the DHCP server and the IP address configured manually can
override each other.
If the VLAN has obtained an IP address from the DHCP server, it will renew the IP address
automatically.
The DHCP Client and DHCP Relay/DHCP Snooping are mutually exclusive, which means
they cannot be enabled concurrently on the same device. However, the DHCP Relay and
DHCP Snooping can be enabled concurrently on the save device.
Examples
This example shows how to enable DHCP Client on VLAN interface 1 with the IP address of
the DHCP Server being 10.0.0.1.
Raisecom#config
Raisecom(config)#interface vlan 1
Raisecom(config-vlan)#ip address dhcp server-ip 10.0.0.1
Set successfully.
Related commands
show ip dhcp client
Function
To configure DHCP Client property, use this command. To return to the default condition, use
the no form of this command.
Format
ip dhcp client { hostname host-name | class-id class-id | client-id client-id }
no ip dhcp client { hostname | class-id | client-id }
Parameters
Parameter Description
host-name Hostname, a string of 1 to 64 characters
class-id Class-ID, a string of 1 to 64 characters
client-id Client-ID, a string of 1 to 64 characters
Default conditions
The HostName is Raisecom; Class-ID is Raisecom-ROS; Client-ID is Raisecom-SYSMAC-
IF0; ROS is the platform version of ROS; SYSMAC is the MAC address of the device.
Command mode
VLAN interface configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the Hostname, Class-ID, and Client-ID of the DHCP
Client.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Do not use this command if the device is in the stage of IP address application, renewal, or
release.
Examples
This example shows how to configure the Hostname of the DHCP Client to myhost.
Raisecom#config
Raisecom(config)#interface vlan 1
Raisecom(config-vlan1)#ip dhcp client hostname myhost
Set successfully.
Related commands
show ip dhcp client
Function
To renew the IP address obtained from the DHCP Client manually, use this command.
Format
ip dhcp client renew
Parameters
N/A
Default conditions
The DHCP Client will renew the IP address automatically.
Command mode
VLAN interface configuration
User level
11
Usage guidelines
Scenario
The IP address obtained from the DHCP Client has a period of validity. You have to renew
the IP address if you wish to keep using it. Generally the device will renew it automatically,
but you can renew it manually through this command.
Prerequisite
You need to use the ip address dhcp command to enable DHCP Client and obtain the IP
address.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to renew an IP address manually through DHCP.
Raisecom#config
Raisecom(config)#interface vlan 1
Raisecom(config-vlan)#ip dhcp client renew
Set successfully.
Related commands
N/A
Function
To enable the DHCPv6 Client, use this command. To release the IP address obtained from
DHCPv6 server and disable the DHCP Client, use the no form of this command
Format
ipv6 address dhcp [ server-ip ipv6-address ]
no ipv6 address dhcp
Parameters
Parameter Description
server-ip IP address of the specified DHCP server
Only the specified server assigns IP addresses if the parameter is
configured.
ip-address IP address, in colon hexadecimal notation, such as 3001::1
Default conditions
DHCPv6 Client is disabled.
Command mode
VLAN interface configuration
User level
11
Usage guidelines
Scenario
Assigning IPv6 address dynamically facilitates users in intensively managing and configuring
IP address, and improving IPv6 utilization rate. When DHCP Client is enabled through this
command, the device will obtain the IP address assigned by the DHCP server automatically.
You can use the no ip address dhcp command to release the IPv6 address meanwhile disable
DHCP Client.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Before using this command, you should confirm that the VLAN interface is UP, namely, the
VLAN interface is associated with the Active VLAN and the interface connected to the server
joins the VLAN. Otherwise, interface will fail to obtain IP address through DHCPv6. When
an IP address of DHCPv6 server is specified by the command, it only obtains IP address
assigned by specified DHCPv6 Server. Currently, it only supports configuring the IP address
of the Server as link-local address, only when the specified address is link-local can
configurations be obtained from the specified server; otherwise, the specified server will be
invalid and configurations can be obtained from any server.
The IP address obtained from the DHCPv6 server and the IP address configured manually can
override each other
If you manually configure the IP address after the IP address is successfully obtained from the
DHCPv6, then the manually configured IP address will override the IP address obtained from
the DHCPv6 and vice versa.
Examples
This example shows how to enable DHCP Client on VLAN1 interface with the IP address of
DHCP Server of 2000::3.
Raisecom#config
Raisecom(config)#interface vlan 1
Raisecom(config-vlan1)#ipv6 address dhcp server-ip 2000::3
Set successfully.
Related commands
show ipv6 dhcp client
Function
To enable DHCPv6 Client to apply for fast interaction, use this command. To return to the
default condition, use the no form of this command.
Format
ipv6 dhcp client rapid-commit
no ipv6 dhcp client rapid-commit
Parameters
N/A
Default conditions
Disabled
Command mode
VLAN interface configuration
User level
11
Usage guidelines
Scenario
This command is used for the DHCPv6 Client to obtain information from the Server through
fast interaction. When Client is configured with fast interaction, server will decide wether to
adopt fast interaction or not upon receiving the sent Solicit packets with this Optiom. If
Server supports fast interaction, it will respond Reply packets and interact with Client in two
steps, if not, the Server will repond offer packets and interact with Client in four steps.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
This command is valid only when VLAN1 interface obtains an IP address through DHCPv6.
Examples
This example shows how to configure Client to obtain configurations through fast interaction.
Raisecom#config
Raisecom(config)#interface vlan 1
Raisecom(config-valn1)#ipv6 dhcp client rapid-commit
Set successfully.
Related commands
show ipv6 dhcp client
Function
If you have successfully applied for an IP address through DHCPv6, use this command to
renew.
Format
ipv6 dhcp client renew
Parameters
N/A
Default conditions
DHCPv6 Client renews automatically
Command mode
VLAN interface configuration
User level
11
Usage guidelines
Scenario
On VLAN1 interface, if you have successfully applied for an IP address through DHCPv6,
use this command to renew. If you do not take the initiative to execute this command,
DHCPv6 Client will automatically renew.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
This command is valid only when VLAN1 interface obtains an IP address through DHCPv6.
Examples
This example shows how to renew VLAN1 interface.
Raisecom#config
Raisecom(config)#interface vlan 1
Raisecom(config-vlan1)#ipv6 dhcp client renew
Set successfully.
Related commands
show ipv6 dhcp client
Function
To show configurations of the DHCP Client, use this command.
Format
show ip dhcp client
Parameters
N/A
Default conditions
N/A
Command mode
Any command
User level
5
Usage guidelines
N/A
Examples
This example shows how to show configurations of the DHCP Client.
Raisecom#show ip dhcp client
Hostname: Raisecom
Class-ID: Raisecom-ROS
client-ID: Raisecom-000e5e000000-IF0
DHCP Client is requesting for a lease.
Assigned IP Addr: 0.0.0.0
Subnet mask: 0.0.0.0
Default Gateway: --
Client lease Starts: Jan-01-1970 08:00:00
Client lease Ends: Jan-01-1970 08:00:00
Client lease duration: 0(sec)
DHCP Server: 0.0.0.0
Tftp server name: --
Tftp server IP Addr: --
Startup_config filename: --
NTP server IP Addr: --
Root path: --
Field Description
Hostname DHCP Client property (Hostname)
Class-ID DHCP Client property (Class-ID)
Client-ID DHCP Client property (Client-ID)
Field Description
Assigned IP Addr IP address assigned by the DHCP server
Subnet mask Subnet mask
Default Gateway Default gateway
Client lease Starts Time when the lease starts since the device obtained the IP
address
Client lease Ends Time when the lease ends since the device obtained the IP
address
Client lease duration The duration of the lease since the device obtained the IP
address
DHCP Server IP address of the DHCP server
Devices obtain the IP address only from that DHCP server.
Tftp server name TFTP server name
Tftp server IP Addr IP address of the TFTP server
Startup_config filename Startup configuration file name
NTP server IP Addr IP address of the NTP server
Root path Root path
Related commands
N/A
Function
To show configurations about DHCPv6, use this command.
Format
show ipv6 dhcp client
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show configurations about DHCP client.
Raisecom#show ipv6 dhcp client
DHCPv6 Client DUID : 00030006000e5e462745
DHCPv6 Client info in ip0
DHCPv6 Client Enable : enable
Link State : up
Specified Dhcpv6 Server : --
DHCPv6 Client Mode : stateful
Client Rapid-commit : enable
IAID : 17367040
Dhcpv6 client status : bound/idle
Assigned IPv6 Addr : 2000::7720:96B6
Preferred Lifetime(s) : 20
Valid Lifetime(s) : 40
DHCPv6 Server IP : FE80::20E:5EFF:FE47:151A
DHCPv6 Server DUID : 00030006000e5e47151a
Client Lifetime Starts : 2011-09-20,11:02:00
Remaining Time To Renew(s) : 0
Remaining Time To Expire(s): 30
DNS Servers : 2000::FF
SNTP Servers : 2000::200
Related commands
N/A
Function
To enable global DHCP Snooping, use this command. To disable this function, use the no
form of this command.
Format
ip dhcp snooping
no ip dhcp snooping
Parameters
N/A
Default conditions
Global DHCP Snooping is disabled.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
Attackers use ARP, IP, DHCP packets to attack servers and Clients though phishing the IP and
MAC address. DHCP Snooping can prevent servers and Clients from being attacked.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The DHCP Client, DHCP Server, and DHCP Relay/DHCP Snooping are mutually exclusive,
namely, they cannot be enabled concurrently on the same device. However, the DHCP Relay
and DHCP Snooping can be enabled concurrently on the same device.
Examples
This example shows how to enable global DHCP Snooping.
Raisecom#config
Raisecom(config)#ip dhcp snooping
Set successfully.
Related commands
show ip dhcp snooping
Function
To enable DHCP Snooping on the interface, use this command. To disable this function, use
the no form of this command.
Format
ip dhcp snooping
no ip dhcp snooping
Parameters
N/A
Default conditions
DHCP Snooping on interface is enabled.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to enable DHCP Snooping on the interface.
Prerequisite
Global DHCP Snooping is enabled through the ip dhcp Snooping command. Otherwise,
DHCP Snooping is useless even though it is enabled.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable DHCP Snooping on interface 1/1/2.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet 1/1/2)# ip dhcp snooping
Set successfully.
Related commands
show ip dhcp snooping
Function
To configure the interface to DHCP Snooping trusted interface, use this command. To
configure the interface to an untrusted interface, use the no form of this command.
Format
ip dhcp snooping trust
no ip dhcp snooping trust
Parameters
N/A
Default conditions
The interface is in an untrusted status.
Command mode
Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
DHCP Snooping supports trusted or untrusted interfaces. The device will drop DHCP-ACK,
DHCP-NAK, DHCP-OFFER packets from untrusted interfaces and normally forward the
above packets received from trusted interfaces, thus ensuring that the DHCP clients have
access to the right IP address.
The trusted interface is for connecting the DHCP server while the untrusted interface is for
connecting users or network, thus avoiding cheating by pseudo servers.
Prerequisite
Global DHCP Snooping is enabled through the ip dhcp Snooping command.
DHCP Snooping is enabled on the interface through the ip dhcp Snooping port-list
command.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure interface 1/1/2 as DHCP Snooping trusted interface
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet 1/1/2)#ip dhcp snooping trust
Set successfully.
Related commands
show ip dhcp snooping
Function
To enable DHCP Snooping to support Option82, use this command. To disable this function,
use the no form of this command.
Format
ip dhcp snooping information option
no ip dhcp snooping information option
Parameters
N/A
Default conditions
Option82 is not supported.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
Option 82 records information about DHCP Clients, and the information will be inserted to
DHCP packets by the device enabled with DHCP Snooping. The DHCP server will not
interpret that field, but it will bring back the Option 82 information in DHCP response packets
as it is. While the device enabled with DHCP Snooping receives the DHCP packets carrying
Option 82 information inserted by local device, it will compare whether the Option 82 field
includes Option 82 information inserted by the local device, if it contains, the Option 82
information inserted by local device will be deprived.
The device will obtain the exact user access information by Option 82. If the ARP, IP packets
received are not in conformity with the information, they will be discarded to prevent the
device from being attacked.
Prerequisite
The global DHCP Snooping is enabled through the ip dhcp Snooping command.
The DHCP Snooping on the interface is enabled through the ip dhcp Snooping port-list
command.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable DHCP Snooping to support Option82.
Raisecom#config
Raisecom(config)#ip dhcp snooping information option
Set successfully.
Related commands
show ip dhcp snooping
Function
To enable DHCP Snooping to support customized Option or Option 61, use this command. To
disable this function, use the no form of this command.
Format
ip dhcp snooping option { option-id | client-id }
no ip dhcp snooping option { option-id | client-id }
Parameters
Parameter Description
option-id The ID of customized Option supported, an integer, ranging from 1 to 254
client-id Support Option61, Option61 to record information about Clients ID.
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
Option 61 records identification information about the DHCP Client and the information will
be inserted to DHCP packets by the device enabled with DHCP Snooping. DHCP server will
not interpret that field, but it will bring back the Option 61 information in DHCP response
packets as it is. While the device enabled with Snooping receives the DHCP packets carrying
Option 61 information inserted by local device, it will compare whether the Option 61 field
includes Option 61 information inserted by the local device, if it contains, the Option 61
information inserted by local device will be deprived.
The device will obtain the exact user access information by Option 61. If the ARP, IP packets
received are not in conformity with the information, they will be discarded to prevent the
device from being attacked.
Prerequisite
Global DHCP Snooping is enabled through the ip dhcp Snooping command.
DHCP Snooping on the interface is enabled through the ip dhcp Snooping port-list
command.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable DHCP Snooping to support Option 61.
Raisecom#config
Raisecom(config)#ip dhcp snooping option client-id
Set successfully.
Related commands
show ip dhcp snooping
Function
To enable global DHCP Snooping based on IPv6, use this command. To disable this function,
use the no form of this command.
Format
ipv6 dhcp snooping
no ipv6 dhcp snooping
Parameters
N/A
Default conditions
Disabled
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
Attackers use ARP, IP, DHCP packets to attack servers and Clients though phishing the IP
address and MAC address. DHCP Snooping can prevent servers and Clients from being
attacked. You can use this command to enable global DHCP Snooping.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable global DHCP Snooping based on IPv6.
Raisecom#config
Raisecom(config)#ipv6 dhcp snooping
Set successfully.
Related commands
show ipv6 dhcp snooping
Function
To enable interface-based IPv6 DHCP Snooping, use this command. To disable this function,
use the no form of this command.
Format
ipv6 dhcp snooping interface-type interface-number
no ipv6 dhcp snooping interface-type interface-number
Parameters
Parameter Description
interface-type Enable DHCP Snooping on the specified interface.
interface-number The interface-type refers to the interface type.
The interface-number refers to the interface list.
Default conditions
Enabled
Command mode
Global configuration
User level
15
Usage guidelines
Scenario
This example shows how to enable interface-based IPv6 DHCP Snooping.
Prerequisite
Enable global DHCP Snooping based on IPv6 using the ipv6 dhcp snooping command in
global configuration mode. Otherwise, DHCP Snooping on the interface will not take effect
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable DHCP Snooping based on IPv6 on interface 1/1/2.
Raisecom#config
Raisecom(config)#ipv6 dhcp snooping gigaethernet 1/1/2
Set successfully.
Related commands
show ipv6 dhcp snooping
Function
To enable DHCPv6 Snooping to support customized Option or Option 18, use this command.
To disable this function, use the no form of this command.
Format
ipv6 dhcp snooping option { number | interface-id }
no ipv6 dhcp snooping option { number | interface-id }
Parameters
Parameter Description
number The ID of customized Option supported, an integer, ranging from 1 to
254
interface-id Enable DHCP Snooping to support Option 18.
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
Option18 is a field of relay router which is used for recording user access information.
You can use the ipv6 dhcp snooping option interface-id command to enable DHCP
Snooping to support Option18.
Prerequisite
Use the ipv6 dhcp snooping command to enable global DHCP Snooping based on IPv6.
Use the ipv6 dhcp snooping port-list command to enable DHCP Snooping based on the
interface.
Follow-up procedure
N/A
Precaution
Only when DHCP Snooping is enabled on the interface and globally can the function of
Option 1 take effect.
Examples
This example shows how to enable DHCP Snooping to support Option 18.
Raisecom#config
Raisecom(config)#ipv6 dhcp snooping option interface-id
Set successfully.
Related commands
show ipv6 dhcp snooping
Function
To configure the interface as the DHCP Snooping trusted interface based on IPv6, use this
command. To configure the interface as an untrusted interface, use the no form of this
command.
Format
ipv6 dhcp snooping trust
no ipv6 dhcp snooping trust
Parameters
N/A
Default conditions
The interface is in an untrusted state.
Command mode
Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
DHCP Snooping supports trusted or untrusted interfaces. The device will drop DHCP
response packets from untrusted interfaces and normally forward the DHCP packets received
from trusted interfaces, thus ensuring that customers have access to the right IP address.
You can use this command to configure interface type. The trusted interface is used to
connecting the DHCP server while the untrusted interface is for connecting users or network,
thus avoiding being cheated by pseudo servers.
Prerequisite
DHCP Snooping based on IPv6 is enabled through the ipv6 dhcp snooping command.
DHCP Snooping on the interface based on IPv6 is enabled through the ipv6 dhcp
snooping port-list.
Follow-up procedure
N/A
Precaution
Only when DHCP Snooping is enabled on the interface and globally can the configured
trusted status of the interface take effect.
Examples
This example shows how to configure interface 1 as the DHCP Snooping trusted interface
based on IPv6.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet 1/1/2)#ipv6 dhcp snooping trust
Set successfully.
Related commands
show ipv6 dhcp snooping
Function
To show configurations of DHCP Snooping, use this command.
Format
show ip dhcp snooping
Parameters
N/A
Default conditions
N/A
Command mode
Any command
User level
5
Usage guidelines
N/A
Examples
This example shows how to show configurations of DHCP Snooping.
Raisecom#show ip dhcp snooping
DHCP Snooping: Disabled
Port vlan Enabled Status Trusted Status
Option82 Vlanlist
-------------------------------------------------------------------------
------------------------
gigaethernet1/1/1 -- enabled no 1-
4094
gigaethernet1/1/2 -- enabled no 1-
4094
gigaethernet1/1/3 -- enabled no 1-
4094
gigaethernet1/1/4 -- enabled no 1-
4094
gigaethernet1/1/5 -- enabled no 1-
4094
gigaethernet1/1/6 -- enabled no 1-
4094
gigaethernet1/1/7 -- enabled no 1-
4094
gigaethernet1/1/8 -- enabled no
Field Description
DHCP Snooping Status of DHCP Snooping
Enabled: enabled
Disabled: disabled
DHCP Option 61 Status of DHCP Option 61
Enabled: enabled
Disabled: disabled
Field Description
DHCP Option 82 Status of DHCP Option 82
Enabled: enabled
Disabled: disabled
Port Interface ID
Related commands
N/A
Function
To show information about DHCP Snooping binding table, use this command.
Format
show ip dhcp snooping binding
Parameters
N/A
Default conditions
N/A
Command mode
Any command
User level
5
Usage guidelines
N/A
Examples
This example shows how to show DHCP Snooping binding table.
Raisecom#show ip dhcp snooping binding
Current Binding: 1
History Max Binding: 1
Ip Address Mac Address Lease(sec) Type VLAN Port
--------------------------------------------------------------------
20.168.0.3 000E.5E00.91E0 1650 dhcp-snooping 1 P1
Field Description
Current Binding Number of current bindings in the binding table
History Max Binding Historical maximum bindings
Ip Address Bind the IP address.
Mac Address Bind the MAC address.
Lease(sec) Lease time
Type Binding type
dhcp-Snooping: dynamic binding
static-config: static binding
Related commands
N/A
Function
To show DHCP Snooping configurations based on IPv6, use this command.
Format
show ipv6 dhcp snooping
Parameters
N/A
Default conditions
N/A
Command mode
Any command
User level
5
Usage guidelines
N/A
Examples
This example shows how to show DHCP Snooping configurations based on IPv6.
Raisecom#show ipv6 dhcp snooping
DHCP Snooping: Enabled
Port Enabled Status Trusted Status
--------------------------------------------------
P1 enabled no
P2 enabled no
P3 enabled no
Field Description
DHCP Snooping Status of DHCP Snooping
Enabled: enabled
Disabled: disabled
DHCP Option 61 Status of DHCP Option 61
Enabled: enabled
Disabled: disabled
DHCP Option 82 Status of DHCP Option 82
Enabled: enabled
Disabled: disabled
Port Interface ID
Enabled Status Status of DHCP Snooping on the interface
Enabled: enabled
Disabled: disabled
Trusted Status Trusted status on the interface
yes: trusted
no: untrusted
Option82 Vlanlist Option 82 VLAN list
Related commands
N/A
Function
To show information about DHCP Snooping binding table based on IPv6, use this command.
Format
show ipv6 dhcp snooping binding
Parameters
N/A
Default conditions
N/A
Command mode
Any command
User level
5
Usage guidelines
N/A
Examples
This example shows how to show information about DHCP Snooping binding table based on
IPv6.
Raisecom#show ipv6 dhcp snooping binding
Current Binding: 0
History Max Binding: 0
IPv6 Address DUID Lease(sec) Type VLAN Port
----------------------------------------------------------------
Related commands
N/A
Function
To configure the attached string in Option82 of DHCP packets, use this command. To return
to the default condition, use the no form of this command.
Format
ip dhcp information option attach-string attach-string
no ip dhcp information option attach-string
Parameters
Parameter Description
attach-string Attached string, a string of 1 to 32 characters, in units of byte
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
Information about the attached string in Option 82 can be customized by users themselves.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the attached string in Option 82 as Raisecom.
Raisecom#config
Raisecom(config)#ip dhcp information option attach-string raisecom
Set successfully.
Related commands
show ip dhcp information option
Function
To configure the circuit ID sub-option in Option82 of DHCP packets, use this command. To
return to the default condition, use the no form of this command.
Format
ip dhcp information option circuit-id circuit-id [ prefix-mode ]
no ip dhcp information option circuit-id
Parameters
Parameter Description
circuit-id Circuit ID, a string, with a length ranging from 1 to 64
prefix-mode Prefix mode
Default conditions
The circuit ID option is N/A.
Command mode
Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
The Circuit ID Option 82 suboption is for specifying the interface ID, attached VLAN, and
additional information of the request packets received by the device enabled with DHCP
Relay or DHCP Snooping from the DHCP clients, namely, the information about the interface
(which receives request packets from the DHCP clients) on the device enabled with DHCP
Relay or DHCP Snooping.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the circuit ID in Option 82 on the interface as 10.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#ip dhcp information option circuit-id
10
Set successfully.
Related commands
show ip dhcp information option
Function
To configure the MAC address format of the circuit ID in Option 82 of DHCP packets, use
this command. To return to the default condition, use the no form of this command.
Format
ip dhcp information option circuit-id mac-format string
no ip dhcp information option circuit-id mac-format
Parameters
Parameter Description
string MAC address format, a string, support the following types:
hhhhhhhhhhhh
hhhh.hhhh.hhhh
hhhh-hhhh-hhhh
hhhh:hhhh:hhhh
hh.hh.hh.hh.hh.hh
hh-hh-hh-hh-hh-hh
hh:hh:hh:hh:hh:hh
Default conditions
The format is hhhhhhhhhhhh.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
After configuring the Circuit ID to support variables, the parameter %m or %r will be
converted into the MAC address when the device is generating the Circuit ID automatically.
You can use this command to configure the format of the MAC address.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the MAC address format of the circuit ID in Option 82
of DHCP packets as hhhh.hhhh.hhhh.
Raisecom#config
Raisecom(config)#ip dhcp information option circuit-id mac-format
hhhh.hhhh.hhhh
Set successfully.
Related commands
show ip dhcp information option
Function
To configure remote-ID suboption in Option 82 of DHCP packets, use this command.
Format
ip dhcp information option remote-id { client-mac | client-mac-string | hostname | string
string | switch-mac | switch-mac-string }
Parameters
Parameter Description
client-mac The remote ID value is the MAC address of the user device, sent in
binary form
client-mac-string The remote ID value is the MAC address of the user device, sent a
string
hostname The remote ID value is the host name, sent a string
string Value of user-defined remote ID, with the length no more than 64
bytes, sent a string
switch-mac The remote ID value is the MAC address of the device, sent in
binary form
switch-mac- The remote ID value is the MAC address of the device, sent a string
string
Default conditions
The remote ID mode is switch-mac.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the remote ID mode in Option 82 of DHCP packets.
Generally, it is the interface MAC address (DHCP relay), the bridge MAC address of the
device (device with DHCP Snooping), or the customized character string of the device with
DHCP Relay or DHCP Snooping which receives request packets from the DHCP clients.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the remote ID mode in Option 82 to switch-mac-
string.
Raisecom#config
Raisecom(config)#ip dhcp information option remote-id switch-mac-string
Set successfully.
Related commands
show ip dhcp information option
Function
To configure customized Option based on IPv4, use this command. To disable this function,
use the no form of this command.
Format
ipv4 dhcp option option-id { ascii ascii-string | hex hex-string | ip-address ip-address }
no ipv4 ipv4 dhcp option option-id
Parameters
Parameter Description
option-id Relay agent option, an integer, ranging from 1 to 254
ascii-string A string, in units of byte, sent in form of ASCII code
hex-string A string, sent in form of hexadecimal code
The device will add 0 to the head of the character string if the
bytes of the character string are odd numbered.
ip-address In dotted decimal notation, sent in form of IP address
Default conditions
N/A
Command mode
Global configuration/Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
Customized Option, which is a relay agent option, can be customized by users. You can use it
on the device with enabled DHCP Relay/DHCP Snooping.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable DHCP Snooping to support the IPv4-based customized
Option.
Raisecom#config
Raisecom(config)#ipv4 dhcp option 100 ip-address 10.0.0.1
Set successfully.
Related commands
show ip dhcp information option
Function
To configure information about Option 61 fields based on IPv4, use this command. To disable
this function, use the no form of this command.
Format
ipv4 dhcp option client-id{ ascii ascii-string | hex hex-string | ip-address ip-address }
no ipv4 dhcp option client-id
Parameters
Parameter Description
ascii-string A string, in units of byte, sent in form of ASCII code
hex-string A string, sent in form of hexadecimal code
ip-address In dotted decimal notation, sent in form of IP address
Default conditions
N/A
Command mode
Global configuration/Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
Option 61 is an ID option of DHCP Clients for specifying DHCP Clients information.
Option 61 is a relay agent option which can be used on the device enabled with DHCP
Snooping.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure information about Option61 fields based on IPv4.
Raisecom#config
Raisecom(config)#ipv4 dhcp option client-id ip-address 10.0.0.1
Set successfully.
Related commands
show ip dhcp information option
Function
To configure customized Option based on IPv6, use this command. To disable this function,
use the no form of this command.
Format
ipv6 dhcp option number { ascii ascii-string | hex hex-string | ipv6-address ipv6-address }
no ipv6 dhcp option number
Parameters
Parameter Description
number Relay agent option, an integer, ranging from 1 to 254
Specify the number which supports customized Option.
ascii-string A string, in units of byte, sent in form of ASCII code
hex-string A string, sent in form of hexadecimal code
ipv6-address In colon hexadecimal notation, sent in form of IP address
Default conditions
N/A
Command mode
Global configuration/Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
You can use this command to configure the customized Option based on IPv6.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the customized Option based on IPv6.
Raisecom#config
Raisecom(config)#ipv6 dhcp option 10 ascii raisecom
Set successfully.
Related commands
show ip dhcp information option
Function
To configure IPv6-based customized Option18, use this command. To disable this function,
use the no form of this command.
Format
ipv6 dhcp option interface-id { ascii ascii-string | hex hex-string | ipv6-address ipv6-
address }
no ipv6 dhcp option interface-id
Parameters
Parameter Description
ascii-string A string, in units of byte, sent in form of ASCII code
hex-string A string, sent in form of hexadecimal code
ipv6-address In colon hexadecimal notation, sent in form of IP address
Default conditions
N/A
Command mode
Global configuration/Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
You can use this command to configure the customized Option18 based on IPv6.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure Option18 based on IPv6.
Raisecom#config
Raisecom(config)#ipv6 dhcp option interface-id ascii raisecom
Set successfully.
Related commands
show ip dhcp information option
Function
To configure the attached string in Option 37 of DHCPv6 packets, use this command. To
return to the default condition, use the no form of this command.
Format
ipv6 dhcp option remote-id { ascii | hex } string
no ipv6 dhcp option remote-id
Parameters
Parameters Description
ascii a string
hex In hexadecimal notation
string Attached string, a string of 1 to 32 characters, in units of byte,support
the following parameters:
%h: hostname
%s: slot
%v: svlan
%c: cvlan
%p: port
%m: local mac
%r: remote mac
%i: ip address
%u: unit
Default conditions
The attached string is N/A.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
Information about the attached string in Option 37 can be customized by users themselves.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the attached string in Option 37 as Raisecom.
Raisecom#config
Raisecom(config)# ipv6 dhcp option remote-id ascii raisecom
Set successfully.
Related commands
ipv6 dhcp option
Function
To configure the variable parameter MAC address format of the Circuit ID in Option 37 of
DHCPv6 packets, use this command. To return to the default condition, use the no form of
this command.
Format
ipv6 dhcp option remote-id mac-format string
no ipv6 dhcp option remote-id mac-format
Parameters
Parameters Description
string MAC address format, a string, support the following types:
hhhhhhhhhhhh
hhhh.hhhh.hhhh
hhhh-hhhh-hhhh
hhhh:hhhh:hhhh
hh.hh.hh.hh.hh.hh
hh-hh-hh-hh-hh-hh
hh:hh:hh:hh:hh:hh
Default conditions
The format is hhhhhhhhhhhh.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
After configuring the Circuit ID to support variables, the parameter %m, %r will be converted
into the MAC address when the device is generating the Circuit ID automatically. You can use
this command to configure the format of the MAC address.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the variable parameter MAC address format of the
circuit ID in Option 37 of DHCPv6 packets to hhhh.hhhh.hhhh.
Raisecom#configRaisecom(config)#ipv6 dhcp option circuit-id mac-format hhhh.hhhh.hhhh
Set successfully.
Related commands
ipv6 dhcp option
Function
To show configurations of DHCP Option, use this command.
Format
show ip dhcp information option
Parameters
N/A
Default conditions
N/A
Command mode
Any command
User level
5
Usage guidelines
N/A
Examples
This example shows how to show configurations of DHCP Option.
Raisecom#show ip dhcp information option
raisecom(config)#show ip dhcp information op
DHCP Option Config Information
Circuit-ID: default
Remote-ID Mode: switch-mac
ipv4Global
ipv4Port
P1:
P2:
P3:
ipv6Global
code: 10 content : raisecom
code: 18 content : raisecom
ipv6Port
P1:
P2:
P3:
Field Description
DHCP Option Config Information DHCP Option configuration
Circuit-ID Circuit ID
Remote-ID Mode Remote ID mode
ipv4Global IPv4 global configuration
ipv4Port IPv4 interface
ipv6Global IPv6 global configuration
ipv6Port IPv6 interface
Related commands
N/A
Function
To configure the IP address pool of the DHCPv4 server, use this command.
Format
address start-ip-address end-ip-address mask { mask | mask-length }
Parameters
Parameter Description
start-ip-address The start IP address of address pool, in dotted decimal notation,
such as 10.10.10.1
end-ip-address The end IP address of address pool, in dotted decimal notation,
such as 10.10.10.1
mask Mask of IP address, in dotted decimal notation, such as 255.0.0.0
mask-length Mask length of IP address, an integer, ranging from 1 to 30
Default conditions
N/A
Command mode
Address pool configuration
User level
11
Usage guidelines
Scenario
When the device serves as the DHCPv4 server, the DHCPv4 Client can apply to the server for
IP address.
This command is used for configuring address pool for the DHCPv4 server. Then the
DHCPv4 server assigns the IP address in the address pool to the DHCPv4 Client.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the range of the address pool to be from 172.31.0.1 to
172.31.0.10 in address pool configuration mode and with the mask of 255.255.255.0.
Raisecom#config
Raisecom(config)#ip dhcp server pool pool1
Raisecom(dhcp-pool)#address 172.31.0.1 172.31.0.10 mask 255.255.255.0
Set successfully.
Related commands
ip dhcp server pool
show ip dhcp server pool
Function
To save the DHCPv4 lease information to the Flash, use this command. To delete the
information, use the erase form of this command.
Format
ip dhcp lease save
ip dhcp lease erase
Parameters
Parameter Description
save Save DHCPv4 lease information.
erase Delete DHCPv4 lease information.
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
When the device serves as the DHCPv4 server, the DHCPv4 Client can apply to the server for
IP address and use the address within the negotiated lease period.
You can use this command to save the lease information to the Flash for future view.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to save the DHCPv4 lease information to the Flash.
Raisecom#config
Raisecom(config)#ip dhcp lease save
Set successfully.
Related commands
N/A
Function
To enable the DHCPv4 Server feature, use this command. To disable this function, use the no
form of this command.
Format
ip dhcp server
no ip dhcp server
Parameters
N/A
Default conditions
Disabled
Command mode
Interface configuration
User level
11
Usage guidelines
Scenario
When the device serves as the DHCPv4 server, DHCPv4 Clients can apply to it for IP
addresses.
If you wish to make relevant configurations about DHCPv4 Server on the device, you have to
use this command to enable the DHCPv4 Server feature first.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
If DHCPv4 Relay, DHCPv4 Client, or DHCPv4 Snooping is enabled, you shouldn't enable
DHCPv4 Server, otherwise, configurations fail.
Examples
This example shows how to enable DHCPv4 Server on the interface.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/4/1
Raisecom(config-gigaethernet1/4/1)#ip dhcp server
Set successfully.
Related commands
show ip dhcp server
Function
To create an address pool and define its property for interfaces to assign addresses, use this
command. To disable this function, use the no form of this command.
Format
ip { dhcp | oam } server pool pool-name
no ip { dhcp | oam } server pool
Parameters
Parameter Description
dhcp DHCP-based address pool
oam OAM-based address pool
pool pool-name IP address pool
The pool-name is a string of 1 to 255 characters.
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the IP address pool and define its property to DHCP
or OAM to facilitate interfaces in assigning addresses to remote devices.
Prerequisite
The DHCPv4 Server feature is enabled through the ip dhcp server command in Layer 3
interface configuration mode.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to create IP address pool.
Raisecom#config
Raisecom(config)#ip dhcp server pool pool
Raisecom(dhcp-pool)#
Related commands
ip dhcp server
ip dhcp server pool
show ip dhcp server pool
Function
To configure DHCPv4 static lease, use this command. To disable this function, use the no
form of this command.
Format
ip dhcp static-bind ip-address mac-address pool-name
no ip dhcp static-bind ip-address mac-address
Parameters
Parameter Description
ip-address IP address, in dotted decimal notation, such as 10.10.10.1
mac-address MAC address, in dotted hexadecimal notation, such as
"000E.5E12.3456"
It shall not be a multicast address, broadcast address, or an address with
all bytes being 0.
pool-name IP address pool, a string of 1 to 255 characters
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
When the device serves as the DHCPv4 server, DHCPv4 Clients can apply to it for IP
addresses.
To avoid frequent changes of IP addresses of some DHCP Clients, you can use this command
to bind them with static IP addresses.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure DHCPv4 static lease.
Raisecom#config
Raisecom(config)#ip dhcp static-bind 10.0.0.1 000e.5e12.3456 pool
Set successfully.
Related commands
show ip dhcp static-bind
Function
To configure the lease period of IPv4 address in address pool configuration mode, use this
command. To return to the default configuration, use the no form of this command.
Format
lease expired { minute | infinite }
no lease expired
Parameters
Parameter Description
minute Lease time, an integer, ranging from 1 to 10080s
infinite Infinite lease time
Default conditions
The lease period of the device is 30min in the IP address pool configuration mode.
Command mode
Address pool configuration
User level
11
Usage guidelines
Scenario
When the device serves as the DHCPv4 server, DHCPv4 Clients can apply to it for IP
addresses.
You can use this command to configure the IP address lease time of the device's address pool.
Prerequisite
The IP address pool of the DHCPv4 server is created through the ip dhcp server pool
command.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the lease time of IP address pool 1 of the DHCPv4
server to 600min.
Raisecom#config
Raisecom(config)#ip dhcp server pool pool1
Raisecom(dhcp-pool)#lease expired 600
Set successfully.
Related commands
ip dhcp server pool
6.4.7 dns-server
Function
To configure the DNS server address of the IPv4 address pool, use this command. To disable
this function, use the no form of this command.
Format
dns-server ip-address [ secondary ]
no dns-server [ secondary ]
Parameters
Parameter Description
ip-address IPv4 address, in dotted decimal notation, such as 10.10.10.1
secondary Specify the address for a backup DNS server.
Default conditions
N/A
Command mode
Address pool configuration
User level
11
Usage guidelines
Scenario
When the device serves as the DHCPv4 server, DHCPv4 Clients can apply to it for IP
addresses.
This command is for configuring the DNS server address in the IP address pool. The DHCP
Clients will resolve the domain name through the DNS server while accessing the internet.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the IP address of the DNS server to 192.168.100.1 in
address pool configuration mode.
Raisecom#config
Raisecom(config)#ip dhcp server pool pool1
Raisecom(dhcp-pool)#dns-server 192.168.100.1
Set successfully.
Related commands
gateway
ip dhcp server pool
6.4.8 gateway
Function
To configure the gateway address of the IP address pool, use this command. To disable this
function, use the no form of this command.
Format
gateway ip-address
no gateway
Parameters
Parameter Description
ip-address IP address, in dotted decimal notation, such as 10.10.10.1
Default conditions
N/A
Command mode
Address pool configuration
User level
11
Usage guidelines
Scenario
When the device serves as the DHCPv4 server, DHCPv4 Clients can apply to it for IP
addresses.
This command is used for configuring the gateway address of the IP address pool. The
DHCPv4 can access other networks through the gateway.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the gateway address of the IP address pool to
192.168.1.1 in address pool configuration mode.
Raisecom#config
Raisecom(config)#ip dhcp server pool pool1
Raisecom(dhcp-pool)#gateway 192.168.1.1
Set successfully.
Related commands
dns-server
dns-server secondary
6.4.9 option 60
Function
To configure Option60 fields of the DHCPv4 server, use this command. To disable this
function, use the no form of this command.
Format
option 60 string
no option 60
Parameters
Parameter Description
string Value of Option60 fields, a string of 1 to 16 characters
Default conditions
N/A
Command mode
Address pool configuration
User level
11
Usage guidelines
Scenario
When the device serves as the DHCPv4 server, DHCPv4 Clients can apply to it for IP
addresses.
When using it in zero configuration scenario, you need to ensure that values of Option60
fields of the devices at both ends are matchable.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure Option60 binding information as "Raisecom"+VLAN 1.
Raisecom#config
Raisecom(config)#ip dhcp server pool pool1
Raisecom(config-pool)#option 60 Raisecom001
set seccessfully
Related commands
N/A
Function
To configure the trusted DHCP Relay and the server will discard packets from untrusted
DHCP Relay, use this command. To disable this function, use the no form of this command.
Format
ip dhcp relay target-ip ip-address
no ip dhcp relay target-ip ip-address
Parameters
Parameter Description
ip-address Destination IP address, in dotted decimal notation
Default conditions
The destination IP address of packets is not configured.
Command mode
VLAN interface configuration
User level
15
Usage guidelines
Scenario
You can use this command to configure the destination address for forwarding DHCP packets.
The system will take it as the address of the Server or the next Relay.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the trusted Relay address on interface 2 within the
VLAN to 192.168.12.34.
Raisecom#config
Raisecom(config)#interface vlan 2
Raisecom(config-vlan2)#ip dhcp relay relay-ip 192.168.12.34
Set successfully.
Related commands
show ip dhcp relay
Function
To show configurations about the DHCPv4 server, use this command.
Format
show ip dhcp server
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show configurations about the DHCPv4 server.
Raisecom##show ip dhcp server
Interface Status
------------------------------
gigaethernet 1/1/1 Enable
Field Description
Interface Layer 3 interface ID
Status Enabled status of the DHCPv4 server on Layer 3 interface
Related commands
N/A
Function
To show the IP address assigned by the DHCPv4 server or the information about the DHCPv4
Clients, use this command.
Format
show ip dhcp server lease
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show the IP address assigned by the DHCPv4 server or the
information about the DHCPv4 clients.
Raisecom#show ip dhcp server lease
IP Address Hardware Address Lease Expiration IP Interface
--------------------------------------------------------------------
172.16.1.11 00:a0:98:02:32:de Feb-01-2012 11:40:00 1
172.16.3.254 02:c7:f8:00:04:22 Jul-01-2012 23:00:00 1
Lease count: 2
Field Description
IP Address IP address assigned
Hardware Address MAC address of the DHCPv4 client
Lease Expiration Lease expiration time
IP Interface Layer 3 interface address
Related commands
N/A
Function
To show packets statistics of the DHCPv4 server, use this command.
Format
show ip dhcp server statistics
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show packets statistics of the DHCPv4 server.
Raisecom#show ip dhcp server statistics
Bootp msg count : 0
Discover msg count : 0
Request msg count : 0
Release msg count : 0
Offer msg count : 0
Ack msg count : 0
Nak msg count : 0
Decline msg count : 0
Inform msg count : 0
Unknown msg count : 0
Total msg count : 0
Field Description
Bootp msg count Number of Bootp packets
Discover msg count Number of Discover packets
Request msg count Number of Request packets
Release msg count Number of Release packets
Offer msg count Number of Offer packets
Ack msg count Number of Ack packets
Nak msg count Number of Nak packets
Decline msg count Number of Decline packets
Inform msg count Number of Inform packets
Unknownn msg count Number of unknown packets
Total msg count Number of total packets
Related commands
N/A
Function
To show information about DHCPv4 static lease, use this command.
Format
show ip dhcp static-bind
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show information about DHCPv4 static lease, use this command.
Raisecom#show ip dhcp static-bind
IP address Mac address Pool name
------------------------------------------------
10.0.0.1 000E.5E12.3456 pool
Field Description
IP address IP address
Mac address MAC address
Pool name Name of the address pool
Related commands
N/A
Function
To show configurations about the address pool of the DHCPv4 server, use this command.
Format
show ip server pool
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show configurations about the address pool of the DHCPv4
server.
Raisecom##show ip server pool
Pool Name: : 123
pool type : DHCP
Address Range : 0.0.0.0~0.0.0.0
Address Mask : 0.0.0.0
Gateway : 0.0.0.0
DNS Server: : 0.0.0.0
Secondary DNS : 0.0.0.0
Tftp Server : 0.0.0.0
Lease time : 30 minutes
Trap Server: : 0.0.0.0
option60 :
Pool Name: : ra
pool type : DHCP
Address Range : 0.0.0.0~0.0.0.0
Address Mask : 0.0.0.0
Gateway : 0.0.0.0
DNS Server: : 0.0.0.0
Secondary DNS : 0.0.0.0
Tftp Server : 0.0.0.0
Lease time : 30 minutes
Trap Server: : 0.0.0.0
option60 :
Pool Name: : 1
pool type : DHCP
Address Range : 0.0.0.0~0.0.0.0
Address Mask : 0.0.0.0
Gateway : 0.0.0.0
DNS Server: : 0.0.0.0
Secondary DNS : 0.0.0.0
Tftp Server : 0.0.0.0
Lease time : 30 minutes
Trap Server: : 0.0.0.0
Related commands
N/A
6.4.16 tftp-server
Function
To configure the address for TFTP Server, use this command. To disable this function, use the
no form of this command.
Format
tftp-server ip-address
no tftp-server
Parameters
Parameter Description
ip-address IP address, in dotted decimal notation, such as 10.10.10.1
Default conditions
N/A
Command mode
Address pool configuration
User level
11
Usage guidelines
Scenario
When the device serves as the DHCPv4 server, DHCPv4 Clients can apply to it for IP
addresses.
This command is used for configuring the TFTP server address. DHCPv4 clients can obtain
startup files through TFTP Server while accessing the internet.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the IP address of TFTP Server in address pool
configuration mode to 192.168.1.201.
Raisecom#config
Raisecom(config)#ip dhcp server pool pool1
Raisecom(dhcp-pool)#tftp-server 192.168.1.201
Set successfully.
Related commands
show ip server pool
Function
To configure the Trap server address, use this command. To disable this function, use the no
form of this command.
Format
trap server-ip ip-address
no trap server-ip
Parameters
Parameter Description
ip-address IP address, in dotted decimal notation, such as 10.10.10.1
Default conditions
N/A
Command mode
Address pool configuration
User level
11
Usage guidelines
Scenario
When the device serves as the DHCPv4 server, DHCPv4 Clients can apply to it for IP
addresses.
This command is for configuring the address for Trap server. Through Option 60, the server
will send the SNMP Host to the Client. When the remote device with zero configuration
obtains the address, it will send a Trap to the NMS notifying the discovery of the device.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the IP address of the Trap server in address pool
configuration mode to 192.168.1.201.
Raisecom#config
Raisecom(config)#ip dhcp server pool pool1
Raisecom(dhcp-pool)#trap server-ip 192.168.1.201
Set successfully.
Related commands
show ip server pool
6.4.18 option 43
Function
To configure the Option 43 field of the DHCPv4 Server, use this command. To disable this
function, use the no form of this command.
Format
option 43 [ sub-option Sub option code ] {hex | ascii } string
no option 43 [ sub-option Sub option code ]
Parameters
Parameter Description
sub option code Sub-option ID, an integer, ranging from 1 to 254
hex In dotted hexadecimal notation
ascii A string
string Option 43 field, a string, ranging from 1 to 16
Default conditions
N/A
Command mode
Address pool configuration
User level
11
Usage guidelines
Scenario
When a Layer 3 network is between the AC and AP, the AP cannot discover the AC through
Layer 2 broadcast. In this case, you can configure the Option 43 of the DHCP Server. The AP
can obtain the IP address of the AC through the Option 43 carried by the DHCP response
packet, thus communicating with the AC.
Additionally, if there are multiple ACs at the same Layer 3 network, different APs needs to
communicate with the corresponding ACs. In this case, Option 43 supports configuring the IP
addresses of multiple ACs concurrently. Different APs, according to their observed sub-option
IDs, can acquire the IP addresses of the corresponding ACs, thus implementing
communication.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
In the address pool mode, the DHCPv4 Server configures the Option 43 for the address pool.
When you execute a command, the sub-option will be considered as 0 if not configured. Sub-
options 1254 do not conflict with each other. Multiple sub-options can exist concurrently
(except sub-option 0). If you configure a command without sub-option and then configure
another command with sub-option 1254, then the previous command without sub-option will
be deleted. If you configure a command with one or more sub-option 1254 and then
configure a command without sub-option, then the previous configuration with sub-option
will be deleted.
Examples
This example shows how to configure the Option 43 message to Raisecom.
Raisecom#config
Raisecom(config)#ip dhcp server pool pool1
Raisecom(config-pool)#option 43 ascii Raisecom
set seccessfully
Related commands
N/A
Function
To enable DHCP Relay, use this command. To disable this function, use the no form of this
command.
Format
ip dhcp relay
no ip dhcp relay
Parameters
N/A
Default conditions
Disabled
Command mode
Global configuration
User level
15
Usage guidelines
Scenario
You can use this command to configure global DHCP Relay.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable DHCP Relay.
Raisecom#config
Raisecom(config)#ip dhcp relay
Set successfully.
Related commands
show ip dhcp relay
Function
To enable DHCP Relay to support Option 82, use this command. To disable this function, use
the no form of this command.
Format
ip dhcp relay information option
no ip dhcp relay information option
Parameters
N/A
Default conditions
Disabled
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
This function takes effect only when the global DHCP Relay is enabled and the corresponding
interfaces are enabled with the function of supporting the corresponding VLAN.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable DHCP Relay to support Option 82.
Raisecom#config
Raisecom(config)#ip dhcp relay information option
Set successfully.
Related commands
show ip dhcp relay information
Function
To configure the VLAN list of Option 82 supported by DHCP Relay, use this command. To
disable this function, use the no form of this command.
Format
ip dhcp relay information option vlan-list vlan-list
no ip dhcp relay information option vlan-list vlan-list
Parameters
Parameter Description
vlan-list VLAN list, an integer, ranging from 1 to 4094
It supports specific values, such as "1,2,3"; it also supports a range,
such as "1-3".
Default conditions
The supported VLAN list is from 1 to 4094.
Command mode
Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
You can use this command to enable DHCP Relay on the interface to support Option 82
VLAN lists.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the VLAN of Option 82 supported by DHCP Relay to
VLAN 3 on 1000 Mbit/s interface 1/1/1.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-port)#ip dhcp relay information option vlan-list 3
Set successfully
Related commands
show ip dhcp relay information
Function
To configure DHCP Relay trusted interface, use this command. To configure untrusted
interface, use the no form of this command.
Format
ip dhcp relay information trusted
no ip dhcp relay information trusted
Parameters
N/A
Default conditions
Interface is Untrusteded.
Command mode
Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
DHCP Relay allows configuring the interface to trusted or untrusted. The device will discard
DHCP packets from untrusted interfaces.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure interface 1000 Mbit/s interface 1/1/1 as DHCP Relay
trusted interface.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#ip dhcp relay information trusted
Set successfully
Related commands
show ip dhcp relay information
Function
To configure the policy for DHCP Relay to process DHCP request packets with Option 82.
Format
ip dhcp relay information policy { drop | keep | replace }
Parameters
Parameter Description
drop Discard Option 82 packets.
keep Directly forward Option 82 packets.
replace Replace the Option 82 field and then transmit the packet.
Default conditions
The processing policy is replace.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to specify the policy for DHCP Relay to process DHCP request
packets with Option 82.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The configured policies take effect only on the condition that the DHCP Relay supports
Option82.
Examples
This example shows how to configure policy for DHCP Relay to process DHCP request
packets with Option 82 to keep.
Raisecom#config
Raisecom(config)#ip dhcp relay information policy keep
Set successfully.
Related commands
show ip dhcp relay information
Function
To configure the destination IP address for forwarding DHCP packets, use this command. To
disable this function, use the no form of this command.
Format
ip dhcp relay target-ip ip-address
no ip dhcp relay target-ip ip-address
Parameters
Parameter Description
ip-address Destination IP address, in dotted decimal notation
Default conditions
Not configured
Command mode
VLAN interface configuration
User level
15
Usage guidelines
Scenario
You can use this command to configure the destination IP address for forwarding DHCP
packets. The system will take it as the address of the Server or next Relay.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the Relay destination IP address on interface 2 within
the VLAN to 192.168.12.34.
Raisecom#config
Raisecom(config)#interface vlan 2
Raisecom(config-vlan2)#ip dhcp relay target-ip 192.168.12.34
Set successfully.
Related commands
show ip dhcp relay
Function
To configure relay IP address which is used to add Agent IP field in the DHCP request
message, use this command. To delete the device, use the no form of this command.
Format
ip dhcp relay relay-ip ip-address
no ip dhcp relay relay-ip ip-address
Parameters
Parameters Description
ip-address Relay IP address, in dotted decimal notation
Default conditions
Not configured
Command mode
VLAN interface configuration
User level
15
Usage guidelines
Scenario
You can use this command to configure relay address, the system will use this address as relay
address and add Agent IP field of DHCP packets.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the relay address on VLAN interface 2 to
192.168.12.56.
Raisecom#config
Raisecom(config)#interface vlan 2
Raisecom(config-vlan2)#ip dhcp relay relay-ip 192.168.12.56
Set successfully.
Related commands
show ip dhcp relay
Function
To show configurations about DHCP Relay, use this command.
Format
show ip dhcp relay
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show configurations about DHCP Relay.
Raisecom#show ip dhcp relay
DHCP Relay Global Status: Disable
Interface Status Relay Address Target Address
-----------------------------------------------------------------
vlan1 Enable 1.2.3.4 1.2.3.4
Field Description
DHCP Relay Global Status DHCP Relay global status
Enabled: enabled
Disabled: disabled
Interface IP Interface ID
Status DHCP Relay functional status on the IP interface
Enabled: enabled
Disabled: disabled
Field Description
Target Address Destination IP address
Related commands
N/A
Function
To show information about DHCP Relay, use this command.
Format
show ip dhcp relay information
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show information about DHCP Relay.
Raisecom#show ip dhcp relay information
Option 82: Enabled
Policy: Replace
Port Trusted Status Option82 Vlanlist
---------------------------------------------------
gigaethernet 1/1/1no 1
gigaethernet 1/1/2yes 1-4094
gigaethernet 1/1/3no 1-4094
gigaethernet 1/1/4no 1-4094
gigaethernet 1/1/5no 1-4094
Field Description
Option 82 DHCP Relay status
Enabled: DHCP Relay is enabled
Disabled: DHCP Relay is disabled
Policy Policy for DHCP Relay to process DHCP request packets with Option
82
drop: discard Option 82 packets
keep: directly forward Option 82 packets
replace: replace Option 82 field and then transmit the packet
Port Interface ID
Trusted Status DHCP Relay status on the interface
yes: trusted interface
no: untrusted interface
Option82 vlanlist VLAN lists which support Option 82
Related commands
N/A
7 QoS
Function
To configure the description of the profile, use this command. To delete the description, use
the no form of this command.
Format
description statement
no description
Parameters
Parameter Description
statement Description, a string of 1 to 255 characters
Default conditions
N/A
Command mode
CMAP configuration/PMAP configuration/cos-remark configuration/cos-to-pri
configuration/dscp-mutation configuration/dscp-to-pri configuration/exp-to-pri
configuration/pri-to-exp configuration/wred configuration
User level
11
Usage guidelines
Scenario
While creating traffic classification, traffic policy, or various priority mapping profiles, you
can use this command to describe them to facilitate users in understanding their meaning.
Prerequisite
Use the relevant commands to create description objects and enter the corresponding
configuration mode.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure description of the COS remarking profile 5 to video.
Raisecom#config
Raisecom(config)#mls qos mapping cos-remark 5
Raisecom(cos-remark)#description video
Set successfully.
This example shows how to configure description of the CoS-to-local priority (color) profile 5
to video.
Raisecom#config
Raisecom(config)#mls qos mapping cos-to-local-priority 5
Raisecom(cos-to-pri)#description video
Set successfully.
This example shows how to configure the description of DSCP remarking profile 5 to video.
Raisecom#config
Raisecom(config)#mls qos mapping dscp-mutation 5
Raisecom(dscp-mutation)#description video
Set successfully.
This example shows how to configure description of the DSCP-to-local priority (color)
profile 5 to video.
Raisecom#config
Raisecom(config)#mls qos mapping dscp-to-local-priority 5
Raisecom(dscp-to-pri)#description video
Set successfully.
Related commands
show mls qos mapping cos-remark
show mls qos mapping cos-to-local-priority
show mls qos mapping dscp-mutation
Function
To show QoS information on the interface, use this command.
Format
show mls qos interface [ interface-type interface-number ]
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Privileged EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show QoS information on 1000 Mbit/s interface 1.
Raisecom#show mls qos interface gigaethernet 1/1/1
Interface TrustMode Priority Cos-PriProfile Dscp-PriProfile Dscp-Mutation
Cos-Remark
-------------------------------------------------------------------------
gigaethernet1/1/1 dscp 5 0 0 0 0
Field Description
Interface Interface
TrustMode Trust mode
Priority Interface priority
Cos-PriProfile Mapping from CoS to local priority
Dscp-PriProfile Mapping from DSCP to local priority
Dscp-Mutation DSCP remarking
Cos-Remark CoS remarking
Related commands
N/A
Function
To configure the priority type of interface trust, use this command. To return to the default
condition, use the no form of this command.
Format
mls qos trust { cos | dscp | port-priority }
no mls qos trust
Parameters
Parameter Description
cos CoS priority in the header of the 802.1Q packet
dscp DHCP priority in the header of the IP packet
port-priority Priority trusted by the interface
Default conditions
COS priority is trusted by Layer 2 interfaces.
Command mode
Physical layer interface configuration mode
User level
15
Usage guidelines
Scenario
While using QoS, the device needs to recognize the priority carried by the packet. You can
use this command to configure the priority trusted by the interface.
CoS priority adopts the first 3 bits in VLAN Tag TCI field. If you configure the CoS priority
trusted by the interface:
If the packets are Tagged, the interface trusts their CoS priority and generate local
priority for queue scheduling.
If the packets are Untagged, the device will adopt interface priority and generate local
priority for queue scheduling.
DSCP priority adopts the first 6 bits in the service type field of IP packets. You can use this
command to configure the priority trusted by the interface. If you configure the DSCP priority
trusted by the interface:
If the packets are IP packets, the interface will trust their DSCP priority and generate
local priority for queue scheduling.
If the packets are non-IP packets, the device will adopt interface priority and generate
local priority for queue scheduling.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure DSCP priority trusted by 1000 Mbit/s interface 1.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#mls qos trust dscp
Set successfully.
Related commands
show mls qos interface
Function
To configure the interface priority, use this command.
Format
mls qos priority priority
Parameters
Parameter Description
priority Interface priority, an integer, ranging from 0 to 7
Default conditions
The priority is 6.
Command mode
Physical layer interface configuration mode
User level
15
Usage guidelines
Scenario
You can use this command to configure the priority of physical interfaces and packets. The
bigger the value is, the higher the priority is.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the priority of interface 1/1/3 to 2.
Raisecom#config
Raisecom(config)#interface gigaethernet1/1/3
Raisecom(config-gigaethernet1/1/3)#mls qos priority 2
Set successfully.
Related commands
show mls qos interface
Function
To create the CoS remarking profile and enter cos-remark configuration mode, use this
command. To delete the profile, use the no form of this command.
Format
mls qos mapping cos-remark profile-id
no mls qos mapping cos-remark profile-id
Parameters
Parameter Description
profile-id Profile number, an integer, ranging from 1 to 7
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
By creating the CoS remarking profile, you can configure the mapping from local priority to
CoS. Therefore, the downstream devices can manage QoS of the packets according to the
mapped CoS priority.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
If you wish to delete a profile, you need to delete the application relationship between the
profile and the interface in interface configuration mode. If you do not delete the application
relationship between the profile and the interface, then the newly created profile with the
same profile ID will be directly applied to the corresponding interface. The mapping is in
default condition.
Examples
This example shows how to configure CoS remarking profile 1.
Raisecom#config
Raisecom(config)#mls qos mapping cos-remark 1
Raisecom(cos-remark)#
Related commands
show mls qos mapping cos-remark
Function
To enable mapping from local priority to CoS, use this command. To disable this function, use
the disable form of this command.
Format
mls qos cos-remark-mapping { enable | disable }
Parameters
Parameter Description
enable Enable mapping from local priority to CoS.
disable Disable mapping from local priority to CoS.
Default conditions
Enabled
Command mode
Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
Only when mapping from the local priority to CoS is enabled by this command can the CoS
remarking profile applied to the interface take effect.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable mapping from local priority to CoS on interface 1.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#mls qos cos-remark-mapping enable
Set successfully.
Related commands
show mls qos interface
Function
To create the CoS-to-local priority (color) profile and enter cos-to-pri configuration mode, use
this command. To delete the profile, use the no form of this command.
Format
mls qos mapping cos-to-local-priority profile-id
no mls qos mapping cos-to-local-priority profile-id
Parameters
Parameter Description
profile-id Profile ID, an integer, ranging from 1 to 7
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
By creating the CoS-to-local priority (color) profile, you can modify the mapping between
CoS and local priority, add packets to different queues, and schedule these packets on the
egress interface.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
If you wish to delete a profile, you need to delete the application relationship between the
profile and the interface in interface configuration mode. If you do not delete the application
relationship between the profile and the interface, then the newly created profile with the
same profile ID will be directly applied to the corresponding interface. The mapping is in
default condition.
Examples
This example shows how to create CoS-to-local priority (color) profile 1.
Raisecom#config
Raisecom(config)#mls qos mapping cos-to-local-priority 1
Raisecom(cos-to-pri)#
Related commands
show mls qos mapping cos-to-local-priority
Function
To create DSCP remarking profile and enter dscp-mutation configuration mode, use this
command. To delete the profile, use the no form of this command.
Format
mls qos mapping dscp-mutation profile-id
no mls qos mapping dscp-mutation profile-id
Parameters
Parameter Description
profile-id Profile ID, an integer, ranging from 1 to 7
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
By creating the DSCP remarking profile, you can modify the mapping between the old and
new DSCP priority. Therefore, the downstream devices can manage QoS of the packets
according to the remarked DSCP priority.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
If you wish to delete a profile, you need to delete the application relationship between the
profile and the interface in interface configuration mode. If you do not delete the application
relationship between the profile and the interface, then the newly created profile with the
same profile ID will be directly applied to the corresponding interface. The mapping is in
default condition.
Examples
This example shows how to configure DSCP remarking profile 1.
Raisecom#config
Raisecom(config)#mls qos mapping dscp-mutation 1
Raisecom(dscp-mutation)#
Related commands
show mls qos mapping dscp-mutation
Function
To create the DSCP-to-local priority (color) profile and enter dscp-to-pri configuration mode,
use this command. To delete this configuration, use the no form of this command.
Format
mls qos mapping dscp-to-local-priority profile-id
no mls qos mapping dscp-to-local-priority profile-id
Parameters
Parameter Description
profile-id Profile ID, an integer, ranging from 1 to 7
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
By creating the DSCP-to-local priority (color) profile, you can modify the mapping between
DSCP and local priority, add packets into different queues, and schedule these packets on the
egress interface.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
If you wish to delete a profile, you need to delete the application relationship between the
profile and the interface in interface configuration mode. If you do not delete the application
relationship between the profile and the interface, then the newly created profile with the
same profile ID will be directly applied to the corresponding interface. The mapping is in
default condition.
Examples
This example shows how to create DSCP-to-local priority (color) profile 1.
Raisecom#config
Raisecom(config)#mls qos mapping dscp-to-local-priority 1
Raisecom(dscp-to-pri)#
Related commands
show mls qos mapping dscp-to-local-priority
Function
To configure the mapping from CoS to local priority (color), use this command.
Format
cos cos-value to local-priority localpri-value [ color { green | red | yellow } ]
Parameters
Parameter Description
cos cos-value CoS priority
The cos-value is an integer ranging from 0 to 7.
local-priority Local priority
localpri-value The localpri-value is an integer ranging from 0 to 7.
green Specify the green.
red Specify the red.
yellow Specify the yellow.
Default conditions
The mapping from CoS to local priority or to the color is as follows:
CoS 0 1 2 3 4 5 6 7
Command mode
cos-to-pri configuration
User level
11
Usage guidelines
Scenario
You can use this command to modify the mapping information from CoS to local priority
(color), map a specified CoS value of an ingress packet to a local priority value, and then
schedule the ingress packet.
Prerequisite
Use the mls qos mapping cos-to-local-priority command to create the CoS-to-local priority
(color) profile and enter cos-to-pri configuration mode.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to map CoS 2 of CoS-to-local priority (color) profile 1 to local
priority 3 and how to specify the color to red.
Raisecom#config
Raisecom(config)#mls qos mapping cos-to-local-priority 1
Raisecom(cos-to-pri)#cos 2 to local-priority 3 color red
Set successfully.
Related commands
show mls qos mapping cos-to-local-priority
Function
To configure the mapping from DSCP to local priority (color), use this command.
Format
dscp dscp-value to local-priority localpri-value [ color { green | red | yellow } ]
Parameters
Parameter Description
dscp-value DSCP value, an integer, ranging from 0 to 63
localpri-value Local priority, an integer, ranging from 0 to 7
green Specify the green.
red Specify the red.
Parameter Description
yellow Specify the yellow.
Default conditions
The mapping between DSCP to local priority or to the color is as follows:
DSCP 0 to 7 8 to 15 16 to 24 to 32 to 40 to 48 to 56 to
23 31 39 47 55 63
Local 0/green 1/green 2/green 3/green 4/green 5/green 6/green 7/green
Command mode
dscp-to-pri configuration
User level
11
Usage guidelines
Scenario
You can use this command to modify the mapping information about the DSCP-to-local
priority (color) profile, map a specified DSCP value of an ingress packet to a local priority
value, and then schedule the ingress packet.
Prerequisite
Use the mls qos mapping dscp-to-local-priority command to create the DSCP-to-local
priority (color) profile and enter dscp-to-pri configuration mode.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to map DSCP 2 of DSCP-to-local priority (color) profile 1 to local
priority 3 and how to specify the color to red.
Raisecom#config
Raisecom(config)#mls qos mapping dscp-to-local-priority 1
Raisecom(dscp-to-pri)#dscp 2 to local-priority 3 color red
Set successfully.
Related commands
show mls qos mapping dscp-to-local-priority
Function
To remark the DSCP priority of specified packets, use this command.
Format
dscp dscp-value to new-dscp dscp-value
Parameters
Parameter Description
dscp-value DSCP value, an integer, ranging from 0 to 63
Default conditions
N/A
Command mode
dscp-mutation configuration
User level
11
Usage guidelines
Scenario
After the DSCP priority of packets is remarked, the current device will schedule the ingress
packets according to the remarked DSCP priority.
Prerequisite
Use the mls qos mapping dscp-mutation command to create DSCP remarking profile and
enter dscp-mutation configuration mode.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to remark DSCP priority 2 to 20 in DSCP remarking profile 1.
Raisecom#config
Raisecom(config)#mls qos mapping dscp-mutation 1
Raisecom(dscp-mutation)#dscp 2 to new-dscp 20
Set successfully.
Related commands
show mls qos mapping dscp-mutation
Function
To configure the mapping from local priority to CoS priority, use this command.
Format
local-priority localpri-value to cos cos-value
Parameters
Parameter Description
localpri-value Local priority, an integer, ranging from 0 to 7
cos-value CoS priority, an integer, ranging from 0 to 7
Default conditions
N/A
Command mode
cos-remark configuration
User level
11
Usage guidelines
Scenario
After the mapping between local priority and CoS is configured, the downstream devices can
manage QoS of the packets according to the mapped CoS priority.
Prerequisite
You must use the mls qos mapping cos-remark command to create CoS remarking profile
and enter cos-remark configuration mode.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to modify the local priority 2 to CoS priority 3 in CoS remarking
profile 1.
Raisecom#config
Raisecom(config)#mls qos mapping cos-remark 1
Raisecom(cos-remark)#local-priority 2 to cos 3
Set successfully.
Related commands
show mls qos mapping cos-remark
Function
To apply the CoS remarking profile to the interface, use this command. To disable this
function, use the no form of this command.
Format
mls qos cos-remark profile-id
no mls qos cos-remark
Parameters
Parameter Description
profile-id Profile ID, an integer, ranging from 1 to 7
Default conditions
N/A
Command mode
Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
You can use this command to apply the CoS remarking profile to the egress interface.
Therefore, the downstream devices can manage CoS of the packets according to the remarked
CoS priority.
Prerequisite
You must use the mls qos mapping cos-remark command to create the CoS remarking
profile.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to apply CoS remarking profile 1 to interface 1/1/2.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/1)#mls qos cos-remark 1
Set successfully.
Related commands
show mls qos interface
Function
To apply the CoS-to-local priority (color) profile to an interface, use this command. To
disable this function, use the no form of this command.
Format
mls qos cos-to-local-priority profile-id
no mls qos cos-to-local-priority
Parameters
Parameter Description
profile-id Profile ID, an integer, ranging from 1 to 7
Default conditions
N/A
Command mode
Physical interface configuration/VLAN interface configuration
User level
11
Usage guidelines
Scenario
After the CoS-to-local priority (color) profile is applied to the interface, the device will assign
local priority to and color the packets entered through that interface according to the CoS
priority of packets and mapping.
Prerequisite
You must use the mls qos mapping cos-to-local-priority command to create the CoS-to-
local priority (color) profile.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to apply CoS-to-local priority (color) profile 1 to interface 1.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#mls qos cos-to-local-priority 1
Set successfully.
Related commands
show mls qos interface
Function
To apply the DSCP remarking profile to an interface, use this command. To disable this
function, use the no form of this command.
Format
mls qos dscp-mutation profile-id
no mls qos dscp-mutation
Parameters
Parameter Description
profile-id Profile ID, an integer, ranging from 1 to 7
Default conditions
N/A
Command mode
Physical interface configuration/VLAN interface configuration
User level
11
Usage guidelines
Scenario
You can use this command to apply the DSCP remarking profile to the ingress interface,
which facilitates the device in scheduling the packets according to the remarked DSCP
priority.
Prerequisite
You must use the mls qos mapping dscp-mutation command to create the DSCP remarking
profile.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to apply DSCP remarking profile 1 to interface 1.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#mls qos dscp-mutation 1
Set successfully.
Related commands
show mls qos interface
Function
To modify information about the DSCP translation profile, use this command.
Format
dscp dscp-value to new-dscp dscp-value
Parameters
Parameter Description
dscp-value DSCP value, an integer, ranging from 0 to 63
Default conditions
N/A
Command mode
dscp-mutation configuration
User level
11
Usage guidelines
Scenario
You can use this command to modify information about the DSCP translation profile, re-
configure DSCP values for packets so that packets are classified based on new DSCP values.
Prerequisite
You must use the mls qos mapping dscp-mutation command to create the DSCP translation
profile.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to modify the priority 2 of DSCP translation profile 5 to 6.
Raisecom#config
Raisecom(config)#mls qos mapping dscp-mutation 5
Raisecom(dscp-mutation)#dscp 2 to new-dscp 6
Set successfully.
Related commands
show mls qos mapping dscp-mutation
Function
To apply the DSCP-to-local priority (color) profile to an interface, use this command. To
disable this function, use the no form of this command.
Format
mls qos dscp-to-local-priority profile-id
no mls qos dscp-to-local-priority
Parameters
Parameter Description
profile-id Profile ID, an integer, ranging from 1 to 7
Default conditions
N/A
Command mode
Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
After the DSCP-to-local priority (color) profile is applied to an interface, the device will
assign local priority to and color the packets which enter from the interface according to their
DSCP priority and the mapping for management and scheduling.
Prerequisite
You must use the mls qos mapping dscp-to-local-priority command to create the DSCP-to-
local priority (color) profile.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to apply DSCP-to-local priority (color) profile 1 to interface 1.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#mls qos dscp-to-local-priority 1
Set successfully.
Related commands
show mls qos interface
Function
To show information about the CoS remarking profile, use this command.
Format
show mls qos mapping cos-remark [ default | profile-id ]
Parameters
Parameter Description
default Show default configurations.
profile-id Profile ID, an integer, ranging from 1 to 7
Default conditions
N/A
Command mode
Privileged EXEC/Global configuration
User level
5
Usage guidelines
N/A
Examples
This example shows how to show CoS remarking profile 1.
Raisecom#config
Raisecom(config)#show mls qos mapping cos-remark 1
cos-remark
Index Description Ref Localpriority:0 1 2 3 4 5 6 7
-------------------------------------------------------------------------
1 8 cos: 0 1 2 3 4 5 6 7
Field Description
cos-remark CoS remark mapping
Index Index
Description Description
Ref Reference
Localpriority Local priority
cos CoS priority
Related commands
N/A
Function
To show information about the CoS-to-local priority (color) profile, use this command.
Format
show mls qos mapping cos-to-local-priority [ default | profile-id ]
Parameters
Parameter Description
default Show default configurations.
profile-id Profile ID, an integer, ranging from 1 to 7
Default conditions
N/A
Command mode
Privileged EXEC/Global configuration
User level
5
Usage guidelines
N/A
Examples
This example shows how to show information about the CoS-to-local priority (color) profile 7.
Raisecom#config
Raisecom(config)#show mls qos mapping cos-to-local-priority 7
G:GREEN
Y:Yellow
R:RED
cos-to-localpriority(color)
Index Description Ref CoS: 0 1 2 3 4 5 6 7
-------------------------------------------------------------------------
1 8 localpri(color):0(G) 1(G) 2(G) 3(G) 4(G) 5(G) 6(G) 7(G)
Field Description
G:GREEN G: green packets
Y:Yellow Y: yellow packets
R:RED R: red packets
cos-to-localpriority(color) Mapping from CoS to Local priority (color)
Index Index
Description Description
Ref Reference
CoS CoS priority
localpri(color) Local priority (color)
Related commands
N/A
Function
To show information about the DSCP remarking profile, use this command.
Format
show mls qos mapping dscp-mutation [ default | profile-id ]
Parameters
Parameter Description
default Show default configurations.
profile-id Profile ID, an integer, ranging from 1 to 7
Default conditions
N/A
Command mode
Privileged EXEC/Global configuration
User level
5
Usage guidelines
N/A
Examples
This example shows how to show information about the DSCP remarking profile 1.
Raisecom#config
Raisecom(config)#show mls qos mapping dscp-mutation 1
d1:Dscp before mutation
d2:Dscp after mutation
Dscp-Mutation-Index :1
Dscp-Mutation-Description :
Dscp-Mutation-Ref :8
d1:d2
-------------------------------------------------------------------------
0 :0 1 :1 2 :2 3 :3 4 :4 5 :5 6 :6 7 :7
8 :8 9 :9 10:10 11:11 12:12 13:13 14:14 15:16
16:16 17:17 18:18 19:19 20:20 21:21 22:22 23:23
24:24 25:25 26:26 27:27 28:28 29:29 30:30 31:31
32:32 33:33 34:34 35:35 36:36 37:37 38:38 39:39
40:40 41:41 42:42 43:43 44:44 45:45 46:46 47:47
48:48 49:49 50:50 51:51 52:52 53:53 54:54 55:55
56:56 57:57 58:58 59:59 60:60 61:61 62:62 63:63
Field Description
d1:Dscp before mutation DSCP before mutation
d2:Dscp after mutation DSCP after mutation
Dscp-Mutation-Index ID of DSCP mutation
Dscp-Mutation-Description Description of DSCP mutation
Dscp-Mutation-Ref Reference of DSCP mutation
Related commands
N/A
Function
To show information about the DSCP-to-local priority (color) profile, use this command.
Format
show mls qos mapping dscp-to-local-priority [ default | profile-id ]
Parameters
Parameter Description
Default conditions
N/A
Command mode
Privileged EXEC/Global configuration
User level
5
Usage guidelines
N/A
Examples
This example shows how to show information about DSCP-to-local priority (color) profile 1.
Raisecom#config
Raisecom(config)#show mls qos mapping dscp-to-local-priority 1
d1:Dscp before mapping
d2:Local priority after mapping
G:GREEN
Y:Yellow
R:RED
Dscp-Map-Index :1
Dscp-Map-Description :
Dscp-Map-Reference :8
d1:d2(color)
-------------------------------------------------------------------------
0 :0 (G) 1 :0 (G) 2 :0 (G) 3 :0 (G) 4 :0 (G) 5 :0 (G) 6 :0 (G)
7 :0 (G)
8 :1 (G) 9 :1 (G) 10:1 (G) 11:1 (G) 12:1 (G) 13:1 (G) 14:1 (G)
15:1 (G)
16:2 (G) 17:2 (G) 18:2 (G) 19:2 (G) 20:2 (G) 21:2 (G) 22:2 (G)
23:2 (G)
24:3 (G) 25:3 (G) 26:3 (G) 27:3 (G) 28:3 (G) 29:3 (G) 30:3 (G)
31:3 (G)
32:4 (G) 33:4 (G) 34:4 (G) 35:4 (G) 36:4 (G) 37:4 (G) 38:4 (G)
39:4 (G)
40:5 (G) 41:5 (G) 42:5 (G) 43:5 (G) 44:5 (G) 45:5 (G) 46:5 (G)
47:5 (G)
48:6 (G) 49:6 (G) 50:6 (G) 51:6 (G) 52:6 (G) 53:6 (G) 54:6 (G)
55:6 (G)
56:7 (G) 57:7 (G) 58:7 (G) 59:7 (G) 60:7 (G) 61:7 (G) 62:7 (G)
63:7 (G)
Field Description
d1:Dscp before mutation DSCP before mutation
d2: Local priority after mapping DSCP after mutation
G:GREEN G: green packets
Y:Yellow Y: yellow packets
R:RED R: red packets
Dscp-Mutation-Index ID of DSCP mutation
Dscp-Mutation-Description Description of DSCP mutation
Dscp-Mutation-Ref Reference of DSCP mutation
Related commands
N/A
Function
To configure the bandwidth guarantee for the interface queue, use this command. To disable
this function, use the no form of this command.
Format
mls qos queue queue-id shaping cir cir pir pir
no mls qos queue queue-id shaping
Parameters
Parameter Description
queue-id Queue ID, an integer, ranging from 1 to 8
cir cir CIR
The cir is an integer ranging from 0 to 1000000, in units of Kbit/s
pir pir PIR
The pir is an integer ranging from 0 to 1000000, in units of Kbit/s
Default conditions
N/A
Command mode
Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
You can use this command to configure the bandwidth guarantee for interface queue.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to set the CIR and PIR of interface 1/1/1 to 20 Kbit/s and 200 Kbit/s
respectively.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#mls qos queue 2 shaping 20 200
Set successfully.
Related commands
show mls qos queue shaping interface
Function
To show information about the interface queue, use this command.
Format
show mls qos queue interface interface-type interface-number
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show queue configurations of 1000 Mbit/s interface 1.
Raisecom#show mls qos queue interface gigaethernet 1/1/1
gigaethernet1/1/1
Queue Weight(SP)
-------------------------
1 0
2 0
3 0
4 0
5 0
6 0
7 0
8 0
Field Description
Queue Queue
Weight(SP) Weight
Related commands
mls qos queue
Function
To clear the statistics of packets made by the queue on the interface, use this command.
Format
clear mls qos queue statistics interface interface-type interface-number [ queueid queue-id ]
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
queueid queue-id Queue ID, an integer, ranging from 0 to 7
Default conditions
N/A
Command mode
Global configuration
User level
5
Usage guidelines
N/A
Examples
This example shows how to clear statistics of packets made by the queue on interface 1/1/2.
Raisecom#config
Related commands
show mls qos queue statistics interface
Function
To show statistics of queue on the interface, use this command.
Format
show mls qos queue statistics interface interface-type interface-number
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
10
Usage guidelines
N/A
Examples
This example shows how to show statistics of the queue on 1000 Mbit/s interface 1/1/2.
Raisecom#show mls qos queue statistics interface gigaethernet 1/1/2
Port :gigaethernet1/1/1
QueueId PassPkts(Pkts) PassBytes(Bytes) DropPkts(Pkts) DropBytes(Bytes)
-------------------------------------------------------------------------
1 0 0 0 0
2 0 0 0 0
3 0 0 0 0
4 0 0 0 0
5 0 0 0 0
6 0 0 0 0
7 0 0 0 0
8 0 0 0 0
Field Description
Port Interface ID
QueueId Queue ID
PassPkts Number of packets past
PassBytes Number of bytes past
DiscardPkts Number of packets dropped
DiscardBytes Number of bytes dropped
Related commands
clear mls qos queue statistics interface
Function
To show information about queue shaping on the interface, use this command.
Format
show mls qos queue shaping interface interface-type interface-number
Parameters
Parameter Description
interface-type Interface list
interface-number The interface-type means interface type.
The interface-number means interface list number.
It supports a range input, such as "1-3".
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show information about the queue shaping on 1000 Mbit/s
interface 1/1/1.
Raisecom#show mls qos queue shaping interface gigaetnernet 1/1/1
Port Queue CIR(KBps) CBS(KB) EIR(KBps) EBS(KB)
------------------------------------------------------------------
GE1/1/1 1 1000 200 2000 40
Field Description
port Interface ID
Queue Queue
CIR(KBps) Committed information rate
CBS(KB) Committed burst size
EIR(KBps) Excess information rate
EBS(KB) Excess burst size
Related commands
N/A
Function
To assign weight to the interface queue when the queue scheduling mode is DRR, use this
command. To return to the default condition, use the no form of this command.
Format
mls qos queue scheduler drr weight1 weight2 weight3weight8
no mls qos queue scheduler
Parameters
Parameter Description
weight1 to weight 8 Weight value, an integer, ranging from 0 to 127 among which 0
represents SP queue.
Default conditions
The weight is 8.
Command mode
Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
You can use this command to assign weight to the queue while configuring queue scheduling
policy of DRR type.
Prerequisite
Queue scheduling policy is configured as DRR through the mls qos queue scheduler drr
command
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to use DRR scheduling policy to assign the weight value of
1:1:1:1:1:1:1:1 to the queue on interface 1 in slot 1.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#mls qos queue scheduler drr 1 1 1 1 1
1 1 1
Set successfully.
Related commands
show mls qos queue interface
Function
To assign weight to the interface queue when the queue scheduling mode is WRR, use this
command. To return to the default condition, use the no form of this command.
Format
mls qos queue scheduler wrr weigh1 weight2 weight3weight8
no mls qos queue scheduler wrr
Parameters
Parameter Description
weight1 to weight8 Weight value, an integer, ranging from 0 to 127 among which 0
represents SP queue.
Default conditions
The weight is 64.
Command mode
Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
You can use this command to assign weight to the queue while configuring queue scheduling
policy of WRR type.
Prerequisite
Queue scheduling policy is configured as WRR through the mls qos queue scheduler wrr
command.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to use WRR scheduling policy to assign the weight value of
1:1:1:1:1:1:1:1 to the queue on interface 1/1/2.
Raisecom#config
Raisecom(config)#interface gigaethernet1/1/2
Raisecom(config-gigaethernet1/1/2)#mls qos queue scheduler wrr 1 1 1 1 1
1 1 1
Set successfully.
Related commands
show mls qos queue interface
Function
To configure the queue scheduling mode as SP, use this command. To return to the default
condition, use the no form of this command.
Format
mls qos queue scheduler sp [schedule-list schedule-number]
no mls qos queue scheduler
Parameters
Parameter Description
schedule-number Task scheduling list, an integer, ranging from 0 to 99
Default conditions
The scheduling mode is SP.
Command mode
Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
Queue scheduling policies can be classified into SP, DRR, and WRR. You can execute this
command to configure queue scheduling policy.
Deficit Round Robin (DRR): on the basis of scheduling packets in a polling manner
according to the priority, the device schedules packets according to the weight of the
queue.
Strict Priority (SP): the device strictly schedules packets in a descending order of priority.
Packets with lower priority cannot be scheduled until packets with higher priority are
scheduled.
Weighted Round Robin (WRR): on the basis of scheduling packets in a polling manner
according to the priority, the queue with higher priority will gain more resources, while
the queue with lower priority will gain little resources. In this way, the problem of SP
scheduling, namely, packets with lower priority wait for a long time to be served, is
solved.
Prerequisite
N/A
Follow-up procedure
Use the mls qos queue wrr command to assign weigh to the queue while using WRR
policy.
Use the mls qos queue drr command to assign weigh to the queue while using DRR
policy.
Precaution
N/A
Examples
This example shows how to configure the scheduling method for interface 1 in slot 1 as SP.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#mls qos queue scheduler SP
Set successfully.
Related commands
show mls qos interface
Function
To create SRED profile and enter SRED profile configuration mode, use this command. To
delete the profile, use the no form of this command.
Format
mls qos sred profile profile-id
no mls qos sred profile { all | profile-list }
Parameters
Parameter Description
profile-id SRED profile ID, an integer, ranging from 1 to 8
all Delete all profiles.
profile-list SRED profile list, an integer, ranging from 1 to 8
It supports specific values, such as "1,2,3".
It also supports a range, such as "1-3".
Default conditions
N/A
Command mode
Global configuration
User level
15
Usage guidelines
N/A
Examples
This example shows how to create SERD profile 1.
Raisecom#config
Raisecom(config)#mls qos sred profile 1
Raisecom(sred)#
Related commands
show mls qos sred profile
Function
To configure SRED profile information, use this command. To disable this function, use the
no form of this command.
Format
sred [ color { red | yellow } ] start-drop-threshold start-drop value drop-probability drop
probability value
no sred [ color { green | red | yellow } ]
Parameters
Parameter Description
red Red packets
yellow Yellow packets
start-drop value Start-drop threshold percentage, ranging from 0 to 100
drop probability Discard probability, an integer, ranging from 0 to 7
value
Default conditions
N/A
Command mode
SRED profile configuration
User level
11
Usage guidelines
Scenario
SRED will randomly discard packets to avoid TCP global synchronization, when the network
is congested.
By modifying information about the SRED profile, you can configure processing modes for
red or yellow packets. For packets in yellow, the drop rate is configured lower and start-drop
threshold and end-drop threshold are higher. While for packets in red, the drop rate is
configured higher and start-drop threshold and end-drop threshold are lower.
Prerequisite
The SRED profile is created through the mls qos sred profile command.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to set the start-drop threshold and drop rate of SRED profile 1 to 20
and 5 respectively.
Raisecom#config
Raisecom(config)#mls qos sred profile 1
Raisecom(sred)#sred start-drop-threshold 20 drop-probability 5
Set successfully.
Related commands
show mls qos sred profile
Function
To show information about SRED profile, use this command.
Format
show mls qos sred profile [ profile-list ]
Parameters
Parameter Description
profile-list SRED profile list, an integer, ranging from 1 to 8
It supports specific values, such as "1,2,3".
It also supports a range, such as "1-3".
Default conditions
N/A
Command mode
Global configuration
User level
5
Usage guidelines
N/A
Examples
This example shows how to show information about SERD profile 1.
Raisecom#config
Raisecom(config)#show mls qos sred profile 1
YSDT: Yellow Start Drop Threshold
YDP : Yellow Drop Probability
RSDT: Red Start Drop Threshold
RDP : Red Drop Probability
Index Description Ref YSDT YDP RSDT RDP
-------------------------------------------------------------------------
-----------------
1 0 100 0(100%) 100 0(100%)
Field Description
YSDT:Yellow Start Discard Threshold Start-drop threshold of packets in yellow
YDP :Yellow Discard Probability Discard rate of packets in yellow
RSDT:Green Start Discard Threshold Start-drop threshold of packets in red
RDP :Green Discard Probability Discard rate of packets in red
Index Index
Description Description
Ref Reference
Related commands
N/A
Function
To create traffic classification and enter cmap configuration mode, use this command. To
disable this function, use the no form of this command.
Format
class-map class-map [ match-all | match-any ]
no class-map class-map
Parameters
Parameter Description
class-map Name of traffic classification, a string of 1 to 16 characters
match-all Specify match type to satisfy all defined classification rules.
match-any Specify match type to satisfy one defined or more defined
classification rules.
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
Traffic classification refers to recognizing packets of certain types according to configured
rules, thus classifying packets with same features into one type. QoS provides it with different
levels of service according to different classification.
While creating traffic classification, you must specify match type. That is, to specify match-
all or match-any.
match-all: means executing "and", that is, various match statements are running "and"
operation. Only the traffic satisfies all match statements can it be matched successfully.
It there are conflicts, the match statement fails.
match-any: means executing "or", traffic will be matched successfully if it satisfies one
match statement.
The packets created by this command should share certain same features.
Prerequisite
Global QoS is enabled.
Follow-up procedure
You can use the description command to describe traffic classification.
You can use the match command to define rules for traffic classification.
Precaution
If the match-all parameter is configured in traffic classification, all classification rules must
be met. Conflicts among classification rules should be avoided, otherwise, the configuration
will fail.
If the traffic classification has been used by traffic policy and applied to the interface, it can
not be deleted.
Examples
This example shows how to create traffic classification class 1 with match type of match-all.
Raisecom#config
Raisecom(config)#class-map class1 match-all
Set successfully.
Raisecom(config-cmap)#
Related commands
show class-map
7.6.2 match
Function
To define the ACL of traffic classification type, use this command. To disable the
configuration, use the no form of this command.
Format
match access-list{ access-list | name}
match cos cos-value
match inner-vlan vlan-id
match vlan vlan-id
match dscp dscp-value
no match access-list{ access-list | name }
no match cos cos-value
no match inner-vlan
no match vlan vlan-id
no match dscp dscp-value
Parameters
Parameter Description
access-list Number of ACL list, in form of integer
When the value ranges from 1000 to 1999, it means basic IP ACL.
When the value ranges from 2000 to 2999, it means extended IP ACL.
When the value ranges from 3000 to 3999, it means MAC ACL.
When the value ranges from 5000 to 5999, it means MAP ACL.
When the value ranges from 6000 to 6999, it means IPv6 ACL.
When the value ranges from 7000 to 7999, it means IPv6 extended ACL.
Default conditions
N/A
Command mode
CMAP configuration
User level
11
Usage guidelines
Scenario
After creating traffic classification, you can use this command to define ACL rules for traffic
classification for recognizing various packets.
Prerequisite
The class-map command is used for creating traffic classification.
The rule command is used for configuring ACL match rules which should be more than
0.
Follow-up procedure
N/A
Precaution
The ACL must be defined and its type is configured to permit.
If traffic classification is applied to an interface, you cannot use the match command to
modify classification rules.
Examples
This example shows how to configure basic IP ACL 1001 for traffic classification class 1.
Raisecom#config
Raisecom(config)#class-map class1
Raisecom(config-cmap)#match access-list 1001
Set successfully.
Related commands
show class-map
Function
To show information about traffic classification, use this command.
Format
show class-map [ class-map-name ]
Parameters
Parameter Description
class-map-name Name of traffic classification, a string of 1 to 16 characters
Default conditions
N/A
Command mode
Privileged EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show information about traffic classification class1.
Raisecom#show class-map class1
Class-Map class1 (id 0)(ref 0)
Description this-is-a-test-class-map
Match acl 1001
Field Description
Class Map Name of traffic classification
Description Description
Match Matchable classification rules
Related commands
class-map
description
match
Function
To create traffic policing profile and enter traffic policing profile configuration mode, use this
command. To delete the profile, use the no form of this command.
Format
mls qos policer-profile policer-name [ single ] [ aggregate ] [ hierarchy ]
no mls qos policer-profile [ policer-name ]
Parameters
Parameter Description
policer-name Name of traffic policing profile, a string of 1 to 16 characters
single Specify the traffic regulation mode as single.
aggregate Specify the traffic regulation mode as aggregate token bucket.
hierarchy Specify the traffic regulation mode as hierarchy token bucket.
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to create traffic policing profile and enter traffic policing profile
configuration mode.
Specify the mode when you create the traffic policing profile for the first time. The single
means that the profile will work together with certain type of traffic in the traffic classification
to limit the rate of the packets.
You can specify actions for traffic regulation in traffic policing profile configuration mode,
such as drop-color, set-cos, set-dscp, set-pri, and recolor. One traffic policing profile can be
configured with one or more actions among which drop conflicts with other actions.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
When using the no mls qos policer-profile [ policer-name ] command to delete traffic
policing profile, you can delete the failures if the specified traffic policing profile is quoted.
Examples
This example shows how to create traffic policing profile tb with the mode of single.
Raisecom#config
Raisecom(config)#mls qos policer-profile tb single
Raisecom(traffic-policer)#
Related commands
show mls qos policer
7.6.5 drop-color
Function
To configure to drop packets in specified color in traffic policing profile configuration mode,
use this command. To disable this function, use the no form of this command.
Format
drop-color red
no drop-color red
Parameters
Parameter Description
red Discard packets in red.
Default conditions
N/A
Command mode
Traffic regulation profile configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure to drop packets in specified color of traffic policing
profile. If the traffic policing profile is quoted, configurations will fail.
Prerequisite
You must use the mls qos policer-profile command to create traffic policing profile and
enter traffic policing profile configuration mode.
You must use the color-mode command to configure color pattern to aware.
Follow-up procedure
N/A
Precaution
Configurations will fail if the traffic policing profile is quoted.
Examples
This example shows how to configure single traffic policing profile tb to discard red packets.
Raisecom#config
Raisecom(config)#mls qos policer-profile tb single
Raisecom(traffic-policer)#drop-color red
Set successfully.
Related commands
show mls qos policer
7.6.6 set-cos
Function
To configure the mapping from packet colors to CoS values, use this command. To disable
this function, use the no form of this command.
Format
set-cos { green cos | red cos }
no set-cos { green | red }
Parameters
Parameter Description
green cos Specify the CoS value mapped to green packets. It is an integer
ranging from 0 to 7.
red cos Specify the CoS value mapped to red packets. It is an integer ranging
from 0 to 7.
Default conditions
N/A
Command mode
Traffic regulation profile configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the mapping from packets in specified color to CoS.
Prerequisite
You must use the mls qos policer-profile command to create traffic policing profile and
enter traffic policing profile configuration mode.
You must use the color-mode command to configure color-aware pattern to aware.
Follow-up procedure
N/A
Precaution
Configurations will fail if the traffic policing profile is quoted.
Examples
This example shows how to configure the single traffic policing profile to specify mapping
packets in red to CoS priority 2.
Raisecom#config
Raisecom(config)#mls qos policer-profile tb single
Raisecom(traffic-policer)#set-cos red 2
Set successfully.
Related commands
show mls qos policer
7.6.7 set-dscp
Function
To configure the mapping from packet color to DSCP priority, use this command. To disable
this function, use the no form of this command.
Format
set-dscp { green green-value | red red-value }
no set- dscp { green | red }
Parameters
Parameter Description
green green-value Specify the DSCP value mapped to green packets. It is an integer
ranging from 0 to 63.
red red-value Specify the DSCP value mapped to red packets. It is an integer
ranging from 0 to 63.
Default conditions
N/A
Command mode
Traffic regulation profile configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure mapping packets in specified color to DSCP.
Prerequisite
You must use the mls qos policer-profile command to create traffic policing profile and
enter traffic policing profile configuration mode.
You must use the color-mode command to configure color pattern to aware.
Follow-up procedure
N/A
Precaution
Configurations will fail if the traffic policing profile is quoted.
Examples
This example shows how to configure the single traffic policing profile to specify mapping
packets in red to DSCP 2.
Raisecom#config
Raisecom(config)#mls qos policer-profile tb single
Raisecom(traffic-policer)#set-dscp red 2
Set successfully.
Related commands
show mls qos policer
7.6.8 set-pri
Function
To configure the mapping from packet color and local priorities, use this command. To
disable this function, use the no form of this command.
Format
set-pri { green green-value | red red-value }
no set- pri { green | red }
Parameters
Parameter Description
green green-value Specify the local priority mapped to green packets. It is an integer
ranging from 0 to 7.
red red-value Specify the local priority mapped to red packets. It is an integer
ranging from 0 to 7.
Default conditions
N/A
Command mode
Traffic regulation profile configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the mapping from packets in specified color to local
priority.
Prerequisite
You must use the mls qos policer-profile command to create traffic policing profile and
enter traffic policing profile configuration mode.
You must use the color-mode command to configure color-aware pattern to aware.
Follow-up procedure
N/A
Precaution
Configurations will fail if the traffic policing profile is quoted.
Examples
This example shows how to configure the single traffic policing profile to specify mapping
packets in red to local priority 2.
Raisecom#config
Raisecom(config)#mls qos policer-profile tb single
Raisecom(traffic-policer)#set-pri red 2
Set successfully.
Related commands
show mls qos policer
7.6.9 recolor
Function
To recolor packets, use this command. To disable this function, use the no form of this
command.
Format
recolor { green-recolor red | red-recolor green }
no recolor { green | red }
Parameters
Parameter Description
green-recolor Recolor green packets.
red-recolor Recolor red packets.
red Recolor packets with red.
green Recolor packets with green.
Default conditions
N/A
Command mode
Traffic regulation profile configuration
User level
11
Usage guidelines
Scenario
You can use this command to recolor packets in specified color.
Prerequisite
You must use the mls qos policer-profile command to create traffic policing profile and
enter traffic policing profile configuration mode.
You must use the color-mode command to configure color-aware pattern to aware.
Follow-up procedure
N/A
Precaution
Configurations will fail if the traffic policing profile is quoted.
Examples
This example shows how to configure the single traffic policing profile to specify recoloring
packets in green.
Raisecom#config
Raisecom(config)#mls qos policer-profile tb single
Raisecom(traffic-policer)#recolor green-recolor red
Set successfully.
Related commands
show mls qos policer
Function
To configure rate-limiting parameter on the traffic policing profile, use this command.
Format
cir cir cbs cbs [ ebs ebs ]
cir cir cbs cbs eir eir ebs ebs [ coupling ]
cir cir cbs cbs pir pir pbs pbs
Parameters
Parameter Description
cir cir Committed information rate
The cir is an integer ranging from 0 to 1048576, in units of Kbit/s.
Parameter Description
cbs cbs Committed burst size
The cbs is an integer ranging from 0 to 16384, in units of Kbytes.
eir eir Excess information rate
The eir is an integer ranging from 0 to 1048576, in units of Kbit/s.
ebs ebs Excess burst size
The ebs is an integer ranging from 0 to 16384, in units of Kbytes.
coupling Bucket coupling, configure different types of traffic policing profiles with
rate limit parameters. Traffic with speed exceeding cir instead of eir will
not be discarded randomly. Instead, they will be sent until their speed is
slower than cir.
pir pir Peak information rate
The pir is an integer ranging from 0 to 1048576, in units of Kbit/s.
pbs pbs Peak burst size
The pbs is an integer ranging from 0 to 16384, in units of Kbytes.
Default conditions
N/A
Command mode
Traffic regulation profile configuration
User level
11
Usage guidelines
Scenario
You can configure rate-limiting parameters according to the actual needs. And the algorithm
of the traffic policing profile varies with the commands.
When the command line is cir cir cbs cbs, use Flow algorithm.
When the command line is cir cir cbs cbs ebs ebs, use RFC2697 algorithm.
When the command line is cir cir cbs cbs pir pir pbs pbs, use RFC2698 algorithm.
When the command line is cir cir cbs cbs eir eir ebs ebs, use RFC4115 algorithm.
When the command line is cir cir cbs cbs eir eir ebs ebs coupling, use MEF10.1
algorithm.
Prerequisite
You must use the mls qos policer-profile command to create traffic policing profile and
specify its mode before configuring this command.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure single traffic policing profile tb, specify its CIR to 20
kbit/s, CBS to 10 Kbytes, PIR to 200 kbit/s, and and PBS to 200 Kbytes.
Raisecom#config
Raisecom(config)#mls qos policer-profile tb single
Raisecom(traffic-policer)#cir 20 cbs 10 pir 200 pbs 200
Set successfully.
Related commands
show mls qos policer
Function
To show rate limiting rules, use this command.
Format
show mls qos policer [ policer-name ]
Parameters
Parameter Description
policer-name Policer name, a string of 1 to 16 characters
Default conditions
N/A
Command mode
Privileged EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show rate limiting rule tb.
Raisecom#show mls qos policer tb
single-policer: tb mode:2698 color:aware
cir: 20 kbps cbs: 10 kB pir: 200 kbps pbs: 200 kB
Field Description
single-policer Name of traffic policing profile
mode Mode of traffic policing profile
color Color-aware pattern of traffic policing profile
cir Committed information rate
cbs Committed burst size
green reclor Recolor green packets.
red drop Discard red packets.
Related commands
N/A
7.6.12 policy-map
Function
To create traffic policy and enter PMAP configuration mode, use this command. To delete the
traffic policy, use the no form of this command.
Format
policy-map policy-map-name
no policy-map policy-map-name
Parameters
Parameter Description
policy-map-name Name of traffic policy, a string of 1 to 16 characters
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
QoS is implemented by traffic policy. The traffic policy means to binding traffic classification
with traffic action, thus processing different kinds of packets according to different processing
modes.
Prerequisite
Traffic classification is created through the class-map(global configuration mode)
command.
Classification rule is defined through the match command.
Follow-up procedure
Use the class-map(PMAP configuration mode) to add traffic classification to traffic
policy.
Use the show policy-map command to show information about traffic policy.
Precaution
One traffic policy includes one or more traffic classifications.
Examples
This example shows how to create traffic policy1.
Raisecom#config
Raisecom(config)#policy-map policy1
Set successfully
Raisecom(config-pmap)#
Related commands
show policy-map
Function
To add traffic classification to the traffic policy and enter traffic policy configuration mode
binding traffic classification, use this command. To delete the traffic classification in the
policy, use the no form of this command
Format
class-map class-map-name
no class-map class-map-name
Parameters
Parameter Description
name Name of traffic classification, a string of 1 to 16 characters
Default conditions
N/A
Command mode
PMAP configuration
User level
11
Usage guidelines
Scenario
The traffic policy is an integrated QoS policy formed by associating traffic policy with traffic
behaviour. You can use this command to add traffic classification to the traffic policy.
Prerequisite
Traffic policies are created through the policy-map command.
Traffic classification is created through the class-map (config) command in slot
configuration mode and rules for traffic classification should be defined through the
match command.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to add traffic classification class1 to traffic policy1.
Raisecom#config
Raisecom(config)policy-map policy1
Raisecom(config-pmap)#class-map class1
Set successfully.
Raisecom(config-pmap-c)#
Related commands
show policy-map
Function
To describe traffic classification or traffic policy, use this command. To disable this function,
use the no form of this command.
Format
description string
no description
Parameters
Parameter Description
string Description, a string of 1 to 255 characters
Default conditions
N/A
Command mode
Traffic classification configuration/traffic policy configuration
User level
11
Usage guidelines
Scenario
While creating traffic classification or traffic policy, you can use this command to describe
traffic classification or traffic policy, thus facilitating users in understanding the meaning of
traffic classification or traffic policy.
Prerequisite
Traffic classification is created through the class-map command.
Traffic policy is created through the policy-map command.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to describe traffic classification class1 with description of this-is-a-
test-class-map.
Raisecom#config
Raisecom(config)#class-map class1
Raisecom(config-cmap)#description this-is-a-test-class-map
Set successfully.
This example shows how to describe traffic policy1 with description of this-is-a-test-policy-
map.
Raisecom#config
Raisecom(config)#policy-map policy1
Raisecom(config-pmap)#description this-is-a-test-policy-map
Set successfully.
Related commands
show class-map
show policy-map
7.6.15 police
Function
To introduce a traffic policing profile (policer) to the traffic policy, use this command. To
delete the profile, use the no form of this command.
Format
police policer-name
no police policer-name
Parameters
Parameter Description
policer-name Policer name, a string of 1 to 16 characters
Default conditions
N/A
Command mode
Traffic policy configuration mode binding traffic classification
User level
11
Usage guidelines
Scenario
You need to define the traffic classification and traffic action (such as traffic remarking,
redirection, and rate limit on traffic) in the traffic policy. You can use this command to
introduce rate limit on traffic as the traffic action to the traffic policy.
Prerequisite
Traffic classification is created through the class-map (global configuration mode)
command.
Classification rule is defined through the match command.
The traffic policing profile is created through the mls qos policer-profile command.
Use the policy-map command to create the traffic policy and use the class-map (PMAP
configuration mode) to add traffic classification to the traffic policy.
Follow-up procedure
You can use the service-policy command to apply the policy to interface.
Precaution
N/A
Examples
This example shows how to use the traffic policing profile with the name of policer 1 in
policy 1 and under class 1.
Raisecom#config
Raisecom(config)#class-map class1
Raisecom(config-cmap)#match access-list 1001
Set successfully
Raisecom(config-cmap)#exit
Raisecom(config)#policy-map policy1
Raisecom(config-pmap)#class-map class1
Raisecom(config-pmap-c)#police policer1
Set successfully.
Related commands
show policy-map
Function
To show information about traffic policy, use this command.
Format
show policy-map [ policy-map-name ] [ class class-map-name ]
Parameters
Parameter Description
policy-map policy- Name of traffic policy
map-name The policy-map-name is a string of 1 to 16 characters.
class-map class- Name of traffic classification
map-name The class-map-name is a string of 1 to 16 characters.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show information about traffic policy.
Raisecom#show policy-map
Policy Map policy1
Class-map class1
police tb
Field Description
Policy Map Name of traffic policy
Class-map Name of traffic classification
police Name of traffic policing profile
Related commands
N/A
7.6.17 set
Function
To configure re-marking for the traffic, use this command. To disable this function, use the no
form of this command.
Format
set { cos cos-value | dscp dscp-value | local-priority value }
no set { cos | ip dscp | local-priority }
Parameters
Parameter Description
cos cos-value New CoS priority
The cos-value is an integer ranging from 0 to 7.
dscp dscp-value New DSCP
The dscp-value is an integer ranging from 0 to 63.
local-priority value New Local priority
The value is an integer ranging from 0 to 7.
Default conditions
N/A
Command mode
Traffic policy configuration mode binding traffic classification
User level
11
Usage guidelines
Scenario
You need to define the traffic classification and traffic action (such as traffic re-marking,
redirection, and rate limit on traffic) in the traffic policy, you can use this command to
configure the traffic remarking.
Remarking means to modifying the priority and VLAN ID of the packets. Different packets
use different priority fields, for example, IP packets use IP priority and DSCP priority while
802.1Q packets use CoS priority with VLAN Tags.
Prerequisite
Traffic classification is created through the class-map(global configuration mode)
command.
Examples
This example shows how to change the CoS value to 5 in the traffic policy1 and under traffic
classification class1.
Raisecom#config
Raisecom(config)#class-map class1
Raisecom(config-cmap)#match acl 1001
Set successfully
Raisecom(config-cmap)#exit
Raisecom(config)#policy-map policy1
Raisecom(config-pmap)#class-map class1
Raisecom(config-pmap-c)#set cos 5
Set successfully.
Related commands
show policy-map
7.6.18 redirect-to
Function
To configure the traffic redirection, use this command. To disable this function, use the no
form of this command.
Format
redirect-to interface-type interface-number
no redirect-to port
Parameters
Parameter Description
interface-type Interface type
Parameter Description
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Traffic policy configuration mode binding traffic classification
User level
11
Usage guidelines
Scenario
You need to define the traffic classification and traffic action (such as traffic re-marking,
redirection, and rate limit on traffic) in the traffic policy. You can use this command to
configure the traffic redirection.
Redirection means that packets will not be forwarded according to the original destination
address. Instead, they will be redirected to the specified egress interface and be forwarded out.
If the next hop is unavailable, the system will forward the packets according to the original
destination address.
Prerequisite
Traffic classification is created through the class-map (global configuration mode)
command.
Classification rule is defined through the match command.
Traffic policy is created through the policy-map command and traffic classification is
added to the policy through the class-map (PMAP configuration mode) command.
Follow-up procedure
N/A
Precaution
Configurations will fail if the traffic policy is used.
The redirected interface must be a physical interface.
The egress interface does not support that configuration.
Examples
This example shows how to redirect traffic to 1000 Mbit/s interface 1/1/2 in the traffic policy1
and under the traffic classification class1.
Raisecom#config
Raisecom(config)#class-map class1
Related commands
show policy-map
7.6.19 copy-to-mirror
Function
To configure copying traffic to the mirroring group, use this command. To disable this
function, use the no form of this command.
Format
copy-to-mirror group-id
no copy-to-mirror
Parameters
Parameter Description
group-id Mirroring group ID, an integer, ranging from 1 to 4
Default conditions
N/A
Command mode
Traffic policy configuration mode binding with traffic classification
User level
11
Usage guidelines
Scenario
After the traffic policy is used and enabled, traffic which match with traffic classification
rules with be copied to the mirror group.
Prerequisite
Examples
This example shows how to configure traffic mirroring.
Raisecom#config
Raisecom(config)#class-map class1
Raisecom(config-cmap)#match acl 1001
Set successfully
Raisecom(config-cmap)#exit
Raisecom(config)#policy-map policy1
Raisecom(config-pmap)#class-map class1
Raisecom(config-pmap-c)#copy-to-mirror 1
Set successfully
Related commands
show policy-map
7.6.20 forward-to-cpu
Function
To configure forwarding the traffic to CPU, use this command. To disable this function, use
the no form of this command.
Format
forward-to-cpu
no forward-to-cpu
Parameters
N/A
Default conditions
N/A
Command mode
Traffic policing profile mode binding with traffic classification
User level
11
Usage guidelines
Scenario
You can use this command to configure forwarding the traffic directly to the CPU.
Prerequisite
Traffic classification is created through the class-map (global configuration mode)
command.
Classification rules are defined through the match command.
Traffic policy is created through the policy-map command and the traffic classification
is added to the policy through the class-map (PMAP configuration mode) command.
Follow-up procedure
N/A
Precaution
Configurations will fail if the traffic policy is used.
Examples
This example shows how to configure forwarding the traffic to the CPU in policy 1 and under
class 1.
Raisecom#config
Raisecom(config)#class-map class1
Raisecom(config-cmap)#match acl 1001
Set successfully
Raisecom(config-cmap)#exit
Raisecom(config)#policy-map policy1
Raisecom(config-pmap)#class-map class1
Raisecom(config-pmap-c)#forward-to-cpu
Set successfully.
Related commands
show policy-map
Function
To enable traffic statistics, use this command. To disable this function, use the disable form of
this command.
Format
statistics { enable | disable }
Parameters
Parameter Description
enable Enable traffic statistics.
disable Disable traffic statistics.
Default conditions
Disabled
Command mode
Traffic policing profile mode binding with traffic classification
User level
11
Usage guidelines
Scenario
You can use this command to configure whether to gather statistics of traffic classification.
Prerequisite
Traffic classification is created through the class-map (global configuration mode)
command.
Classification rules are defined through the match command.
Traffic policy is created through the policy-map command and the traffic classification
is added to the policy through the class-map (PMAP configuration mode) command.
Follow-up procedure
N/A
Precaution
Configurations will fail if the traffic policy is used.
Examples
This example shows how to enable traffic statistics in policy 1 and under class 1
Raisecom#config
Raisecom(config)#class-map class1
Raisecom(config-cmap)#match acl 1001
Set successfully
Raisecom(config-cmap)#exit
Raisecom(config)#policy-map policy1
Raisecom(config-pmap)#class-map class1
Raisecom(config-pmap-c)#statistics enable
Set successfully.
Related commands
show policy-map
7.6.22 service-policy
Function
To apply traffic policy to the interface, use this command. To disable this function, use the no
form of this command.
Format
service-policy ingress policy-map-name
no service-policy ingress policy-map-name
Parameters
Parameter Description
ingress Apply traffic to the ingress direction of interface.
policy-map-name Name of traffic policy, a string of 1 to 16 characters
Default conditions
N/A
Command mode
Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
After traffic classification and policy being defined, the policy should be applied to interface,
thus it can take effect and ensure QoS. You can use this command to apply the traffic policy to
the interface.
Prerequisite
Traffic classification is defined through the class-map(global configuration mode) and
match command.
Traffic policy is created through the policy-map command and traffic classification is
added to policy through the class-map(PMAP configuration mode) command.
Traffic action is defined through the police or rediect-to port command.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to apply traffic policy1 to 1000 Mbit/s interface 1 in the ingress
direction.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#service-policy ingress policy1
Set successfully.
Related commands
show service-policy interface
Function
To clear traffic policy statistics, use this command.
Format
clear service-policy statistics interface interface-type interface-number ingress
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
ingress Clear traffic policy statistics on the interface in the ingress direction.
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to clear traffic statistics.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Executing this command will clear statistics of traffic policy. Use it with caution.
Examples
This example shows how to clear traffic policy statistics on 1000 Mbit/s interface 1/1/1 in the
ingress direction.
Raisecom#config
Raisecom(config)#clear service-policy statistics interface gigaethernet
1/1/1 ingress
Set successfully.
Related commands
show service-policy statistics interface
Function
Show information about the applied traffic policies, use this command.
Format
show service-policy interface
show service-policy interface interface-type interface-number [ ingress ]
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
ingress Clear traffic policy statistics on the interface in the ingress
direction.
Default conditions
N/A
Command mode
Privileged EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show information about the applied policies.
Raisecom#show service-policy interface
Interface Direction PolicyMap
----------------------------------------------------
vlan1 ingress policy1
Field Description
Interface Interface ID
Direction Direction
PolicyMap Traffic policy profile
Related commands
N/A
Function
To show statistics of the applied traffic policies, use this command.
Format
show service-policy statistics interface interface-type interface-number ingress [ class-map
class-map-name ]
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
ingress Clear traffic policy statistics on the interface in the
ingress direction.
class-map class-map-name Name of traffic classification, a string of 1 to 16
characters
Default conditions
N/A
Command mode
Privileged EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show statistics of traffic policy on interface 1/1/1.
Raisecom#show service-policy statistics interface gigaethernet 1/1/1
ingress
Interface Direction PolicyMap ClassMap InPkt
InByte OutPkt OutByte
------------------------------------------------------------------------
class1 0 0 0 0
Field Description
Interface Interface ID
Direction Direction
PolicyMap Traffic policy profile
ClassMap Traffic classification profile
InPkt Number of packets received
InByte Number of bytes received
OutPkt Number of packets sent
OutByte Number of bytes sent
Related commands
N/A
Function
To show information about traffic classification, use this command.
Format
show class-map [ class-map ]
Parameters
Parameter Description
class-map Name of traffic classification, a string of 1 to 16 characters
Default conditions
N/A
Command mode
Any command
User level
5
Usage guidelines
N/A
Examples
This example shows how to show information about traffic classification.
Raisecom#show class-map
Class Map match-any usera (id 0)
Match vlan 2
Field Description
Class Map Traffic classification, type and name
Description Description
Match Classification rules
Related commands
N/A
Function
To show information about the token bucket (traffic shaping), use this command.
Format
show mls qos policer [ policer-name ]
Parameters
Parameter Description
policer-name Show specified information about token bucket. a string of 1 to 16
characters
aggregate-policer Specify showing information about aggregate policer.
class-policer Specify showing information about class policer.
Parameter Description
hierarchy-policer Specify showing information about hierarchical policer.
single-policer Specify showing information about single policer.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
Scenario
You can this this command to show the type, mode, color mode, rate, action type and action
value of traffic regulation. Among which the show mls qos policer [ policer-name ]
command is for showing specified information about token bucket.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to show information about token bucket jk.
Raisecom#show mls qos policer jk
single-policer: jk mode:4115 color:blind
cir: 20 kbps, cbs: 10 kB, eir: 20 kbps, ebs: 20 kB
Related commands
N/A
Function
To configure bandwidth rate limiting on the interface, use this command. To disable this
function, use the no form of this command.
Format
rate-limit { egress | ingress } cir cir-value cbs cbs-value
no rate-limit { egress | ingress }
Parameters
Parameter Description
egress Limit in the egress direction
ingress Limit in the ingress direction
cir cir-value Committed information rate
The cir-value is an integer ranging from 1 to 10000000, in units of
Kbit/s.
cbs cbs-value Committed burst size
The cbs-value is an integer ranging from 1 to 512, in units of Kbytes.
Default conditions
N/A
Command mode
Physical layer interface configuration mode
Usage guidelines
Scenario
You can use this command to configure bandwidth rate limiting on the interface. Rate limiting
on the interface means limiting the rate on the interface according to configured rate. When
the rate limit in the ingress direction is configured successfully, it will prompt the actual
effective rate limit value and burst value.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the committed information rate in the egress direction
of 1000 Mbit/s interface 1 to 100kbit/s and the committed burst size to 20 Kbytes.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#rate-limit egress cir 100 cbs 20
Set successfully
Related commands
show rate-limit interface
Function
To show information about rate limiting on the interface, use this command.
Format
show rate-limit interface [ interface-type interface-number ]
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Privileged EXEC/Global configuration
Usage guidelines
N/A
Examples
This example shows how to show information about rate limiting in the egress direction of
1000 Mbit/s interface 1/1/2.
Field Description
Interface Interface ID
direction Direction
Cir(kbps) Committed information rate
Cbs(kB) Committed burst size
CirOper(kbps) Committed information rate configured
Related commands
rate-limit
8 Multicast
Function
To clear statistics of IGMP, use this command.
Format
clear igmp statistics [ interface-type interface-number ]
Parameters
Parameter Description
interface-type interface-number IGMP statistics on the specified interface
The interface-type means interface type.
The interface-number means interface ID.
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
N/A
Examples
This example shows how to clear IGMP statistics on interface 1 in slot 1.
Raisecom#config
Raisecom(config)#clear igmp statistics gigaethernet 1/1/1
Set successfully.
Related commands
N/A
Function
To enable IGMP immediate-leave, use this command. To disable this function, use the no
form of this command.
Format
igmp immediate-leave interface-type interface-number vlan vlan-list
no igmp immediate-leave interface-type interface-number vlan vlan-list
Parameters
Parameter Description
interface-type Specify immediate-leave interface.
interface-number The interface-type means interface type.
The interface-number means interface ID.
vlan vlan-list VLAN list, an integer, ranging from 1 to 4094
It supports specific values, such as "1,2,3"; it also supports a range,
such as "1-3".
Default conditions
Disabled
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
When the multicast member leaves the group, it will send Leave message. Generally, when
the device receives that message, it will send query packets out the interface which received
the Leave message. If there are responses from that interface, it means that there is still traffic
transmitting on the interface. Thus the multicast forwarding table will not delete the
corresponding entry of the interface. However, if there is no response from that interface, the
multicast forwarding entry will be deleted. Therefore, we can see that it takes a while for
multicast members to leave the group.
After this command is enabled, the multicast members can leave immediately. Namely, the
device deletes the multicast forwarding entry corresponded to the interface without querying
upon receiving the Leave message.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
We recommend enabling immediate leave when the receiving interface is just connected to
one user. If the receiving interface is connected to more users, the device may immediately
delete the multicast forwarding entry without querying upon receiving the Leave message,
which may prevent other users from receiving multicast data.
Examples
This example shows how to enable immediate-leave on interface 1 in slot 1.
Raisecom#config
Raisecom(config)#igmp immediate-leave gigaethernet 1/1/1
Set successfully.
Related commands
show igmp immediate-leave
Function
To create multicast router interface in the specified VLAN, use this command. To delete this
configuration, use the no form of this command.
Format
igmp mrouter vlan vlan-id interface-type interface-number
no igmp mrouter vlan vlan-id interface-type interface-number
Parameters
Parameter Description
vlan vlan-id VLAN to which the specified multicast router interface attached, with
vlan-id as an integer, ranging from 1 to 4094
interface-type Specified multicast router interface
interface-number The interface-type refers to the interface type.
The interface-number refers to the interface ID.
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
The interface which connects the device with the multicast router is called multicast router
interface. The multicast router interface forwards Report and Leave packets to the multicast
router and receives the multicast data from the multicast router.
The routes (the multicast routing protocol should be enabled on the multicast router, learned
through IGMP query packets) can be learned to the router interface. The router interface can
also be configured manually to enable the downstream multicast reports and leave packets be
forwarded to the router interface.
The router interface learned dynamically has aging time while the router interface configured
manually will not be aged.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure interface 1 in slot 1 to multicast router interface with
attached VLAN 10.
Raisecom#config
Related commands
show igmp mrouter
Function
To enable IGMP forwarding on the interface, use this command. To disable this function, use
the no form of this command.
Format
igmp ring interface-type interface-number
no igmp ring interface-type interface-number
Parameters
Parameter Description
interface-type Enable IGMP forwarding on the specified interface.
interface-number The interface-type refers to the interface type.
The interface-number refers to the interface ID.
It supports a range, such as "1-3".
Default conditions
Disabled
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to enable IGMP forwarding on the interface in Ethernet ring to
stabilize multicast services, implement multicast backup on the ring, and prevent multicast
service fault caused by link failures.
After the IGMP forwarding on the interface in Ethernet ring is enabled, the switch will add all
interfaces on the ring to the multicast forwarding table or renew their aging time if the
interfaces on the ring receive Report packets. If the interface that receives Report packets
does not belong to the ring, then the switch will only add this interface to the multicast
forwarding table or renew its aging time.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
IGMP forwarding on the ring cannot be enabled concurrently with immediate leave.
Examples
This example shows how to enable IGMP forwarding on interface 1-2 in slot 1.
Raisecom#config
Raisecom(config)#igmp ring gigaethernet 1/1/1-2
Set successfully.
Related commands
show igmp snooping
show igmp mvr
Function
To delete specified multicast forwarding table entries, use this command.
Format
no igmp member interface-type interface-number
Parameters
Parameter Description
interface-type Delete multicast forwarding table entries on the specified interface.
interface-number The interface-type refers to the interface type.
The interface-number refers to the interface ID.
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
Layer 2 multicast protocol forwards multicast data based on layer 2 multicast forwarding
table.
When the switch receives multicast data, it will forward them to the corresponding interface
according to the multicast forwarding table. When certain multicast forwarding entry is
deleted, the multicast date will not be forwarded to the corresponding interface.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to delete the multicast forwarding entry on interface 1 in slot 1.
Raisecom#config
Raisecom(config)#no igmp member gigaethernet 1/1/1
Set successfully.
Related commands
show igmp mvr member
show igmp snooping member
Function
To configure versions of IGMP, use this command.
Format
igmp version {2 |3}
Parameters
Parameter Description
2|3 IGMP version
2 refers to version 2.
3 refers to version 3.
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure IGMP versions.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the version of IGMP to 3.
Raisecom#config
Raisecom(config)#igmp version 3
Set successfully.
Related commands
N/A
Function
To show configurations of IGMP immediate-leave, use this command.
Format
show igmp immediate-leave [ interface-type interface-number ]
Parameters
Parameter Description
interface-type interface-number Show information about immediate-leave on the
specified interface.
The interface-type refers to the interface type.
The interface-number refers to the interface ID.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
11
Usage guidelines
N/A
Examples
This example shows how to show configurations of IGMP immediate-leave.
Raisecom#show igmp immediate-leave
Port Status Vlan
------------------------------------------
gigaethernet 1/1/1 disable --
gigaethernet 1/1/2 disable --
fastethernet 1/8/2 disable --
fastethernet 1/8/3 disable --
fastethernet 1/8/4 disable --
port-channel 1 disable --
port-channel 2 disable --
port-channel 3 disable --
port-channel 31 disable --
port-channel 32 disable --
Field Description
Port Interface ID
Field Description
Status Interface immediate-leave status
enable: enabled
disable: disabled
Vlan VLAN with immediate-leave on
Related commands
N/A
Function
To show information about IGMP multicast router interface, use this command.
Format
show igmp mrouter
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show information about IGMP multicast router interface.
Raisecom#show igmp mrouter
vlan Port Age Type
-----------------------------------------------
4 fastethernet 1/3/1 -- static
Field Description
vlan VLAN ID
Port Interface ID
Age Aging time
Type Multicast router interface type
static: static router interface
dynamic: dynamic router interface
Related commands
N/A
Function
To show statistics of IGMP, use this command.
Format
show igmp statistics [ interface-type interface-number ]
Parameters
Parameter Description
interface-type Show IGMP statistics on the specified interface.
interface-number The interface-type refers to the interface type.
The interface-number refers to the interface ID.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
11
Usage guidelines
N/A
Examples
This example shows how to show IGMP statistics on interface 1 in slot 1.
Field Description
Type Packet type
Query: query packets
Report: report packets
Leave: leave packets
Related commands
N/A
Function
To enable global IGMP Snooping, use this command. To disable this function, use the no
form of this command.
Format
igmp snooping
no igmp snooping
Parameters
N/A
Default conditions
Disabled
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
IGMP Snooping is a solution to Layer 2 multicast. When the device enabled with IGMP
Snooping receives the IGMP information transmitting between host of multicast members and
multicast routers, the IGMP Snooping module will analyse the information and establish and
maintain Layer 2 multicast forwarding table according to the information.
You need to use this command to enable or disable IGMP Snooping in global configuration
mode. Only when global IGMP Snooping is enabled can the IGMP Snooping under VLAN be
configured effectively. If global IGMP Snooping is disabled, IGMP Snooping under VLAN
will be disabled too.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable global IGMP Snooping.
Raisecom#config
Raisecom(config)#igmp snooping
Set successfully.
Related commands
show igmp snooping
Function
To configure the aging time of IGMP members, use this command. To disable this function,
use the no form of this command.
Format
igmp snooping member-timeout { seconds | infinite }
no igmp snooping member-timeout { seconds | infinite }
Parameters
Parameter Description
seconds Timeout, in units of second, an integer, ranging from 5 to 3600
infinite Never aged
Default conditions
The aging time of IGMP members is 300s.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
IGMP Snooping is a solution to Layer 2 multicast. When the device enabled with IGMP
Snooping receives the IGMP information transmitting between host of multicast members and
multicast routers, the IGMP Snooping module will analyse the information and establish and
maintain Layer 2 multicast forwarding table according to the information.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the aging time of IGMP members to 500s.
Raisecom(config)#igmp snooping member-timeout 500
Set successfully.
Related commands
show igmp snooping
Function
To show relevant configurations of IGMP Snooping, use this command.
Format
show igmp snooping
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show relevant configurations of IGMP Snooping.
Raisecom#show gimp snooping
igmp snooping :Enable
igmp snooping active vlan :10-11
igmp aging time(s) :300
igmp ring :--
Field Description
igmp snooping IGMP Snooping status
Enable: enabled
Disable: disabled
igmp snooping active vlan VLAN enabled with IGMP Snooping
igmp aging time(s) Aging time of multicast forwarding table entries
igmp ring Enable the interface with IGMP forwarding.
Related commands
N/A
Function
To show information about members in IGMP Snooping multicast group, use this command.
Format
show igmp snooping member [ interface-type interface-number | vlan vlan-id ]
Parameters
Parameter Description
interface-type Show information about IGMP Snooping multicast members on
interface-number the specified interface.
The interface-type refers to the interface type.
The interface-number refers to the interface ID.
vlan vlan-id Show information about IGMP Snooping multicast members on
the specified VLAN.
with vlan-id as an integer, ranging from 1 to 4094
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show information about members in IGMP Snooping multicast
group.
Raisecom#show igmp snooping member
*: ring port
Port Vlan GroupID Live-time
-------------------------------------------------------
gigaethernet 1/1/1 5 234.0.0.2 15
Field Description
Port Interface ID
Vlan VLAN ID
GroupID Multicast group address
Live-time Time-to-leave
This example shows how to show information about members in IGMP Snooping multicast
group in VLAN 10.
Raisecom#show igmp snooping member vlan 10
Port GroupID Live-time
---------------------------------------------
gigaethernet 1/1/1 234.0.0.6 25
Field Description
Port Interface ID
GroupID Multicast group address
Live-time Time-to-leave
This example shows how to show information about members in IGMP Snooping multicast
group on interface 1.
Raisecom#show igmp snooping member port 1
Vlan GroupID Live-time
----------------------------------------
60 224.0.0.4 30
Field Description
Vlan VLAN ID
GroupID Multicast group address
Live-time Time-to-leave
Related commands
N/A
Function
To show relevant configurations of IGMP Snooping in the specified VLAN, use this
command.
Format
show igmp snooping vlan vlan-id
Parameters
Parameter Description
vlan vlan-id Show configurations of IGMP Snooping in the specified VLAN.
With vlan-id as an integer, ranging from 1 to 4094
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show configurations of IGMP Snooping in VLAN 10.
Raisecom#show igmp snooping vlan 10
igmp snooping :Enable
Field Description
igmp snooping IGMP Snooping status
Enable: enabled
Disable: disabled
Related commands
N/A
Function
To enable global IGMP MVR, use this command. To disable this function, use the no form of
this command.
Format
igmp mvr
no igmp mvr
Parameters
N/A
Default conditions
Disabled
Command mode
Global configuration/Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
In carrier's network based on Ethernet ring, the IGMP MVR is generally used for deploying
multicast. IGMP MVR allows devices sharing one multicast VLAN at the network side and
using their respective user VLAN at the user side. MVR can not only send multicast flow in
the multicast VLAN but also separate user VLAN, thus saving bandwidth and improving data
security.
If you execute other configurations of the MVR before enabling global IGMP MVR, all
previous relevant configurations of IGMP MVR take effect immediately upon executing the
igmp mvr command.
Only when the global IGMP MVR and IGMP MVR on the interface are enabled can the
device processes multicast protocol packets. If the global IGMP MVR is disabled, the IGMP
MVR on the interface will lose efficacy either.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable global IGMP MVR.
Raisecom#config
Raisecom(config)#igmp mvr
Set successfully.
Related commands
show igmp mvr
Function
To configure the group address of IGMP MVR multicast VLAN, use this command. To delete
the group address, use the no form of this command.
Format
igmp mvr mcast-vlan vlan-id group { start-ip-address [ end-ip-address ] | any }
no igmp mvr mcast-vlan vlan-id group { start-ip-address [ end-ip-address ] | any }
Parameters
Parameter Description
vlan-id Multicast VLAN, VLAN to which the multicast routing interface is
attached, an integer, ranging from 1 to 4094
group Configure the multicast source group address contained in multicast
VLAN.
start-ip-address Start IP multicast address, in dotted decimal notation, ranging from
224.0.0.1 to 239.255.255.255
end-ip-address End IP multicast address, in dotted decimal notation, ranging from
224.0.0.1 to 239.255.255.255
any Any multicast address
Default conditions
There is no multicast VLAN and multicast group address.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
Multicast VLAN means the attached VLAN of multicast router interface. One multicast
VLAN may contain multiple multicast source addresses, which form a group of addresses.
The multicast address learned by the switch must be from the group address of certain
multicast VLAN. Otherwise, the switch will not process the multicast IGMP packets.
After bundling the multicast VLAN with any multicast group, all multicast groups which are
not bundled with multicast VLAN will be bundled with the multicast VLAN.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the source group address of VLAN 10 ranging from
224.0.1.1 to 224.0.1.10.
Raisecom#config
Raisecom(config)#igmp mvr mcast-vlan 10 group 224.0.1.1 224.0.1.10
Set successfully.
This example shows how to configure the group address of multicast VLAN 5 to be bundled
with any multicast address.
Raisecom(config)#igmp mvr mcast-vlan 5 group any
Set successfully.
This example shows how to delete the group address of multicast VLAN 10.
Raisecom(config)#no igmp mvr mcast-vlan 10 group 224.0.1.1
Set successfully.
Related commands
show igmp mvr vlan-group
Function
To show relevant configurations of IGMP MVR, use this command.
Format
show igmp mvr
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show configurations of global MVR.
Raisecom#show igmp mvr
igmp mvr running :Enable
igmp mvr port :--
igmp mvr multicast vlan(ref) :--
igmp aging time(s) :300
igmp ring :--
Field Description
igmp mvr running IGMP MVR status
Enable: enabled
Disable: disabled
igmp mvr port Interface with IGMP MVR on
Field Description
igmp mvr multicast vlan(ref) IGMP MVR multicast VLAN
The displayed information is the multicast VLAN created
by the system.
The content in the bracket shows the number of multicast
address in the group address.
igmp aging time(s) Aging time of multicast forwarding-table entries
igmp ring Enable interface with IGMP forwarding.
Related commands
N/A
Function
To show configurations of IGMP MVR on the specified interface, use this command.
Format
show igmp mvr { interface | interface-type interface-number }
Parameters
Parameter Description
interface Show relevant configurations of IGMP MVR on all
interfaces.
interface-type interface- Show relevant configurations of IGMP MVR on the
number specified interface.
The interface-type refers to the interface type.
The interface-number refers to the interface ID.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show configurations of MVR on interface 1 in slot 1.
Raisecom#show igmp mvr gigaethernet 1/1/1
Running :Disable
Status :Up
Field Description
Running IGMP MVR status
Enable: enabled
Disable: disabled
Status Interface status
Up: opened
Down: closed
Related commands
N/A
Function
To show information about IGMP MVR multicast members, use this command.
Format
show igmp mvr members { interface-type interface-number | user-vlan vlan-id }
Parameters
Parameter Description
interface-type Show information about IGMP MVR multicast members on the
interface-number specified interface.
The interface-type refers to the interface type.
The interface-number refers to the interface ID.
user-vlan vlan-id Show information about IGMP MVR multicast members on the
specified user VLAN.
With vlan-id as an integer, ranging from 1 to 4094
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show information about IGMP MVR multicast members.
Raisecom#show igmp mvr members
R-Ring port D-Dynamic S-Static
Port User-vlan Group Mcast-vlan Live-time(s) Flag
-----------------------------------------------------------
GE1/1/6 1 225.1.2.3 4 -- S
The following table describes fields in the command output.
Field Description
Port Interface ID, namely, the interface enabled with IGMP MVR
User-vlan User VLAN
GroupID Multicast group address
Mcast-vlan Multicast VLAN, VLAN to which the multicast routing interface
is attached
Live-time Time-to-leave
Flag Flag
Related commands
N/A
Function
To show the multicast VLAN of IGMP MVR and the bundled group address, use this
command.
Format
show igmp mvr vlan-group [ mcast-vlan vlan-id ]
Parameters
Parameter Description
mcast-vlan vlan- Show information about IGMP MVR group address of the specified
id multicast VLAN.
With vlan-id as an integer, ranging from 1 to 4094
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show the multicast VLAN of IGMP MVR and the bundled group
address.
Raisecom#show igmp mvr vlan-group
Mcast-vlan Start-group End-group
-------------------------------------------
6 -- any
4 234.1.1.8 234.1.1.8
Field Description
Mcast-vlan Multicast VLAN, VLAN to which the multicast routing
interface is attached
Start-group Starting multicast group address
End-group Ending multicast group address
This example shows how to show IGMP MVR group address of VLAN 4.
Raisecom#show igmp mvr vlan-group mcast-vlan 4
Mcast-vlan Start-group End-group
-------------------------------------------
4 234.1.1.8 234.1.1.8
Field Description
Mcast-vlan Multicast VLAN, VLAN to which the multicast routing
interface is attached
Start-group Starting multicast group address
End-group Ending multicast group address
Related commands
N/A
Function
To enable global IGMP filtering, use this command. To disable this function, use the no form
of this command.
Format
igmp filter
no igmp filter
Parameters
N/A
Default conditions
Disabled
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
When the administer wishes to impose restrictions on multicast users, he/she generally uses
IGMP filtering to enable or disable users to access specified multicast source.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable global IGMP filtering.
Raisecom#config
Raisecom(config)#igmp filter
Set successfully.
Related commands
show igmp filter
Function
To configure the maximum number of multicast groups allowed to be added to the interface
or interface+VLAN, use this command. To return to the default condition, use the no form of
this command.
Format
igmp filter max-groups group-number [ vlan vlan-list ]
no igmp filter max-groups [ vlan vlan-list ]
Parameters
Parameter Description
group-number Maximum number of groups, an integer, ranging from 1 to 1024
vlan vlan-list Specified VLAN, an integer, ranging from 1 to 4094
It supports specific values, such as "1,2,3"; it also supports a range,
such as "1-3".
Configure the maximum number of multicast groups allowed to be
added to "Interface+Specified VLAN" if the parameter is configured.
Configure the maximum number of multicast groups allowed to be
added to the interface if the parameter is not configured.
Default conditions
N/A
Command mode
Physical interface configuration/Aggregation group configuration
User level
11
Usage guidelines
Scenario
The administrator can limit users' access to multicast source by configuring the maximum
number of multicast groups allowed to be added to the interface or interface+VLAN combing
the rules on limiting the maximum number of IGMP multicast groups.
Rules on limiting the maximum number of IGMP multicast groups:
If you configure limit only on the interface, all VLANs on that interface will be limited
too.
If you configure limit on interface+VLAN, only the specified VLAN on the interface
will be limited.
If you configure limit on the interface and "the same interface+VLAN" concurrently:
If one of them reaches the maximum value, the corresponding action (drop | replace)
for reaching the maximum will be taken.
If the number of groups be added to on the interface and the interface+VLAN reaches
to the maximum value concurrently, use drop as a priority, namely, as long as "drop"
is taken for one of them, then no more multicast groups will be allowed by the
interface or interface+VLAN. If both of them adopt "replace", then the groups on
interface+VLAN will be replaced, namely, the multicast group with the shortest
living time on the same interface and same VLAN will be replaced.
Use the no igmp filter max-groups command to restore the limit on the maximum multicast
groups on the interface to the default condition. Use the no igmp filter max-groups vlan
command to restore the limit on the maximum multicast groups on the interface+VLAN to
the default condition.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure interface 1 in slot 1 to allow up to 10 multicast groups
to pass.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#igmp filter max-groups 10
Set successfully.
This example shows how to configure interface 1+VLAN in slot 1 to allow up to 10 multicast
groups to pass.
Raisecom(config-gigaethernet1/1/1)#igmp filter max-groups 10 vlan 10
Set successfully.
Related commands
show igmp filter
Function
To configure the action while the number of multicast groups on the interface or
interface+VLAN reaches to the maximum, use this command. To return to the default
condition, use the no form of this command.
Format
igmp filter max-groups action { drop | replace } [ vlan vlan-list ]
no igmp filter max-group [ vlan vlan-list ]
Parameters
Parameter Description
drop New multicast groups are not allowed to be added to the interface or
interface+VLAN.
replace The shortest Time-to-leave multicast group which overrides the new
multicast group.
vlan vlan-list Specified VLAN, an integer, ranging from 1 to 4094
It supports specific values, such as "1,2,3"; it also supports a range,
such as "1-3".
Configure the processing action when the number of multicast groups
reaches to the maximum on the "Interface+Specified VLAN" if the
parameter is configured.
Configure the processing action when the number of multicast groups
reaches to the maximum on the interface if the parameter is
configured.
Default conditions
The action is "drop" when the number of multicast groups on the interface and
interface+VLAN reaches to the maximum.
Command mode
Physical interface configuration/Aggregation group configuration
User level
11
Usage guidelines
Scenario
The administrator can limit users' access to multicast source by configuring the maximum
number of multicast groups allowed to be added to the interface or interface+VLAN combing
the rules on limiting the maximum number of IGMP multicast groups.
After the multicast feature is enabled, the interface will take responding measures for the new
multicast groups according to the actions if the number of multicast groups to be added to
interface+VLAN reaches to the maximum number.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the action to be drop when the number of multicast
groups on interface 1 in slot 1 reaches to the maximum.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#igmp filter max-groups action drop
Set successfully.
This example shows how to configure the action to be drop when the number of multicast
groups on interface 1+VLAN 10 in slot 1 reaches to the maximum.
Raisecom(config-gigaethernet1/1/1)#igmp filter max-groups action drop
vlan 10
Set successfully.
Related commands
show igmp filter
Function
To create IGMP filter profile, use this command. To delete the profile, use the no form of this
command.
Format
igmp filter profile profile-number
no igmp filter profile profile-number
Parameters
Parameter Description
profile-number Filter profile number, an integer, ranging from 1 to 100
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
While enabling the IGMP filtering feature, you need to create the filter profile and then
configure filter actions and objects in it, thus limiting users' access to the multicast source.
This command is only used for creating the filter profile while the filter action and object are
configured by the permit | deny and range commands.
After the filter profile is created, the filter action is "deny" and the range of the address is not
configured either. Namely, the initially created filter profile let all multicast addresses pass.
Prerequisite
N/A
Follow-up procedure
Use the range command to configure allowing or forbidding users to access multicast source.
Use the permit | deny command to configure the filter action.
Precaution
N/A
Examples
This example shows how to create filter profile 1.
Raisecom#config
Raisecom(config)#igmp filter profile 1
Raisecom(config-igmp-profile)#
Related commands
show igmp filter profile
Function
To apply the IGMP filter profile to the interface or interface+VLAN, use this command. To
delete the profile, use the no form of this command.
Format
igmp filter profile profile-number [ vlan vlan-list ]
no igmp filter profile [ vlan vlan-list ]
Parameters
Parameter Description
profile-number Filter profile number, an integer, ranging from 1 to 100
vlan vlan-list Specified VLAN
The vlan-list is an integer, ranging from 1 to 4094.
It supports specific values, such as "1,2,3"; it also supports a range,
such as "1-3".
Apply the IGMP filter profile to the interface+VLAN if the parameter
is configured.
Apply the IGMP filter profile to the interface if the parameter is
unconfigured.
Default conditions
The IGMP filter profile is not in use.
Command mode
Physical interface configuration/Aggregation group configuration
User level
11
Usage guidelines
Scenario
Applying the IGMP filter profile to the interface or interface+VLAN can help limiting user's
access to some multicast sources.
IGMP filtering rules:
If filtering rules are only configured on the interface, then all VLANs on the interface
will be limited.
If filtering rules are configured on the interface+VLAN, then only the specified VLAN
on the interface is limited.
If filtering rules are configured on the interface and interface+VLAN concurrently, the
deny action will be taken as a priority if the filtering rule on the interface conflicts with
that on the interface+VLAN, which means that as long as the action on either of them is
deny, no multicast groups are allowed.
For example, the action of profile 1 is "permit" and the address range 1 is 224.0.0.1. Apply it
to the interface+VLAN. For example, configure igmp filter profile 1 vlan 2 on Gigaethernet
1/1/1 and leave it as it is (all packets can pass it by default):
Packets with VLAN 2 address of 224.0.0.1 received on 1000 Mbit/s interface 1/1/1 will
pass while other packets (for example 224.0.0.2) will be dropped.
All packets with other VLANs (for example VLAN 3) received on 1000 Mbit/s interface
1/1/1 will pass.
Use the no igmp filter profile command to restore the multicast filtering limit to the default
condition. Use the no igmp filter profile vlan command to restore the multicast filtering limit
on interface+VLAN to the default condition.
Prerequisite
The IGMP filter profile is created through the igmp filter profile (global configuration)
command. Configurations will fail if there is no profile.
Follow-up procedure
N/A
Precaution
One interface can be just configured with one IGMP filter profile. If you configure more
IGMP filter rules on one interface, only the last one will take effect.
Examples
This example shows how to apply IGMP filter profile 1 to interface 1 in slot 1.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#igmp filter profile 1
Set successfully.
This example shows how to apply the IGMP filtering rule to interface 1+VLAN 10 in slot 1.
Raisecom(config-gigaethernet1/1/1)#igmp filter profile 1 vlan 10
Set successfully.
Related commands
show igmp filter profile
Function
To configure the action of IGMP filter profile (permit means users accept the data from the
filtered multicast address and deny means users refuse the data from the filtered multicast
address), use this command.
Format
permit
deny
Parameters
N/A
Default conditions
The action of the filter profile is deny.
Command mode
Profile configuration
User level
11
Usage guidelines
Scenario
IGMP filtering in nature means that the administrator controls the device to enable or disable
the multicast data of the multicast source, thus restricting user access. You can use this
command to configure the IGMP filtering actions, namely, to accept or refuse multicast data.
The process of configuring IGMP filtering is to create filter profile first, then configure the
range of filter address, and finally configure the filter actions.
Prerequisite
IGMP filtering is enabled through the ip igmp filter command.
The filter profile is created through the igmp filter profile.
The range of the multicast address which needs to be filtered by IGMP is configured through
the range command.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the action of IGMP rule profile1 to permit.
Raisecom#config
Raisecom(config)#igmp filter profile 1
Raisecom(config-igmp-profile)#permit
Set successfully.
Related commands
show igmp filter profile
8.4.7 range
Function
To configure the range of multicast addresses which needs to be filtered by IGMP, use this
command. To delete the range of addresses, use the no form of this command.
Format
range range-id start-ip-address [ end-ip-address ]
no range range-id
Parameters
Parameter Description
range-id Index number of the specified multicast address range, an integer,
ranging from 1 to 100
start-ip-address Start IP address of the multicast address range, in dotted decimal
notation, within the range of multicast address, ranging from
224.0.0.1 to 239.255.255.255
end-ip-address End IP address of the multicast address range, in dotted decimal
notation, within the range of multicast address, ranging from
224.0.0.1 to 239.255.255.255,
Filter one multicast address instead of a range of addresses if the
parameter is configured, namely, the start-ip-address.
Default conditions
The range of filtered address is all multicast addresses.
Command mode
Profile configuration
User level
11
Usage guidelines
Scenario
IGMP filtering in nature means that the administrator controls the device to enable or disable
the multicast data of the multicast source, thus restricting user access. You can use this
command to configure the IGMP filtering actions, namely, to accept or refuse multicast data.
The process of configuring IGMP filtering is to create filter profile first, then configure the
range of filter address, and finally configure the filter actions.
Prerequisite
The IGMP filtering is enabled through the ip igmp filter command.
The IGMP filtering profile is created through the ip igmp profile command.
Follow-up procedure
You can use the permit | deny command to configure filter actions.
Precaution
N/A
Examples
This example shows how to create the rule of address range index 1 to filter the data with the
multicast address ranging from 224.0.1.1 to 224.0.10.1 in rule1.
Raisecom#config
Raisecom(config)#igmp filter profile 1
Raisecom(config-igmp-profile)#range 1 224.0.1.1 224.0.10.1
Set successfully.
This example shows how to create the rule of address range index 2 to filter the data with the
multicast address being 224.0.1.1.
Raisecom(config)#igmp filter profile 2
Raisecom(config-igmp-profile)#range 2 224.0.1.1
Set successfully.
Related commands
show igmp filter profile
Function
To show configurations of IGMP filtering, use this command.
Format
show igmp filter [ interface | interface-type interface-number [ vlan vlan-id ] ]
Parameters
Parameter Description
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
Scenario
You can use the show igmp filter command to show global configurations of IGMP filtering,
including the enabled status of multicast filtering, the maximum number of filter profiles, and
the number of currently created profiles.
You can use the show igmp filter interface | interface-type interface-number command to
show the IGMP filtering configurations on the interface, including the filter rules applied to
the interface, the maximum number of multicasts, and the number of current multicast groups
and the action taken when the number of multicast groups reaches to the maximum.
You can use the show igmp filter interface-type interface-number vlan vlan-id command to
show IGMP filtering configurations on interface+VLAN, including the filter rules applied to
the interface, the maximum number of multicasts, and the number of current multicast groups
and the action taken when the number of multicast groups reaches to the maximum.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to show configurations of global IGMP filtering.
Raisecom#show igmp filter
igmp filter: disable
max profiles: 100
current profiles: 4
Field Description
igmp filter Global IGMP filtering status
enable: enabled
disable: disabled
max profiles Maximum filter profile number
current profiles The current filter profile number
This example shows how to show configurations of IGMP filtering on all interfaces.
Raisecom#show igmp filter interface
gigaethernet 1/1/1 0 0 0 drop
gigaethernet 1/1/2 0 0 0 drop
gigaethernet 1/2/1 0 0 0 drop
fastethernet 1/8/2 0 0 0 drop
fastethernet 1/8/3 0 0 0 drop
fastethernet 1/8/4 0 0 0 drop
port-channel 1 0 0 0 drop
port-channel 2 0 0 0 drop
port-channel 3 0 0 0 drop
port-channel 31 0 0 0 drop
port-channel 32 0 0 0 drop
Field Description
interface Interface ID
Filter Filter profile number
Max Groups Maximum number of multicast groups allowed
Field Description
Current Groups Number of the multicast added currently
Action Action taken when the number of multicast groups reaches to
the maximum
drop: forbid new multicast groups to be added to the interface
or interface+VLAN
replace: replace the old multicast group with the shortest living
time with the new multicast group
Field Description
igmp profile Filter profile number
max group Maximum number of multicast groups allowed
current group Number of the multicast added currently
action Action taken when the number of multicast groups reaches to
the maximum
drop: forbid new multicast groups to be added to the interface
or interface+VLAN
replace: replace the old multicast group with the shortest living
time with the new multicast group
This example shows how to show IGMP filtering configurations on interface 1+VLAN 3 in
slot 1.
Raisecom#show igmp filter gigaethernet 1/1/1 vlan 3
Port VLAN Filter Max Groups Current Groups Action
---------------------------------------------------------------------
gigaethernet 1/1/1 3 0 0 0 drop
Field Description
Port Interface ID
VLAN VLAN ID
Filter Range of multicast address needs filtering
Max Groups Maximum number of multicast groups allowed
Current Groups Number of the multicast added currently
Field Description
Action Action taken when the number of multicast groups reaches to
the maximum
drop: forbid new multicast groups to be added to the interface
or interface+VLAN
replace: replace the old multicast group with the shortest living
time with the new multicast group
Related commands
N/A
Function
To show configurations of the IGMP filter profile, use this command.
Format
show igmp filter profile [ profile-number ]
Parameters
Parameter Description
profile-number Show configurations of the specified filter profile.
An integer, ranging from 1 to 100
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show configurations of the IGMP filter profile.
Raisecom#show igmp filter profile
----------------------------------------------------
IGMP profile: 10
action: deny
------------------------------------------
IGMP profile: 11
action: permit
------------------------------------------
IGMP profile: 22
action: permit
range 2: 224.0.0.1
range 3: 224.0.0.10
------------------------------------------
IGMP profile: 100
action: permit
range 2: 224.0.0.1 - 224.0.0.3
------------------------------------------
Field Description
IGMP profile Filter profile number
action Action of IGMP filter profile
permit: allow users to receive data from the filtered multicast
address
deny: forbid users to receive data from the filtered multicast
address
range Range of multicast address needs filtering
This example shows how to show configurations of IGMP filter profile 100.
Raisecom#show igmp filter profile 100
----------------------------------------------------
IGMP profile: 100
action: permit
range 2: 224.0.0.1 - 224.0.0.3
------------------------------------------
Field Description
IGMP profile Filter profile number
action Action of IGMP filter profile
permit: allow users to receive data from the filtered multicast
address
deny: forbid users to receive data from the filtered multicast
address
range Range of multicast address needs filtering
Related commands
N/A
9 OAM
9.1 EFM
9.1.1 clear oam config
Function
To clear OAM configurations, use this command.
Format
clear oam config
Parameters
N/A
Default conditions
N/A
Command mode
Global configuration
User level
5
Usage guidelines
Scenario
When proceeding to a new round of configurations, you can use this command to clear
configurations of OAM links.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to clear OAM configurations.
Raisecom#config
Raisecom(config)#clear oam config
Set successfully.
Related commands
show oam
Function
To clear OAM events, use this command.
Format
clear oam event
Parameters
N/A
Default conditions
N/A
Command mode
Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
When proceeding to a new round of configurations, you can use this command to clear
information about the events on OAM links.
Prerequisite
The interface is configured to Layer 2 physical interface mode through the portswich
command.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to clear events on OAM links.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#clear oam event
Set successfully.
Related commands
show oam event
Function
To clear OAM statistics, use this command.
Format
clear oam statistics
Parameters
N/A
Default conditions
N/A
Command mode
Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
When proceeding to a new round of configurations, you can use this command to clear
statistics of OAM links
Prerequisite
The interface is configured to Layer 2 physical interface mode through the portswich
command.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to clear OAM statistics.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#clear oam statistics
Set successfully.
Related commands
show oam statistics
Function
To configure the working modes of EFM OAM, use this command.
Format
oam { active | passive }
Parameters
Parameter Description
active Active mode
An interface sends OAM Protocol Data Unit (PDU) initiating peer
discovery or remote loopback.
passive Passive mode
An interface waits for receiving the peer OAM PDU.
Default conditions
Passive mode
Command mode
Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
EFM OAM has two work modes: active mode and passive mode.
When you use this command to configure the OAM working modes, all links enabled
with OAM feature will be reset and wait for 5 seconds to enter OAM discovery process.
While using EFM OAM, at least one interface at the ends of the link should be in active
mode, otherwise, the OAM link cannot enter running state, thus unable to implement
link management and monitoring.
When working in the active mode, the OAM link will initiate the discovery process.
When working in the passive mode, the OAM link will wait for the discovery process
initiated by its peer. It does not support initiating a remote loopback command and
variable obtaining request.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure OAM working mode to active.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#oam active
Set successfully.
Related commands
show oam
Function
To configure the monitoring window and threshold of OAM link events, use this command.
To return to the default condition, use the no form of this command.
Format
oam { errored-frame window framewindow threshold framethreshold | errored-frame-
period window frameperiodwindow threshold frameperiodthreshold | errored-frame-
seconds window framesecswindow threshold framesecsthreshold | errored-symbol-period
window symperiodwindow threshold symperiodthreshold }
no oam { errored-frame | errored-frame-period | errored-frame-seconds | errored-
symbol-period }
Parameters
Parameter Description
errored-frame Errored frame event
It will produce error event when number of error frames exceeds
the threshold in monitoring window.
framewindow Errored frame event window, an integer, ranging from 1 to 60, in
units of second
framethreshold Errored frame threshold, an integer, ranging from 1 to 65535
errored-frame- Errored frame period event, generates when the number of error
period frames exceeds the threshold in a period
frameperiodwindow Errored frame period event window, an integer, ranging from 1 to
600, in units of 100ms
frameperiodthreshold Errored frame period event threshold, an integer, ranging from 1
to 65535
errored-frame- Errored frame second event, generates when the number of error
seconds frames in M seconds exceeds the threshold.
framesecswindow Errored frame second event window, an integer, ranging from 10
to 900, in units of second
framesecsthreshold Errored frame second event threshold, an integer, ranging from 1
to 65535
errored-symbol- Errored symbol period event, generates when the number of error
period symbols received in a period (monitor window) exceeds the
threshold.
symperiodwindow Errored symbol period event window, an integer, ranging from 1
to 60, in units of second
symperiodthreshold Errored symbol period event threshold, ranging from 1 to 65535,
an integer
Default conditions
The monitoring windows of errored-frame, errored-frame-period, errored-frame-seconds,
errored-symbol-period of event are configured to 1 second, 1000 milliseconds, 60 seconds,
and 1 second respectively. The threshold is set to 1.
Command mode
Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
EFM OAM has the link monitoring function, which can detect errors in the link and generate
OAM link events. OAM link events include errored frame events, errored frame period events,
errored frame second events, and errored symbol period events.
Errored frame event: the number of error frames exceeds the threshold in a time unit.
Errored frame period event: the number of error frames exceeds the threshold in a period
(specified N frames).
Errored frame second event: the number of error frames in a certain period exceeds the
threshold. 1s is regarded as a time period, if one error frame or more error frames are
generated in 1s, then this 1s time period will be called one error frame second.
Errored symbol period event: the number of error symbols received in a period (monitor
window) exceeds the threshold.
You can use this command to configure the monitor window and threshold for the link events
to the specified value or the default value. When the no command is executed, the OAM will
clear the current statistics on the link and then gather statistics according to the newly
configured window and threshold.
Prerequisite
OAM link event notification is enabled through the oam notify enable command.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure error frame event window to 20s and the threshold
to 100.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#oam errored-frame window 20 threshold
100
Set successfully.
This example shows how to configure the error period event window to 20s and the
threshold to 100.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Related commands
show oam notify
Function
To enable EFM OAM on the link, use this command. To disable this function, use the disable
form of this command.
Format
oam { enable | disable }
Parameters
Parameter Description
enable Enable EFM OAM on the link.
disable Disable EFM OAM on the link.
Default conditions
Disabled
Command mode
Physical layer interface configuration mode
User level
0
Usage guidelines
Scenario
Ethernet in the First Mile (EFM) is a point-to-point link-level Ethernet OAM technology, generally applied to two
directly-connected devices.
EFM OAM features peer discovery, link monitoring, fault reporting, and remote loopback.
You can use this command to enable or disable link OAM.
Prerequisite
The interface is configured to Layer 2 physical interface mode through the portswich
command.
Follow-up procedure
N/A
Precaution
If some OAM configurations have been made before the link is enabled, then those
configurations will take effect immediately upon enabling the link with the OAM.
After enabling OAM, the interface at the end of the link can immediately enter OAM
discovery process if it is Up.
While using EFM OAM, at least one interface at the ends of the link should be in active
mode, otherwise, the OAM link cannot enter running state, thus unable to implement
link management and monitoring.
Examples
This example shows how to enable EFM OAM.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#oam enable
Set successfully.
Related commands
show oam
Function
To enable OAM link event Trap, use this command. To disable this function, use the disable
form of this command.
Format
oam event trap { enable | disable }
Parameters
Parameter Description
enable Enable OAM event Trap.
disable Disable OAM event Trap.
Default conditions
Disabled
Command mode
Physical interface configuration
User level
11
Usage guidelines
Scenario
EFM OAM has the link monitoring function, which can detect errors in the link and generate
OAM link events. OAM link events include errored frame events, errored frame period events,
errored frame second events, and errored symbol period events. After being enabled with
OAM event Trap, the device will inform the NMS through SNMP Trap when it detects link
events.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable local OAM link event Trap.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#oam event trap enable
Set successfully.
Related commands
show oam trap
Function
To configure whether the physical interface makes a response after receiving the remote
loopback command, use this command.
Format
oam loopback { ignore | process }
Parameters
Parameter Description
ignore The interface does not make a response after receiving the remote
loopback command.
process The interface makes a response after receiving the remote loopback
command.
Default conditions
The interface does not make a response after receiving the remote loopback command.
Command mode
Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
EFM OAM provides a link-layer remote loopback mechanism, which is used to detect and
locate link faults. At two ends of a link, the interface in active mode initiates a remote
loopback command, and you can execute this command to configure whether the peer
responds or does not respond to the remote loopback command.
You can use this command to enable or disable the OAM to respond to the OAM remote
loopback.
Responding to the remote loopback: when the interface receives the responding to
remote loopback command, the OAM will configure the link to enter loopback state.
Not responding to the remote loopback: when the interface does not receive the
responding to remote loopback command, the OAM will do nothing, and the
corresponding link will still be in normal forwarding state.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
When the link is in loopback status, it should respond to the remote loopback command.
Examples
This example shows how to configure the link to respond to the remote loopback command.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#oam loopback process
Set successfully.
Related commands
show oam loopback
Function
To configure the remote loopback timeout period on the physical interface, use this command.
Format
oam loopback timeout time
Parameters
Parameter Description
timeout time Timeout, an integer, ranging from 1 to 10, in units of second
Default conditions
The timeout is 3s.
Command mode
Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
OAM provides link-layer remote loopback mechanism, which can be used for locating link
faults, performance, and quality test. When the device is in link loopback state, it will send all
packets (except the OAM packets) received back to its peer device.
After the remote loopback is enabled, the device will re-initiate remote loopback request if it
did not receive the response from its peer within the configured timeout period.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the loopback timeout period to 5s.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#oam loopback timeout 5
Set successfully.
Related commands
show oam loopback
Function
To configure the times of retry of remote loopback timeout on the physical interface, use this
command.
Format
oam loopback retry times
Parameters
Parameter Description
retry times Times of retry, an integer, ranging from 1 to 10
Default conditions
It is 2 times,
Command mode
Physical interface configuration
User level
11
Usage guidelines
Scenario
OAM provides link-layer remote loopback mechanism, which can be used for locating link
faults, performance, and quality test. When the device is in link loopback state, it will send all
packets (except the OAM packets) received back to its peer device.
After the remote loopback is enabled, the device will re-initiate remote loopback request if it
did not receive the response from its peer within the configured timeout period.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the times of retry of loopback timeout to 3.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#oam loopback retry 3
Set successfully.
Related commands
show oam loopback
Function
To enable the interface to notify the peer interface when detecting faults or OAM link events,
use this command. To disable this function, use the disable form of this command.
Format
oam notify { critical-event | dying-gasp | errored-frame | errored-frame-period | errored-
frame-seconds | errored-symbol-period } { enable | disable }
Parameters
Parameter Description
critical-event When detecting critical faults such as abnormal temperature
and voltage, the interface notifies the peer.
dying-gasp When detecting power failure, the interface notifies the
peer.
errored-frame When detecting errored frame events, the interface notifies
the peer.
errored-frame-period When detecting errored frame period events, the interface
notifies the peer.
errored-frame-seconds When detecting errored frame second events, the interface
notifies the peer.
errored-symbol-period When detecting errored symbol period events, the interface
notifies the peer.
enable Enable notification of faults and OAM link events.
disable Disable notification of faults and OAM link events.
Default conditions
Enabled
Command mode
Physical interface configuration
User level
11
Usage guidelines
Scenario
When the interface receives the fault information and OAM link events, you can use this
command to enable or disable informing the information to the peer interface.
If the link allows errored symbol period summary, errored frame period, errored frame,
and errored frame second event Trap, OAM will record the corresponding events to the
device when it detects the corresponding events and the link OAM is enabled, and
meanwhile the OAM passive end will inform the peer OAM active end of the events
through OAM packets. Otherwise, the OAM just records the events to the local device.
If the link allows power failure indication and critical event notification, OAM will
record the corresponding events to the device when it detects the corresponding events
and the link OAM is enabled, and meanwhile the OAM passive end will inform the peer
OAM active end of the events through the flag bit of OAM packets. Otherwise, the
OAM just records the events to the local device.
Prerequisite
N/A
Follow-up procedure
Use the oam { errored-frame | errored-frame-period | errored-frame-seconds | errored-
symbol-period } command to configure the monitor window and threshold of OAM link
events.
Precaution
N/A
Examples
This example shows how to disable Trap of link error frame events.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#oam notify errored-frame disable
Set successfully.
Related commands
show oam notify
Function
To enable Trap of peer OAM link events, use this command. To disable this function, use the
disable form of this command.
Format
oam peer event trap { enable | disable }
Parameters
Parameter Description
enable Enable Trap of peer OAM link events.
disable Disable Trap of peer OAM link events.
Default conditions
Disabled
Command mode
Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
EFM OAM can monitor the link, discover link faults, and generate OAM link events. OAM
link events include error frame event, error frame period event, error second event, and error
symbol period event. When the Trap of peer OAM link event is enabled, the device will report
it to the NMS through SNMP Trap while it receives the Trap.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable Trap of peer OAM link events.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#oam peer event trap enable
Set successfully.
Related commands
show oam trap
Function
To enable the physical interface to initiate the remote loopback, use this command. To disable
this function, use the no form of this command.
Format
oam remote-loopback
no oam remote-loopback
Parameters
N/A
Default conditions
N/A
Command mode
Physical layer interface configuration mode
User level
11
Usage guidelines
Scenario
With the link-layer remote loopback mechanism, OAM can detect and locate link faults.
At two ends of a link, the device in active mode initiates EFM remote loopback and the
device in passive mode responds to EFM remote loopback. While in link loopback status, the
device forwards all packets except OAM packets to the peer device to form a loopback.
You can use this command to enable or disable the device in active mode to initiate the
remote loopback.
Prerequisite
EFM OAM is enabled through the oam enable command.
You must use the oam active command to configure active mode on an interface.
Otherwise, configuration is unsuccessful.
OAM link is connected and the oam loopback command can be used on the OAM peer
device to enable the feature of responding to the remote loopback.
Follow-up procedure
N/A
Precaution
Configurations will succeed only when the interface is in EFM OAM active mode.
Remote loopback can be implemented only when the OAM connection is created.
Other packets will be sent back except the OAM packets.
The device only processes OAM packets on the loopback interface, other packets will be
sent back.
The loopback interface is forbidden to forward packets to other interfaces and vice versa.
Examples
This example shows how to enable OAM remote loopback on the link.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#oam remote-loopback
Set successfully.
Related commands
show oam loopback
Function
To configure the sending period and timeout of OAM PDU, use this command. To return to
the default condition, use the no form of this command.
Format
oam send-period period-number timeout time
no oam send-period timeout
Parameters
Parameter Description
send-period period- Period of sending OAM PDU, an integer, ranging from 1 to
number 100, in units of 100ms
timeout time Timeout, an integer, ranging from 1 to 50, in units of
second
Default conditions
The sending period of OAM PDUs 1s (namely, the period-number is 10 100ms =1s) and the
link timeout is 5s.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
After both interfaces of a link establish connection through peer discovery, they need to
periodically send OAM PDUs to each other to maintain the link. This period is the sending
period of OAM PDU. If the interface at one end does not receive the OAM PDU sent by its
peer within the timeout, it will deem that the link is disconnected.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the sending period of OAM PDU to 2s (20 100ms)
and the timeout to 10s.
Raisecom#config
Raisecom(config)#oam send-period 20 timeout 10
Set successfully
Related commands
show oam
Function
To show basic configurations of OAM, use this command.
Format
show oam [ interface-type interface-number ]
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show basic information about link OAM on the interface.
Raisecom#show oam gigaethernet 1/1/1
Port: gigaethernet1/1/1
Mode: Passive
Administrate state: Disable
Operation state: Disable
Max OAMPDU size: 1518
Send period: 1000 ms
Link timeout : 5 s
Config revision: 2
Supported functions: Loopback, Event, Variable
Field Description
port Interface
Mode OAM working modes
Administrate state Administrative state
Related commands
oam { active | passive }
oam send-period timeout
Function
To show OAM link events, use this command.
Format
show oam event [ interface-type interface-number ] [ critical ]
Parameters
Parameter Description
interface-type Interface type
Parameter Description
interface-number Interface ID
The form and value range depend on the interface type.
critical Critical events
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show records of critical OAM link events on the interface.
Raisecom#show oam event gigaethernet 1/1/1 critical
Port: gigaethernet1/1/1
TimeStamp: 0 days, 0 hours, 9 minutes
Type:linkFault
RunningTotal: 2
EventTotal: 2
Field Description
port Interface
TimeStamp Timestamp
Type Type
RunningTotal Total number of errors
EventTotal Total number of events
Related commands
oam { errored-frame | errored-frame-period | errored-frame-seconds | errored-symbol-
period }
Function
To show configurations of OAM remote loopback, use this command.
Format
show oam loopback [ interface-type interface-number ]
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show configurations of OAM remote loopback on the interface.
Raisecom#show oam loopback gigaethernet 1/1/1
Port: gigaethernet1/1/1
Loopback status: No
Loopback react: Process
OAM loopback timeout: 3s
OAM loopback retry times : 2
Field Description
port Interface
Loopback status Loopback status
Field Description
Loopback react Loopback responses
OAM loopback timeout Remote loopback timeout
OAM loopback retry times Times of retry of remote loopback timeout
Related commands
oam loopback
oam remote-loopback
oam loopback timeout
oam loopback retry
Function
To show configurations of OAM events notification, use this command.
Format
show oam notify [ interface-type interface-number ]
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show configurations of OAM events notification on the interface.
Raisecom#show oam notify gigaethernet 1/1/1
Port: gigaethernet1/1/1
Field Description
port Interface
Errored Symbol period Statistics of errored Symbol period
Errored symbol period window Errored symbol period window
Errored symbol period threshold Errored symbol period threshold
Errored frame period Errored frame period
Errored frame period window Errored frame period window
Errored frame period threshold Errored frame period threshold
Errored frame Errored frame
Errored frame window Errored frame window
Errored frame threshold Errored frame threshold
Errored frame seconds summary Statistics of errored frame seconds
Errored frame seconds summary window Errored frame seconds summary window
Errored frame seconds summary threshold Errored frame seconds summary threshold
Dying gasp Power failure
Critical event Critical event
Related commands
oam notify
oam { errored-frame | errored-frame-period | errored-frame-seconds | errored-symbol-
period }
Function
To show information about OAM peer, use this command.
Format
show oam peer [ interface-type interface-number ]
Parameters
Parameter Description
peer Peer
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show information about OAM peer on the interface.
Raisecom#show oam peer gigaethernet 1/1/1
Port: gigaethernet1/1/1
Field Description
Port gigaethernet1/1/1
Related commands
N/A
Function
To show information about OAM peer events, use this command.
Format
show oam peer event [ interface-type interface-number ] [ critical ]
Parameters
Parameter Description
peer Peer
event Event
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
critical Critical event
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show information about OAM peer events on the interface.
Field Description
Port Interface
Related commands
N/A
Function
To show statistics of the peer OAM link, use this command.
Format
show oam peer link-statistic [ interface-type interface-number ]
Parameters
Parameter Description
peer Peer
link-statistic Link statistics
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show statistics of the peer OAM link.
Raisecom#show oam peer link-statistic gigaethernet 1/1/1
Port: gigaethernet1/1/1
Oam is Passive
Field Description
Port Interface
Oam is OAM state
Related commands
N/A
Function
To show information about the peer OAM entity, use this command.
Format
show oam peer oam-info [ interface-type interface-number ]
Parameters
Parameter Description
peer peer
oam-info OAM information
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show information about peer OAM on the interface.
Raisecom#show oam peer oam-info gigaethernet 1/1/1
port: gigaethernet 1/1/1
Oam is Passive
Field Description
Port Interface
Oam is OAM state
Related commands
N/A
Function
To show OAM statistics, use this command.
Format
show oam statistics [ interface-type interface-number ]
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show OAM statistics on the interface.
Raisecom#show oam statistics gigaethernet 1/1/1
Port: gigaethernet1/1/1
Tx Rx
---------------------------------------------------
Information : 0 0
Event notification : 0 0
Loopback control : 0 0
Variable request : 0 0
Variable response : 0 0
Organization specific : 0 0
Unsupported codes : 0 0
Duplicate event notification : 0 0
Field Description
port Interface
Tx Number of Tx frames
Rx Number of Rx frames
Information Detailed information
Event notification Event notification
Loopback control Loopback control
Variable request Variable request
Variable response Variable response
Organization specific Organization specific information
Unsupported codes Unsupported codes
Duplicate event notification Duplicate event notification
Related commands
clear oam statistics
Function
This example shows how to show information about OAM Trap.
Format
show oam trap [ interface-type interface-number ]
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show link OAM Trap information on interface GE 1.
Raisecom#show oam trap gigaethernet 1/1/1
Port: gigaethernet1/1/1
Event trap: Enable
Peer event trap: Enable
Discovery trap total: 0
Discovery trap timestamp: 0 days, 0 hours, 0 minutes
Lost trap total: 0
Lost trap timestamp: 0 days, 0 hours, 0 minutes
Field Description
Port Interface ID
Field Description
Event trap Event trap
Peer event trap Peer event trap
Discovery trap total Times of trap discovery
Discovery trap timestamp Timestamp of trap recovery
Lost trap total Times of trap loss
Lost trap timestamp Timestamp of trap loss
Related commands
oam event trap enable
oam peer event trap enable
10 Reliability
Function
To add a physical interface to the link aggregation group, use this command. To disable this
function, use the no form of this command.
Format
port-channel channel-number
no port-channel
Parameters
Parameter Description
channel-number Interface aggregation group ID, an integer, ranging from 1 to 32
Default conditions
The physical interface does not join any link aggregation group.
Command mode
Physical interface configuration
User level
15
Usage guidelines
Scenario
You can use this command to add Layer 2 physical interfaces to the specified link aggregation
group. Each physical interface can only join one aggregation group.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Remove an interface from the former link aggregation group before add it to the new
group.
When the user number of the link aggregation interface reaches its maximum, no more
interfaces can be added to the group.
When a link aggregation group is deleted, the interfaces will be automatically removed
from the group.
Examples
This example shows how to add 1000 Mbit/s interface 1/1/1 to interface aggregation group 2.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#port-channel 2
Set successfully.
Related commands
show port-channel
Function
To clear statistics of LACP, use this command.
Format
clear lacp statistics [ interface-type interface-number ]
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to clear statistics of LACP packets. If the interface list is not
specified, this command will clear statistics of LACP packets on all interfaces.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
This command will clear all statistics of LACP packets. Use it with caution.
Examples
This example shows how to clear statistics of LACP on all interfaces.
Raisecom#config
Related commands
show lacp
Function
To enter Aggregation group configuration, use this command.
Format
interface port-channel channel-number
Parameters
Parameter Description
port-channel channel-number Aggregation group interface ID, an integer, ranging
from 1 to 32
Default conditions
N/A
Command mode
Global configuration
User level
1
Usage guidelines
N/A
Examples
This example shows how to enter the configuration mode of aggregation group 1.
Raisecom#config
Raisecom(config)#interface port-channel 1
Raisecom(config-aggregator)#
Related commands
N/A
Function
To configure the LACP mode on the interface while using static LACP link aggregation, use
this command.
Format
lacp mode { active | passive }
Parameters
Parameter Description
active The interface periodically sends LACP packets to the peer for
negotiation.
passive The interface does not send any LACP packets, but receives and
responds to the LACP packets sent by the peer.
Default conditions
LACP mode on the interface is active.
Command mode
Physical layer interface configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the LACP mode on the interface. Interconnected
interfaces send and respond to LACP packets to ensure that the negotiation is under the same
standard, including the interface rate, duplex mode, and the VLAN attached.
When the LACP mode on the interface is active, the interface will send LACPDU
packets periodically.
When the LACP mode on the interface is passive, the interface will not send any LACP
packet, but receive and respond to the LACP packets sent by the peer.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the LACP mode to passive on 1000 Mbit/s interface
1/1/1.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#lacp mode passive
Set successfully.
Related commands
show lacp
Function
To configure the LACP priority of the interface while using static LACP, use this command.
To return to the default condition, use the no form of this command.
Format
lacp port-priority port-priority
no lacp port-priority
Parameters
Parameter Description
port-priority LACP priority of the interface, an integer, ranging from 0 to 65534
Smaller value means higher priority. Interface of higher priority are
more likely to become an active interface.
Default conditions
LACP priority on the interface is 32768.
Command mode
Physical layer interface configuration
User level
11
Usage guidelines
Scenario
Interfaces within a link aggregation group include active interfaces and inactive interfaces.
Active interface is used for transmitting data. Inactive interface is used for backing up links
and cannot transmit data. If one active interface is shut down, the inactive interface with
higher priority will turn into active interface to transmit data instead.
In the static LACP link aggregation mode, whether the interface is active or not depends on its
LACP priority. Interface of higher the priority is more likely to become an active interface.
You can use this command to configure the LACP priority of the interface.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the LACP priority on 1000 Mbit/s interface 1/1/1 to 1.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#lacp port-priority 1
Set successfully.
Related commands
show lacp
Function
To enable LACP priority preempt, use this command. To disable the function, use the disable
form of this command.
Format
lacp priority preempt { enable | disable }
Parameters
Parameter Description
enable Enable priority preempt.
disable Disable priority preempt.
Default conditions
Priority preempt is not enabled
Command mode
Link Aggregation group configuration
User level
11
Usage guidelines
Scenario
With LACP priority preempt enabled and the maximum active Interface ID of the group being
1, interface of higher priority will switch from Standby mode to Active mode when it recovers
from the failure. Interface of lower priority will switch from Active mode to Standby mode.
For example, the maximum active Interface ID of the link aggregation group 1 is 1. The group
has 2 member interfaces of Port 1 and Port 2. The priority of Port 1 is higher than Port 2. Port
1 is in Standby mode due to failure and Port 2 is in Active mode. With LACP priority preempt
enabled, Port 1 will switch to Active mode when it is recovered from failure and Port 2 will
switch back to Standby mode; if LACP priority preempt is disabled, the status of Port 1 and
Port 2 will remain unchanged.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable LACP priority preempt for link aggregation group 1.
Raisecom#config
Raisecom(config)#interface port-channel 1
Raisecom(config-aggregator)#lacp priority preempt enable
Set successfully.
Related commands
show lacp
Function
To configure the LACP priority of the device while using static LACP, use this command. To
return to the default condition, use the no form of this command.
Format
lacp system-priority system-priority
no lacp system-priority
Parameters
Parameter Description
system-priority LACP priority, an integer, ranging from 0 to 65535
Smaller value means higher priority. Interface of higher priority are
more likely to become an active interface.
Default conditions
LACP priority on the interface is 32768.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
In static LACP mode, peer devices should use the same active interface to establish the link
aggregation group. You can specify the active end and inactive end to ensure the consistency
of the active interface. After the active interface on the active side is determined, choose the
same active interface for the inactive side.
LACP priority of the device is used to identify the priority of the two devices over the link.
Device of higher priority will be set as the active end.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the LACP priority of the device to 1.
Raisecom#config
Raisecom(config)#lacp system-priority 1
Set successfully.
Related commands
show lacp
Function
To configure the LACP timeout mode, use this command.
Format
lacp timeout { fast | slow }
Parameters
Parameter Description
fast Fast mode
The interval of sending packets is 1s and the period of timeout is 3s.
slow Slow mode
The interval of sending packets is 30s and the period of timeout is 90s.
Default conditions
The LACP timeout mode is slow.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can select the mode based on actual demand. Generally, fast mode requires good LACP
link status.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the LACP timeout to fast mode.
Raisecom#config
Raisecom(config)#lacp timeout fast
Set successfully.
Related commands
show lacp
Function
To configure the traffic load sharing mod, use this command. To return to the default
condition, use the no form of this command.
Format
load-sharing mode { dst-ip | dst-mac | src-dst-ip | src-dst-mac | src-ip | src-mac }
no load-sharing
Parameters
Parameter Description
dst-ip Select the forwarding interface based on the destination IP address,
ensuring packets with the same destination IP address being
forwarded through the same interface.
dst-mac Select the forwarding interface based on the destination MAC
address, ensuring packets with the same destination MAC address
being forwarded through the same interface.
src-dst-ip Select the forwarding port based on the result of logical XOR of
source and destination IP addresses, ensuring packets with the same
result being forwarded through the same interface.
src-dst-mac Select the forwarding port based on the result of logical XOR of
source and destination MAC addresses ensuring packets with the
same result being forwarded through the same interface.
src-ip Select the forwarding interface based on the source IP address,
ensuring packets with the same source IP address being forwarded
through the same interface.
src-mac Select the forwarding interface based on the source MAC address,
ensuring packets with the same source MAC address being forwarded
through the same interface.
Default conditions
The load sharing mode is src-dst-mac.
Command mode
Aggregation group configuration
User level
11
Usage guidelines
Scenario
Link aggregation uses a load-sharing mode to select a forwarding interface, ensuring packets
with the same attributes (such as IP addresses of the same source and MAC addresses of the
same source) being forwarded through the same interface, therefore prevent packets disorder
in the receiving end. Based on certain algorithm, link aggregation can balance the traffic in
different links, provide redundancy protection, and expand the bandwidth of the single link.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the load sharing mode to src-ip.
Raisecom#config
Raisecom(config)#interface port-channel 1
Raisecom(config-aggregator)#load-sharing mode src-ip
Set successfully.
Related commands
show port-channel
10.1.10 master-port
Function
To configure the interface as master-port while using the Active-Standby mode, use this
command.
Format
master-port interface-type interface-number
no master-port
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Aggregation group configuration
User level
11
Usage guidelines
Scenario
The Active-Standby mode means that an aggregation group contains two member interfaces,
including a master interface and a backup interface, with one in Active mode and the other in
Shutdown mode.
In Active-Standby mode, use this command to configure the master interface. Generally the
master interface is in Active mode.
Prerequisite
Use the mode { lacp-static | manual } backup command to configure the aggregation group
to Active-Standby mode by.
Follow-up procedure
N/A
Precaution
Use the port-channel command to add the master interface to the aggregation group, or the
Active-Standby mode will not take effect.
Examples
This example shows how to configure 1000 Mbit/s interface 1/1/1 as the master interface of
aggregation group 1.
Raisecom#config
Raisecom(config)#interface port-channel 1
Raisecom(config-aggregator)#master-port gigaethernet 1
Set successfully.
Related commands
show port-channel
Function
To configure the maximum or minimum number of active links in the link aggregation group,
use this command. To return to the default condition, use the no form of this command.
Format
{ max-active | min-active } links number
no { max-active | min-active } links
Parameters
Parameter Description
max-active Maximum number of active interfaces
min-active Minimum number of active interfaces
number Threshold of the active interface, an integer, ranging from 1 to 8
Default conditions
The minimum number of active links in the link aggregation is 1. The maximum number of
active links in the link aggregation is 8.
Command mode
Aggregation group configuration
User level
11
Usage guidelines
Scenario
By configure a maximum number of active interfaces in a link aggregation group, you can
ensure the reliability of data transmission. By configuring a minimum number, you can
prevent traffic congestion caused by inadequate active interfaces.
Maximum number of active interfaces: When the number of active interface reaches its
maximum, no more active interfaces can be added to the aggregation group.
Minimum number of active interfaces: When the number of active interface reaches its
minimum, the aggregation interface will switch to down mode and all the member
interfaces will stop data forwarding.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The maximum number of the active interface in an aggregation group should be greater or
equal to the minimum number.
Examples
This example shows how to configure the maximum number of active interface in
aggregation group 1 to 3 and the minimum number to 2.
Raisecom#config
Raisecom(config)#interface port-channel 1
Raisecom(config-aggregator)#max-active links 3
Set successfully.
Raisecom(config-aggregator)#min-active links 2
Set successfully.
Related commands
show port-channe
10.1.12 mode
Function
To configure the working mode of the link aggregation group, use this command.
Format
mode { lacp | manual } [ backup ]
Parameters
Parameter Description
lacp Static LACP aggregation mode
manual Manual aggregation mode
backup Active-Standby link aggregation mode
Default conditions
By default, the link aggregation group works in manual aggregation mode.
Command mode
Aggregation group configuration
User level
11
Usage guidelines
Scenario
Link aggregation works in 3 modes: manual mode, static LACP mode and Active-Standby
mode. In Active-Standby mode, an aggregation group contains two member interfaces with
one in Active mode and the other in Shutdown mode for backup. Based on different link
aggregation methods, Active-Standby mode can be further divided into manual Active-
Standby mode and static LACP Active-Standby mode.
The ISCOM2600 series support manual mode, static LACP mode, manual Active-Standby
mode, and static Active-Standby mode. You should configure the aggregation mode for the
device manually. Each aggregation group should contain at least 1 interface. Descriptions of
each mode are as follows:
Manual aggregation mode: all interfaces forwards data and share loads. This mode is
applicable to 2 connected devices, where 1 device does not support LACP.
Static LACP aggregation mode: the active end and interface are chosen based on LACP.
The active interface is used to forward data while the inactive interface is used to back
up links. This mode is applicable to 2 connected devices, where both devices support
LACP.
Manual Active-Standby link aggregation mode: the aggregation group contains two
interfaces with one in Active mode and the other in Shutdown mode for backup. This
mode is applicable to 2 connected devices, where 1 device does not support LACP.
Static LACP Active-Standby link aggregation mode: The aggregation group contains two
interfaces with one in Active mode and the other in Shutdown mode for backup. This
mode is applicable to 2 connected devices, where both devices support LACP.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the link aggregation group to static LACP aggregation
mode.
Raisecom#config
Raisecom(config)#interface port-channel 1
Raisecom(config-gigaethernet-channel1)#mode lacp
Set successfully.
Related commands
show port-channel
10.1.13 restore-mode
Function
To configure the restore mode and the restore delay of the link aggregation group in Active-
Standby mode, use this command.
Format
restore-mode { non-revertive | revertive [ restore-delay second ] }
Parameters
Parameter Description
non-revertive Non-revertive mode
revertive Revertive mode
restore-delay second Restore delay, an integer, ranging from 0 to 65535s
Default conditions
The restore-mode of the link aggregation group is non-revertive mode.
Command mode
Aggregation group configuration
User level
11
Usage guidelines
Scenario
When a link recovers from a fault, the system does not immediately restore the data to the
master link, but stays in fault status for a period. You can adjust the value of the Restore-delay
time to prevent frequent switching of link status, therefore avoid flow oscillation due to
continuous switch between active and inactive links.
Non-revertive mode differs from revertive mode in that a link will not switch the traffic from
backup link to the active link after it recovers from a fault.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the link aggregation group to non-revertive mode.
Raisecom#config
Raisecom(config)#interface port-channel 1
Raisecom(config-aggregator)#restore-mode non-revertive
Set successfully.
Related commands
show port-channel
Function
To show LACP information, use this command.
Format
show lacp { internal [ detail ] | neighbor [ detail ] | statistics [ interface-type interface-
number ] | sys-id }
Parameters
Parameter Description
internal Show LACP information on the local interface.
neighbor Show LACP information on the neighbor interface connecting to the
local interface.
detail Show detailed LACP information.
statistics Show statistics of LACP.
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
sys-id Show the link aggregation ID used by the LACP, composed of the
LACP priority and the MAC address of the device.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show LACP information on the local interface.
Raisecom#show lacp internal
Flags:
S- Device is requesting Slow LACPDUs F- Device is requesting Fast LACPDUs
A- Device in Active mode P- Device in Passive mode MP- MLACP Peer Port
Field Description
Interface Interface ID
State Interface status
Active: the interface is in active status, forwarding data
Standby: the interface is in inactive status, backing up links
Down: the interface is in shutdown status
Flag Flag
S: the speed for sending LACPPDUs is slow; the period for
sending LACPPDUs is long.
F: the speed for sending LACPPDUs is fast; the period for
sending LACPPDUs is short.
A: the interface works in LACP active mode, actively sending
LACPPDUs to the peer periodically.
P: the interface works in LACP passive mode, passively receiving
LACPPDUs sent by the peer.
MP: peer port of the MLACP
Port-Priority Interface priority
Field Description
Admin-key Administration KEY automatically generated by the LACP
It defines the capability of other interfaces in a link aggregation
group, using the physical features of an interface, such as speed,
duplex mode.
Oper-key Operation key, produced by LACP automatically.
Port-State Interface status
Interface status is represented by 8 bits. Bit 0 is the lowest bit.
Bit 0: LACP mode of an interface. 1 refers to an active interface
while 0 refers to a passive interface.
Bit 1: LACP timeout. 1 refers to a short timeout with 30s while 0
refers to a long timeout with 90s.
Bit 2: whether an interface can be aggregated. 1 refers to a
positive result while 0 refers to a negative result.
Bit 3: whether an interface is successfully added to a link
aggregation group. 1 refers to a positive result while 0 refers to a
negative result.
Bit 4: the enabling status for an interface to receive frames. 1
refers enabled while 0 refers to disabled.
Bit 5: the enabling status for an interface to forwarding frames. 1
refers enabled while 0 refers to disabled.
Bit 6: whether an interface uses the default value. 1 refers to a
positive result while 0 refers to a negative result.
Bit 7: whether the interface is in a timeout status. 1 refers to a
positive result while 0 refers to a negative result.
This example shows how to show LACP information on the neighbour interface.
Raisecom#show lacp neighbor
Flags:
S- Device is requesting Slow LACPDUs F- Device is requesting Fast LACPDUs
A- Device in Active mode P- Device in Passive mode MP- MLACP Peer Port
Field Description
Interface Interface ID
Flag Flag
S: the speed for sending LACPPDUs is slow; the period for
sending LACPPDUs is long.
F: the speed for sending LACPPDUs is fast; the period for
sending LACPPDUs is short.
A: the interface works in LACP active mode, actively sending
LACPPDUs to the peer periodically.
P: the interface works in LACP passive mode, passively
receiving LACPPDUs sent by the peer.
Field Description
Port-Priority Interface priority
Age The time since an interface receives the last LACPPDU sent by
the peer
Device-ID MAC address of the peer
Oper-key Operation key, produced by LACP automatically
Partner-Port Peer interface
Port-State Interface status
Interface status is represented by 8 bits. Bit 0 is the lowest bit.
Bit 0: LACP mode of an interface. 1 refers to an active
interface while 0 refers to a passive interface.
Bit 1: LACP timeout. 1 refers to a short timeout with 30s while
0 refers to a long timeout with 90s.
Bit 2: whether an interface can be aggregated. 1 refers to a
positive result while 0 refers to a negative result.
Bit 3: whether an interface is successfully added to a link
aggregation group. 1 refers to a positive result while 0 refers to
a negative result.
Bit 4: the enabling status for an interface to receive frames. 1
refers enabled while 0 refers to disabled.
Bit 5: the enabling status for an interface to forwarding frames.
1 refers enabled while 0 refers to disabled.
Bit 6: whether an interface uses the default value. 1 refers to a
positive result while 0 refers to a negative result.
Bit 7: whether the interface is in a timeout status. 1 refers to a
positive result while 0 refers to a negative result.
This example shows how to show statistics of LACP.
Raisecom#show lacp statistics gigaethernet 1/1/3
LACPDUs Marker Marker-Response LACPDUS(RX)
Interface Send Receive Send Receive Send Receive Unknown Illegal
----------------------------------------------------------------------
Client3 2 0 0 0 0 0 0 0
Field Description
Interface Interface ID
Send: number of LACPPDUs sent
LACPDUS
Receive: number of LACPPDUs received
Send: number of marker packets sent
Marker
Receive: number of marker packets received
Send: number of marker-response packets sent
Marker-Response
Receive: number of marker-response packets received
Unknown: number of unknown LACPPDUs
LACPDUS (RX)
Illegal: number of illegal LACPPDUs
This example shows how to show system LACP information.
Field Description
Link aggregation status Link aggregation status:
Enable: enabled
Disable: disabled
LACP LAG ID LACP LAG ID, composed of the LACP priority and the
MAC address of the device
Related commands
N/A
Function
To show information about link aggregation, use this command.
Format
show port-channel
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show information about link aggregation.
Raisecom#show port-channel
Group 1 information:
Mode: Lacp Load-sharing mode: src-dst-mac
MinLinks: 1 Max-links: 1
UpLinks: 0 Priority-Preemptive: Disable
Member Port:
Efficient Port:
Group 2 information:
Mode: Manual Load-sharing mode: src-dst-mac
MinLinks: 1 Max-links: 3
UpLinks: 0 Priority-Preemptive: Disable
Member Port:
Efficient Port:
Field Description
Mode Link aggregation mode
Static: static LACP mode
Manual: manual link aggregation mode
MinLinks Lower threshold of the link aggregation group number
MaxLinks Upper threshold of the link aggregation group number
UpLinks Number of UP links
Priority-Preemptive Priority preemption
Enable: enabled
Disable: disabled
Member Port Member interface list
Show all member interfaces added to the aggregation group.
Efficient Port Efficient interface list
Show all efficient interfaces (active interfaces) in the link
aggregation group.
Related commands
N/A
Function
To show information about interface backup, use this command.
Format
show switchport backup
Parameters
N/A
Default conditions
N/A
Command mode
Any command
User level
5
Usage guidelines
Scenario
You can use this command to show information about interface backup, including restore
delay, restore mode and interface backup group information. The interface backup group
information contains master interface ID, backup interface ID, master and backup interface
status (Up/Down/Standby), and VLAN list.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to show information about interface backup.
Raisecom#show switchport backup
Restore delay: 15s
Restore mode: port-up
Active Port(State) Backup Port(State) Vlanlist
-----------------------------------------------------------------
3 (Up) 5(Standby) 1-100
6 (Down) 7(Up) 1-100
Field Description
Restore delay Backup recovery delay, ranging from 0 to 180s
Restore mode Backup recovery mode
port-up: interface connecting mode. A link recovers from a
fault when the interface is in Up status.
neighbor-discover: neighbour discovery mode. A link
Related commands
N/A
Function
To configure force switch, use this command. To cancel this configuration, use the no form of
this command.
Format
switchport backup { interface-type interface-number | port-channel port-channel-id }
force-switch
no switchport backup { interface-type interface-number | port-channel port-channel-id }
force-switch
Parameters
Parameter Description
port-id Interface ID, an integer, ranging from 1 to the maximum Interface
ID
port-channel-id Aggregation group ID, an integer, ranging from 1 to 32
Default conditions
N/A
Command mode
Physical interface configuration mode/Aggregation group configuration
User level
11
Usage guidelines
Scenario
This command is used in the physical interface configuration mode of the master interface. In
addition, this command is used to forcibly switch data to the backup link regardless of the
backup link status.
After this command is successfully executed, the master link is blocked and data is forcibly
switched to the backup link for transportation. If the device is in backup recovery status when
you are configuring forced switch, it is just cancelling the backup of recovery timer.
You can use the no switchport backup interface-type backup-interface-number force-switch
command to cancel the force switch and re-select a forwarding status based on the link status.
The selection principles are shown as follows:
If the Up/Down statuses of the two interfaces are identical, the active interface is
preferred.
If the Up/Down statuses of the two interfaces are different, the interface in Up status is
preferred.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
If multiple backup interface pairs are configured on the active interface, you must enter the
backup Interface ID to which the data is forcibly switched. Otherwise, configurations fail.
Examples
There is an interface backup group on the ISCOM2600G. Port 1 is the master interface and
Port 2 is the backup interface, the data is transmitted on the master link.
This example shows how to switch data from the working link to the link where Port 2 is.
Raisecom#config
Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#switchport backup port 2 force-switch
Set successfully.
Related commands
show switchport backup
Function
To configure the interface backup group, use this command. To delete the backup interface,
use the no form of this command.
Format
switchport backup { interface-type interface-number | port-channel port-channel-id }
vlanlist vlan-list
no switchport backup { port port-id | port-channel port-channel-id }
Parameters
Parameter Description
port-id Interface ID, an integer, ranging from 1 to the maximum Interface ID
port-channel-id Aggregation group ID, an integer, ranging from 1 to 32
vlan-list VLAN list, an integer, ranging from 1 to 4094
Support multi-VLAN input form such as "1, 2, and 3" and VLAN
range enter form such as "1-3".
If you do not specify VLAN list for the interface backup group,
VLNA ID ranges from 1 to 4094 by default.
Default conditions
There is no interface backup group.
Command mode
Physical interface configuration/aggregation configuration
User level
11
Usage guidelines
Scenario
This command is used to create the interface backup group for interface backup, helping
realize basic link redundancy.
There are 2 member interfaces in the interface backup group: active interface and backup
interface. The active interface is the one in the physical interface configuration mode. The
backup interface refers to the one specified by the command. These two interfaces provide
interface backup in s specified VLAN list. One interface is in forwarding (Up) status and the
other one is in standby status.
The active interface and the backup interface can either be physical interfaces or be link
aggregation groups.
If you set a link aggregation group to the member interface of the interface backup group, you
must set the member interface with smallest Interface ID in the link aggregation group to the
member interface of the interface backup group. When the interface is in up status, all
member interfaces in the link aggregation group are in up status. If the interface is in down
status, so do all member interfaces in the link aggregation group.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
In the same VLAN, an/a interface/ link aggregation group cannot be set to the member
interface of two or more interface backup groups.
In an interface backup group, an interface cannot be set to the active interface and the
backup interface simultaneously.
STP and interface backup are exclusive.
Examples
This example shows how to set the active interface to Port 1 and how to set the backup
interface to Port 2 in VLANs 1-100.
Raisecom#config
Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#switchport backup port 2 vlanlist 1-
100
Set successfully.
Related commands
show switchport backup
Function
To configure restore delay, use this command. To return to the default setting, use the no form
of this command.
Format
switchport backup restore-delay second
no switchport backup restore-delay
Parameters
Parameter Description
second Restore delay, an integer, ranging from 0 to 300s
Default conditions
The restore delay is set to 15s .
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
When a link recovers from a fault, the system does not restore the data to the master link.
Instead, it keeps the fault status for a period by adjusting the value of Restore-delay timer.
This helps prevent frequent switching of link status.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the restore delay to 35s.
Raisecom#config
Raisecom(config)#switchport backup restore-delay 35
Set successfully.
Related commands
show switchport backup
Function
To configure the restore mode of interface backup, use this command.
Format
switchport backup restore-mode { disable | port-up }
Parameters
Parameter Description
disable Interface backup recovery is disabled.
port-up Interface connection mode
A link recovers from a fault when the interface is in Up status.
Default conditions
The recovery mode is interface connecting mode.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
To configure the restore mode of interface backup, use this command.
disable: all interface backup groups are detected. If some interface backup group is in
backup restore status, interface backup is disabled.
port-up: when the backup interface is in up status and the active interface changes from
down status to up status, the backup restore timer is enabled. When the timer expires and
no Down event is generated, the active interface status is set to Forwarding and the
backup interface status is set to Discarding. If an interface is in down status during this
process, the timer is canceled. The Up interface is set to forwarding and the Down
interface is set to discarding.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to set the restore mode to port-up.
Raisecom#config
Raisecom(config)#switchport backup restore-mode port-up
Set successfully.
Related commands
show switchport backup
Function
To create a link-state group and enable link-state tracking, use this command. To disable the
function, use the no form of this command.
Format
link-state-tracking group group-number
no link-state-tracking group group-number
Parameters
Parameter Description
group-number link-state group number, an integer, ranging from 1 to 10
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
When the upstream failed, the system will inform the downstream devices so that they can
switch traffic to the standby line to prevent traffic lost.
If no link-state group is created, you can use this command to create one and enable it. If the
link-state group has already existed, you can use this command to enable it without creating a
new one. In addition, configurations of the existing link-state group will not be changed.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
When you use the no link-state-tracking group group-number command to disable link-state
tracking, link-state group with no interface connected will be deleted.
Examples
This example shows how to create and enable link-state group 1.
Raisecom#config
Raisecom(config)#link-state-tracking group 1
Set successfully.
Related commands
show link-state-tracking group
Function
To configure the uplink and downlink interface of the link-state group, use this command. To
delete the interface from the link-state group, use the no form of this command.
Format
link-state-tracking group group-number { downstream | upstream }
no link-state-tracking group
Parameters
Parameter Description
group-number Link-state group number, an integer, ranging from 1 to 10
downstream Configure the interface as downlink interface.
Downlink interface is connected with the downlink. If the uplink
fails, all downlink interfaces will shut down to inform the downlinks
to switch.
upstream Configure the interface as upstream interface.
The upstream interface is connected with the uplink to monitor the
uplink. In addition, there can be multiple uplink and downlink
interfaces in a link-state group.
Default conditions
There is no upstream or downstream interface in the link-state group.
Command mode
Physical layer interface configuration
User level
11
Usage guidelines
Scenario
The link-state group consists of downstream interfaces and upstream interfaces. There can be
multiple upstream and downstream interfaces in a link-state group. After you configure a link-
state group, upstream interfaces are monitored in real time.
In general, the downlink cannot learn the fault when the uplink fails. Therefore, services may
be interrupted. With link-state tracking, the system informs the downstream devices when the
uplink fails. The upstream interface of a link-state group is used to monitor the fault generated
on the uplink. The downstream devices switch traffic into a standby line to prevent losing
traffic.
You can use the no link-state-tracking group command to delete an interface from the link-
state group. When you delete an interface, if there is no interface in the link-state group and
the link-state group is not enabled, the group will be deleted too.
Prerequisite
You must use the link-state-tracking group command to create a link-state group. Otherwise,
configurations will fail.
Follow-up procedure
You can use the show link-state-tracking group command to show uplink interfaces and
downlink interfaces in a link-state group.
Precaution
An interface can either be configured as an uplink interface or a downlink interface. Only the
last configuration will take effect.
Examples
This example shows how to set interface 1 of slot 3 to uplink interface and how to set
interface 2 of slot 3 to downlink interface in link-state group 1.
Raisecom#config
Raisecom(config)#interface fastethernet 1/3/1
Raisecom(config-gigaethernet1/1/1)#link-state-tracking group 1 upstream
Raisecom(config-gigaethernet1/1/1)#exit
Raisecom(config)#interface fastethernet 1/3/2
Raisecom(config-gigaethernet1/1/1)#link-state-tracking group 1 downstream
Set successfully.
Related commands
show link-state-tracking group
Function
To show link-state tracking configurations, use this command.
Format
show link-state-tracking group group-number [ detail ]
Parameters
Parameter Description
group-number Link-state group ID, an integer, ranging from 1 to 10
detail Detailed information
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
Scenario
You can use this command to show information about the link-state group, including the link-
state group number, link-state group enabling status, link-state tracking status, downstream
and upstream interface statuses.
If you do not specify a link-state group number, information about all link-state groups will be
showed.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
This command cannot be used to show link-state groups that are created but not enabled, and
failure groups that have no interfaces connected to them.
Examples
This example shows how to show information about link-state group 1.
Raisecom#show link-state-tracking group 1
Link State Tracking Group: 1 (Enable)
Status: Normal
Upstream Interfaces:
fastethernet1/3/2(Up) fastethernet1/3/3(Up)
Downstream Interfaces:
fastethernet1/3/1(Up)
Field Description
Link State Tracking Link-state group number/status
Group Enable: enabled.
Disable: disabled.
Status Link-state tracking status
Normal: no link-state tracking occurred.
Link-state tracking: link-state tracking occurred.
Upstream Interfaces Upstream Interface ID/status
Up: the link is active.
Down: the link is shut down.
Downstream Downstream Interface ID/status
Interfaces Up: the link is active.
Down: the link is shut down.
Related commands
N/A
11 Security
Function
To clear certain type of secure MAC address on specified interface, use this command.
Format
clear port-security { all | configured | dynamic | sticky }
Parameters
Parameter Description
all All secure MAC addresses
configured Static secure MAC addresses
dynamic Dynamic secure MAC addresses
sticky Sticky secure MAC addresses
Default conditions
N/A
Command mode
Physical layer interface configuration
User level
11
Usage guidelines
Scenario
You can use this command to clear certain type of secure MAC address on specified interface.
After this command is executed, packets with specified secure MAC address will not be
forwarded the first time they are sent to the specified interface because the secure MAC
address of the specified interface has already been cleared.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to clear the Sticky secure MAC address on interface 1/1/2.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#clear port-security sticky
Set successfully.
Related commands
show port-security mac-address
Function
To re-enable the interface that is shut down due to violation of secure MAC addresses, use
this command.
Format
no port-security shutdown
Parameters
N/A
Default conditions
N/A
Command mode
Physical layer interface configuration
User level
11
Usage guidelines
Scenario
While configuring the violation mode of secure MAC to shutdown mode, the device will send
a trap and Syslog prompt and the interface is shut down.
You can use this command to re-enable the interface that is shut down due to violation of
secure MAC addresses. When an interface is re-enabled, the previously-configured violation
mode still takes effect.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to res-enable the interface 1/1/2 that is shut down due to violation of
secure MAC addresses.
Raisecom#config
Raisecom(config)#interfacegigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#no port-security shutdown
Set successfully.
Related commands
show port-security
switchport port-security violation
Function
To configure the security MAC recovery time on the interface, use this command. To return to
the default condition, use the no form of this command.
Format
port-security recovery-time second
no port-security recovery-time
Parameters
Parameter Description
second Recovery time, an integer, ranging from 30 to 86400s
Default conditions
The recovery time of port security MAC is 0s, showing as "Disable".
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the recovery time for interface that is shut down due
to violation of secure MAC addresses. The interface will be turned on automatically when the
recovery time expires.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the recovery time of the port security MAC to 30s.
Raisecom#config
Raisecom(config)#port-security recovery-time 30
Set successfully.
Related commands
show port-security
Function
To configure the aging time for secure MAC address, use this command. To return to the
default condition, use the no form of this command.
Format
port-security aging-time period
no port-security aging-time
Parameters
Parameter Description
period Aging time, an integer, ranging from 0 to 1440s
Default conditions
The aging time of the secure MAC address is 30s.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the aging time for the MAC secure address on the
interface, the secure MAC address on the interface will be aged when the aging time expires.
If the aging time is 0, all the secure MAC address will not be aged when the aging time
expires.
If the aging time is not 0, the static secure MAC address and Sticky secure MAC address
will not be aged but the dynamic secure MAC address will be aged when the aging time
expires.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
When you use the show port-security mac-address [ port-list port-list ] command to show
the aging time of the secure MAC address:
If the aging time is 0, the aging time will show as "--".
If the aging time is not set to 0 and if the aging time is shorter than 1min, the aging time
will show as "<1".
The aging time for static security MAC address and Sticky secure MAC address will
always be shown as "--".
Examples
This example shows how to configure the aging time of secure MAC address to 10min.
Raisecom#config
Raisecom(config)#port-security aging-time 10
Set successfully.
Related commands
show port-security mac-address
Function
To configure aging time for the secure MAC address, use this command. To return to the
default condition, use the no form of this command.
Format
switchport port-security aging-type { absolute | inactivity }
Parameters
Parameter Description
Default conditions
The aging mode of the secure MAC address is absolute.
Command mode
Physical layer interface configuration
User level
11
Usage guidelines
Scenario
The secure MAC address aging contains 2 modes:
Absolute mode: The secure MAC address will be aged immediately when the specified
aging time expires.
Inactivity mode: The secure MAC address will be aged if there is no traffic produced
during the specified time period.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the secure MAC address aging mode on interface 1/1/2
to inactivity.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#switchport port-security aging-type
inactivity
Set successfully.
Related commands
show port-security
Function
To show secure MAC address on the interface, use this command.
Format
show port-security mac-address [interface-type interface-number ]
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
11
Usage guidelines
Scenario
You can use this command to show information about port security MAC including VLAN ID,
secure MAC address, secure MAC address type, interface ID, and aging time.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to show secure MAC address on interface 1.
Raisecom#show port-security mac-address gigaethernet 1/1/2
VLAN Security-MAC-Address Flag Port Age(min)
--------------------------------------------------------------------
1 0000.0000.0001 dynamic 1 1
Parameter Description
Security-MAC-Address Secure MAC address on the interface
Flag Flag of secure MAC address on the interface
Static: static secure MAC address
Dynamic: dynamic secure MAC address
Sticky: Sticky secure MAC address
Port Interface ID
Parameter Description
Age(min) Remnant aging time for secure MAC address on the interface.
If the aging time is 0, the aging time will be shown as "--".
If the aging time is not 0 and is shorter than 1 min, the aging
time will be shown as "<1".
The aging time for static secure MAC address and Sticky
secure MAC address is always shown as "--".
VLAN VLAN ID
Related commands
N/A
Function
To show configurations and learning of the port security MAC, use this command.
Format
show port-security [ interface-type interface-number ]
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
11
Usage guidelines
Scenario
You can use this command to show configurations and learning of the port security MAC
including the interface ID, security MAC status, maximum number of secure MAC addresses,
current number of secure MAC addresses, the maximum number of secure MAC address in
history, violation number, violation handling mode and status of dynamic learning Trap.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to show configurations and learning of the security MAC on
interface 1/1/2.
Raisecom#show port-security gigaethernet 1/1/2
Port security aging time:30 (mins)
Port security recovery time:Disable (s)
port status Max-Num Cur-Num His-MaxNum vio-Count
vio-action Dynamic-Trap Aging-Type
-------------------------------------------------------------------------
-----------------------------------------
gigaethernet1/1/1 Disable 1024 0 0 0
protect Disable Absolute
Field Description
Port security aging Aging time of the secure MAC address on the interface
time
port Interface ID
status Port security MAC status
enable: enabled
disable: disabled
Max-Num Maximum number of secure MAC addresses allowed by the
interface, ranging from 0 to 100
Cur-Num Number of current secure MAC addresses, ranging from 0 to 100
His-Num Maximum number of secure MAC addresses in history, ranging
from 0 to 65535
vio-Count Number of violations on the interface, ranging from 0 to 65535
vio-action Handling mode of violations on the interface
Protect: protect the interface
Restrict: restrict packets
Shutdown: shut down the interface
Field Description
Dynamic-Trap Status of dynamic learning Trap on the interface
enable: enabled
disable: disabled
Aging-Type Aging mode
Related commands
N/A
Function
To enable port security MAC, use this command. To disable the function, use the no form of
this command.
Format
switchport port-security
no switchport port-security
Parameters
N/A
Default conditions
Port security MAC is disabled.
Command mode
Physical layer interface configuration
User level
11
Usage guidelines
Scenario
Port security MAC is mainly used for devices at user side in edge network to ensure the date
security of an interface. Port security MAC controls packets based on their source MAC
addresses. It helps prevent illegal users or too many users from accessing to the network
through some interface of a device.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
We do not recommend you to enable port security MAC on member interfaces in the
aggregation group.
We do not recommend you to enable MAC address management to configuring static
MAC address while port security MAC is enabled.
Security MAC and Dot1x are mutually exclusive and thus cannot be configured both.
Port security MAC and VLAN-based MAC address number limiting are mutually
exclusive.
Examples
This example shows how to enable security MAC on interface 1/1/2.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#switchport port-security
Set successfully.
Related commands
show port-security
Function
To configure static security MAC addresses, use this command. To delete the MAC address,
use the no form of this command.
Format
switchport port-security mac-address mac-address vlan vlan-id
no switchport port-security mac-address mac-address vlan vlan-id
Parameters
Parameter Description
mac-address MAC address, in dotted hexadecimal notation
vlan-id VLAN ID, an integer, ranging from 1 to 4094
Default conditions
N/A
Command mode
Physical layer interface configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure static secure MAC addresses. Static secure MAC
addresses are configured manually on the secure interface. It will take effect when port
security MAC is enabled and will not be aged.
If an interface only allows specified users to access the network, you can manually configure
static secure MAC addresses for them. If the interface allows a specified user to access the
network permanently and does not put restriction on other users, you can configure the
number of learned secure MAC addresses and write the static secure MAC address of the
specified user to the interface. Therefore, other users of dynamic secure MAC addresses can
access the network.
Prerequisite
N/A
Follow-up procedure
You can use the switchport port-security command to enable port security MAC.
Precaution
N/A
Examples
This example shows how to configure the static secure MAC address on interface 1 to
0000.0000.0001, and how to relate the static secure MAC address to VLAN 1.
Raisecom#config
Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#switchport port-security mac-address
0000.0000.0001 vlan 1
Set successfully.
Related commands
show port-security mac-address
Function
To enable Sticky learning on the interface, use this command. To disable this function, use the
no form of this command.
Format
switchport port-security mac-address sticky
no switchport port-security mac-address sticky
Parameters
N/A
Default conditions
Sticky learning on the interface is disabled.
Command mode
Physical layer interface configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure Sticky learning on the secure interface. When the
function is enabled, Sticky secure MAC addresses will take effect and will not be aged. All
secure MAC addresses will be converted to Sticky secure MAC addresses. When the function
is disabled, all Sticky secure MAC addresses will be converted to dynamic secure MAC
addresses.
Dynamic secure MAC addresses are acquired through learning. You can configure all learned
MAC addresses within the maximum number to secure MAC addresses. These secure MAC
addresses can be aged and can be converted to Sticky secure MAC address to make them not
aged.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable Sticky learning on interface 1/1/2.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#switchport port-security mac-address
sticky
Set successfully.
Related commands
show port-security mac-address
Function
To configure Sticky secure MAC addresses, use this command. To disable this function, use
the no form of this command.
Format
switchport port-security mac-address sticky mac-address vlan vlan-id
no switchport port-security mac-address sticky mac-address vlan vlan-id
Parameters
Parameter Description
mac-address MAC address, in dotted hexadecimal notation
vlan-id VLAN ID, an integer, ranging from 1 to 4094
Default conditions
N/A
Command mode
Physical layer interface configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure Sticky secure MAC addresses on the interface. Sticky
secure MAC addresses are configured manually on the secure interface or converted through
dynamic secure MAC addresses.
Sticky MAC addressed need to work with Sticky learning:
When Sticky learning is enabled, Sticky secure MAC addresses take effect and will not
be aged. The device supports loading Sticky secure MAC addresses when being booted.
When Sticky learning is disabled, Sticky security MAC addresses will be invalid and
only saved to the system.
Prerequisite
N/A
Follow-up procedure
You can use switchport port-security mac-address sticky command to enable Sticky
security learning.
Precaution
N/A
Examples
This example shows how to configure Sticky secure MAC on interface 1/1/2 to
0000.0000.00001 and how to associate interface 1 with VLAN 1.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#switchport port-security mac-address
sticky 0000.0000.0001 vlan 1
Set successfully.
Related commands
show port-security mac-address
Function
To configure the maximum number of secure MAC addresses for the secure interface, use this
command. To return to the default condition, use the no form of this command.
Format
switchport port-security maximum maximum
no switchport port-security maximum
Parameters
Parameter Description
maximum Maximum number of secure MAC addresses, an integer, ranging from 1 to
1024
Default conditions
The maximum number of secure MAC addresses is 1.
Command mode
Physical layer interface configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the maximum number of secure MAC addresses for
the secure interface. When port security MAC is enabled, the number of secure MAC
addresses on the interface will not exceed the maximum number. If the maximum number is
exceeded, configurations will fail. The device will adopt a violation mode to deal with packets
with unknown source MAC addresses.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The maximum number is only used to restrict the number of security MAC addresses. It will
not affect the number of static MAC addresses configured by the MAC management module.
The static MAC addresses will still working normally based on "interface + VLAN".
When the maximum number is exceeded, configurations will fail.
Examples
This example shows how to configure the maximum allowed number of secure MAC
addresses on interface 1/1/2 to 10.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#switchport port-security maximum 10
Set successfully.
Related commands
show port-security
Function
To enable port security MAC learning trap, use this command. To disable this function, use
the disable form of this command.
Format
switchport port-security trap { enable | disable }
Parameters
Parameter Description
enable Enable port security MAC learning Trap
disable Disable port security MAC learning Trap
Default conditions
Port security MAC learning Trap is disabled.
Command mode
Physical layer interface configuration
User level
11
Usage guidelines
Scenario
When port security MAC learning Trap is enabled, the secure interface will send a trap to the
NMS every time it learns a dynamic secure MAC address. The secure interface will not send
trap to the NMS when you manually configure a secure MAC address. The trap includes the
following information:
Learned secure MAC addresses
Related VLANs
Related Interfaces
Related secure MAC address type
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable security MAC learning Trap on interface 1/1/2.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#switchport port-security trap enable
Set successfully.
Related commands
show port-security
Function
To configure port security violation action mode, use this command. To return to the default
condition, use the no form of this command.
Format
switchport port-security violation { protect | restrict | shutdown }
no switchport port-security violation
Parameters
Parameter Description
protect Protect the interface.
The secure port will discard packets from unauthorized users.
restrict Restrict packets.
The secure port will discard packets from unauthorized users, print Syslog
at console, and send a trap to the NMS.
shutdown Shut down the interface.
The secure port will discard packets from unauthorized users, print Syslog
information at console, send a trap to the NMS, and shut down the
interface.
Default conditions
The port security violation action mode is protect.
Command mode
Physical layer interface configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure port security violation action mode. The secure
interface will respond to the unauthorized accesses according to the violation action mode
configured.
When the maximum number of secure MAC addresses is exceeded, packets from unknown
MAC sources will be considered as a violation. The secure interface will respond to the
violation according to the configured violation action modes, as listed below:
Protect mode (protect): configure the violation action mode to "no learning, no
forwarding, no sending to the CPU" mode. The interface will discard packets from
unknown MAC sources and forward packets with secure MAC addresses only.
Restrict mode (restrict): configure the violation action mode to "no learning, no
forwarding, sending to the CPU" mode. The interface will send a trap and Syslog
information. The interface will forward packets with secure MAC addresses only.
Shutdown mode (shutdown): configure the violation action mode to "no learning, no
forwarding, sending to the CPU" mode. After sending a trap and Syslog information, the
interface will be shut down.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the violation actin mode of interface 1/1/2 to restrict.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#switchport port-security violation
restrict
Set successfully.
Related commands
show port-security
11.2 ACL
11.2.1 access-list
Function
To create and configure the ACL (Access Control List), use this command. To delete the ACL,
use the no form of this command.
Format
access-list acl-number [ name acl-name ]
no access-list { acl-number | name acl-name }
Parameters
Parameter Description
acl-number Access control list number, an integer
Ranging from 1000 to 1999, enter standard IP ACL configuration
mode.
Ranging from 2000 to 2999, enter extended IP ACL configuration
mode.
Ranging from 3000 to 3999, enter MAC ACL configuration mode.
Ranging from 5000 to 5999, enter User ACL configuration mode.
Ranging from 6000 to 6999, enter IPv6 ACL configuration mode.
Ranging from 7000 to 7999, enter advanced ACL configuration mode.
Default conditions
N/A
Command mode
Global configuration
User level
15
Usage guidelines
N/A
Examples
This example shows how to create standard IP ACL and enter standard IP ACL configuration
mode.
Raisecom#config
Raisecom(config)#access-list 1001
Raisecom(config-acl-ip-std)#
This example shows how to create extended IP ACL and enter extend IP ACL configuration
mode.
Raisecom#config
Raisecom(config)#access-list 2001
Raisecom(config-acl-ip-ext)#
This example shows how to create User ACL and enter User ACL configuration mode.
Raisecom#config
Raisecom(config)#access-list 5001
Raisecom(config-acl-udf)#
Related commands
show access-list
Function
To configure standard IP ACL rules, use this command. To delete standard IP ACL rules, use
the no form of this command.
Format
rule [ rule-id ] { deny | permit } { source-ip-address source-ip-mask | any }
no rule rule-id
Parameters
Parameter Description
rule-id Rule ID, an integer, ranging from 1 to 65535
deny Deny access when the rule is matched.
permit Allow access when the rule is matched.
source-ip-address Source IP address of the packet, in dotted decimal notation, such as
10.10.10.1
source-ip-mask Source IP mask of the packet, in dotted decimal notation, such as
255.255.255.0
any Match with any IP address.
Default conditions
N/A
Command mode
Basic IP ACL configuration
User level
11
Usage guidelines
Scenario
You can use this command to define the ACL rule.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The maximum number of rules for each list is 32. 1000 lists can have 3200 rules in total.
Any rule should not contradict with other configured rules.
If the ACL is currently in use, relevant rules cannot be edited.
Examples
This example shows how to configure rule 1001 in standard IP ACL configuration mode to
allow device with IP address of 192.168.27.27 to access.
Raisecom#config
Raisecom(config)#access-list 1001
Raisecom(config-acl-ip-std)#rule permit 192.168.27.27 255.255.255.0
Set successfully.
Related commands
show access-list
Function
To configure extended IP ACL rules, use this command. To delete extended IP ACL rules, use
the no form of this command.
Format
rule [ rule-id ] { deny | permit } { protocol-id | icmp | igmp | ip } { source-ip-address
source-ip-mask | any } { destination-ip-address destination-ip-mask | any } [ dscp dscp-
value ] [ ttl ttl-value ] [ fragment ] [ precedence precedence-value ] [ tos tos-value ]
rule [ rule-id ] { deny | permit } { tcp | udp } { source-ip-address source-ip-mask | any }
[ source-port ] [ range minimum source port maximum source port ] { destination-ip-address
destination-ip-mask | any } [ destination-port ] [ ack ack-value ] [ dscp dscp-value ] [ fin fin-
value ] [ fragment ] [ precedence precedence-value ] [ psh psh-value ] [ range minimum
source port maximum source port ] [ rst rst-value ] [ syn syn-value ] [ tos tos-value ] [ urg
urg-value ] [ ttl ttl-value ]
no rule rule-id
Parameters
Parameter Description
rule-id Rule ID, an integer, ranging from 1 to 65535
deny Deny access when the rule is matched.
permit Allow access when the rule is matched.
Parameter Description
protocol-id Protocol ID, an integer, ranging from 0 to 255
icmp ICMP
igmp IGMP
ip IP
source-ip-address Source IP address of the packet, in dotted decimal notation, such
as 10.10.10.1
source-ip-mask Source IP mask of the packet, in dotted decimal notation, such as
255.255.255.0
any Match with any IP address.
destination-ip-address Destination IP address of the packet, in dotted decimal notation,
such as 10.10.10.1
destination-ip-mask Destination IP mask of the packet, in dotted decimal notation,
such as 255.255.255.0
ack ack-value Match ACK bit, an integer, ranging from 0 to 1
fin fin-value Match FIN bit, an integer, ranging from 0 to 1
psh psh-value Match PSH bit, an integer, ranging from 0 to 1
rst rst-value Match RST bit, an integer, ranging from 0 to 1
syn syn-value Match SYN bit, an integer, ranging from 0 to 1
urg urg-value Match URG bit, an integer, ranging from 0 to 1
dscp dscp-value DSCP priority, an integer, ranging from 0 to 63
ttl ttl-value Packet lifetime, an integer, ranging from 1 to 255
icmp-type icmp-type- ICMP type, an integer, ranging from 0 to 255
value
precedence Priority used to match the packet, an integer, ranging from 0 to 7
precedence-value
tos tos-value TOS used to match the packet, an integer, ranging from 0 to 15
fragment fragment
tcp TCP
udp UDP
source-port Source port of the packet, an integer, ranging from 1 to 65535
destination-port Destination of the port, an integer, ranging from 1 to 65535
Parameter Description
range minimum Source port batch configuration mode, used to configure the
source port maximum minimum and maximum number of source ports.
source port Minimum number of source ports, an integer, ranging from 1
to 65535
Maximum number of source ports, an integer, ranging from 1
to 65535
Default conditions
N/A
Command mode
Extended IP ACL configuration
User level
11
Usage guidelines
Scenario
You can use this command to define ACL rules.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The maximum number of rules for each list is 32. 1000 lists can have 3200 rules in total.
Any rule should not contradict with other configured rules.
If the ACL is currently in use, relevant rules cannot be edited.
Examples
This example shows how to configure rule 2001 in extended IP ACL mode to allow device of
192.168.27.27 to access device of 192.168.27.28 through ICMP.
Raisecom#config
Raisecom(config)#access-list 2001
Raisecom(config-acl-ipv4-advanced)#rule permit icmp 192.168.27.27
255.255.255.0 192.168.27.28 255.255.255.0
Set successfully.
This example shows how to configure rule 2002 in extended IP ALC mode to allow source
port 10000 of 192.168.27.27 to access destination port 10000 of 192.168.27.28 through TCP.
Raisecom#config
Raisecom(config)#access-list 2002
Raisecom(config-acl-ipv4-advanced)#rule permit tcp 192.168.27.27
255.255.255.0 10000 192.168.27.28 255.255.255.0 10000
Set successfully.
Related commands
show access-list
Function
To configure MAC ACL rules, use this command. To delete MAC ACL rules, use the no form
of this command.
Format
rule [ rule-id ] { deny | permit } { source-mac-address source-mac-mask | any }
{ destination-mac-address destination-mac-mask | any } [ ethertype { ethertype [ ethertype-
mask ] | ip | arp } ] [ svlan svlanid ] [ cos cos-value ] [ cvlan cvlanid ] [ inner-cos inner-cos ]
no rule rule-id
Parameters
Parameter Description
rule-id Rule ID, an integer, ranging from 1 to 65535
deny Deny access when the rule is matched.
permit Allow access when the rule is matched.
source-mac-address Source MAC address of physical frame, in dotted hexadecimal
notation, such as 000E.5E12.3456
source-mac-mask Source MAC mask of physical frame, in dotted hexadecimal
notation, such as FFFF.FFFF.FFFF
any Match any MAC address
destination-mac- Destination MAC address of physical frame, in dotted
address hexadecimal notation, such as 000E.5E12.3456
destination-mac-mask Destination MAC mask of physical frame, in dotted hexadecimal
notation, such as FFFF.FFFF.FFFF
ethertype ethertype Ethernet frame type, in hexadecimal notation, ranging from
0x0000 to 0xFFFF
ethertype-mask Ethernet frame type mask, in hexadecimal notation, ranging
from 0x0000 to 0xFFFF
ip IP
arp ARP
Parameter Description
svlan svlanid SVLAN ID, an integer, ranging from 1 to 4094
cos cos-value CoS priority of SVLAN, an integer, ranging from 0 to 7
cvlan cvlanid CVLAN ID, an integer, ranging from 1 to 4094
inner-cos inner-cos CoS priority of CVLAN, an integer, ranging from 0 to 7
Default conditions
N/A
Command mode
MAC ACL configuration
User level
11
Usage guidelines
Scenario
You can use this command to define ACL rule.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The maximum number of rules for each list is 32. 1000 lists can have 3200 rules in total.
Any rule should not contradict with other configured rules.
If the ACL is currently in use, relevant rules cannot be edited.
Examples
This example shows how to configure rule 3001 in MAC ACL configuration mode to allow
device of 000E.5E12.3456 to access device of 000E.5E34.5678 through IP.
Raisecom#config
Raisecom(config)#access-list 3001
Raisecom(config-acl-mac)#rule 1 permit 000E.5E12.3456 FFFF.FFFF.FFFF
000E.5E34.5678 FFFF.FFFF.FFFF ethertype ip
Set successfully.
Related commands
show access-list
Function
To configure user ACL rules, use this command. To delete user ACL rules, use the no form of
this command.
Format
rule [ rule-id ] { deny | permit } { ipv4 | layer2 } rule-string rule-mask offset
no rule rule-id
Parameters
Parameter Description
rule-id Rule ID, an integer, ranging from 1 to 65535
deny Deny access when the rule is matched.
permit Allow access when the rule is matched.
ipv4 Offset starts from IPv4 packet head+20 bytes
layer2 Offset starts from protocol field
rule-string User-defined string, in hexadecimal notation, with even
characters
rule-mask User-defined string mask, in hexadecimal notation, with even
characters
offset Beginning field of the user-defined string, starts from the
physical frame, an integer, ranging from 22 to 37
Default conditions
N/A
Command mode
User ACL configuration
User level
11
Usage guidelines
Scenario
You can use this command to define ACL rules.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The maximum number of rules for each list is 32. 1000 lists can have 3200 rules in total.
Any rule should not contradict with other configured rules.
If the ACL is currently in use, relevant rules cannot be edited.
Examples
This example shows how to configure rule 5001 in user ACL configuration mode to allow
offset starts from protocol field. Packet with User-defined string being 2D, mask being FF and
offset being 22 is allowed to access.
Raisecom#config
Raisecom(config)#access-list 5001
Raisecom(config-acl-udf)#rule 1 permit layer2 2D FF 22
Set successfully.
Related commands
show access-list
Function
To configure IPv6 ACL rules, use this command. To delete IPv6 ACL rules, use the no form
of this command.
Format
rule [ rule-id ] { deny | permit } { protocol-id | ipv6 | icmpv6 } { source-ipv6-address/prefix
| any } { destination- ipv6-address/prefix | any } [ dscp dscp-value ] [ fragment ] [flow-label
flow label-value ]
rule [ rule-id ] { deny | permit } { tcp | udp } { source-ipv6-address/prefix source-ip-mask |
any } { destination- ipv6-address/prefix | any } [ destination-port ] [ ack ack-value ] [ dscp
dscp-value ] [ fin fin-value ] [ fragment ] [flow-label flow label-value ] [ psh psh-value ]
[ rst rst-value ] [ syn syn-value ] [ urg urg-value ]
no rule rule-id
Parameters
Parameter Description
rule-id Rule ID, an integer, ranging from 1 to 65535
deny Deny access when the rule is matched.
permit Allow access when the rule is matched.
Parameter Description
protocol-id Protocol ID, an integer, ranging from 0 to 255
ipv6 IPv6
icmpv6 ICMPv6
source-ipv6- Source IPv6 address and prefix length of the packet, in colon
address/prefix hexadecimal notation
any Match any IP address.
destination- ipv6- Destination IPv6 address of the packet, in colon hexadecimal
address/prefix notation
ack ack-value Match ACK bit, an integer, ranging from 0 to 1
fin fin-value Match FIN bit, an integer, ranging from 0 to 1
psh psh-value Match PSH bit, an integer, ranging from 0 to 1
rst rst-value Match RST bit, an integer, ranging from 0 to 1
syn syn-value Match SYN bit, an integer, ranging from 0 to 1
urg urg-value Match URG bit, an integer, ranging from 0 to 1
dscp dscp-value DSCP priority, an integer, ranging from 0 to 63
flow-label flow label- Flow label, an integer, ranging from 0 to 1048575
value
fragment fragment
tcp TCP
udp UDP
source-port Source port of the packet, an integer, ranging from 1 to 65535
destination-port Destination port of the packet, an integer, ranging from 1 to
65535
Default conditions
N/A
Command mode
IPv6 ACL configuration
User level
11
Usage guidelines
Scenario
Examples
This example shows how to configure rule 6001 in IPv6 ACL configuration mode to allow
device with IPv6 address of 1030:0::48AA:1A2B/60 to access all IPv6 address.
Raisecom#config
Raisecom(config)#access-list 6001
Raisecom(config-acl-ipv6)# rule 1 permit ipv6 1030:0::48AA:1A2B/60 any
Set successfully.
Related commands
show access-list
Function
To configure Advanced ACL rules, use this command.
Format
rule [ rule-id ] { deny | permit } { source-mac-address source-mac-mask | any }
{ destination-mac-address destination-mac-mask | any } [ svlan svlanid ] [ cos cos-value ]
[ cvlan cvlanid ] [ inner-cos inner-cos ] { source-ip-address source-ip-mask | any }
{ destination-ip-address destination-ip-mask | any }[ dscp dscp-value ] [ ttl ttl-value ]
[ fragment ] [ precedence precedence-value ] [ tos tos-value ]
no rule rule-id
Parameters
Parameter Description
rule-id Rule ID, an integer, ranging from 1 to 65535
deny Deny access when the rule is matched.
permit Allow access when the rule is matched.
Parameter Description
source-mac-address Source MAC address of physical frame, in dotted hexadecimal
notation, such as 000E.5E12.3456
source-mac-mask Source MAC address mask of physical frame, in dotted
hexadecimal notation, such as FFFF.FFFF.FFFF
any Match any MAC address
destination-mac- Destination MAC address of physical frame, in dotted
address hexadecimal notation, such as 000E.5E12.3456
destination-mac-mask Destination MAC address mask of physical frame, in dotted
hexadecimal notation, such as FFFF.FFFF.FFFF
svlan svlanid SVLAN ID, an integer, ranging from 1 to 4094
cos cos-value SVLAN CoS priority, an integer, ranging from 0 to 7
cvlan cvlanid CVLAN ID, an integer, ranging from 1 to 4094
inner-cos inner-cos CVLAN CoS priority, an integer, ranging from 0 to 7
source-ip-address Source IP address of the packet, in dotted decimal notation such
as 10.10.10.1
source-ip-mask Source IP address mask of the packet, in dotted decimal
notation, such as 255.255.255.0
dscp dscp-value DSCP priority, an integer, ranging from 0 to 63
ttl ttl-value Packet lifetime, an integer, ranging from 1 to 255
precedence Priority used to match packet, an integer, ranging from 0 to 7
precedence-value
tos tos-value TOS priority used to match packet, an integer, ranging from 0 to
15
fragment Fragment
Default conditions
N/A
Command mode
Advanced ACL configuration
User level
11
Usage guidelines
Scenario
Examples
This example shows how to configure rule 7001 in advanced ACL configuration mode to
allow device with IP address of 192.168.1.2 and MAC address of 000E.5E12.3456 to access
device with IP address of 192.168.1.5 and MAC address of 000E.5E34.5678.
Raisecom#config
Raisecom(config)#access-list 7001
Raisecom(config-acl-advanced)#rule 1 permit 000E.5E12.3456 FFFF.FFFF.FFFF
000E.5E34.5678 FFFF.FFFF.FFFF 192.168.1.2 255.255.255.0 192.168.1.5
255.255.255.0
Set successfully.
Related commands
show access-list
Function
To show ACL resource information, use this command.
Format
show acl resource { egress | ingress } interface-type interface-number
Parameters
Parameter Description
interface-type Enable DHCP Snooping on specified interface.
interface-number The interface-type means interface type.
The interface-number means interface list.
egress Egress
ingress Ingress
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show ACL resource.
Raisecom#show acl resource egress interface gigaethernet 1/1/2
Free Resource Number:0
Resource Reserved Configured Remaining
Type Number Number Number
------------------------------------------------
MAC 0 0 0
IP 0 0 0
IPv6 0 0 0
Advanced 0 0 0
Field Description
Free Resource Number Number of free resource
Resource Type Resource type
Reserved Number Number of reserved resource
Configured Number Number of configured resource
Remaining Number Number of remaining resource
Related commands
N/A
Function
To apply ACL to the interface, use this command. To disable this function, use the no form of
this command.
Format
filter ingress access-list acl-number [ statistics ]
no filter ingress access-list acl-number
Parameters
Parameter Description
ingress Apply ACL to the ingress direction.
access-list Access control list number, an integer
acl-number Ranging from 1000 to 1999, enter standard IP ACL configuration
mode.
Ranging from 2000 to 2999, enter extended IP ACL configuration
mode.
Ranging from 3000 to 3999, enter MAC ACL configuration mode.
Ranging from 5000 to 5999, enter user ACL configuration mode.
Ranging from 6000 to 6999, enter IPv6 ACL configuration mode.
Ranging from 7000 to 7999, enter advanced ACL configuration mode.
Default conditions
N/A
Command mode
Physical interface configuration mode/Aggregation group interface configuration/VLAN
interface configuration mode.
User level
15
Usage guidelines
Scenario
To bring the defined ACL rules into effect, apply the rule to the interface.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
ACL rules cannot be changed after applied to the interface. To change ACL rules, use the
no form of the command to delete the configurations.
The number of ACL rules should be greater than 0.
Examples
This example shows how to apply ACL rule 1001 to the ingress direction of interface 1.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#filter ingress access-list 1001
Set successfully.
Related commands
show access-list
Function
To clear statistics of ACL, use this command.
Format
clear filter statistics interface interface-type interface-number ingress [ access-list acl-
number ]
Parameters
Parameter Description
interface-type Interface type
interface- Interface ID
number The form and value range depend on the interface type.
ingress Clear statistics on ingress direction.
access-list acl- Access control list number, an integer
number Ranging from 1000 to 1999, enter standard IP ACL configuration
mode.
Ranging from 2000 to 2999, enter extended IP ACL configuration
mode.
Ranging from 3000 to 3999, enter MAC ACL configuration mode.
Ranging from 5000 to 5999, enter user ACL configuration mode.
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to clear statistics of ACL.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to clear ACL statistics on gigabit interface 1.
Raisecom#config
Raisecom(config)#clear filter statistics interface gigaethernet 1/1/1
ingress
Set successfully.
Related commands
show access-list
Function
To show filter information, use this command.
Format
show filter interface
show filter interface interface-type interface-number ingress
show filter statistics interface interface-type interface-number ingress access-list acl-
number
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
statistics statistics
Parameter Description
ingress Clear statistics on ingress direction.
access-list acl- Access control list number, an integer
number Ranging from 1000 to 1999, enter standard IP ACL configuration
mode.
Ranging from 2000 to 2999, enter extended IP ACL configuration
mode.
Ranging from 3000 to 3999, enter MAC ACL configuration mode.
Ranging from 5000 to 5999, enter user ACL configuration mode.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
11
Usage guidelines
N/A
Examples
This example shows how to show filter information on gigabit interface 1.
Raisecom#show filter interface gigaethernet 1/1/1
Interface Direction Acl-Num
-----------------------------------------
gigaethernet1/1/1 ingress 1001
Field Description
Interface Interface
Direction Direction
Acl-Num ACL number
RuleId Filter rule ID
Field Description
Interface Interface
Direction Direction
Acl-Num ACL number
RuleId Filter rule ID
Access Type
Bytes Byte
Pkts Packet
Related commands
N/A
Function
To show Access-List, use this command.
Format
show access-list [acl-number | name acl-name ]
Parameters
Parameter Description
acl-number Access control list number, an integer
Ranging from 1000 to 1999, enter standard IP ACL configuration
mode.
Ranging from 2000 to 2999, enter extended IP ACL configuration
mode.
Ranging from 3000 to 3999, enter MAC ACL configuration mode.
Ranging from 5000 to 5999, enter user ACL configuration mode.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
You can use this command to show Access-List information.
Raisecom(config)#show access-list
Acl RuleCount InUse Type Name
-------------------------------------------------------------------------
------
1000 1 Yes IPv4-Std --
1001 0 No IPv4-Std --
2000 0 No IPv4-Ext --
2001 0 No IPv4-Ext --
2002 0 No IPv4-Ext --
3000 0 No Mac --
5000 0 No Udf --
6000 1 No IPv6 -a6-
7000 1 No Advanced --
Field Description
ACL ACL number
RuleCount Number of rules
InUse Application
Type Type
Name Name
Related commands
N/A
Function
To configure the static APR table rule, use this command. To disable this function, use the no
form of this command.
Format
ip arp-inspection binding ip-address [ mac-address ] [ vlan vlan-id ] interface-type
interface-number
no ip arp-inspection binding { ip-address | all [interface-type interface-number ] }
Parameters
Parameter Description
ip-address Binding IP address, in dotted decimal notation, such as 10.0.0.1
mac-address Binding MAC address, in dotted hexadecimal notation, such as
000E.5E12.3456
vlan vlan-id Binding VLAN ID, an integer, ranging from 1 to 4094
interface-type Interface type
interface- Interface ID
number The form and value range depend on the interface type.
all All binding interfaces
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the static ARP binding table rule. The binding IP
address and the binding interface are required. You cannot configure two static binding rules
for one IP address. If you configure a new dynamic binding rule for an IP address that already
had a dynamic binding rule, the new one will replace the formal one.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Enable static APR binding on the device, or the configured static binding rule will not take
effect.
Examples
This example shows how to configure the static binding rule of interface 1/1/2 with IP address
of 10.0.0.1 and VLAN 10 associated.
Raisecom#config
Raisecom(config)#ip arp-inspection binding 10.0.0.1 vlan 10 gigaethernet
1/1/2
Set successfully
Related commands
show ip arp-inspection
Function
To enable ARP binding, use this command. To disable this function, use the no form of this
command.
Format
ip arp-inspection dhcp-snooping
no ip arp-inspection dhcp-snooping
Parameters
N/A
Default conditions
Dynamic ARP binding is disabled.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use dynamic ARP inspection to separate unsecure APR packets and prevent ARP
spoofing attack.
Dynamic binding works with DHCP Snooping to form dynamic binding relations. When
dynamic DHCP Snooping is enabled, the contents in the DHCP Snooping binding table will
be learned to the dynamic ARP binding table. Changes in DHCP Snooping entries will be
synchronized to dynamic binding entries.
Prerequisite
You can used the ip dhcp snooping command to enable DHCP Snooping
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable ARP binding.
Raisecom#config
Raisecom(config)#ip arp-inspection dhcp-snooping
Set successfully
Related commands
ip dhcp snooping
show ip arp-inspection
Function
To enable static ARP binding, use this command. To disable this function, use the no form of
this command.
Format
ip arp-inspection static-config
no ip arp-inspection static-config
Parameters
N/A
Default conditions
Static ARP binding is disabled.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use dynamic ARP inspection to prevent ARP spoofing attack and separate unsecure
APR packets. Whether ARP packets be trusted or not depends on the trust status of the
interface and whether the packets meet the requirements is decided by the binding table.
You can manually configure static binding. When static ARP binding is enabled, static ARP
inspection binding rules configured on the device will take effect immediately.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable static ARP binding.
Raisecom#config
Raisecom(config)#ip arp-inspection static-config
Set successfully
Related commands
ip arp-inspection binding
show ip arp-inspection
Function
To configure the interface to dynamic ARP inspection trusted interface, use this command. To
configure the interface to untrusted interface, use the no form of this command.
Format
ip arp-inspection trust
no ip arp-inspection trust
Parameters
N/A
Default conditions
The interface is untrusted interface and do not trust ARP packets.
Command mode
Physical layer interface configuration
User level
11
Usage guidelines
Scenario
When static or dynamic ARP binding is enabled:
Trusted interface will stop ARP inspection and allow all ARP packets to pass.
Untrusted interface will provide the interface with ARP protection. Packets that meet the
requirements of the binding table rules are allowed to pass. Packets do not meet the
requirements will be discarded.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure interface 1/1/2 to dynamic ARP inspection trusted
interface.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#ip arp-inspection trust
Set successfully
Related commands
show ip arp-inspection
Function
To configure dynamic ARP inspection protection VLAN, use this command. To disable this
function, use the no form of this command.
Format
ip arp-inspection vlan vlan-list
Parameters
Parameter Description
vlan vlan-list Protection VLAN ID list, an integer, ranging from 1 to 4094
Support multiple VLAN input, such as "1, 2, and 3".
Support VLAN range input, such as "1-3".
Default conditions
Dynamic ARP inspection protection, protecting all VLANs
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure dynamic ARP inspection to protect specified VLAN.
When the command is executed, untrusted interface VLAN will be protected. APR packets
that meet the requirements of the binding table rules will be allowed to pass, other packets
will be discarded.
Use the no ip arp-inspection vlan command to delete certain or all protection VLAN
configurations. ARP protection for VLAN will be stopped.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
All VLANs protection is based on interface configuration, with each interface automatically
generates 1 ACL. In part VLAN protection, each interface will generate 1 ACL for each
protected VLAN. For this reason, redundant protection VLAN list is not recommended.
Examples
This example shows how to configure ARP protection VLAN to VLAN 1 to VLAN 3.
Raisecom#config
Raisecom(config)#ip arp-inspection vlan 1-3
Set successfully
Related commands
show ip arp-inspection
Function
To enable rate limiting on ARP packets on the interface, use this command. To disable this
function, use the disable form of this command.
Format
ip arp-rate-limit { enable | disable }
Parameters
Parameter Description
Default conditions
The rate limiting on ARP packets on the interface is disabled.
Command mode
Physical layer interface configuration
User level
11
Usage guidelines
Scenario
You can use rate limiting on ARP packets to prevent mass ARP packets attack. If the attacker
sends too much ARP packets to the interface of the device, a CPU overload may occur. This
may affect the normal operation of the system or even cause device breakdown.
You can enable rate limiting on ARP packets to configure the maximum number of ARP
packets received per second on the interface. If the number exceeds the threshold, the device
will regard the interface as under attack and will discard all ARP packets on the interface to
avoid further attack.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to how to enable rate limiting on ARP packets on interface 1/1/2.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#ip arp-rate-limit enable
Set successfully
Related commands
show ip arp-rate-limit
Function
To configure the threshold of rate limiting on ARP packets, use this command. To return to
the default condition, use the no form of this command.
Format
ip arp-rate-limit rate rate-value
no ip arp-rate-limit rate
Parameters
Parameter Description
rate-value Threshold, an integer, ranging from 1 to 1000 packet/s
Default conditions
The threshold of the ARP packets is 100 packet/s.
Command mode
Physical layer interface configuration
User level
11
Usage guidelines
Scenario
You can configure the threshold of rate limiting on ARP packets to configure the maximum
number of ARP packets received per second on the interface. If the number exceeds the
threshold, the device will regard the interface as under attack and will discard all ARP packets
on the interface to prevent further attack.
Prerequisite
Use the ip arp rate limit enable command to enable ARP packets rate limiting.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the threshold of rate limiting on ARP packets of
interface 1/1/2 to 200 packet/s.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#ip arp-rate-limit rate 200
Set successfully
Related commands
show ip arp-rate-limit
Function
To enable ARP packets rate limiting automatic recovery on the interface, use this command.
To disable this function, use the disable form of this command.
Format
ip arp-rate-limit recover { enable | disable }
Parameters
Parameter Description
Default conditions
ARP packets rate limiting automatic recovery on the interface is disabled.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can enable this function to enable ARP packets rate limiting automatic recovery on the
interface. When the automatic recovery time expires, the interface will recover to its original
status and allow ARP packets to pass.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable ARP packets rate limiting automatic recovery on the
interface.
Raisecom#config
Raisecom(config)#ip arp-rate-limit recover enable
Set successfully
Related commands
show ip arp-rate-limit
Function
To configure the automatic recovery time, use this command. To return to the default
condition, use the no form of this command.
Format
ip arp-rate-limit recover time time
no ip arp-rate-limit recover time
Parameters
Parameter Description
time Automatic recovery time, an integer, ranging from 10 to 3600 s
Default conditions
The automatic recovery time is 30s.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the automatic recovery time on the interface.
When the automatic recovery time expires, the attacked interface will recover to its normal
status and allow ARP packets to pass.
Prerequisite
Use the ip arp-rate-limit recover enable command to enable automatic recovery on the
interface.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the automatic recovery time to 100s.
Raisecom#config
Raisecom(config)#ip arp-rate-limit recover time 100
Set successfully
Related commands
ip arp-rate-limit recover enable
show ip arp-rate-limit
Function
To show dynamic ARP inspection configurations, use this command.
Format
show ip arp-inspection
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
Scenario
You can use this command to show dynamic ARP inspection configurations, including static
ARP binding status, dynamic DHCP Snooping binding status, protected VLAN of dynamic
ARP inspection, number of binding rules, ACLs, remnant ACLs and trusted ARP packets
configurations on the interface.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to show status of ARP binding table rules and trusted ARP packets.
Raisecom#show ip arp-inspection
Static Config ARP Inspection: Disable
DHCP Snooping ARP Inspection: Disable
ARP Inspection Vlan: All
Bind Rule Num : 0
Vlan Acl Num : 0
Remained Acl Num : 512
Port Trust
--------------------------
P1 yes
P2 no
P3 no
P4 no
Field Description
Static Config ARP Inspection Static ARP inspection status
Enable: enabled
Disable: disabled
DHCP Snooping ARP Inspection Dynamic ARP inspection status
Enable: enabled
Disable: disabled
ARP Inspection Vlan ARP inspection protection VLAN
Bind Rule Num Number of ARP binding entries
Vlan Acl Num Number of VLAN ACL entries
Remained Acl Num Number of remnant ACL entries
Port Interface ID
Trust Trust status
Yes: trusted interface
No: untrusted interface
Related commands
N/A
Function
To show the ARP binding table information, use this command.
Format
show ip arp-inspection binding [ interface-type interface-number ]
Parameters
Parameter Description
port port-id Interface ID, an integer, ranging from 1 to the maximum Interface ID
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
Scenario
You can use this command to show the ARP binding table information, including all the rules
in the dynamic ARP inspection table, the number of current rules and the maximum number
of the rules in history.
You can use this command to show dynamic ARP inspection binding table rules on specified
interface.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to show ARP binding table information.
Raisecom#show ip arp-inspection binding
Ip Address Mac Address VLAN Port Type Inhw
---------------------------------------------------------------------
10.0.0.1 -- 10 port1 static no
Field Description
Ip Address IP address
Mac Address MAC address
VLAN VLAN ID
Port Interface ID
Type Type
Static: static binding
DHCP-snooping: dynamic binding
Field Description
Inhw Whether write to the hardware
yes: write to the hardware
no: not write to the hardware
Current Rules Num Number of current rules
History Max Rules Num Number of maximum rules in history
Related commands
N/A
Function
To show the Configurations of rate limiting on ARP packets, use this command.
Format
show ip arp-rate-limit
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
Scenario
You can use this command to show Configurations of rate limiting on ARP packets, including
global automatic recovery status, automatic recovery time, ARP rate limiting status, ARP
limiting rate and ARP limiting rate status.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to show Configurations of rate limiting on ARP packets.
Raisecom#show ip arp-rate-limit
arp rate limit auto recover: disable
arp rate limit auto recover time: 30 second
Port Enable-Status Rate(Num/Sec) Overload
--------------------------------------------------
1 Enabled 100 Yes
2 Disabled 100 No
3 Disabled 100 No
4 Disabled 100 No
5 Disabled 100 No
6 Disabled 100 No
28 Disabled 100 No
Field Description
arp rate limit auto recover ARP rate limiting automatic recovery status
Enable: enabled
Disable: disabled
arp rate limit auto recover time ARP rate limiting automatic recovery time
Port Interface ID
Enable-Status ARP packets rate limiting status
Enabled: enabled
Disabled: disabled
Rate(Num/Sec) Rate (packet/s)
Overload Overload status
Yes: overload
No: not overload
Related commands
N/A
11.4 RADIUS/TACACS+
11.4.1 aaa accounting fail
Function
To configure processing modes for accounting failure, use this command.
Format
aaa accounting fail { online | offline }
Parameters
Parameter Description
online Allow login.
offline Disallow login.
Default conditions
The processing mode for accounting failure is online.
Command mode
Privileged EXEC
User level
15
Usage guidelines
Scenario
You can use this command to configure processing modes for accounting failure.
Online: you are allowed to log in to the device when successfully authenticated but
failed to connect to the RADIUS/TACACS+ sever.
Offline: you are not allowed to login in to the device when successfully authenticated but
failed to connect to the RADIUS/TACACS+ sever.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
This configuration only applies to users who configure processing modes before
authenticating through the RADIUS/TACACS+ server.
Examples
This example shows how to configure the processing mode of accounting failure to offline.
Raisecom#aaa accounting fail offline
Set successfully.
Related commands
show radius-server
show tacacs-server
Function
To enable RADIUS/TACACS+ accounting, use this command. To disable this function, use
the disable form of this command.
Format
aaa accounting login { enable | disable }
Parameters
Parameter Description
enable Enable RAUIUS/TACACS+ accounting.
disable Disable RADIUS/TACACS+ accounting.
Default conditions
RADIUS/TACACS+ accounting is disabled.
Command mode
Privileged EXEC
User level
15
Usage guidelines
Scenario
You can use this command to enable or disable the RADIUS/TACACS+ accounting. When
you log in to the device, the RADIUS/TACACS+ server will send a Start packet to start
accounting. During the login, the server will keep sending Update packets to update
accounting. When you log out of the device, the server will send a Stop packet to stop
accounting. The packets will contain the login and logout time. Through sending packets, the
RADIUS/TACACS server can record the access time and operation of each user.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable RADIUS/TACACS+ accounting.
Raisecom#aaa accounting login enable
Set successfully.
Related commands
show radius-server
show tacacs-server
Function
To configure a period for sending accounting update packets, use this command. To return to
the default condition, use the no form of this command.
Format
aaa accounting update minute
no aaa accounting update
Parameters
Parameter Description
update minute Period, an integer, ranging from 0 to 300min
Default conditions
The period is 0, which means no update packet is sent.
Command mode
Privileged EXEC
User level
15
Usage guidelines
Scenario
You can use this command to configure the period for sending accounting update packets.
With the value being 0: the client will send a start packet to the server when the user logs
in to the device and a stop packet when the user logs out of the device. The client will
not send any update packet.
With the value not being 0: Except for the start packet and the stop packet, the server
will also send update packets periodically.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the period for sending accounting update packets to 10
minutes.
Raisecom#aaa accounting update 10
Set successfully.
Related commands
show radius-server
show tacacs-server
Function
To enable RADIUS authentication through command line, use this command. To disable this
function, use the disable form of this command.
Format
aaa command authorize{ enable | disable }
Parameters
Parameter Description
enable Enable RADIUS authentication through command line.
disable Disable RADIUS authentication through command line.
Default conditions
RADIUS authentication through command line is disabled.
Command mode
Privileged EXEC
User level
15
Usage guidelines
Scenario
You can use this command to enable/disable RADIUS authentication through command line.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable RADIUS authentication through command line.
Raisecom#aaa command authorize enable
Set successfully.
Related commands
N/A
Function
To clear statistics of TACACS, use this command.
Format
clear tacacs statistics
Parameters
N/A
Default conditions
N/A
Command mode
Privileged EXEC
User level
15
Usage guidelines
Scenario
You can use this command to clear statistics of TACACS.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Executing this command will clear all statistics of TACACS. Use it with caution.
Examples
This example shows how to clear statistics of TACACS.
Raisecom#clear tacacs statistics
Set successfully.
Related commands
N/A
Function
To configure authentication mode for enter privileged EXEC mode through common mode,
use this command.
Format
enable login { local-tacacs | tacacs-local | tacacs-user }
Parameters
Parameter Description
local-tacacs When local authentication coexists with TACACS+ authentication, use
local authentication.
tacacs-local When local authentication coexists with TACACS+ authentication, use
TACACS+ authentication.
tacacs-user Use TACACS+ authentication.
Default conditions
The authentication mode for entering privileged EXEC mode from common mode is local
authentication.
Command mode
Privileged EXEC
User level
15
Usage guidelines
Scenario
After being authenticated and authorized, privileged users can log in to the network, and
obtain network resources. All the authentication and authorization information will be stored
in the remote RADIUS server, the remote TACACS+ server, or the local device. You can use
this command to configure the authentication mode for privileged user.
Prerequisite
Ensure the authentication server already has information of the privileged user (user name and
password), or you cannot log in to the device.
Follow-up procedure
N/A
Precaution
The newly-configured login mode will take effect next time you log in to the device.
To use Radius/TACACS+ authentication, ensure that the server and the device are
properly connected and the server already has your information, or you cannot log in to
the device.
Examples
This example shows how to enter privileged EXEC mode through local authentication.
Raisecom#enable login local-tacacs
Set User Login Method successfully
Related commands
show user
11.4.7 radius
Function
To configure the IP address and interface ID for the RADIUS authentication server, use this
command. To return to the default condition, use the no form of this command.
Format
radius [ backup ] ip-address [ auth-port port-id ] [ vpn-instance vrf-name ] [ sourceip ip-
address ]
no radius [ backup ]
Parameters
Parameter Description
Select backup: configure the IP address for the backup RADIUS
backup
authentication server.
Not select backup: configure the IP address for the working
Default conditions
The IP address for the RADIUS authentication server is not configured. The authentication
interface ID is 1812.
Command mode
Privileged EXEC
User level
15
Usage guidelines
Scenario
AAA stands for authentication, authorization, and accounting. AAA supports several
protocols including RADIUS. Generally, the working RADIUS server is used. When the
working server fails to response, the backup server will be used. You can use this command to
configure the IP address and the interface ID for the RADIUS authentication server.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the IP address for the RADIUS authentication server
to 10.0.0.1 and interface ID to 1000.
Raisecom#radius 10.0.0.1 auth-port 1000
Set successfully.
Related commands
show radius-server
Function
To configure the IP address and interface ID for the RADIUS accounting server, use this
command. To return to the default condition, use the no form of this command.
Format
radius [ backup ] accounting-server ip-address [ account-port ] [ sourceip ip-address ]
no radius [ backup ] accounting-server
Parameters
Parameter Description
Select backup: configure the IP address for the backup
backup
RADIUS accounting server.
Not select backup: configure the IP address for the working
Default conditions
The IP address for the RADIUS accounting server is 0.0.0.0. The interface ID is 1813.
Command mode
Privileged EXEC
User level
15
Usage guidelines
Scenario
AAA stands for authentication, authorization, and accounting. AAA supports several
protocols including RADIUS. Generally, the working RADIUS server is used. When the
working server fails to response, the backup server will be used.
The RADIUS server will start accounting when you successfully log in to the device. You can
use this command to configure the IP address and interface ID for the RADIUS accounting
server.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the IP address for the RADIUS accounting server to
10.10.10.1, and interface ID to 1000.
Raisecom#radius accounting-server 10.10.10.1 1000
Set successfully.
Related commands
show radius-server
Function
To configure the shared key of the RADIUS accounting server, use this command. To return
to the default condition, use the no form of this command.
Format
radius accounting-server key string
no radius accounting-server key
Parameters
Parameter Description
key string Key string, a string of 1 to 200 characters
Default conditions
The shared key of the RADIUS accounting server is null.
Command mode
Privileged EXEC
User level
15
Usage guidelines
Scenario
Generally, users are connected to the Network Access Server (NAS) and NAS is connected to
the RADIUS server or the TACACS+ server. The device functions as a NAS. It is responsible
for passing authentication and accounting information to the RADIUS server, using the
RADIUS protocol. Authenticates users can acquire authorities to access network or utilize
network resources. To prevent users' passwords from being snooped when they are
transmitted across insecure network, the NAS and the RADIUS server use a shared key to
communicate. You can use this command to configure the shared key of the RADIUS
accounting server.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the shared key of RADIUS accounting server to
Raisecom.
Raisecom#radius accounting-server key raisecom
Set successfully.
Related commands
show radius-server
11.4.10 radius-key
Function
To configure the shared key of RADIUS authentication server, use this command. To return to
the default condition, use the no form of this command.
Format
radius-key string
no radius-key
Parameters
Parameter Description
string Key string, a string of 1 to 200 characters
Default conditions
The shared key of the RADIUS authentication server is null.
Command mode
Privileged EXEC
User level
15
Usage guidelines
Scenario
Generally, users are connected to the Network Access Server (NAS) and NAS is connected to
the RADIUS server or the TACACS+ server. The device functions as a NAS. It is responsible
for passing authentication and accounting information to the RADIUS server, using the
RADIUS protocol. Authenticates users can acquire authorities to access network or utilize
network resources. To prevent users' passwords from being snooped when they are
transmitted across insecure network, the NAS and the RADIUS server use a shared key to
communicate. You can use this command to configure the shared key of the RADIUS
accounting server.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the shared key of the RADIUS authentication server to
raisecom.
Raisecom#radius-key raisecom
Set successfully.
Related commands
show radius-server
Function
To show RADIUS/TACACS+ accounting information, use this command.
Format
show aaa
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
15
Usage guidelines
Scenario
You can use this command to show RADIUS/TACACS+ accounting information.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to show RADIUS accounting information.
Raisecom#show aaa
Accounting login : enable
Update interval(m) : 0
Accounting fail policy : online
dot1x user login method: radius
Field Description
Accounting login RADIUS accounting status
Update interval(m) Update period
Accounting fail policy Processing mode for accounting failure
dot1x user login method Dot1x user authentication mode
Related commands
radius key
aaa accounting login
aaa accounting update
aaa accounting fail
Function
To show configurations of the RADIUS server, use this command.
Format
show radius-server
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
15
Usage guidelines
N/A
Examples
This example shows how to show RADIUS server configurations
Raisecom#show radius-server
Authentication server IP: 0.0.0.0 port:1812
Backup authentication server IP:0.0.0.0 port:1812
Authentication server key:
Accounting server IP: 0.0.0.0 port:1813
Backup accounting server IP: 0.0.0.0 port:1813
Accounting server key:
Accounting login: disable
Update interval(min.): 0
Accounting fail policy: online
Field Description
Authentication server IP IP address of the authentication server
Backup authentication server IP IP address of the backup authentication server
Authentication server key Shared key of the authentication server
Accounting server IP IP address of the accounting server
Backup accounting server IP IP address of the backup accounting server
Accounting server key Shared key of the accounting server
Accounting login Accounting status
Update interval Update period
Accounting fail policy Processing mode for accounting failure
Related commands
N/A
Function
To show configurations of the TACACS+ server, use this command.
Format
show tacacs-server
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
15
Usage guidelines
N/A
Examples
This example shows how to show configurations of the TACACS+.
Raisecom#show tacacs-server
Server Address: --
Backup server Address: 10.0.0.1
Sever Shared Key: raisecom
Accounting server Address: --
Backup Accounting server Address: --
Total Packet Sent: 0
Total Packet Recv: 0
Num of Error Packets: 0
Field Description
Server Address Server address
Backup Server Address Backup server address
Sever Shared Key Shared key of the server
Accounting server Address Accounting server address
Backup Accounting server Address Backup accounting server address
Total Packet Sent Total number of sent packets
Total Packet Recv Total number of received packets
Field Description
Num of Error Packets Number of error packets
Related commands
N/A
Function
To show user information on the device, use this command.
Format
show user { active | table }
Parameters
Parameter Description
active Show information about logged-in users.
table Show user information table.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show logged-in user information.
Raisecom#show user active
Username : raisecom
Priority : 15
Server IP : --
Terminal IP : 0.0.0.0
Login Type : telnet-1
Field Description
Username User name
Priority Priority
User of higher priority value has greater privileges and can use more
command lines.
Server IP IP address of the server
Terminal IP IP address of the terminal
Login Type User login type:
Telnet
Console
Ssh
This example shows how to show detailed information of the user information table.
Raisecom#show user table detail
User Login :local-user
Enable Login:local-user
Enable Authen:bypass
Username:1
Priority:5
Server :Local
Login :telnet
Status :online
Username:raisecom
Priority:15
Server :Local
Login :--
Status :offline
Field Description
User Login Authentication mode for user login
Enable Login Login mode to enter privileged EXEC mode
Enable Authen Authentication mode to enter privileged EXEC mode
Username User name
Field Description
Priority User priority, ranging from 0 to 15
User of higher priority value has greater privileges and can use
more command lines.
Server User login authentication mode
Local: authenticate through local user name and password.
Radius: authentication through user name and password on the
RADIUS server
TACACS+: authentication through user name and password on
Related commands
N/A
Function
To configure the IP address for the TACACS+ accounting server, use this command. To return
to the default condition, use the no form of this command.
Format
tacacs [ backup ] accounting-server ip-address
no tacacs [ backup ] accounting-server
Parameters
Parameter Description
Select backup: Configure the IP address for the backup
backup
TACACS+ accounting server.
Not select backup: Configure the IP address for the working
Default conditions
The IP address of the TACACS+ accounting server is null.
Command mode
Privileged EXEC
User level
15
Usage guidelines
Scenario
AAA stands for authentication, authorization, and accounting. AAA supports several
protocols including TACACS+.
Generally, the working TACACS+ server is used. When the working server fails to response,
the backup server will be used. The TACACS+ server will start accounting when you
successfully log in to the device. You can use this command to configure the IP address for
the working or backup TACACS+ accounting server.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the IP address for the TACACS+ accounting server to
10.0.0.1.
Raisecom#tacacs accounting-server 10.0.0.1
Set successfully.
Related commands
show tacacs-server
11.4.16 tacacs-server
Function
To configure the IP address for the TACACS+ authenticating server, use this command. To
return to the default condition, use the no form of this command.
Format
tacacs-server [ backup ] ip-address
no tacacs-server [ backup ]
Parameters
Parameter Description
Select backup: configure the IP address for the backup TACACS+
backup
authenticating server.
Not select backup: configure the IP address for the working
Default conditions
The IP address of the TACACS+ authenticating server is null.
Command mode
Privileged EXEC
User level
15
Usage guidelines
Scenario
AAA stands for authentication, authorization, and accounting. AAA supports several
protocols including TACACS+.
Generally, the working TACACS+ server is used. When the working server fails to response,
the backup server will be used. The TACACS+ server will start accounting when you
successfully log in to the device. You can use this command to configure the IP address for
the working or backup TACACS+ accounting server.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the IP address of the TACACS+ authenticating server
to 10.0.0.1
Raisecom#tacacs-server backup 10.0.0.1
Set successfully.
Related commands
show tacacs-server
Function
To configure the shared key of the TACACS+ server, use this command. To return to the
default condition, use the no form of this command.
Format
tacacs-server key string
no tacacs-server key
Parameters
Parameter Description
key string Key string, a string of 1 to 200 characters
Default conditions
The shared key of the TACACS+ server is null.
Command mode
Privileged EXEC
User level
15
Usage guidelines
Scenario
Generally, users are connected to the Network Access Server (NAS) and NAS is connected to
the RADIUS server or the TACACS+ server. The device functions as a NAS. It is responsible
for passing authentication and accounting information to the TACACS+ server, using the
TACACS+ protocol. Authenticated users can acquire authorities to access network or utilize
network resources. To prevent users' passwords from being snooped when they are
transmitted across insecure network, the NAS and the TACACS+ server use a shared key to
communicate. You can use this command to configure the shared key of the TACACS+
accounting server.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The TACACS+ authentication server and accounting server shares the same key.
Examples
This example shows how to configure the shared key of the TACACS+ server to raisecom.
Raisecom#tacacs-server key raisecom
Set successfully.
Related commands
show tacacs-server
Function
To configure the authentication mode of user login, use this command.
Format
user login { local-radius | local-user | radius-local [ server-no-response ] | radius-user |
local-tacacs | tacacs-local [ server-no-response ] | tacacs-user }
Parameters
Parameter Description
local-radius When local authentication coexists with RADIUS authentication, use
local authentication.
local-user Use local authentication.
radius-local When local authentication coexists with RADIUS authentication, use
RADIUS authentication.
server-no- Use local authentication only when the RADIUS/TACACS+ server
response has no response.
radius-user Use RADIUS authentication.
local-tacacs When local authentication coexists with TACACS+ authentication,
use local authentication.
tacacs-local When local authentication coexists with TACACS+ authentication,
use TACACS+ authentication.
tacacs-user Use TACACS+ authentication.
Default conditions
The user login mode is local-user.
Command mode
Privileged EXEC
User level
15
Usage guidelines
Scenario
After being authenticated and authorized, privileged users can log in to the network, and
obtain network resources. All the authentication and authorization information will be stored
in the remote RADIUS server, the remote TACACS+ server, and Network Access Server
(NAS), namely local device. You can use this command to configure the authentication mode
for privileged user.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The newly-configured login mode will take effect next time you log in to the device.
To use Radius/TACACS+ authentication, ensure that the server and the device are
properly connected and the server already has your information, or you cannot log in to
the device.
Examples
This example shows how to the login mode to local-radius.
Raisecom#user login local-radius
Set User Login Method successfully.
Related commands
N/A
11.5 802.1x
11.5.1 clear dot1x statistics
Function
To clear statistics of the 802.1x packets on the interface, use this command.
Format
clear dot1x interface-type interface-number statistics
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to clear statistics of 802.1x packets on the interface.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Executing this command will clear all statistics of 802.1x packets. Use it with caution.
Examples
This example shows how to clear statistics of 802.1x packets on the interface.
Raisecom#config
Raisecom(config)#clear dot1x port-list 1 statistics
Set successfully.
Related commands
show dot1x statistics
Function
To enable global 802.1x or interface 802.1x, use this command. To disable this function, use
the disable form of this command.
Format
dot1x { enable | disable }
Parameters
Parameter Description
enable Enable 802.1x.
disable Disable 802.1x.
Default conditions
Global 802.1x and interface 802.1x are disabled.
Command mode
Global configuration/Physical layer interface configuration
User level
11
Usage guidelines
Scenario
The 802.1x is an access control protocol based on physical interface. You can use this
command to enable or disable the 802.1x. Interface 802.1x management will only take effect
when both global 802.1x and interface 802.1x are both enabled.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
We do not recommend enabling the 802.1x on aggregated interface or non-Access
interface.
Configure this command on the interface connected to the user.
Examples
This example shows how to enable global 802.1x and 802.1x on the interface.
Raisecom#config
Raisecom(config)#dot1x enable
Set successfully.
Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#dot1x enable
Set successfully.
Related commands
show dot1x
Function
To configure the 802.1x authentication mode, use this command. To return to the default
condition, use the no form of this command.
Format
dot1x authentication-method { chap | pap | eap }
no dot1x authentication-method
Parameters
Parameter Description
chap A three-way handshaking Protocol that only transmits user name
through the network. It does not transmit password during
authentication and thus is more secure and reliable.
pap A two-way handshaking protocol that transmits the password in clear
text
eap The switch will directly send authorization information of 802.1x users
to the RADIUS server in form of EAP packets without converting them
into standard RADIUS packets. To configure this mode, the RADIUS
server must support EAP.
Default conditions
The authentication mode is chap.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use EAP mode for authentication if the RADIUS server supports EAP. EAP is
compatible with the standard 802.1x and thus can be used as the relay protocol for
authentication. You can use CHAP or PAP mode if the RADIUS server does not support EAP.
In CHAP mode, the RADIUS server transmits the user information in ciphertext. In PAP
mode, the server transmits the user information in clear text which is less secured. The PAP
mode is compatible with some of the traditional RADIUS server.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the 802.1x authentication mode to CHAP.
Raisecom#config
Raisecom(config)#dot1x authentication-method chap
Set successfully.
Related commands
show dot1x
Function
To configure the access control mode of the interface, use this command.
Format
dot1x auth-control { authorized-force | unauthorized-force | auto }
Parameters
Parameter Description
authorized-force Forced-authorized mode. The interface is in authorized status.
Users can access the network without authentication.
Parameter Description
unauthorized-force Forced-unauthorized mode. The interface is in unauthorized
status. User authentication is not allowed. Users cannot access
the network.
auto Automatic-recognition mode. User authentication is allowed.
User can access the network after authentication.
Default conditions
The access control mode of the interface is auto.
Command mode
Physical layer interface configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the access control mode of the interface.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the access control mode to authorized-force.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#dot1x auth-control authorized-force
Set successfully.
Related commands
show dot1x
Function
To configure the access authentication mode on the interface, use this command.
Format
dot1x auth-method { macbased | portbased }
Parameters
Parameter Description
macbased MAC-based mode. Users cannot access the network through one account
on the same interface. Only the last user authenticated by the interface
can access the network.
portbased Port-based mode. When the first user successfully authenticated, other
users can access the network without authentication.
Default conditions
The authentication mode on the interface is port-based.
Command mode
Physical layer interface configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the access authentication mode on the interface.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the authentication mode on the interface to macbased.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#dot1x auth-method macbased
Set successfully.
Related commands
show dot1x
Function
To enable re-authentication, use this command. To disable this function, use the disable form
of this command.
Format
dot1x reauthentication { enable | disable }
Parameters
Parameter Description
enable Enable re-authentication.
disable Disable re-authentication.
Default conditions
Re-authentication is disabled.
Command mode
Physical layer interface configuration
User level
11
Usage guidelines
Scenario
You can use this command to enable or disable re-authentication on the interface. When re-
authentication is enabled, the device will re-authenticate users periodically.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable re-authentication on the interface.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#dot1x reauthentication enalbe
Set successfully.
Related commands
show dot1x
Function
To configure the re-authentication timeout period, use this command. To return to the default
condition, use the no form of this command.
Format
dot1x timer reauth-period second
no dot1x timer reauth-period
Parameters
Parameter Description
second Re-authentication timeout period, an integer, ranging from 1 to 65535s
Default conditions
The re-authentication timeout period is 3600s.
Command mode
Physical layer interface configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the re-authentication timeout period when re-
authentication on the interface is enabled. The device will re-authenticate users periodically.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the re-authentication timeout period to 1000s.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#dot1x timer reauth-period 1000
Set successfully.
Related commands
show dot1x
Function
To configure the Request/Identity packet timeout period, use this command. To return to the
default condition, use the no form of this command.
Format
dot1x timer tx-period second
no dot1x timer tx-period
Parameters
Parameter Description
second Request/Identity packet timeout period, an integer, ranging from 10 to 120s
Default conditions
The Request/Identity packet timeout period is 30s.
Command mode
Physical layer interface configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the Request/Identity packet timeout period. The
device sends Request/Identity packets to acquire user names. The timer starts after the device
sends the packet. If the device fails to receive the response packet from the user in the
configured period, it will send the Request/Identity packet again.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the Request/Identity packet timeout period to 30s.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#dot1x timer tx-period 30
Set successfully.
Related commands
show dot1x
Function
To configure the Request/MD5 Challenge packet timeout period, use this command. To return
to the default condition, use the no form of this command.
Format
dot1x timer supp-timeout second
no dot1x timer supp-timeout
Parameters
Parameter Description
second Request/MD5 Challenge packet timeout period, an integer, ranging from
10 to 120s
Default conditions
The Request/MD5 Challenge packet timeout period is 30s.
Command mode
Physical layer interface configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the Request/MD5 Challenge packet timeout period.
The device sends Request/MD5 Challenge packets to transmit ciphertext. The timer starts
after the device sends the packet. If the device fails to receive the response packet from the
user in configured period, it will send the Request/MD5 Challenge packet again.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the Request/MD5 Challenge packet timeout period to
100s.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#dot1x timer supp-timeout 100
Set successfully.
Related commands
show dot1x
Function
To configure the RADIUS server timeout period, use this command. To return to the default
condition, use the no form of this command.
Format
dot1x timer server-timeout second
no dot1x timer server-timeout
Parameters
Parameter Description
second RADIUS server timeout period, an integer, ranging from 100 to 300s
Default conditions
The RADIUS server timeout period is 100s.
Command mode
Physical layer interface configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the RADIUS server timeout period. The timer starts
after the server sends the packet. If the device doesn't receive the response packet from the
user in configured period, it will send the packet again.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The period should be greater than the product of the number of attempts configured on the
RADIUS client and the wait time of each attempt.
Examples
This example shows how to configure the RADIUS server timeout period to 200s.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#dot1x timer server-timeout 200
Set successfully
Related commands
show dot1x
Function
To configure the interface quiet period, use this command. To return to the default condition,
use the no form of this command.
Format
dot1x timer quiet-period second
no dot1x timer quiet-period
Parameters
Parameter Description
second Interface quiet period an integer, ranging from 10 to 120s
Default conditions
The interface quiet period is 60s.
Command mode
Physical layer interface configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the interface quite period. When a user fails to be
authenticated, the interface will not respond to new authentication packets. The interface will
restart user authentication when the configured quite period expires.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the interface quite period to 100s.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#dot1x timer quiet-period 100
Set successfully
Related commands
show dot1x
Function
To show the 802.1x information on the interface, use this command.
Format
show dot1x interface-type interface-number
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show information about the 802.1x on the interface.
Raisecom#show dot1x gigaethernet1/1/1
Field Description
802.1x Global Admin State Global 802.1x status
Enable: enabled
Disable: disabled
802.1x Port Admin State Interface 802.1x status
Enable: enabled
Disable: disabled
PAE PAE type, all for Authenticators
PortMethod Interface authentication methods
Macbased: MAC address-based authentication
Portbased: interface-based authentication
PortControl Interface authentication modes
Authorized-force: forced interface authentication
mode
Unauthorized-force: forced interface
unauthorized mode
Auto: protocol authentication mode
Field Description
Backend Authenticator State Backend Authenticator Status
Request: in request status
Response: in respond status
Success: in success status
Fail: in failed status
Timeout: in timeout status
Idle: in idling status
Initialize: in initialized status
Ignore: in ignoring status
Related commands
N/A
Function
To show statistics of 802.1x on the interface, use this command.
Format
show dot1x interface-type interface-number statistics
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show statistics of 802.1x on the interface.
Raisecom#show dot1x port-list 1 statistics
Port gigaethernet1/1/2
--------------------------------------------------------
RxTotal: 0
TxTotal: 0
RxStart: 0
RxLogoff: 0
RxResp: 0
TxReq: 0
TxReqID: 0
RxRespID: 0
RxInvalid: 0
RxLenErr: 0
LastRxVersion: 0
LastRxSrcMAC: 0000.0000.0000
Field Description
RxTotal Number of total EAPOL packets received
TxTotal Number of total EAPOL packets sent
RxStart Number of total EAPOL-Start packets received
RxLogoff Number of EAPOL-Logoff packets received
RxResp Number of EAP Response packets received
TxReq Number of EAP Request packets sent
TxReqID Number of EAP Req/Id packets sent
RxRespID Number of EAP Req/Id packets received
RxInvalid Number of invalid EAPOL packets received
RxLenErr Number of packets received with error length
LastRxVersion Version of the EAPOL packet last received
LastRxSrcMAC MAC address of the EAPOL packet last received
Related commands
N/A
Function
To show information about the authentication user, use this command.
Format
show dot1x interface-type interface-number user
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show information about the authentication user.
Raisecom#show dot1x gigaethernet1/1/1 user
Port gigaethernet1/1/1
--------------------------------------------------------
User Name : --
Mac Address : --
Upstream Ratelimite : 0 kbps
Downstream Ratelimite: 0 kbps
Native vlan : 0
Member Vlan list : --
Untag Vlan list : --
Field Description
User Name User name
Mac Address Client MAC address
Upstream Ratelimite Restricted upstream rate
Downstream Ratelimite Restricted downstream rate
Native vlan Default VLAN
Member Vlan list Member VLAN list
Untag Vlan list Untagged VLAN list
Related commands
N/A
11.6 PPPoE+
11.6.1 clear pppoeagent statistic
Function
To clear statistics of PPPoE+ on the interface, use this command.
Format
clear pppoeagent statistic
Parameter
N/A
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
When PPPoE+ is enabled, the device will calculate the number of received PADI packets,
sent PADI packets, received PADR packets, and sent PADR packets. You can use the clear
pppoeagent statistic [ port-list port-list ] command to cleat all statistics of PPPoE+. The
packet calculator will be cleared.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to clear statistics of PPPoE+ on the interface.
Raisecom#config
Raisecom(config)#clear pppoeagent statistic
Set successfully.
Related commands
show pppoeagent statistic
Function
To enable PPPoE+, use this command. To disable this function, use the disable form of this
command.
Format
pppoeagent { enable | disable }
Parameters
Parameter Description
enable Enable PPPoE+.
disable Disable PPPoE+.
Default conditions
Global PPPoE+ on the device is disabled. Interface PPPoE+ is disabled.
Command mode
Global configuration/Physical layer interface configuration
User level
11
Usage guidelines
Scenario
PPPoE is widely applied to the authentication dial process of broadband accessing. The
authentication packet sent by the PPPoE client only contains basic user information therefore
may cause account overlap and account theft. By adding access device information into the
packet, PPPoE+ combines user account with the access device to prevent account overlap or
account theft, safeguarding the interests of the user and the carrier.
When global PPPoE+ and interfacePPPoE+ are enabled, device information will be added to
the PPPoE+ packets that send to the interface before they are sent to the trust interface. In
short, PPPoE+ adds device information to PPPoE to provide the server with sufficient
information for user authentication.
Enable global PPPoE+in global configuration mode and interface PPPoE+ in physical level
interface configuration mode. Interface PPPoE+ only takes effect when both configurations
are enabled.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
To enable interface PPPoE+ that connected to the client, you should configure the interface
that connected to the server to trust interface.
Examples
This example shows how to enable global PPPoE+.
Raisecom#config
Raisecom(config)#pppoeagent enable
Set successfully.
Related commands
show pppoeagent
Function
To configure the circuit ID on the interface to user-defined string, use this command. To
return to the default condition, use the no form of this command.
Format
pppoeagent circuit-id string
no pppoeagent circuit-id
Parameters
Parameter Description
string Content of the circuit ID, a string of 1 to 63 characters
Circuit ID that includes spacing should be enclosed in double-quotes.
Default conditions
The circuit ID is in form of VLAN ID/Interface ID/Attached string.
Command mode
Physical layer interface configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the circuit ID on specified interface to user-defined
string
There are 2 circuit ID padding modes:
In ONU mode, the form of the circuit ID is fixed. In Switch mode, you can configure the
circuit ID on the interface to user-defined string. You can use this command to configure
the filling content of the circuit ID in switch mode.
In switch mode, circuit ID is in two forms: default form and user-defined form. The
default form is "Interface ID/VLAN ID/Added string". The default content of the
attached string is the hostname of the device. The user-defined form is the string input by
the users.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the circuit ID on the interface to raisecom.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#pppoeagent circuit-id raisecom
Set successfully.
Related commands
show pppoeagent
Function
To configure the attached string in the circuit ID on the switch, use this command. To return
to the default condition, use the no form of this command.
Format
pppoeagent circuit-id { attach-string | format | hex } string
no pppoeagent circuit-id { attach-string | format | hex }
Parameters
Parameter Description
attach-string Any fixed string
format Variable parameters
hex In hexadecimal notion
string Attached string, with the length ranging from 1 to 55 bytes.
If the string contains spacing, enclose the string in double-quotes.
Default conditions
The attached string in Circuit ID is the host name of the device.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
By default, the circuit ID is in form of Interface ID/VLAN ID/attached string. The content of
the attached string is the host name of the device. You can configure it to user-defined string.
You can use this command to configure the attached string of the circuit ID.
The device supports the following variable parameters:
%h: hostname
%s: slot
%v: svlan
%c: cvlan
%p: port
%m: local mac
%r: remote mac
%i: ip address
%u: unit
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the attached string of the circuit ID to user01.
Raisecom#config
Raisecom(config)#pppoeagent circuit-id attach-string user01
Set successfully.
Related commands
show pppoeagent
Function
To configure the circuit ID of the switch to the variable parameter of MAC address, use this
command. To return to the default condition, use the no form of this command.
Format
pppoeagent circuit-id mac-format string
no pppoeagent circuit-id mac-format
Parameters
Parameter Description
mac-format MAC address form, a string, supporting the following 7 forms:
string hhhhhhhhhhhh
hhhh.hhhh.hhhh
hhhh-hhhh-hhhh
hhhh:hhhh:hhhh
hh.hh.hh.hh.hh.hh
hh-hh-hh-hh-hh-hh
hh:hh:hh:hh:hh:hh
Default conditions
The variable parameter of MAC address in Circuit ID is in form of hhhhhhhhhhhh.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
After configuring the circuit ID to support variable parameters, the device will transform
parameter %m and %r to the MAC address. You can use this command to configure the form
of the MAC address.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the variable parameter of MAC address in the circuit
ID of the switch to hhhh.hhhh.hhhh.
Raisecom#config
Related commands
show pppoeagent
Function
To configure the padding mode of the circuit ID on the interface, use this command.
Format
pppoeagent circuit-id mode { onu | switch }
Parameters
Parameter Description
onu ONU mode
switch Switch mode
Default conditions
The circuit ID padding mode of the interface is Switch mode.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
The circuit ID padding mode of the interface is Switch mode. Only when the interface is used
as ONU will the Circuit ID padding mode be ONU mode.
Circuit ID padding information is in fixed form in ONU mode and cannot be configured.
Only in Switch mode can you configure the filling information.
"Interface ID/VLAN/Hostname" stands for the VLAN ID, interface ID and host name.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the padding mode of the circuit ID to ONU mode.
Raisecom#config
Raisecom(config)#pppoeagent circuit-id mode onu
Set successfully.
Related commands
show pppoeagent
Function
To configure the padding mode of the remote ID on specified interface, use this command.
Format
pppoeagent remote-id format { ascii | binary }
Parameters
Parameter Description
ascii Remote ID in ASCII format
binary Remote ID in binary format
Default conditions
The remote ID on the interface is in binary format.
Command mode
Physical layer interface configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the padding mode of the remote ID on specified
interface. If the remote ID is in binary format, fill in the MAC address directly. If the remote
ID is in ASCII format, transform the MAC address into a string before filling it into the
remote ID.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the padding mode of the remote ID to ASCII.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#pppoeagent remote-id format ascii
Set successfully.
Related commands
show pppoeagent
Function
To configure the MAC address filled in the remote ID, use this command.
Format
pppoeagent remote-id { client-mac | switch-mac }
Parameters
Parameter Description
Default conditions
By default, the MAC address filled in remote ID is the switch MAC address.
Command mode
Physical layer interface configuration
User level
11
Usage guidelines
Scenario
The MAC address filled in the remote ID can be the switch MAC address or the PPPoE client
MAC address. You can use this command to configure the MAC address filled in the remote
ID.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the MAC address filled in the remote ID to client MAC
address.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#pppoeagent remote-id client-mac
Set successfully.
Related commands
show pppoeagent
Function
To configure the interface to trust interface, use this command. To return to the default
condition, use the no form of this command.
Format
pppoeagent trust
no pppoeagent trust
Parameters
N/A
Default conditions
The interface is untrusted interface.
Command mode
Physical layer interface configuration
User level
11
Usage guidelines
Scenario
PPPoE+ only deals with PADI packets and PADR packets of PPPoE. After enabling global
PPPoE+ and interface PPPoE, the device will attach access device information to the PPPoE
packets before sending them through the trust interface. You should configure the trust
interface to send PPPoE+ packets received on the trust interface.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
You cannot configure the interface to trust interface when only interface PPPoE+ is
enabled.
When PPPoE+ is enabled on interface connected to the client, the interface connected to
the server should be configured to trust interface.
Examples
This example shows how to configure the interface to trust interface.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#pppoeagent trust
Set successfully.
Related commands
show pppoeagent
Function
To enable tag overwriting on specified interface, use this command. To disable this function,
use the disable form of this command.
Format
pppoeagent vendor-specific-tag overwrite { enable | disable }
Parameters
Parameter Description
enable Enable tag overwriting on specified interface.
disable Disable tag overwriting on specified interface
Default conditions
Tag overwriting on the interface is disabled.
Command mode
Physical layer interface configuration
User level
11
Usage guidelines
Scenario
Tag overwriting is used to overwrite the original tag of packets. After tag overwriting is
enabled, the original tag of the PPPoE packets will be overwritten. If the PPPoE packet does
not carry any tag, new tag will be attached.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable tag overwriting on specified interface.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#pppoeagent vendor-specific-tag
overwrite enable
Set successfully.
Related commands
show pppoeagent
Function
To show configurations of PPPoE+, use this command.
Format
show pppoeagent
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
Scenario
You can use this command to show configurations of PPPoE+, including the attached string,
interface enabling status, tag overwriting enabling status, Remote ID, Remote ID formatting
mode and the content of the Circuit ID.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to show configurations of PPPoE+.
Raisecom#show pppoeagent
Global PPPoE+ status: enable
Attach-string: %default%
Circuit ID padding mode: switch
Port State Overwrite Remote-ID Format-rules Circuit-ID
----------------------------------------------------------------
P1 enable disable switch-mac binary %default%
P2 trust disable switch-mac binary %default%
P3 disable disable switch-mac binary %default%
P4 disable disable switch-mac binary %default%
Field Description
Global PPPoE+ status Global PPPoE+ status
Enable: enabled
Disable: disabled
Attach-string Attached string
Circuit ID Circuit ID padding mode
Switch: Switch mode
ONU: ONU mode
Field Description
Port Interface ID
State Status
Enable: enabled
Disable: disabled
Trust: trust interface
Related commands
N/A
Function
To show statistics of PPPoE+, use this command.
Format
show pppoeagent statistic
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
Scenario
You can use this command to show statistics of PPPoE+ on the interface, including the
number of received PADI packets, sent PADI packets, received PADR packets, and sent
PADR packets.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to shoe statistics of PPPoE+ on the interface.
Raisecom#show pppoeagent statistic
Port PADI-Recv PADI-Send PADR-Recv PADR-Send
-------------------------------------------------------
P1 0 0 0 0
P2 0 0 0 0
P3 0 0 0 0
P4 0 0 0 0
Field Description
Port Interface ID
PADI-Recv Number of received PADI packets, ranging from 0 to 4294967295
PADI-Send Number of sent PADI packets, ranging from 0 to 4294967295
PADR-Recv Number of received PADR packets, ranging from 0 to 4294967295
PADR-Send Number of sent PADR packets, ranging from 0 to 4294967295
Related commands
clear pppoeagent statistic
Function
To enable unknown unicast packets forwarding, use this command. To disable this function,
use the disable form of this command.
Format
dlf-forwarding { enable | disable }
Parameters
Parameter Description
enable Enable DLF packets forwarding.
disable Disable DLF packets forwarding.
Default conditions
Disabled
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
When the device receives an unknown unicast packet, it cannot identify the egress interface
based on the destination MAC address of the unicast packet. The device will send the unicast
packet to all interfaces besides the one that should receive this packet. It may cause broadcast
storm, affecting the network speed. You can use this command to enable or disable DLF
forwarding after which the interface will forward or discard the DLF packets.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable unknown unicast packets forwarding.
Raisecom#config
Raisecom(config)#dlf-forwarding enable
Set successfully.
Related commands
show dlf-forwarding
11.7.2 storm-control
Function
To enable storm control and configure the rate limiting threshold, use this command. To
disable this function, use the no form of this command.
Format
storm-control { broadcast | unknown-multicast | dlf | all } { bps value | pps value }
no storm-control { broadcast | unknown-multicast | dlf | all } { bps value | pps value }
Parameters
Parameter Description
broadcast Execute storm control over broadcast traffic.
unknown-multicast Execute storm control over unknown multicast traffic.
dlf Execute storm control over unknown unicast traffic.
all Execute storm control over broadcast, multicast, and unicast
traffic.
pps value Number of packets allowed to pass per second, an integer,
ranging from 64 to 100000, in increments of 64
bps value Packet rate allowed to pass per second, an integer, ranging
from 1 to 262134, in units of kbits
Default conditions
The rate limiting mode is BPS and the packet rate allowed to pass per second is 64 kbit/s.
Command mode
Interface configuration
User level
11
Usage guidelines
Scenario
When the device receives an unknown unicast packet, it cannot identify the egress interface
based on the destination MAC address of the unicast packet. The device will send the unicast
packet to all interfaces besides the one that should receive this packet. It may cause broadcast
storm, affecting the network speed. You can use this command to enable storm control to
prevent the above-mentioned conditions.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Only one control mode can be used at the same time of storm control. You have to use the no
command first to disable one mode before you configure another mode.
Examples
This example shows how to enable storm control over broadcast traffic under VLAN2.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#storm-control broadcast enable
Set successfully.
Related commands
show storm-control
Function
To show configurations of storm control, use this command.
Format
show storm-control [ interface-type interface-number ]
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show configurations of storm control.
Raisecom#show storm-control
Interface Packet-Type Threshold Unit
--------------------------------------------------------------
gigaethernet1/1/1 Broadcast 64 kbps
Multicast 0 --
Unicast 0 --
--------------------------------------------------------------
gigaethernet1/1/2 Broadcast 64 kbps
Multicast 0 --
Unicast 0 --
--------------------------------------------------------------
gigaethernet1/1/3 Broadcast 64 kbps
Multicast 0 --
Unicast 0 --
--------------------------------------------------------------
gigaethernet1/1/4 Broadcast 64 kbps
Multicast 0 --
Unicast 0 --
--------------------------------------------------------------
gigaethernet1/1/5 Broadcast 64 kbps
Multicast 0 --
Unicast 0 --
--------------------------------------------------------------
Field Description
Interface Interface ID
Packet-Type Packet type
Broadcast: broadcast traffic
Multicast: multicast traffic
Unicast: unknown unicast traffic
Field Description
Threshold Threshold
Unit With the unit of kbit/s
Related commands
N/A
Function
To show DLF forwarding, use this command.
Format
show dlf-forwarding
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration
User level
5
Usage guidelines
N/A
Examples
This example shows how to show DLF forwarding.
Raisecom#show dlf-forwarding
DLF-forwarding: Enable
Related commands
N/A
Function
To configure static binding relations, use this command. To disable this function, use the
disable form of this command.
Format
ip source binding ip-address { mac-address | vlan vlan-id | interface-type interface-number }
no ip source binding ip-address
Parameters
Parameter Description
ip-address IP address, in dotted decimal notation, such as 10.0.0.1
mac-address MAC address, in dotted hexadecimal notation, such as
000E.5E12.3456
vlan vlan-id VLAN ID, an integer, ranging from 1 to 4094
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
Static binding controls the interface by manually configuring the binding information to
produce binding entries. It is applicable to the situation when the number of hosts is small or
you only want to bind a certain host.
You can use this command to configure static binding relations, including Port+IP,
Port+IP+MAC, Port+IP+VLAN, and Port+IP+MAC+VLAN. The newly configured static
binding relation of an IP will override the existing dynamic binding relation of the same IP.
The existing static binding relation will not be override.
You can use the no ip source binding ip-address command to delete the static binding
relation. The dynamic binding relation will recover automatically when the static binding
relation is deleted.
Prerequisite
You can use the ip verify source command to enable static binding.
Follow-up procedure
N/A
Precaution
Enable global static binding before configuring static binding relations. Binding relations
will not take effect when global static binding is disabled.
The overridden dynamic binding relations will recover when static binding relations are
deleted.
Examples
This example shows how to configure the static binding relation of the IP address of 1.2.3.4 to
interface 1/1/2.
Raisecom#config
Raisecom(config)#ip source binding 1.2.3.4 gigaethernet 1/1/2
Set successfully.
Related commands
show ip source binding
Function
To enable automatic dynamic-static entry conversion, use this command. To disable this
function, use the no form of this command.
Format
ip source binding auto-update
no ip source binding auto-update
Parameters
N/A
Default conditions
Automatic dynamic-static entry conversion is disabled.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to automatically convert the dynamic binding relations studies
from DHCP Snooping to static binding relations. Dynamic relations studies before this
function is enabled will not be converted.
After this function is disabled, the dynamic binding relation learned from DHCP Snooping
will not be converted.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable automatic dynamic-static entry conversion.
Raisecom#config
Raisecom(config)#ip source binding auto-update
Set successfully.
Related commands
show ip source binding
Function
To convert dynamic binding relation to static binding relation, use this command.
Format
ip source binding dhcp-snooping static
Parameters
N/A
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to convert dynamic binding relation to static binding relation.
When you delete the static binding relation, the overridden dynamic binding relation of the
same IP address will be recovered.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Binding relations configured will not take effect when global static binding is disabled.
Enable global binding before configure the static binding relation.
You do not need to delete the dynamic binding relation, the newly configure static entry
will directly override the dynamic entry of the same IP address.
You cannot delete dynamic entries manually. Dynamic entry will not override static entry.
When a static entry is deleted, the dynamic entry of the same IP address will be
recovered.
Examples
This example shows how to convert dynamic binding relation to static binding relation.
Raisecom#config
Raisecom(config)#ip source binding dhcp-snooping static
Set successfully.
Related commands
show ip verify source
Function
To enable static binding, use this command. To disable this function, use the no form of this
command.
Format
ip verify source
no ip verify source
Parameters
N/A
Default conditions
Static binding is disabled on the device.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
When global IP Source Guard static binding is enabled, IP packets in trust interface, IP
packets and DHCP packets in untrusted binding table will be forwarded. Other IP packets will
be discarded.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Binding relations configured will not take effect when global static binding is disabled.
Enable global binding before configure the static binding relation.
Examples
This example shows how to enable static binding.
Raisecom#config
Raisecom(config)#ip verify source
Set successfully.
Related commands
show ip verify source
Function
To enable dynamic binding, use this command. To disable this function, use the no form of
this command.
Format
ip verify source dhcp-snooping
no ip verify source dhcp-snooping
Parameters
N/A
Default conditions
Dynamic binding is disabled on the device.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
When global IP Source Guard dynamic binding is enabled, IP packets and DHCP packets in
DHCP Snooping binding entry will be forwarded. Other IP packets will be discarded.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Dynamic binding relations will not take effect when global dynamic binding is disabled.
Examples
This example shows how to enable dynamic binding.
Raisecom#config
Raisecom(config)#ip verify source dhcp-snooping
Set successfully.
Related commands
show ip verify source
Function
To configure the interface to trust interface, use this command. To return to the default
condition, use the no form of this command.
Format
ip verify source trust
no ip verify source trust
Parameters
N/A
Default conditions
All the interfaces are untrusted interfaces.
Command mode
Physical layer interface configuration
User level
11
Usage guidelines
Scenario
When an interface is configured as trust interface, all the packets on the interface will be
forward normally. When global static/dynamic binding is enabled on untrusted interface, only
DHCP packets and packets conformed to binding relations will be forwarded normally, other
packets will be discarded.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure interface 1 to trust interface.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#ip verify source trust
Set successfully.
Related commands
show ip verify source
Function
To configure IPv6 static binding relations, use this command. To disable this function, use the
no form of this command.
Format
ipv6 source binding ipv6-address { mac-address | vlan vlan-id | interface-type interface-
number }
no ipv6 source binding ipv6-address
Parameters
Parameter Description
ipv6-address IPv6 address, in colon hexadecimal notation, such as 3001::1
mac-address MAC address, in dotted hexadecimal notation, such as
000E.5E12.3456
vlan vlan-id VLAN ID, an integer, ranging from 1 to 4094
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
Static binding controls the interface by manually configuring the binding information to
produce binding entries. It is applicable to the situation when the number of hosts is small or
you only want to bind a certain host.
You can use this command to configure static binding relations, including Port+IPv6,
Port+IPv6+MAC, Port+IPv6+VLAN, and Port+IPv6+MAC+VLAN. The newly configured
static binding relation of an IP will override the existing dynamic binding relation of the same
IP. The existing static binding relation will not be override.
You can use the no ipv6 source binding ipv6-address command to delete the static binding
relation. The dynamic binding relation will recover automatically when the static binding
relation is deleted.
Prerequisite
You can use ipv6 verify source command to enable static binding.
Follow-up procedure
N/A
Precaution
Static binding relations configured will not take effect when global static binding is
disabled. Enable global static binding before configure the static binding relation.
When a static entry is deleted, the dynamic entry of the same IP address will be
recovered.
Examples
This example shows how to configure the static binding relation of the IPv6 address of
3001::1 to interface gigaethernet1/1/1.
Raisecom#config
Raisecom(config)#ipv6 source binding 3001::1 gigaethernet1/1/1
Set successfully.
Related commands
show ipv6 source binding
Function
To enable IPv6 static binding, use this command. To disable this function, use the no form of
this command.
Format
ipv6 verify source
no ipv6 verify source
Parameters
N/A
Default conditions
Static binding is disabled.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
When global IP Source Guard static binding is enabled, all IPv6 packets on trust interface,
IPv6 packets and DHCP packets in untrusted interface binding entry will be forwarded
normally. Other IP packets will be discarded.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Static binding relations configured will not take effect when global static binding is
disabled.
Enable global static binding before configure the static binding relation.
Examples
This example shows how to configure static binding.
Raisecom#config
Raisecom(config)#ipv6 verify source
Set successfully.
Related commands
show ipv6 verify source
Function
To enable IPv6 dynamic binding, use this command. To disable this function, use the no form
of this command.
Format
ipv6 verify source dhcp-snooping
no ipv6 verify source dhcp-snooping
Parameters
N/A
Default conditions
Dynamic binding on the device is disabled.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
When IP Source Guard dynamic binding is enabled globally, all IPv6 packets and DHCP
packets in DHCP Snooping binding entry will be forwarded normally. Other IP packets will
be discarded.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Dynamic binding relations will not take effect when global dynamic binding is disabled.
Examples
This example shows how to enable dynamic binding.
Raisecom#config
Raisecom(config)#ipv6 verify source dhcp-snooping
Set successfully.
Related commands
show ipv6 verify source
Function
To configure IPv6 interface to trust interface, use this command. To return to the default
condition, use the no form of this command.
Format
ipv6 verify source trust
no ipv6 verify source trust
Parameters
N/A
Default conditions
All interfaces are untrusted interfaces.
Command mode
Physical layer interface configuration
User level
11
Usage guidelines
Scenario
When an interface is configured as trust interface, all the packets on the interface will be
forward normally. When global static/dynamic binding is enabled on untrusted interface, only
DHCP packets and packets that conform to binding relations will be forwarded normally,
other packets will be discarded.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure interface 1 to trust interface.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#ipv6 verify source trust
Set successfully.
Related commands
show ipv6 verify source
Function
To show IP Source Guard binding information, use this command.
Format
show ip source binding [interface-type interface-number ]
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
Scenario
You can use this command to show IP Source Guard binding information, including the
maximum number of binding entries in history, number of current binding entries, IP address,
MAC address, VLAN ID, interface ID, binding type, and status of whether it is written in the
hardware.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to show binding information.
Raisecom#show ip source binding
History Max Entry Num: 5
Current Entry Num: 4
Ip Address Mac Address VLAN Port Type Inhw
-----------------------------------------------------------------------
192.168.0.1 000e.5e12.3451 10 gigaethernet1/1/1 static yes
192.168.11.19 000e.5e11.1729 29 gigaethernet1/1/2 static yes
192.168.11.23 -- -- gigaethernet1/1/3 static yes
192.168.11.33 -- 16 gigaethernet1/1/4 static yes
Field Description
History Max Entry Num Maximum number of binding entries in history
Current Entry Num Number of current binding entries
Ip Address IP address
Mac Address MAC address
VLAN VLAN ID
Port Interface ID
Type Binding type
Static: static binding
Dynamic: dynamic binding
Inhw Write to hardware or not
Yes: write to hardware
No: not write to hardware
Related commands
N/A
Function
To show global binding status and interface trusting status, use this command.
Format
show ip verify source
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
Scenario
You can use this command to show global binding status and interface trusting status,
including static binding status, dynamic binding status, interface ID, and trusting status.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to show global binding status and interface trusting status.
Field Description
Static Bind Static binding status
Enable: enabled
Disable: disabled
Dhcp-Snooping Bind Dynamic binding status
Enable: enabled
Disable: disabled
Port Interface ID
Trust Trusting status
Yes: trust
No: not trust
Related commands
N/A
Function
To show IPv6 Source Guard binding information, use this command.
Format
show ipv6 source binding [interface-type interface-number ]
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
Scenario
You can use this command to show IP Source Guard binding information, including the
maximum number of binding entries in history, number of current binding entries, IPv6
address, MAC address, VLAN ID, interface ID, binding type, and status of whether it is
written in the hardware.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to show binding information.
Raisecom#show ipv6 source binding
History Max Entry Num: 1
Current Entry Num: 1
Ip Address Mac Address VLAN Port Type Inhw
-----------------------------------------------------------------------
300::1 000e.5e12.3451 10 gigaethernet1/1/1 static yes
Field Description
History Max Entry Num Maximum number of binding entries in history
Current Entry Num Number of current binding entries
Ip Address IP address
Mac Address MAC address
VLAN VLAN ID
Port Interface ID
Field Description
Type Binding type
Static: static binding
Dynamic: dynamic binding
Inhw Write to hardware or not
Yes: write to hardware
No: not write to hardware
Related commands
N/A
Function
To show IPv6 global binding status and interface trusting status, use this command.
Format
show ipv6 verify source
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
Scenario
You can use this command to show global binding status and interface trusting status,
including static binding status, dynamic binding status, interface ID, and trusting status.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to show global binding status and interface trusting status.
Raisecom#show ipv6 verify source
Static Bind: Disable
Dhcp-Snooping Bind: Disable
Port Trust
--------------------
gigaethernet1/1/1 no
gigaethernet1/1/2 no
gigaethernet1/1/3 no
gigaethernet1/1/4 no
gigaethernet1/1/5 no
Field Description
Static Bind Static binding status
Enable: enabled
Disable: disabled
Dhcp-Snooping Bind Dynamic binding status
Enable: enabled
Disable: disabled
Port Interface ID
Trust Trusting status
Yes: trust
No: not trust
Related commands
N/A
Function
To clear statistics of global and interface CPU CAR (Committed Access Rate), use this
command.
Format
clear cpu-protect car { arp | dhcp | global | icmp | igmp } statistics
Parameters
Parameter Description
clear Clear
cpu-protect CPU protection
car Committed access rate
arp ARP packets
dhcp DHCP packets
global Global information
icmp ICMP packets
igmp IGMP packets
statistics Statistics
Default conditions
N/A
Command mode
Physical layer interface configuration
User level
15
Usage guidelines
Scenario
You can use this command to clear statistics of global or interface CPU CAR to starting a new
round of calculation.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
This command will clear all statistics of global or interface CPU CAR. Use it with caution.
Examples
This example shows how to clear statistics of global CPU CAR.
Raisecom#config
Raisecom(config)#clear cpu-protect car global statistics
Set successfully
Related commands
show cpu-protect car statistics
Function
To configure CIR (Committed Information Rate) and CBS (Committed Burst Size) of global
CPU packet protection, use this command. To return to the default condition, use the no form
of this command.
Format
cpu-protect car { arp | dhcp | global | icmp | igmp } kbps cir cir cbs cbs
no cpu-protect car { arp | dhcp | global | icmp | igmp }
Parameters
Parameter Description
cpu-protect CPU protection
car Committed access rate
arp ARP packets
dhcp DHCP packets
global Global information
icmp ICMP packets
igmp IGMP packets
kbps With the unit of Kbit/s
cir cir Committed information rate, an integer, ranging from 1 to 10000 pps
cbs cbs Committed burst size, an integer, ranging from 1 to 10000 Kbytes
Default conditions
The CIR is 500pps. The CBS is 500 Kbytes.
Command mode
Global configuration
User level
15
Usage guidelines
Scenario
You can use this command to configure the CIR and CBS of global CPU packet protection.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the CIR and CBS of global CPU protection to 400 and
600.
Raisecom#config
Raisecom(config)#cpu-protect car global kbps cir 400 cbs 600
Set successfully
Related commands
show cpu-protect car statistics
Function
To show statistics of global or interface CPU CAR, use this command.
Format
show cpu-protect car statistics
Parameters
Parameter Description
cpu-protect CPU protection
car Committed access rate
Parameter Description
statistics Statistics
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show statistics of CPU CAR on interface 1.
Raisecom#show cpu-protect car statistics
PortName Cir(pps) Cbs(KB) pass packet(pkt) drop packet(pkt) pass
byte(byte) drop byte(byte)
-------------------------------------------------------------------------
GE1/4/1 8 1 0 0 0
Field Description
PortName Interface ID
Cir (pps) Committed information rate
Cbs (KB) Committed bust size
pass packet (pkt) Number of passed packets
drop packet (pkt) Number of discarded packets
pass byte (byte) Number of passed bytes
drop byte (byte) Number of discarded bytes
Related commands
clear cpu-protect car statistics
12.1 LLDP
12.1.1 clear lldp global statistic
Function
To clear statistics of Link Layer Discovery Protocol (LLDP) global, use this command.
Format
clear lldp global statistic
Parameters
N/A
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to clear statistics of LLDP global when starting a new calculation.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
This command will clear all statistics of global LLDP. Use it with caution.
Examples
This example shows how to clear statistics of LLDP global.
Raisecom#config
Raisecom(config)#clear lldp global statistic
Set successfully.
Related commands
show lldp statistic
Function
To clear statistics of LLDP on specified interface, use this command.
Format
clear lldp statistic [ interface-type interface-number ]
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to clear statistics of LLDP on specified interface when starting a
new round of calculation.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
This command will clear statistics of LLDP on specified interface. Use it with caution.
Examples
This example shows how to clear statistics of LLDP on interface GE 1/1/1.
Raisecom#config
Raisecom(config)#clear lldp statistic gigaethernet 1/1/1
Set successfully.
Related commands
show lldp statistic
Function
To clear statistics of LLDP neighbour on specified information, use this command.
Format
clear lldp remote-table [ interface-type interface-number ]
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to clear statistics of LLDP neighbour on specified information
when starting a new round of calculation.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
This command will clear statistics of LLDP neighbour on specified information. Use it with
caution.
Examples
This example shows how to clear statistics of neighbour on interface GE 1/1/1.
Raisecom#config
Raisecom(config)#clear lldp remote-table gigaethernet 1/1/1
Set successfully.
Related commands
show lldp remote
Function
To enable global LLDP or interface LLDP, use this command. To disable this function, use the
disable form of this command.
Format
lldp { enable | disable }
Parameters
Parameter Description
enable Enable LLDP.
disable Disable LLDP.
Default conditions
Global LLDP is disabled. LLDP on all interfaces are enabled.
Command mode
Global configuration/Physical layer interface configuration/Aggregation group interface
configuration
User level
11
Usage guidelines
Scenario
LLDP is used to discover the physical interfaces of a device and interfaces that are connected
to other devices. It helps you to quickly locate network fault. With LLDP, when the network
expands, the NView NNM can quickly master Layer 2 network topology information and
topology changes.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable global LLDP.
Raisecom#config
Raisecom(config)#lldp enable
Set successfully.
Related commands
show lldp local config
Function
To configure the delay time for LLDP packets, use this command. To return to the default
condition, use the no form of this command.
Format
lldp message-transmission delay second
no lldp message-transmission delay
Parameters
Parameter Description
second Delay time, an integer, ranging from 1 to 8192 s
Default conditions
The delay time of LLDP packets is 2s.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
When the network status changes, the device will sent LLDP packets to neighbour nodes and
enable the delay timer. During the delay time, if the device status changes again, the device
will not send LLDP packets until the delay time expires.
When the network status changes frequently, you can reduce the frequency for sending LLDP
packets by setting a long delay time.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
We recommend you to configure the interval for sending LLDP packets first. The
interval and the delay time are in inverse relationship. The delay time must be shorter
than or equal to a quarter of the interval. Otherwise, configurations will fail.
Examples
This example shows how to configure the delay time of LLDP packets to 5s.
Raisecom#config
Raisecom(config)#lldp message-transmission delay 5
Set successfully.
Related commands
show lldp local config
Function
To configure a neighbour aging coefficient for LLDP packets, use this command. To return to
the default condition, use the no form of this command.
Format
lldp message-transmission hold-multiplier coefficient
no lldp message-transmission hold-multiplier
Parameters
Parameter Description
coefficient Neighbor aging coefficient, an integer, ranging from 2 to 10
Default conditions
The neighbour aging coefficient for LLDP packets is 4.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
LLDP packets sent by the device are saved on the neighbour node for a certain time. If the
aging time expires, the neighbour node will delete the LLDP packets. You can use this
command to configure the aging coefficient for LLDP packets.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Aging time is the product of the aging coefficient and the interval.
Examples
This example shows how to configure the LLDP neighbour aging time to 10.
Raisecom#config
Raisecom(config)#lldp message-transmission hold-multiplier 10
Set successfully.
Related commands
show lldp local config
Function
To configure the interval for sending LLDP packets, use this command. To return to the
default condition, use the no form of this command.
Format
lldp message-transmission interval second
no lldp message-transmission interval
Parameters
Parameter Description
second Interval for sending LLDP packets, an integer, ranging from 5 to 32768s
Default conditions
The interval for sending LLDP packets is 30s.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
When its status is stable, the device sends LLDP packets periodically to the neighbour node.
Configure a properly value for the interval. If the interval is over long, the device cannot
inform the neighbour node immediately. If the interval is over short, mass LLDP packets will
be sent to the neighbour node, which may increase system load and waste network resources.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The interval and the delay time are in inverse relationship. The delay time must be 3 times
greater than or equal to the aging time.
Examples
This example shows how to configure the interval for sending LLDP packets to 50s.
Raisecom#config
Raisecom(config)#lldp message-transmission interval 50
Set successfully.
Related commands
show lldp local config
Function
To configure the LLDP restart delay time, use this command. To return to the default
condition, use the no form of this command.
Format
lldp restart-delay second
no lldp restart-delay
Parameters
Parameter Description
second Restart delay time, an integer, ranging from 1 to 10s
Default conditions
The LLDP restart delay time is 2s.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
When LLDP is enabled on an interface, you can use this command to configure the restart
delay time. The device notifies the changes to the neighbour node after a period, preventing
topology vibration of the neighbour node caused by the changes of LLDP status.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the LLDP restart delay time to 10s.
Raisecom#config
Raisecom(config)#lldp restart-delay 10
Set successfully.
Related commands
show lldp local config
Function
To configure the LLDP trap interval timer, use this command. To return to the default
condition, use the no form of this command.
Format
lldp trap-interval second
no lldp trap-interval
Parameters
Parameter Description
second LLDP trap interval, an integer, ranging from 5 to 3600s
Default conditions
The LLDP trap interval is 5s.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
After you use this command to configure a LLDP Trap interval, each interface, where LLDP
is enabled, sends neighbour information to the NView NNM based on the interval. If the
neighbour information changes frequently, you can configure a long LLDP Trap interval to
prevent the topology vibration caused by mass neighbour information.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the LLDP trap interval to 10s.
Raisecom#config
Raisecom(config)#lldp trap-interval 10
Set successfully.
Related commands
show lldp local config
snmp-server lldp-trap enable
Function
To show local configurations of LLDP, use this command.
Format
show lldp local config
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show local configurations of LLDP.
Raisecom#show lldp local config
System configuration:
------------------------------------------------------------------
LLDP enable status: enable (default is disabled)
LldpMsgTxInterval: 30 (default is 30s)
LldpMsgTxHoldMultiplier: 4 (default is 4)
LldpReinitDelay: 2 (default is 2s)
LldpTxDelay: 2 (default is 2s)
LldpNotificationInterval: 5 (default is 5s)
LldpNotificationEnable: enable (default is enabled)
------------------------------------------------------------------
Port Status
--------------------------------------------------------
PC2 enable
Ga1/1/1 enable
Ga1/1/2 enable
Field Description
LLDP enable status Global LLDP status
LldpMsgTxInterval LLDP interval timer
LldpMsgTxHoldMultiplier LLDP neighbor aging coefficient
LldpReinitDelay LLDP restart timer
LldpTxDelay LLDP delay timer
LldpNotificationInterval LLDP trap timer
LldpNotificationEnable LLDP trap status
Related commands
N/A
Function
To show local information of the LLDP system, use this command.
Format
show lldp local system-data [ interface-type interface-number ]
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show local information of the LLDP system.
Raisecom#show lldp local system-data
System information:
-------------------------------------------------------------------------
-------------
ChassisIdSubtype: macAddress
ChassisId: 000E.5E12.3456
SysName: Raisecom
SysDesc: ROS
SysCapSupported: Repeater/Hub,Bridge/Switch
SysCapEnabled: Repeater/Hub,Bridge/Switch
Port SubType PortID Description
-------------------------------------------------------------------------
-------------
PC2 ifName port-channel2 N/A
Ga1/1/1 ifName gigaethernet1/1/1 gigaethernet1/1/1
Ga1/1/2 ifName gigaethernet1/1/2 gigaethernet1/1/2
Field Description
ChassisIdSubtype Chassis ID sub-type
ChassisId Chassis ID
SysName System ID
SysDesc System description
SysCapSupported Supported system capacities
SysCapEnabled Enabled system capacities
Port Interface name
SubType Interface ID
PortID Interface ID
Description Description
Related commands
N/A
Function
To show LLDP neighbour information, use this command.
Format
show lldp remote [ interface-type interface-number ] [ detail ]
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
detail Detailed information
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show LLDP neighbour information on all interfaces.
Raisecom#show lldp remote
Port ChassisId PortId SysName MgtAddress ExpiredTime
-------------------------------------------------------------------------
Field Description
Port Interface
ChassisId Chassis ID
PortID Interface ID
SysName System name
MgtAddress Management address
ExpiredTime Aging time
This example shows how to show the detailed information on all interfaces.
Related commands
N/A
Function
To show statistics of the LLDP system, use this command.
Format
show lldp statistic [ interface-type interface-number ]
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show statistics of the LLDP system on all interfaces.
Raisecom#show lldp statistic
System remote table statistics:
-------------------------------------------------------------------------
Last change time: 1970-01-01,08:00:00
Inserts: 0 Deletes: 0
AgesOut: 0 Drops: 0
Port TxFrames RxFrames ErrFrames DropFrames UnknownTlvs AgeoutFrames
-------------------------------------------------------------------------
PC2 0 0 0 0 0 0
Ga1/1/1 0 0 0 0 0 0
Ga1/1/2 0 0 0 0 0 0
Field Description
Last change time Last change time of the table
Inserts Number of inserted neighbors
Deletes Number of deleted neighbors
AgesOut Number of aging neighbors
Drops Number of discarded neighbors
Port Number of interfaces
TxFrames Number of sent packets
RxFrames Number of received packets
ErrFrames Number of error packets
DropFrames Number of discarded packets
UnknownTlvs Number of unknown TLV packets
AgeoutFrames Number of aging packets
Related commands
N/A
Function
To enable LLDP Trap, use this command. To disable this function, use the no form of this
command.
Format
snmp-server lldp-trap { enable | disable }
Parameters
Parameter Description
enable Enable LLDP trap.
disable Disable LLDP trap.
Default conditions
LLDP Trap is enabled.
Command mode
Debug configuration
User level
11
Usage guidelines
Scenario
When remote MIB contents change, the device must report this information (an LLDP trap) to
the NView NNM. You can use this command to enable LLDP trap.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable LLDP trap.
Raisecom#debug-hide 0906
Raisecom(debug)#snmp-server lldp-trap disable
Set successfully.
Related commands
lldp trap-interval
show lldp local config
12.2 SNMP
12.2.1 show snmp access
Function
To show SNMP group access information, use this command.
Format
show snmp access
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show SNMP group access information.
Raisecom#show snmp access
Index: 0
Group: group1
Security Model: usm
Security Level: authnopriv
Context Prefix: --
Context Match: exact
Read View: view1
Write View: --
Notify View: internet
Field Description
Index Index
Group SNMP group name
Security Model Security model
Usm: use SNMPv3 model
Security Level Security level
Authpriv: SNMP packet authentication and encryption
noauthnopriv: no authentication and encryption for SNMP packets
Context Prefix Context name
Field Description
Context Match Context match mode
Read View View that can be read
Write View View that can be write
Notify View View that can be notified
Related commands
N/A
Function
To show SNMP community information, use this command.
Format
show snmp community
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show SNMP community information.
Raisecom#show snmp community
Index Community Name View Name Permission
----------------------------------------------------------
1 public internet ro
2 private internet rw
3 guest mib2 ro
4 raisecom internet rw
Field Description
Index Index
Community Name Character string of the community
View Name SNMP view name
Permission Access privilege
Ro: read Agent data only
Rw: read and write Agent data
Related commands
N/A
Function
To show SNMP basic configurations, use this command.
Format
show snmp config
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show SNMP basic configurations.
Field Description
Contact information Contact information
Device location Location information of the device
SNMP trap status SNMP trap status
Enable: enable SNMP trap
Disable: disable SNMP trap
SNMP engine ID SNMP engine ID
Related commands
N/A
Function
To show SNMP group user information, use this command.
Format
show snmp group
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show SNMP group user information.
Raisecom#show snmp group
Index GroupName UserName SecModel
----------------------------------------------------------
0 initialnone none usm
1 initial md5nopriv usm
2 initial shanopriv usm
Field Description
Index Index
GroupName SNMP group name
UserName User name
SecModel Security model:
Usm: use SNMPv3 model
Related commands
N/A
Function
To show destination host information, use this command.
Format
show snmp host
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show SNMP destination host information.
Raisecom#show snmp host
Index: 0
IP family: IPv4
IP address: 10.0.0.1
Port: 162
User Name: raisecom
SNMP Version: v3
Security Level: authnopriv
TagList: bridge config interface rmon snmp ospf
Field Description
Index Index
IP family IP address version
IP address IP address of the destination host that receives the trap
Port ID of receiving interface
User Name User name
SNMP Version SNMP version
v1: SNMPv1
v2c: SNMPv2c
v3: SNMPv3
Security Level Security level
Authpriv: authenticate and encrypt SNMP packets
Noauthnopriv: do not authenticate or encrypt SNMP packets
Related commands
N/A
Function
To show statistics of SNMP, use this command.
Format
show snmp statistics
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show statistics of SNMP.
Raisecom#show snmp statistics
SNMP packets input:6352
Unsupported SNMP version SNMP PDUs: 0
Unknown SNMP community name SNMP PDUs: 0
SNMP community not allowed operation SNMP PDUs: 0
ASN.1 or BER errors SNMP PDUs: 0
SNMP silently dropped SNMP PDUs: 0
SNMP proxy droped SNMP PDUs: 0
Unsupported security level SNMP PDUs: 0
Not in time window SNMP PDUs: 0
Unknown user name SNMP PDUs: 0
Unknown engine ID SNMP PDUs: 0
Wrong Digests SNMP PDUs: 0
Decryption Errors SNMP PDUs: 0
Field Description
SNMP packets input Number of received SNMP
Unsupported SNMP version SNMP Number of unsupported SNMP PDUs
PDUs
Unknown SNMP community name Number of SNMP PDUs with unknown
SNMP PDUs community names
SNMP community not allowed Number of SNMP PDUs that the community
operation SNMP PDUs disallows to operate
ASN.1 or BER errors SNMP PDUs Number of SNMP PDUs that have ASN.1 or
BER errors
Field Description
SNMP silently dropped SNMP PDUs Number of SNMP PDUs discarded by the
SNMP
SNMP proxy droped SNMP PDUs Number of SNMP PDUs that are discarded by
the SNMP proxy
Unsupported security level SNMP Number of SNMP PDUs that do not support
PDUs security levels
Not in time window SNMP PDUs Number of timeout SNMP PDUs
Unknown user name SNMP PDUs Number of SNMP PDUs with unknown user
names
Unknown engine ID SNMP PDUs Number of SNMP PDUs with unknown SNMP
engine IDs
Wrong Digests SNMP PDUs Number of SNMP PDUs with wrong digests
Decryption Errors SNMP PDUs Number of SNMP PDUs with decryption errors
Related commands
N/A
Function
To show SNMP user information, use this command.
Format
show snmp user
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show SNMP user information.
Raisecom#show snmp user
Index: 1
User Name: user1
Security Name: user1
EngineID: 800022b603000e5e551222
Authentication: MD5
Privacy: NoPriv
Field Description
Index Index
User Name User name
Security Name Security name
EngineID SNMP engine ID
Authentication Authentication protocol
NoAuth: do not authenticate SNMP packets
MD5: use MD5 Hash Function to authenticate SNMP packets
SHA: use SHA-1 Hash Function to authenticate SNMP packets
Privacy Encryption protocol
NoPriv: do not encrypt SNMP packets
DES: encrypt SNMP packets with DES
Related commands
N/A
Function
To show SNMP view information, use this command.
Format
show snmp view
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show SNMP view information.
Raisecom#show snmp view
Index: 0
View Name: mib1
OID Tree: 1.3.6.1.2.1
Mask: --
Type: included
Field Description
Index Index
View Name View name
OID Tree OID of the subtree corresponding to the view
Mask Mask of the subtree
Type Type
Included: the MIB variables of the view are included in the subtree.
Exclude: the MIB variables of the view are excluded from the subtree.
Related commands
N/A
Function
To show IP authentication configurations of the SNMP server, use this command.
Format
show snmp server-auth
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
Scenario
You can use this command to show IP authentication configurations of the SNMP server and
the IP address information.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to show IP authentication configurations of the SNMP server.
Raisecom#show snmp server-auth
SERVERIP: disable
Index IP Address
----------------------
0 1.2.3.4
Field Description
SERVERIP IP authentication status of the SNMP server
Enable: enabled
Disable: disabled
Field Description
Index Index ID, not correspond to the IP address, arranged in ascending
order of the IP address
IP address IP address of the SNMP server
Related commands
N/A
Function
To define SNMP group operation, use this command. To delete the SNMP group operations,
use the no form of this command.
Format
snmp-server access group-name [ read view-name ] [ write view-name ] [ notify view-name ]
[ context context-name { exact | prefix } ] usm { noauthnopriv | authnopriv | authpriv }
no snmp-server access group-name [ context context-name] usm { noauthnopriv |
authnopriv | authpriv }
Parameters
Parameter Description
group-name SNMP group name. A maximum of 32 characters are
supported.
read Users in a SNMP group can only read data from the Agent.
write Users in a SNMP group can write data into the Agent.
notify Users in a SNMP group can use Trap.
view-name View name. A maximum of 32 characters are supported.
context context-name Specify the context name or prefix
exact String and the context name are total matched.
prefix String and the first characters of the context name are
matched.
usm Adopt the SNMPv3 security model.
noauthnopriv Do not authenticate or encrypt SNMP packets. It is applicable
to the SNMPv3 security model.
authpriv Authenticate but not encrypt SNMP packets. It is applicable
to the SNMPv3 security model.
Parameter Description
authnopriv Authenticate and encrypt SNMP packets. It is applicable to
the SNMPv3 security model.
Default conditions
The security model is usm; the security level is nonauthnopriv; the Context Match is exact;
the readable view name is system; the notification name is internet.
Command mode
Global configuration
User level
15
Usage guidelines
Scenario
After using this command to configure a SNMP group, only users (NMS) of the SNMP group
can access the device (Agent).
Prerequisite
N/A
Follow-up procedure
You can use the show snmp access command to SNMP group information.
Precaution
When you adopt the SNMPv1 or SNMPv2c security models, the security level is
automatically set to noauthnopriv.
Examples
This example shows how to define operations for SNMP group guestgroup: using the
SNMPv3 security model, setting the security level to authnopriv, and setting the name of the
readable view to mib2.
Raisecom#config
Raisecom(config)#snmp-server access guestgroup read mib2 usm authnopriv
Set successfully.
Related commands
show snmp access
Function
To configure the community, use this command. To delete the community, use the no form of
this command.
Format
snmp-server community string [ view view-name ] { ro | rw }
no snmp-server community string
Parameters
Parameter Description
string Community name, a string of less than or equal to 32 characters
view view-name MIB view name, a tring of less than or equal to 32 characters
If you do not select this parameter, the default name of an accessible
view is internet.
ro The community can only read data from the Agent.
rw The community can read data from and write data into the Agent.
Default conditions
There are two communities.
Community public: be able to access view internet; only read data from the Agent.
Community private: be able to access view internet; can read data from and write data
into the Agent.
Command mode
Global configuration
User level
15
Usage guidelines
Scenario
SNMPv1 and SNMPv2c adopt community authentication mechanism. By configuring the
community on the Agent (the device), you can control the access authority of the Network
Management Station (NMS). If the SNMP packet sent by the NMS is not matched with the
community string defined in the Agent, the SNMP packet will be discarded, which means the
NMS cannot access to the Agent.
Prerequisite
N/A
Follow-up procedure
You can use the show snmp community command to show community information.
Precaution
N/A
Examples
This example shows how to configure the community to guest, accessing view to mib1 with
read-only privilege.
Raisecom#config
Raisecom(config)#snmp-server community guest view mib1 ro
Set successfully.
Related commands
N/A
Function
To configure contact information of NMS, use this command. To return to the default
condition, use the no form of this command.
Format
snmp-server contact string
no snmp-server contact
Parameters
Parameter Description
string Character string, such as E-mail
Default conditions
The contact information is support@raisecom.com.
Command mode
Global configuration
User level
15
Usage guidelines
Scenario
You can use this command to configure contact information of NMS. You can contact
technical engineers when the device needs maintenance.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure contact information of NMS to service@raisecom.com.
Raisecom#config
Raisecom(config)#snmp-server contact service@raisecom.com
Set successfully.
Related commands
N/A
Function
To enable SNMP trap, use this command. To disable this function, use the no form of this
command.
Format
snmp-server enable traps
no snmp-server enable traps
Parameters
N/A
Default conditions
SNMP Trap is enabled.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use SNMP trap to send traps to the NMS when the device runs abnormally. This
function will keep you informed of the operation status of the device.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable SNMP trap on the device.
Raisecom#config
Raisecom(config)#snmp-server enable traps
Set successfully.
Related commands
N/A
Function
To add users in SNMP group, use this command. To delete the users, use the no form of this
command.
Format
snmp-server group group-name user user-name usm
no snmp-server group user user-name usm
Parameters
Parameter Description
group-name SNMP group name. A maximum of 32 characters are supported.
user-name User name. A maximum of 32 characters are supported.
usm Adopt SNMPv3 security model, supporting authentication and encryption.
Default conditions
N/A
Command mode
Global configuration
User level
15
Usage guidelines
Scenario
Only users in the SNMP group can access to the Agent. Different groups have different access
authorities. You can use this command to add users to a SNMP group. A newly-added user
shares the access authorities of the SNMP group.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to add user guestuser1 to SNMP group guestgroup and how to
configure the user guestuser1 to SNMPv3 security model.
Raisecom#config
Raisecom(config)#snmp-server group guestgroup user guestuser1 usm
Set successfully.
Related commands
N/A
Function
To configure the IP address of the destination host that receives traps, use this command. To
return to the default condition, use the no form of this command.
Format
snmp-server host ip-address version { 1 | 2c } community-string [ udpport port-id ]
Parameters
Parameter Description
ip-address IP address of the destination host, in dotted decimal notation
1 | 2c | 3 SNMP version
v1sm: adopt SNMPv1.
v2csm: adopt SNMPv2c.
usm: adopt SNMPv3.
community- Community name
string SNMPv1 and SNMPv2c use the community to authenticate SNMP
packets. If the community of the NMS is inconsistent with the one on the
Agent, the NMS cannot receive the trap.
udpport UDP port number of the destination host for receiving traps
If you do not select this parameter, the default port number is set to 162.
port-id Port number, an integer, ranging from 1 to 65535
authnopriv Authenticate but not encrypt SNMP packets.
authpriv Neither authenticate nor encrypt SNMP packets.
noauthnopriv User names in the SNMP group
SNMPv3 uses the user name to authenticate SNMP packets. If the user
name of the NMS is inconsistent with the one on the Agent, the NMS
cannot receive the trap.
user-name Community name
The SNMPv1 and SNMPv2c use the community to authenticate SNMP
packets. If the community of the NMS is inconsistent with the one on the
Agent, the NMS cannot receive the trap.
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
After SNMP trap is enabled on the device, it will send traps to the NMS if the device works
improperly. You can use this command to configure the IP address of the destination NMS and
verify the IP address through authentication methods.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to set the IP address of a host that receives traps to 10.0.0.1, the
security model to SNMPv3, the user name to raisecom, and the privilege to authenticating but
not encrypting SNMP packets.
Raisecom#config
Raisecom(config)#snmp-server host 10.0.0.1 version 3 authnopriv raisecom
Set successfully.
Related commands
N/A
Function
To configure location information of the device, use this command. To return to the default
condition, use the no form of this command.
Format
snmp-server location location-string
no snmp-server location
Parameters
Parameter Description
location-string Location information, such as raisecom beijing china
Default conditions
The location information is world china raisecom.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure location information of the device. The location
information facilitates the NMS to locate and maintain the device.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure location information of the device to raisecom.
Raisecom#config
Raisecom(config)#snmp-server location raisecom
Set successfully.
Related commands
N/A
Function
To create a user for the SNMP group, use this command. To delete the user, use the no form
of this command.
Format
snmp-server user user-name [ remote engine-id ]
snmp-server user user-name [ remote engine-id ] authentication{ md5 | sha }
authpassword privkey privkey
snmp-server user user-name [ remote engine-id ] authkey { md5 | sha } keyword privkey
privkey
no snmp-server user user-name [ remote engine-id ]
Parameters
Parameter Description
user-name SNMP group name. A maximum of 32 characters are supported.
remote Specify the remote SNMP engine ID.
engine-id SNMP engine ID related to a user name
It must be named with even bytes.
authentication Authentication mode of the user
md5 Configure an authentication mode for the user. Use the MD5 Hash
Function to authenticate SNMP packets.
sha Configure an authentication mode for the user. Use the SHA-1 Hash
Function to authenticate SNMP packets.
keyword Authentication key
Work with the Hash Function to generate a verification code for
authentication.
authkey Modify the user's key.
privkey Encrypt information
privkey Encrypt key
Default conditions
N/A
Command mode
Global configuration
User level
15
Usage guidelines
Scenario
You can use this command to create a user and configure the authentication mode for the user
in a SNMP group. The NMS cannot access to the Agent unless its user and key information
are identical to the ones on the Agent. This command is valid for SNMPv3. SNMPv2 and
SNMPv2c uses the community instead of SNMP group and users.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to create user user1, to configure user1 to md5 authentication mode,
to configure the authentication key to raisecom, and to configure user1 not encrypting SNMP
packets.
Raisecom#config
Raisecom(config)#snmp-server user user1 authentication md5 raisecom
Set successfully.
Related commands
N/A
Function
To create SNMP view, use this command. To delete the view, use the no form of this
command.
Format
snmp-server view view-name oid-tree [ mask ] { included | excluded }
no snmp-server view view-name oid-tree
Parameters
Parameter Description
view-name View name. A maximum of 32 characters are supported.
oid-tree OID of the subtree cprrespondent to the view
mask Mask of the subtree
The mask is set to 0 or 1. A maximum of 16 characters are supported,
such as 1.1.1.1.0.1.
If some bit is set to 0, it indicates the value of the MIB variable of a
view may not be identical to the one of the OID.
If some bit is set to 1, it indicates the value of the MIB variable of a
Parameter Description
included MIB variables of the view are included in the subtree.
excluded MIB variables of the view are excluded from the subtree.
Default conditions
There are view system and view internet.
View system: the subtree is 1.3.6.1.2.1.1; the mask is null, and the type is include.
View internet: the subtree is 1.3.6; the mask is null, and the type is include.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
SNMP is a collection of MIB variables. It defines MIB variables that can be accessed. SNMP
view is used for SNMPv3 only. SNMP view is not defined in SNMPv1 and SNMPv2.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to create view mib1 and configure the MIB variables of the view to
all variables in subtree 1.3.6.1.2.1 and mask 1.1.1.1.0.1.
Raisecom#config
Raisecom(config)#snmp-server view mib1 1.3.6.1.2.1 1.1.1.1.0.1 included
Set successfully.
Related commands
N/A
Function
To configure the IP authentication address for the SNMP server, use this command. To disable
this function, use the no form of this command.
Format
snmp-server server-auth ip-address
no snmp-server server-auth ip-address
Parameters
Parameter Description
ip-address IP address of the SNMP server, in dotted decimal notion
Default conditions
The IP authentication address of the SNMP server is not configured.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the IP authentication address for the SNMP server.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
You can configure up to 100 IP authentication addresses for the SNMP server.
Examples
This example shows how to configure the IP authentication address for the SNMP server to
192.168.1.100.
Raisecom#config
Related commands
show snmp server-auth
Function
To enable IP authentication of the SNMP server, use this command. To disable this function,
use the disable form of this command.
Format
snmp-server server-auth { enable | disable }
Parameters
Parameter Description
Default conditions
IP authentication of the SNMP server is disabled.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to enable IP authentication of the SNMP server.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable IP authentication of the SNMP server.
Raisecom#config
Raisecom(config)#snmp-server server-auth enable
Set successfully.
Related commands
show snmp server-auth
Function
To show status of global switch and interface switch of optical module Digital Diagnostics
Monitoring (DDM), use this command.
Format
show transceiver
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show status of global switch and interface switch of optical module DDM.
Raisecom#show transceiver
Field Description
Digitaldiagnotic Optical module DDM status
Enable: enabled
Disable: disabled
Trap Optical module DDM Trap status
Enable: enabled
Disable: disabled
PasswordCheck Password check status
Enable: enabled
Disable: disabled
Related commands
N/A
Function
To show information about optical module DDM, use this command.
Format
show transceiver ddm interface-type interface-number [ detail ]
Parameters
Parameter Description
interface-type Interface list
interface-number The interface-type means interface type
The interface-number refers to three dimensional Interface ID,
supporting port range padding mode such as "1-3".
detail Display detailed information, including alarm types and threshold
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show information about optical module DDM on interface 1 of
slot3.
Raisecom#show transceiver ddm fastethernet 1/3/1
If device is externally calibrated, only calibrated values are printed.
++ : high alarm, + : high warning, - : low warning, -- : low alarm,
* :normal
Tx: transmit, Rx: receive,mA: milliamperes.
Field Description
high alarm High alarm
high warning High warning
low warning Low warning
low alarm Low alarm
normal Normal
Temperature Temperature
Tx bias Current Current
Optical Tx Powe Sent optical power
Optical Rx Power Receive optical power
Supply Voltage Voltage
This example shows how to show detailed information about optical module DDM on
interface 1 of slot3.
Related commands
N/A
Function
To show historical information about optical module DDM, use this command.
Format
show transceiver interface-type interface-number history [ 15m | 24h ]
Parameters
Parameter Description
interface-type Interface list
interface-number The interface-type means interface type
The interface-number refers to three dimensional Interface ID,
supporting port range padding mode such as "1-3".
15m Optical module DDM information during 15 minutes
24h Optical module DDM information during 24 hours
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show historical information about optical module DDM on
interface 1 of slot3 with an interval of 15 minutes.
Raisecom#show transceiver fastethernet 1/3/1 history 15m
Temperature : Celsius
Tx bias Current : mA
Optical Tx Power: dBm
Optical Rx Power: dBm
Supply Voltage : Volts
----------------------------------------------------------------------
Period type: 15 minute
Port parameterName periodNumber max min mean
fastethernet 1/3/1 Temperature 1 52.9680 52.5310 52.7150
fastethernet 1/3/1 Temperature 2 53.0620 52.6250 52.8400
fastethernet 1/3/1 Temperature 3 52.9680 52.4680 52.7450
fastethernet 1/3/1 Temperature 4 53.0930 52.6560 52.8670
fastethernet 1/3/1 Tx bias Current 1 10.1840 10.1280 10.1580
fastethernet 1/3/1 Tx bias Current 2 10.2000 10.1200 10.1700
fastethernet 1/3/1 Tx bias Current 3 10.2000 10.1280 10.1610
fastethernet 1/3/1 Tx bias Current 4 10.2080 10.1440 10.1710
fastethernet 1/3/1 Optical Tx Power 1 -5.7670 -5.8670 -5.7980
fastethernet 1/3/1 Supply Voltage 1 3.3380 3.3310 3.3340
fastethernet 1/3/1 Supply Voltage 2 3.3390 3.3310 3.3340
Field Description
Temperature Temperature
Tx bias Current Current
Optical Tx Powe Sent optical power
Optical Rx Power Received optical power
Supply Voltage Voltage
port Interface ID
parameterName Parameter name
periodNumber Interval
max Maximum value
min Minimum value
mean Mean
Related commands
N/A
Function
To show basic information about the optical module, use this command.
Format
show transceiver information interface-type interface-number
Parameters
Parameter Description
interface-type Interface list
interface-number The interface-type means interface type
The interface-number refers to three dimensional Interface ID,
supporting port range padding mode such as "1-3".
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show basic information about the optical module on interface 1 of
slot 3.
Raisecom#show transceiver information fastethernet 1/3/1
Interface FE1/3/1 basic information:
--------------------------------------------
Transceiver Type : SFP
Vendor Name : Raisecom
Vendor Part Number : USFP-Gb/S1-D-03R
*Vendor Serial Number : B1811602286
*Vendor Version : 1.0
Digital diagnostic function : support
Calibration type : internal
RSSI : not support
Media type : single_modeKm
Transfer Distance(meter) : 15000
Connector type : fiber_jack
Wavelength(nm) : 1310
Min data rate(Gb/s) : --
Max data rate(Gb/s) : --
Wavelength tolerance(nm) : --
*Compatibility type : 1000_BASE_LX
*Max power dissipation : --
*CDR : not support
TX Ref Clock : not required
Laser type : 850 nm VCSEL
Wavelength control : not support
Cooled laser : no
Tunable laser : no
Detector type : PIN
*line loopback : not support
*XFI loopback : not support
VPS : not support
Tx_Dis control : not support
Standby control : not support
VPS inner low power : not support
VPS outer low power : support
FEC : support
CMU : support
Related commands
N/A
Function
To show information about the optical module of last known threshold violation, use this
command.
Format
show transceiver threshold-violations interface-type interface-number
Parameters
Parameter Description
interface-type Interface list
interface-number The interface-type means interface type
The interface-number refers to three dimensional Interface ID,
supporting port range padding mode such as "1-3".
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show information about the optical module on interface 1 of slot
3 of last known threshold violation.
Raisecom#show transceiver threshold-violations fastethernet 1/3/1
DDDD: days, HH: hours, MM: minutes, SS: seconds
Field Description
DDDD Day
HH Hour
MM Minute
SS Second
Port Interface ID
Time since Last Known threshold Time since last known threshold violation
Violation(DDDD:HH:MM:SS)
Type(s) of Last Known Threshold Type of last known threshold violation
Violation(s)
Related commands
N/A
Function
To enable global optical module trap, use this command. To disable this function, use the
disable form of this command.
Format
snmp-server trap transceiver { enable | disable }
Parameters
Parameter Description
enable Enable global optical module trap.
When the system detects abnormally in optical module parameters, it
generates a trap.
disable Disable global optical module trap.
Default conditions
Global optical module trap is disabled.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
The optical module has five parameters: transceiver temperature, interior supply voltage, sent
bias current, sent optical power, and received optical power. Each parameter has a threshold.
After optical module DDM is enabled, OOM will monitor these parameters. If any threshold
is exceeded, a trap is generated.
Prerequisite
You can use transceiver ddm command to enable optical module trap.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to disable global optical module trap.
Raisecom#config
Raisecom(config)#snmp-server trap transceiver disable
Set successfully.
Related commands
show transceiver
Function
To enable optical module DDM, use this command. To disable this function, use the disable
form of this command.
Format
transceiver ddm { enable | disable }
Parameters
Parameter Description
enable Enable optical module DDM.
disable Disable optical module DDM
Default conditions
Global optical module DDM is disabled. Interface optical module DDM is enabled.
Command mode
Global configuration/Physical layer interface configuration
User level
11
Usage guidelines
Scenario
Optical module DDM provides a method for monitoring optical module performance
parameters. You can predict its lifetime, isolate system faults, and verify its compatibility in
the installation site by analysing the monitored data.
In global configuration mode, you can use the transceiver ddm enable command to enable
global optical module DDM.
In physical layer interface configuration mode, you can use the transceiver ddm enable
command to enable optical module DDM on an interface.
The optical module will perform digital diagnostics only when global and interface optical
module DDM are both enabled.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable global optical module DDM.
Raisecom#config
Raisecom(config)#transceiver ddm enable
Set successfully.
Related commands
show transceiver
Function
To enable optical module trap on the interface, use this command. To disable this function,
use the disable form of this command.
Format
transceiver trap { enable | disable }
Parameters
Parameter Description
Default conditions
Optical module trap on the interface is enabled.
Command mode
Physical layer interface configuration
User level
11
Usage guidelines
Scenario
The optical module has five parameters: transceiver temperature, interior supply voltage, sent
bias current, sent optical power, and received optical power. Each parameter has a threshold.
After optical module DDM is enabled, OOM will monitor these parameters. If any threshold
is exceeded, a trap is generated.
Prerequisite
You can use the transceiver ddm command to enable optical module DDM.
You can use the snmp-server trap transceiver enable command to enable global optical
module trap.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable optical module trap on interface 1 of slot 3.
Raisecom#config
Raisecom(config)#interface fastethernet 1/3/1
Raisecom(config-gigaethernet1/1/1)#transceiver trap enable
Set successfully.
Related commands
show transceiver
Function
To clear logs of the log buffer, use this command.
Format
clear logging buffer
Parameters
N/A
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
N/A
Examples
This example shows how to clear logs of the log buffer.
Raisecom#config
Raisecom(config)#clear logging buffer
Set successfully.
Related commands
show logging buffer
Function
To clear statistics of log, use this command.
Format
clear logging statistics
Parameters
N/A
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
N/A
Examples
This example shows how to clear statistics of log.
Raisecom#config
Raisecom(config)#clear logging statistics
Set successfully.
Related commands
N/A
Function
To configure sending Level 7 (debug-level) logs, use this command.
Format
logging buginf [ high | normal | low | none ]
Parameters
Parameter Description
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
Level 7 debugging information is divided into 4 types: debugging information with high,
normal, low or none priority. The processing modes for these types are different.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the debugging information to high level.
Raisecom#config
Raisecom(config)#logging buginf high
Set successfully.
Related commands
N/A
Function
To output logs to the log buffer, use this command. To disable this function, use the no form
of this command.
Format
logging buffered [ log-level | alerts | critical | debugging | emergencies | errors |
informational | notifications | warnings | distriminator distriminator-number ]
no logging buffered
Parameters
Parameter Description
log-level Severity level of logs, an integer ranging from 0 to 7
It has the same function with the following 8 parameters. The
difference is that severity level is shown in number, but the
following 8 parameters are shown in characters.
emergencies Level 0, emergency
System cannot be used and need to be rebooted.
alerts Level 1, alert
Must take actions immediately.
critical Level 2, critical
Must take actions or analyze reasons.
errors Level 3, error
Do not affect services but need attention.
warnings Level 4, warning
May cause service fault and need attention.
notifications Level 5, normal
Provide key operation information when the device works
properly.
informational Level 6, notification event
Provide general operation information when the device works
properly.
Parameter Description
debugging Level 7, debugging information
Provide general operation information when the device works
properly. Need no attention.
discriminator Establish a connection with the discriminator. Output
discriminated logs to the log buffer.
distriminator-number Discriminator number, an integer, ranging from 1 to 5
Default conditions
Output informational-level logs to the log buffer.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to output specified logs to the log buffer. In addition, you can use
this command to output logs of level lower than the specified log.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to output errors-level logs to the log buffer.
Raisecom#config
Raisecom(config)#logging buffered errors
Set successfully.
This example shows how to disable logs from being output to the log buffer.
Raisecom(config)#no logging buffered
Set successfully.
Related commands
show logging buffer
Function
To configure the log buffer size, use this command. To return to the default condition, use the
no form of this command.
Format
logging buffered size size
no logging buffered size
Parameters
Parameter Description
size Buffer size, an integer, ranging from 4 to 256 Kbytes
Default conditions
The buffer size is 4 Kbytes.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the log buffer size.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
If the log buffer size changes, all logs in it will be deleted.
Examples
This example shows how to configure the log buffer size to 10 Kbytes.
Raisecom#config
Raisecom(config)#logging buffered size 10
Set successfully.
Related commands
show logging buffer
Function
To output logs to the console, use this command. To disable this function, use the no form of
this command.
Format
logging console [ log-level | alerts | critical | debugging | emergencies | errors |
informational | notifications | warnings | distriminator distriminator-number ]
no logging console [ distriminator ]
Parameters
Parameter Description
log-level Severity level of logs, an integer, ranging from 0 to 7. It has the same
function with the following 8 parameters. The difference is that
severity level is shown in number, but the following 8 parameters are
shown in characters.
emergencies Level 0, emergency
System cannot be used and need to be rebooted.
alerts Level 1, alert
Must take actions immediately.
critical Level 2, critical
Must take actions or analyze reasons.
errors Level 3, error
Do not affect services but need attention.
warnings Level 4, warning
May cause service fault and need attention.
notifications Level 5, normal
Provide key operation information when the device works properly.
Parameter Description
informational Level 6, notification event
Provide general operation information when the device works
properly.
debugging Level 7, debugging information
Provide general operation information when the device works
properly. Need no attention.
discriminator Establish a connection with the discriminator. Output discriminated
logs to the log buffer.
Default conditions
Output information-level logs and logs of lower level to the console.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to output specified logs to the console. In addition, you can use
this command to output logs of level lower than the specified log.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to output errors-level logs to the console.
Raisecom#config
Raisecom(config)#logging console errors
Set successfully.
This example shows how to disable logs from being output to the console.
Raiscom(config)#no logging console
Set successfully.
Related commands
show logging
Function
To configure a log discriminator, use this command. To delete the discriminator, use the no
form of this command.
Format
logging discriminator distriminator-number { facility | mnemonics | msg-body } { drops |
includes } key
logging discriminator distriminator-number { facility | mnemonics | msg-body } none
no logging discriminator distriminator-number
Parameters
Parameter Description
distriminator-number Discriminator number, an integer, ranging from 1 to 5
facility Discriminate a log based on its module name.
mnemonics Discriminate a log based on its name.
msg-body Discriminate a log based on its body text.
drops Drop logs that contain keywords and allow logs that do not
contain keywords.
includes Drop logs that do not contain keywords and allow logs that
contain keywords.
none Do not discriminate selected fields.
key Keyword, a string of characters
facility: the length of the key ranges from 1 to 20
characters.
mnemonics: the length of the key ranges from 1 to 30
characters.
msg-body: the length of the key ranges from 1 to 64
characters.
Logs that contain these keywords will be selected.
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
Discriminators are divided into facility, mnemonics and msg-body discriminators. They
discriminate logs based on different fields.
faclility: filter a log based on its module name.
mnemonics: filter a log based on its name
msg-body: filter a log based on its body text.
If the log contains these keywords, it will be selected and filtered.
A discriminator can set multiple filtering rules on many fields of a log. The log is
discriminated in the order of facility, mnemonics, and msg-body.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The logs are discriminated in a form of untotally-matched mode. If the keyword is contained
in the logs, the logs will be selected.
The keyword is case sensitive.
Examples
This example shows how to configure discriminator 1 to discard logs that contain the
keyword test.
Raisecom#config
Raisecom(config)#logging discriminator 1 mnemonics drops test
Set successfully.
Related commands
N/A
Function
To configure the facility field of logs sent to the log host, use this command. To return to the
default condition, use the no form of this command.
Format
logging [ host ip-address ] facility { alert | audit | | auth | clock | cron | daemon | ftp | kern |
local0 | local1 | local2 | local3 | local4 | local5 | local6 | local7 | lpr | mail | news | ntp |
sercurity | syslog | user | uucp }
no logging facility
Parameters
Parameter Description
host ip-address IP address of the host, in dotted decimal notion
alert Logs generated by system alarms
audit Logs generated when audited
auth Logs generated when authenticated
clock Information about clock management process
cron cron/at tool information
daemon Information about system guard process
ftp Information about FTP process
kern Logs generated by kernel
local0-7 Locally-generated logs
lpr Logs generated by Line Printer system
mail Logs generated by mail system
news Logs generated by USENET network news system
ntp Logs generated by network time sub-system
security Logs generated when authorized
syslog Logs generated by system log
user Logs generated by user process
uucp UUCP system information
Default conditions
The facility field is local7.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the facility field of all the logs sent to the log host.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to set the facility field to auth.
Raisecom#config
Raisecom(config)#logging facility auth
Set successfully.
Related commands
N/A
Function
To output logs to the log file, use this command. To disable this function, use the no form of
this command.
Format
logging file [ discriminator distriminator-number ]
no logging file [ discriminator ]
Parameters
Parameter Description
distriminator Establish a connection with the discriminator. Output
discriminated logs to the log file.
distriminator-number Discriminator number, an integer, ranging from 1 to 5
Default conditions
N/A
Command mode
Global configuration
User level
15
Usage guidelines
Scenario
Key status and operation information of the device is recorded to the logs. Logs are output to
the terminal, log file, log host, console, and log buffer.
To output logs that are equal to or lower than the specified level to the terminal, use this
command.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to output logs to the log file.
Raisecom#config
Raisecom(config)#logging file
Set successfully.
Related commands
show logging file
Function
To output logs to the log history table, use this command. To disable this function, use the no
form of this command.
Format
logging history
no logging history
Parameters
N/A
Default conditions
Logs cannot be output to the log history table.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to output logs to the log history table.
Prerequisite
N/A
Follow-up procedure
You can use the logging history size command to configure the log history table size.
Precaution
N/A
Examples
This example shows how to output logs to the log history table.
Raisecom#config
Raisecom(config)#logging history
Set successfully.
Related commands
show logging history
Function
To configure the log history table size, use this command. To return to the default condition,
use the no form of this command.
Format
logging history size size
no logging history size
Parameters
Parameter Description
size Log history size, an integer, ranging from 1 to 500
Default conditions
Log history size is 1.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
The log history size refers to number of logs saved in the history table. You can use this
command to configure the log history size.
Prerequisite
N/A
Follow-up procedure
You can use the logging history command to output logs to the log history table.
Precaution
If the log history table size changes, logs in it will be deleted.
Examples
This example shows how to configure the log history table size to 100.
Raisecom#config
Raisecom(config)#logging history size 100
Set successfully.
Related commands
show logging history
Function
To output logs to the log host, use this command. To return to the default condition, use the no
form of this command.
Format
logging host ip-address [ log-level | alerts | critical | debugging | emergencies | errors |
informational | notifications | warnings | distriminator distriminator-number ]
no logging host ip-address
Parameters
Parameter Description
ip-address IP address of the log host, in dotted decimal notation, such as
10.0.0.1
log-level Severity level of logs, an integer ranging from 0 to 7. It has the
same function with the following 8 parameters. The difference is
that severity level is shown in number, but the following 8
parameters are shown in characters.
emergencies Level 0, emergency
System cannot be used and need to be rebooted.
alerts Level 1, alert
Must take actions immediately.
critical Level 2, critical
Must take actions or analyze reasons.
errors Level 3, error
Do not affect services but need attention.
warnings Level 4, warning
May cause service fault and need attention.
Parameter Description
notifications Level 5, normal
Provide key operation information when the device works
properly.
informational Level 6, notification event
Provide general operation information when the device works
properly.
debugging Level 7, debugging information
Provide general operation information when the device works
properly. Need no attention.
distriminator Establish a connection with the discriminator. Output
discriminated logs to the log host.
distriminator-number Discriminator number, an integer, ranging from 1 to 5.
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
Key status and operation information of the device is recorded to the logs. Logs are output to
the terminal, log file, log host, console, and log buffer.
To output logs that are equal to or lower than the specified level to the terminal, use this
command.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to output alerts-level logs and logs that have a lower level, to the log
host with the IP address of 10.0.0.1.
Raisecom#config
Raisecom(config)#logging host 10.0.0.1 alerts
Set successfully.
Related commands
N/A
Function
To output logs to the terminal (terminal that connected to the device through Telnet), use this
command. To disable this function, use the no form of this command.
Format
logging monitor [ log-level | alerts | critical | debugging | emergencies | errors |
informational | notifications | warnings | distriminator distriminator-number ]
no logging monitor [ distriminator ]
Parameters
Parameter Description
log-level Severity level of logs, an integer ranging from 0 to 7. It has the
same function with the following 8 parameters. The difference is
that severity level is shown in number, but the following 8
parameters are shown in characters.
emergencies Level 0, emergency
System cannot be used and need to be rebooted.
alerts Level 1, alert
Must take actions immediately.
critical Level 2, critical
Must take actions or analyze reasons.
errors Level 3, error
Do not affect services but need attention.
warnings Level 4, warning
May cause service fault and need attention.
notifications Level 5, normal
Provide key operation information when the device works
properly.
Parameter Description
informational Level 6, notification event.
Provide general operation information when the device works
properly.
debugging Level 7, debugging information.
Provide general operation information when the device works
properly. Need no attention.
distriminator Establish a connection with the discriminator. Output discriminated
logs to the terminal.
distriminator-number Discriminator number, an integer, ranging from 1 to 5.
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
Key status and operation information of the device is recorded to the logs. Logs are output to
the terminal, log file, log host, console, and log buffer.
To output logs that are equal to or lower than the specified level to the terminal, use this
command.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to output warnings-level logs and logs with lower level to the
terminal.
Raisecom#config
Raisecom(config)#logging monitor warnings
Set successfully.
Related commands
N/A
12.4.14 logging on
Function
To enable log, use this command. To disable the function, use the no form of this command.
Format
logging on
no logging on
Parameters
N/A
Default conditions
Log is enabled.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
User's operation and the anomaly of the device are saved in the log. It provides a significant
evident for maintaining and diagnosing the device.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable log.
Raisecom#config
Raisecom(config)#logging on
Set successfully.
Related commands
show logging
Function
To configure the rate for processing logs, use this command. To return to the default condition,
use the no form of this command.
Format
logging rate-limit log-num
no logging rate-limit
Parameters
Parameter Description
log-num Number of logs processed per second, an integer, ranging from 1 to 10000
Default conditions
The rate for processing logs is 0, which means there is no rate restriction.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
The system need to process a log after it is generated. If the rate for generating logs is over
great, a lot of system resources will be consumed. You can use this command to configure the
rate for processing logs. When the generating rate exceeds the configured value, logs will be
discarded.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the rate for processing logs to 100.
Raisecom#config
Raisecom(config)#logging rate-limit 100
Set successfully.
Related commands
show logging
Function
To use the sequence number field of a log, use this command. To disable this function, use the
no form of this command.
Format
logging sequence-number
no logging sequence-number
Parameters
N/A
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
When you view a log, you can view the sequence number field of the log. The sequence
number begins with 000001 and is added by 1 each time the system receives a log.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The sequence number is meaningful only when logs are output to the console, terminal, log
file, and log buffer. The sequence number is meaningless when logs are output to log host and
log history table.
Examples
This example shows how to use the sequence number field of a log.
Raisecom#config
Raisecom(config)#logging sequence-number
Set successfully.
Related commands
N/A
Function
To configure the timestamp option of a log, use this command.
Format
logging time-stamp { debug | log } { datetime | uptime | none }
Parameters
Parameter Description
debug Configure the timestamp for Level 7 logs.
log Configure the timestamp for Level 0-Level 6 logs.
datetime The timestamp is an absolute time, a given time, that is, the system time.
uptime The timestamp is a relative time, a period, that is, the period after the
device is booted.
none There is no timestamp.
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure the timestamp option of a log.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the timestamp option of Level 7 log to uptime.
Raisecom#config
Raisecom(config)#logging time-stamp log uptime
Set successfully.
Related commands
show logging
Function
To translate logs in the history table into trap, use this command. To disable this function, use
the no form of this command.
Format
logging trap [ log-level | alerts | critical | debugging | emergencies | errors | informational |
notifications | warnings | distriminator distriminator-number ]
no logging trap [ distriminator ]
Parameters
Parameter Description
log-level Severity level of logs, an integer ranging from 0 to 7. It has the
same function with the following 8 parameters. The difference is
that severity level is shown in number, but the following 8
parameters are shown in characters.
Parameter Description
emergencies Level 0, emergency
System cannot be used and need to be rebooted.
alerts Level 1, alert
Must take actions immediately.
critical Level 2, critical
Must take actions or analyze reasons.
errors Level 3, error
Do not affect serviced but need attention.
warnings Level 4, warning
May cause service fault and need attention.
notifications Level 5, normal
Provide key operation information when the device works
properly.
informational Level 6, notification event
Provide general operation information when the device works
properly.
debugging Level 7, debugging information
Provide general operation information when the device works
properly. Need no attention.
distriminator Establish a connection with the discriminator. Output
discriminated logs to the log history table.
distriminator-number Discriminator number, an integer, ranging from 1 to 5.
Default conditions
Translate warnings-level logs in the log history table into Trap.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
After enabling outputting logs to the log history table, if a log is output to the log history table,
the system will translated the log with lower or equal level to the specified level into trap. If
outputting logs to the log history table is disabled, no log will be translated into trap.
Prerequisite
You must use the logging history command to output logs to the log history table. Otherwise,
logs cannot be translated into trap.
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to translated errors-level logs into trap.
Raisecom#config
Raisecom(config)#logging trap errors
Set successfully.
Related commands
show logging
Function
To show log information, use this command.
Format
show logging [ buffer | discriminator | file | history ]
Parameters
Parameter Description
buffer Show information about the log buffer.
discriminator Show information about the discriminator.
file Show information about the log file.
history Show information about the log history table.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show log information.
Raisecom#show logging
Syslog logging: enable
Dropped Log messages: 0
Dropped debug messages: 0
Rate-limited: 0 messages per second
Squence number display: disable
Debug level time stamp: none
Log level time stamp: datetime
Log buffer size: 4kB
Debug level: Low
Syslog history logging: enable
Syslog history table size:10
Dest Status Level LoggedMsgs DroppedMsgs Discriminator
-----------------------------------------------------------------------
buffer disable informational(6) 1 2 0
console enable warnings(5) 0 0 0
trap enable warnings(5) 0 0 0
file disable 0 0 0
Log host information:
Max number of log server: 10
Current log server number: 0
Target Address Level Facility Sent Drop Discriminator
-------------------------------------------------------------------
Field Description
Syslog logging Status of log
Enable: enabled
Disable: disabled
Dropped Log messages Number of discarded logs
Dropped debug messages Number of discarded debugging packets
Rate-limited Rate for processing logs
Enable: view sequence number of a log.
Squence number display
Disable: do not view sequence number of a log.
Debug level time stamp Timestamp of Level 0-Level 6 logs
Datetime: absolute time
Uptime: relative time
None: no timestamp
Field Description
Log level time stamp Timestamp of Level 7 logs
Datetime: absolute time
Uptime: relative time
None: no timestamp
Status Status:
Enable: enabled
Disable: disabled
Level Severity level
mergencies: level 0, emergency
alerts: level 1, alert
critical: level 2, critical
errors: level 3, error
warnings: level 4, warning
notifications: level 5, normal
informational: level 6, notification
debugging: level 7, debugging information
Field Description
Drop Number of received logs
Related commands
N/A
Function
To configure the alarm delay time, use this command.
Format
alarm active delay second [ schedule-list list-number ]
no alarm active delay [ schedule-list list-number ]
Parameters
Parameter Description
second Delay time, an integer, ranging from 0 to 600s
schedule-list list-number Schedule list, an integer, ranging from 0 to 99
Default conditions
The alarm delay time of the device is 0s.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
Alarm delay refers to that an alarm is saved on the device or reported to the NView NNM a
certain period after it is generated, rather than immediately after it is generated. The delay
time recorded on the device is same with that on the NView NNM. By configuring the delay
time for generating an alarm, you can configure the device to delay reporting the alarm to the
NView NNM after it is generated.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the alarm delay time to 10s.
Raisecom#config
Raisecom(config)#alarm active delay 10
Set successfully.
Related commands
show alarm management
Function
To configure alarm storage mode, use this command.
Format
alarm active storage-mode { loop | stop }
Parameters
Parameter Description
Default conditions
The alarm storage mode is stop.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
When the alarm buffer is full, the device will process newly-generated alarms in the following
two modes:
stop: the device will discard newly-generated alarms without recording it.
loop: the device will replace the old alarms with newly-generated ones.
You can use this command to configure an alarm storage mode for newly-generated alarms
when enough alarms are saved in the alarm buffer.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure alarm storage mode to loop.
Raisecom#config
Raisecom(config)#alarm active storage-mode loop
Set successfully.
Related commands
show alarm management
Function
To enable alarm auto-report, use this command. To disable this function, use the disable form
of this command.
Format
alarm auto-report all { enable | disable }
alarm auto-report alarm-restype alarm-restype-value { enable | disable }
alarm auto-report type alarm-type { enable | disable }
alarm auto-report type alarm-type alarm-restype alarm-restype-value { enable | disable }
Parameters
Parameter Description
all All alarms
type alarm-type Alarm type, a string
The value is set to alarm names, such as aiblightparameterhigh
alarm-restype Alarm source type, a string
The value is set to names of alarm source types, such as port-channel
alarm-restype- Alarm source value, an integer, related to the alarm source type
value
enable Enable alarm auto-report.
disable Disable alarm auto-report.
Default conditions
Alarm auto-report is enabled.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
With alarm auto-report, the system will send the alarms to the NView NNM when an alarm is
generated. Therefore, the NView NNM does not need to automatically query or synchronize
alarms.
You can enable alarm auto-report to report certain alarm type, the specified alarm source or
the specified type of the specified alarm source.
You can use the alarm auto-report all { enable | disable } command to enable or
disable alarm auto-report for all alarms.
You can use the alarm auto-report alarm-restype alarm-restype-value { enable |
disable } to enable or disable alarm auto-report for alarms with specified alarm source.
You can use the alarm auto-report type alarm-type { enable | disable } command to
enable or disable alarm auto-report for alarms with specified alarm type.
You can use the alarm auto-report type alarm-type alarm-restype alarm-restype-value
{ enable | disable } command to enable or disable alarm auto-report for alarms with
specified alarm source or specified alarm type.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to disable alarm auto-report for alarm type of failed authentication.
Raisecom(config)#alarm auto-report type system_authfailur disable
Set successfully.
Related commands
show alarm management
Function
To clear current alarms, use this command.
Format
alarm clear all
alarm clear index index
alarm clear alarm-restype alarm-restype-value
alarm clear type alarm-type
alarm clear type alarm-type alarm-restype alarm-restype-value
Parameters
Parameter Description
all Clear all current alarms.
index index Specified alarm index, an integer, ranging from 1 to 4294967295
type alarm-type Alarm type, a string
The value is set to alarm names, such as ais, blightparameterhigh,
criticalevent.
alarm-restype Alarm source type, a string
The value is set to names of alarm source types, such as
boardindex, fanindex, port-channel.
alarm-restype-value Alarm source, an integer, related to the alarm source type
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
Clearing current alarms refers to deleting current alarms from the current alarm list. Deleted
alarms will be saved to the historical alarm list.
You can use the alarm clear all command to clear all current alarms.
You can use the alarm clear index index command to clear current alarms with specified
alarm index.
You can use the alarm clear alarm-restype alarm-restype-value command to clear
current alarm with specified alarm source.
You can use the alarm clear type alarm-type command to clear current alarm with
specified alarm type.
You can use the alarm clear type alarm-type alarm-restype alarm-restype-value
command to clear current alarms with specified alarm type and alarm source.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to clear all current alarms.
Raisecom#config
Raisecom(config)#alarm clear all
Set successfully.
Related commands
show alarm management
Function
To configure alarm clear delay time, use this command.
Format
alarm clear delay second
no alarm clear delay
Parameters
Parameter Description
delay second Alarm delay time, an integer, ranging from 0 to 600s
Default conditions
The alarm clear delay time is 0s.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
After configuring the delay time for clearing an alarm, the alarm will be cleared a certain time
after the fault is cleared.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the alarm delay time to 10s.
Raisecom#config
Raisecom(config)#alarm active delay 10
Set successfully.
Related commands
show alarm management
Function
Enable alarm correlation inhibit, use this command. To disable this function, use the disable
form of this command.
Format
alarm correlation-inhibit { enable | disable }
Parameters
Parameter Description
Default conditions
Alarm correlation inhibition is enabled.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
When alarm correlation inhibition is enabled, the device will only record the root alarms but
not attached alarms. For example, alarm B is caused by alarm A. When alarm correlation
inhibition is enabled, alarm B is inhibited and cannot be saved to the alarm buffer or log
buffer. By enabling alarm correlation inhibition, you can effectively reduce the number of
alarms.
When alarm correlation inhibition is disabled, both the root alarm and attached alarms are
saved on the device.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable alarm correlation inhibit.
Raisecom#config
Raisecom(config)#alarm correlation-inhibit enable
Set successfully.
Related commands
show alarm management
Function
Enable alarm inhibit, use this command. To disable this function, use the disable form of this
command.
Format
alarm inhibit { enable | disable }
Parameters
Parameter Description
enable Enable alarm inhibit.
disable Disable alarm inhibit
Default conditions
Alarm inhibit is enabled.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to inhibit repeated alarm report. For example, if fault alarm
LinkDown is triggered before fault clear alarm LinkUp on port A, the former one will be
cleared from the current alarm table and removed to the history alarm table. The alarm
LinkUp will be sent to the NView NNM.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable alarm inhibit.
Raisecom#config
Raisecom(config)#alarm inhibit enable
Set successfully.
Related commands
show alarm management
Function
To configure alarm inverse mode, use this command.
Format
alarm inverse interface-type interface-number { auto | manual | none }Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
auto Automatic inverse mode
manual Manual inverse mode
none Non-inverse mode
Default conditions
The alarm inverse mode is non-inverse mode.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
With alarm inverse, the device will report inverse information when recording an alarm. It
means the device will send a trap to the NView NNM when no alarm is generated, vice versa.
At present, the device only supports configuring alarm inverse modes on interface, including:
Non-inverse mode
The device reports alarms as usual.
Manual inverse mode
In this mode, the auto-report status is opposite to the actual status. When there is an alarm, the
system will not report the alarm and vice versa. Before the alarm inverse status is recovered to
the non-inverse mode, this mode will be sustained regardless of alarm status changes.
Automatic inverse mode
When you set the alarm inverse mode to automatic inverse mode:
If there is no alarm on the interface to be inversed, the configuration fails.
If there are alarms on the interface to be inverted, the configuration will take effect and
the auto-report status will change to the opposite one. After an alarm is reported to the
NView NNM, alarm-inverse will be disabled on the interface and the interface enters
non-inverse mode. In non-inverse mode, the device will report newly-generated alarms
properly.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure alarm inverse mode on interface GE 1/1/1 to automatic
inverse mode.
Raisecom#config
Raisecom(config)#alarm inverse gigaehernet 1/1/1 auto
Set successfully.
Related commands
show alarm management
Function
To enable alarm monitoring, use this command. To disable this function, use the disable form
of this command.
Format
alarm monitor all { enable | disable }
alarm monitor alarm-restype alarm-restype-value { enable | disable }
alarm monitor type alarm-type { enable | disable }
alarm monitor type alarm-type alarm-restype alarm-restype-value { enable | disable }
Parameters
Parameter Description
all All alarms
type alarm-type Alarm type, a string
The value is set to alarm names, such as blightparameterhigh.
alarm-restype Alarm source type, a string
The value is set to names of alarm source types, such as port-
channel.
alarm-restype-value Alarm source value, an integer, related to the alarm source type
enable Enable alarm monitoring.
disable Disable alarm monitoring.
Default conditions
Alarm monitoring is enabled.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
Examples
This example shows how to disable alarm monitoring on interface GE 1/1/1.
Raisecom#config
Raisecom(config)#alarm monitor gigaethernet 1/1/1 disable
Set successfully.
Related commands
show alarm management
Function
To enable alarm Syslog output, use this command. To disable this function, use the disable
form of this command.
Format
alarm syslog { enable | disable }
Parameters
Parameter Description
enable Enable alarm Syslog output.
disable Disable alarm Syslog output.
Default conditions
Alarm Syslog output is disabled.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
When alarms are saved in the alarm buffer, system logs will be generated and saved in the log
buffer.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable alarm Syslog output.
Raisecom#config
Raisecom(config)#alarm syslog enable
Set successfully.
Related commands
show alarm log
show alarm management
Function
To show information about the current alarm list, use this command.
Format
show alarm active [ module_name ]
Parameters
Parameter Description
module_name Alarms of module with specified features, a string.
The value is set to names of modules that support alarm, such as
aps, cfm, system
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show information of the current alarm list.
Raisecom#show alarm active
#1 2015-1-1 8:4:3 AlarmModulName:hw_monitor.
TrapName:alarmInformationTrap. Desc
ription: power-abnormal
#6 2015-1-1 8:5:10 AlarmModulName:hw_monitor.
TrapName:alarmInformationTrap. Des
cription: high-volt
#261 2015-1-3 5:40:29 AlarmModulName:hw_monitor.
TrapName:alarmInformationTrap.
Description: high-temperature
Alarm active total number: 3
Related commands
N/A
Function
To show information about the history alarm list, use this command.
Format
show alarm cleared [ module_name | severity severity ]
Parameters
Parameter Description
module_name Alarms of module with specified features, a string
The value is set to names of modules that support alarm, such as aps,
cfm, and system.
severity severity Alarms with a specified level
The severity is an integer, ranging from 1 to 4 or 1 to 6
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show information about the history alarm list.
Raisecom#show alarm cleared
AlarmModulName:dms 1971-8-4 10:10:8 Index:9. Severity:1.
TrapName:rcUdDeviceTmptAbnormalTrap. Resource: slot 1. Description: The
device temperature is abnormal.
AlarmModulName:dms 1971-8-4 10:10:35 Index:11. Severity:1.
TrapName:rcUdDeviceTmptAbnormalTrap. Resource: slot 1. Description: The
device temperature is abnormal.
Related commands
N/A
Function
To show alarm statistics of the system log, use this command.
Format
show alarm log
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show alarm statistics of the system log.
Raisecom#show alarm log
Alarm log limit:200
Alarm log num:300
Alarm log bumped:100
----------------------------- -------------------------------------------
Module mplstp log num: 300
Module mplstp log bumped:100
#2012-12-25 13:45:33 mplstp/mplsXcDown: mplsXCOperStatus.1.1.1:1
Field Description
Alarm log limit Threshold of alarm logs
Alarm log num Number of generated alarm logs
Alarm log bumped Number of discarded alarm logs
Module Alarm module
Related commands
N/A
Function
To show alarm type configurations, use this command.
Format
show alarm management [ alarm_type ]
Parameters
Parameter Description
alarm_type Alarm type, a string
The value is set to names of modules that support alarm, such as
blightparameterhigh.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show alarm type configurations.
----------------------------- -------------------------------------------
AlarmListName GroupName Port Inverse Auto-report Monitor
erps link-changed NA NA enable enable
Field Description
Alarm active delay Delay time for generating an alarm
Alarm clear delay Delay time for clearing an alarm
Alarm active storage-mode Alarm storage mode
Alarm inhibit Alarm inhibition
Alarm syslog Alarm Syslog output
AlarmListName Alarm list name, related to the module name
GroupName Alarm event name
Port Interface ID
Inverse Alarm inverse mode
Auto-report Alarm auto-report status
Monitor Alarm monitoring status
Related commands
N/A
Function
To show statistics of the alarm management module, use this command.
Format
show alarm management statistics
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show statistics of the alarm management module.
Raisecom#show alarm management statistics
Alarm Active Overflow: 0
Alarm Active LastChanged: 9336459
------------------------------------------------------------------------
AlarmListName ActiveCurrent ActiveTotal LastRaise LastClear
system 0 0 0 0
load_cfg 0 0 0 0
snmp 0 0 0 0
syslog 0 0 0 0
portlib 2 12 9336459 8235147
mpls 0 0 0 0
ping 0 0 0 0
traceroute 0 0 0 0
rmon 0 0 0 0
ptp 0 0 0 0
cfm 0 0 0 0
sla 0 0 0 0
oam 0 0 0 0
rtdp 0 0 0 0
lldp 0 0 0 0
Field Description
Alarm Active Overflow Current alarm overflow
Alarm Active LastChanged Last change time of the current alarm list
AlarmListName Alarm list name, related to the module name
ActiveCurrent Total number of current alarms
ActiveTotal Total number of generated alarms
Field Description
LastRaise Time for generating an alarm
LastClear Time for clearing an alarm
Related commands
N/A
Function
To configure CPU alarm falling threshold, use this command. To return to the default setting,
use the no form of this command.
Format
cpu falling-threshold value
no cpu falling-threshold
Parameters
Parameter Description
value Falling threshold, an integer, ranging from 0 to 98%
Default conditions
The falling threshold is 1%.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
After you enable or disable CPU threshold alarm sending trap, the system sends a trap when
the CPU utilization is higher than the rising threshold or is lower than the falling threshold
during a specified period.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The falling threshold must be smaller than the rising threshold.
Examples
This example shows how to configure the CPU falling threshold to 20%.
Raisecom#config
Raisecom(config)#cpu falling-threshold 20
Set successfully.
Related commands
show cpu-utilization
Function
To configure the CPU alarm rising threshold and sampling period, use this command. To
return to the default setting, use the no form of this command.
Format
cpu rising-threshold rising-threshold-value
no cpu rising-threshold
Parameters
Parameter Description
rising-threshold-value Rising threshold, an integer, ranging from 1 to 100%
Default conditions
The rising threshold is 100%.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
After you enable or disable CPU threshold alarm sending trap, the system sends a trap when
the CPU utilization is higher than the rising threshold or is lower than the falling threshold
during a specified period.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The lower threshold must be smaller than the upper threshold.
Examples
This example shows how to configure the rising threshold to 80%.
Raisecom#config
Raisecom(config)#cpu rising-threshold 80
Set successfully.
Related commands
show cpu-utilization
Function
To show CPU utilization, use this command.
Format
show cpu-utilization [ dynamic | history { 10min | 1min | 2hour | 5sec } ]
Parameters
Parameter Description
dynamic Dynamic CPU utilization
history CPU utilization history in certain period
10min CPU utilization in 10 minutes
1min CPU utilization in 1minute
2hour CPU utilization in 2 hours
5sec CPU utilization in 5 seconds
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
Scenario
You can use the show cpu-utilization command to show CPU utilization, including CPU
threshold trap enabling status, CPU utilization thresholds, and CPU utilization in certain
period.
You can use the show cpu-utilization dynamic command to show dynamic CPU
utilization.
You can use the show cpu-utilization history { 10min | 1min | 2hour | 5sec } command
to show CPU utilization history in certain period.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to show dynamic CPU utilization.
Raisecom#show cpu-utilization dynamic
CPU threshold trap enable: Disable
Rising threshold: 100
Fallingthreshold: 1
Trap transfer observation interval(second): 60
Field Description
CPU threshold trap enable CPU utilization threshold enabling status
Rising threshold Rising threshold
Fallingthreshold Fallingthreshold
Trap transfer observation interval(second) Period for trap sampling
Dynamic statistics period Dynamic statistics period
Last 1 second CPU utilization CPU utilization in last 1 second
Last 5 seconds CPU utilization CPU utilization in last 5 seconds
Total CPU utilization Total CPU utilization
This example shows how to show CPU utilization history in last 1 minute.
Raisecom#show cpu-utilization history 1min
Cpu utilization history table size:60
CPU-utilization:
6% 6% 6% 6% 6% 6% 6% 6% 6% 6% 6% 6% 6% 6% 6%
6% 6% 6% 6% 6% 6% 6% 6% 6% 6% 6% 6% 7% 7% 6%
7% 6% 6% 6% 6% 6% 6% 6% 6% 6% 6% 6% 6% 6% 6%
7% 7% 7% 7% 7% 7% 6% 6% 6% 6% 6% 6% 6% 6% 6%
Related commands
N/A
Function
To show status information of each task, use this command.
Format
show process [ cpu | sorted { normal-priority | process-name }]
Parameters
Parameter Description
cpu CPU utilization of each task
sorted Sort outputs.
normal-priority Sort outputs based on the normal priority.
process-name Sort outputs based on the task name.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
Scenario
You can use the show process cpu command to show CPU utilization information.
You can use the show process [ sorted { normal-priority | process-name } ] command
to show task status, including task priority and stack utilization.
You can use the show process taskname command to show detailed operating status of a
specified task. The task name must be a complete task name saved on the device.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to show status information of each task.
Raisecom#show process
Number of processes: 89
Last 5 seconds CPU utilization: 7%
Last 1 minute CPU utilization: 5%
Last 10 minutes CPU utilization: 6%
READY | Task is not waiting for any resource other than the CPU.
PEND | Task is blocked due to the unavailability of some resource.
DELAY | Task is asleep for some duration.
SUSPEND | Task is unavailable for execution (but not suspended, delayed,
or pended).
DELAY+S | Task is both delayed and suspended.
PEND+S | Task is both pended and suspended.
PEND+T | Task is pended with a timeout..
PEND+S+T| Task is pended with a timeout, and also suspended.
state+I | Task has inherited priority (+I may be appended to any string
above).
DEAD | Task no longer exists.
Field Description
Number of processes Total number of tasks
Last 5 seconds CPU utilization CPU utilization within last 5 seconds
Last 1 minute CPU utilization CPU utilization within last 1 minutes
Last 10 minutes CPU utilization CPU utilization within last 10 minutes
READY The task is not waiting for any resource other than
the CPU.
PEND The task is blocked due to the unavailability of some
resource.
DELAY The task is asleep for some duration.
SUSPEND The task is unavailable for execution.
DELAY+S The task is both delayed and suspended.
PEND+S The task is both pended and suspended.
PEND+T Task is pended with a timeout.
PEND+S+T The task is pended with a timeout, and also
suspended.
state+I The task has an inherited priority.
DEAD The task does not exist anymore.
PNo Task number
Priority(Nor/Cur) Priority (normal/current)
Status Task status
PC Program counter
ErrorNo Error code
Stack(Size /Use /Max) Stack (size/usage/maximum)
ProcessName Task name
This example shows how to show detailed status information of tasks monitored by the CPU.
Raisecom#show process CpuMon
Field Description
Process ID Task ID
Process name Task name
Create time Creation time
Entry Task entry
Status Task status
Error number Error code
Program counter Program counter
Delay Task delay
Total invoked times Total number of starts
Semaphore waiting for Number of signals that are waiting for
CPU use time(Sec.uSec) Total CPU running time (s/s)
Normal priority/Current priority Normal priority/current priority
Stack size/Stack use/Max stack Stack size/Stack usage/Maximum stack usage
use
Stack begin/Stack pointer/Stack Stack begin position/Stack pointer position/Stack end
end position
Period Statistics period
CPURunTime CPU running time
Field Description
Invoked Number of startup
CPU-Utilization CPU utilization
5seconds CPU utilization within last 5 seconds
1minute CPU utilization within last 1 minute
10minutes CPU utilization within last 10 minutes
This example shows how to show detailed status information of alarm tasks.
Raisecom#show process alarm
Process ID: 282ea98
Process name: alarm
Create time: 0h:0m:27s
Entry: 5912bc
Status: DELAY
Error number: 0
Program counter: 14c260
Delay(ticks): 6
Total invoked times: 27757
Semaphore waiting for:0
CPU use time(Sec.uSec): 1.231692
Normal priority/Current priority: 100/100
Stack size/Stack use/Max stack use: 24576/312/1256
Stack begin/Stack pointer/Stack end:282ea98/282e960/2828a98
Related commands
N/A
Function
To show CPU utilization of each task, use this command.
Format
show process cpu [ sorted [ 10min | 1min | 5sec | invoked ] ]
Parameters
Parameter Description
sorted Sort outputs.
10min Sort outputs based on CPU utilization within 10 minutes.
1min Sort outputs based on CPU utilization within 1 minute.
5sec Sort outputs based on CPU utilization within 5 seconds.
invoked Sort outputs based on start orders of tasks.
Default conditions
Sort outputs based on the CPU running time.
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show CPU utilization of each task.
Raisecom#show process cpu
Last 5 seconds CPU utilization: 7%
Last 1 minute CPU utilization: 5%
Last 10 minutes CPU utilization: 6%
Last 2 hours CPU utilization: 6%
Field Description
Number of processes Total number of tasks
Field Description
Last 5 seconds CPU utilization CPU utilization within last 5 seconds
Last 1 minute CPU utilization CPU utilization within last 1 minute
Last 10 minutes CPU utilization CPU utilization within last 10 minutes
Last 2 hours CPU utilization CPU utilization within last 2 hours
PNo Task number
CPURunTime(Sec.uSec) CPU running time
Invoked Total number of starts
CPUUtilization CPU utilization
ProcessName Task name
Related commands
N/A
Function
To enable CPU threshold alarm sending trap, use this command. To disable this function, use
the disable form of this command.
Format
snmp-server traps { enable | disable } cpu-threshold
Parameters
Parameter Description
enable Enable CPU threshold alarm sending trap.
disable Disable CPU threshold alarm sending trap.
Default conditions
CPU threshold alarm sending trap is disabled.
Command mode
Global configuration
User level
5
Usage guidelines
Scenario
After you enable or disable CPU threshold alarm sending trap, the system sends a trap when
the CPU utilization is higher than the rising threshold or is lower than the falling threshold
during a specified period.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable CPU threshold alarm sending trap.
Raisecom#config
Raisecom(config)#snmp-server traps enable cpu-threshold
Set successfully.
Related commands
show cpu-utilization
Function
To test the network connectivity between the local and the destination, use this command.
Format
ping ip-address [ count count ] [ size size ] [ source ip-address ] [ waittime period ]
ping ipv6 ipv6-address [ count count ] [ size size ] [ waittime period ]
Parameters
Parameter Description
ip-address Destination IP address
count Specify numbers of detection packets for exiting Ping program.
count Number of detection packets, an integer, ranging from 1 to 65535
Parameter Description
size Specify the size of the detection packet.
size Size of the detection packet, an integer, ranging from 0 to 4096, in
units of Byte
waittime Specify the wait time for Ping program. If no response is received
when the wait time expires, it is believed the destination is
unreachable.
period Timeout, an integer, ranging from 1 to 60, in units of second
ipv6-address IPv6 address, in colon hexadecimal notation
source ip- Specify source IP address.
address
Default conditions
The number of Ping detection packets is configured to 5. The size of a Ping detection packet
is configured to 8 Bytes. The timeout is configured to 3s.
Command mode
Privileged EXEC
User level
1
Usage guidelines
Scenario
Ping program is used to test the connectivity between the source address and the destination
address. The local device sends an ICMP ECHO-REQUEST packet to the destination address.
It the network connectivity is normal, the destination host sends an ICMP ECHO-REPLY
packet to the source host. If the source host does not receive the ICMP ECHO-REPLY packet
sent by the destination host, it is believed the network connectivity is abnormal.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to Ping 10.0.0.1 and how to configure other parameters to default
values. (In this example, the result is positive.)
Raisecom#ping 10.0.0.1
Type CTRL+C to abort
Sending 5, 8-byte ICMP Echos to 10.0.0.1, timeout is 3 seconds:
Reply from 10.0.0.1: time<1ms
Reply from 10.0.0.1: time<1ms
Reply from 10.0.0.1: time<1ms
Reply from 10.0.0.1: time<1ms
Reply from 10.0.0.1: time<1ms
---- PING Statistics----
5 packets transmitted, 5 packets received,
Success rate is 100 percent(5/5),
round-trip (ms) min/avg/max = 0/0/0.
This example shows how to Ping 10.0.0.2, how to configure the number of detection packets
to 3, how to configure the size of a detection packet to 20 Bytes, and how to configure the
timeout to 5s. (In this example, the result is positive.)
Raisecom#ping 10.0.0.2 count 3 size 20 waittime 5
Type CTRL+C to abort
Sending 3, 28-byte ICMP Echos to 10.0.0.2, timeout is 5 seconds:
Reply from 10.0.0.2: time<1ms
Reply from 10.0.0.2: time<1ms
Reply from 10.0.0.2: time<1ms
---- PING Statistics----
3 packets transmitted, 3 packets received,
Success rate is 100 percent(3/3),
round-trip (ms) min/avg/max = 0/0/0.
This example shows how to Ping 10.0.0.3 and how to configure other parameters to default
values. (In this example, the result is negative.)
Raisecom#ping 10.0.0.3
Type CTRL+C to abort.
Sending 5, 8-byte ICMP Echos to 10.0.0.3 , timeout is 3 seconds:
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Related commands
traceroute
12.7.2 traceroute
Function
To acquire information about the path from the source address to the destination address, use
this command. This command is used to locate network faults.
Format
traceroute ip-address [ firstttl first-ttl ] [ maxttl max-ttl ] [ port port-number ] [ waittime
period ] [ count times ] [ size size ]
Parameters
Parameter Description
ip-address IP address of the destination host/network
firstttl First TTL
first-ttl Value of the first TTL, an integer, ranging from 1 to 255
maxttl Maximum TTL
When this value is exceeded, the destination is unreachable.
max-ttl Value of the maximum TTL, an integer, ranging from 1 to 255
port Interface ID of the UDP packet
port-number Interface ID, an integer, ranging from 1 to 65535
waittime Specify the timeout for Traceroute program. If no response is received
when the timeout expires, the destination is unreachable.
period Timeout, an integer, ranging from 1 to 60, in units of second
count Configure numbers of detection packets sent during a hop.
times Number of detection packets, an integer, ranging from 1 to 10
size Specify the size of detection packets.
size Size of detection packets, an integer, ranging from 0 to 4096, in units
of Byte
Default conditions
The first TTL value is configured to 1. The maximum TTL value is configured to 30. The
interface ID is configured to 33433. The timeout is configured to 3. The number of detection
packets is configured to 3.
Command mode
Privileged EXEC
User level
1
Usage guidelines
Scenario
Traceroute program sends a set of packets with TTL 1. Because the TTL expires, the first hop
sends back an ICMP error message informing that this set of packets cannot be sent. Then the
set of packets will be resent with TTL 2, and then the second hop sends back the packets
because the TTL expires. This continues until the destination host receives the packets. The
device will record the source address of each ICMP TTL timeout message for offering the
path through which the packets arrived at the destination.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to trace 10.0.0.1 and how to configure other parameters to default
values. (In this example, the result is positive.)
Raisecom#traceroute 10.0.0.1
Tracing the route to 10.0.0.1:
Type ctrl+c to abort
1 10.0.0.1 <1ms <1ms <1ms
Trace complete.
Field Description
10.0.0.1 Indicate the gateway through which the packet passes.
<1ms Indicate that the route to the destination is reachable.
This example shows how to traceroute 10.0.0.2, how to configure the maximum TTL to 3,
how to configure the number of detection packets during a hop to 2. (In this example, the
result is negative.)
Raisecom#traceroute 10.0.0.2 maxttl 3 count 2
Tracing the route to 10.0.0.2:
Type ctrl+c to abort
1 * *
2 * *
3 * *
Trace complete.
Field Description
* Indicate that the route to the destination is unreachable.
Related commands
ping
Function
To acquire information about the path from the source address to the destination address of
IPv6 packets, use this command. This command is used to locate network faults.
Format
traceroute ipv6 ipv6-address [ firstttl first-ttl ] [ maxttl max-ttl ] [ port port-number ]
[ waittime period ] [ count times ] [ size size ]
Parameters
Parameter Description
ipv6-address IPv6 address, in colon hexadecimal notation, such as 3001::1
firstttl First TTL
first-ttl Value of the first TTL, an integer, ranging from 1 to 255
maxttl Maximum TTL
When this value is exceeded, the destination is unreachable.
max-ttl Value of the maximum TTL, an integer, ranging from 1 to 255
port Interface ID of the UDP packet
port-number Interface ID, an integer, ranging from 1 to 65535
waittime Specify the timeout for Traceroute program. If no response is received
when the timeout expires, the destination is unreachable.
period Timeout, an integer, ranging from 1 to 60, in units of second
count Configure numbers of detection packets sent during a hop.
times Number of detection packets, an integer, ranging from 1 to 10
size Specify the size of detection packets.
size Size of detection packets, an integer, ranging from 0 to 4096, in units of
Byte
Default conditions
The first TTL value is configured to 1. The maximum TTL value is configured to 30. The
interface ID is configured to 33433. The timeout is configured to 3. The number of detection
packets is configured to 3.
Command mode
Privileged EXEC
User level
1
Usage guidelines
Scenario
Traceroute program sends a set of packets with TTL 1. Because the TTL expires, the first hop
sends back an ICMP error message informing that this set of packets cannot be sent. Then the
set of packets will be resent with TTL 2, and then the second hop sends back the packets
because the TTL expires. This continues until the destination host receives the packets. The
device will record the source address of each ICMP TTL timeout message for offering the
path through which the packets arrived at the destination.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to trace IPv6 3000::1 and how to configure other parameters to
default values. (In this example, the result is positive.)
Raisecom#traceroute 3000::1
Tracing the route to 3000::1
Type ctrl+c to abort
1 3000::1 <1ms <1ms <1ms
Trace complete.
Field Description
3000::1 Indicate the gateway through which the packet passes.
<1ms Indicate that the route to the destination is reachable.
Related commands
ping
12.8 KeepAlive
12.8.1 snmp-server keepalive-trap
Function
Enable sending KeepAlive Trap packets periodically, use this command. Use the disable form
of this command to disable KeepAlive Trap or use the pause form of this command to pause
KeepAlive Trap.
Format
snmp-server keepalive-trap { enable | disable | pause }
Parameters
Parameter Description
Default conditions
Disabled
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
The NView NNM can find the device in a short time based on the KeepAlive Trap packets
sent by the device.
After you use this command to enable KeepAlive Trap, the device sends KeepAlive Trap
packets to the destination host that contains bridge module Trap if global Trap is enabled. If
global Trap is disabled, the device does not send KeepAlive trap after you enable KeepAlive
Trap.
After the KeepAlive Trap is disabled by this command, the device stops sending KeepAlive
Trap.
Prerequisite
N/A
Follow-up procedure
Use the show keepalive command to display the status of KeepAlive Trap.
Precaution
N/A
Examples
This example shows how to enable KeepAlive Trap.
Raisecom#config
Raisecom(config)#snmp-server keepalive-trap enable
Set successfully.
Related commands
show keepalive
Function
To configure an interval for sending KeepAlive Trap packets, use this command. To return to
the default condition, use the no form of this command.
Format
snmp-server keepalive-trap interval period
no snmp-server keepalive-trap interval
Parameters
Parameter Description
period Interval for sending KeepAlive Trap packets, ranging from 120 to
28800, in units of second
Default conditions
The interval for sending KeepAlive Trap packets is configured to 300s
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
After you use this command to configure an interval for sending KeepAlive Trap packets, the
interface, where KeepAlive Trap is enabled, will send KeepAlive Trap packets to the NMS
based on the interval.
To prevent multiple devices sending KeepAlive Trap packets based on the same interval, the
KeepAlive Trap packets are randomly sent during the interval + 5s.
Prerequisite
The KeepAlive Trap is enabled by the snmp-server keepalive-trap enable command.
Follow-up procedure
Use the show keepalive command to show the interval for sending KeepAlive Trap packets.
Precaution
N/A
Examples
This example shows how to set the interval for sending KeepAlive Trap packets to 500s.
Raisecom#config
Raisecom(config)#snmp-server keepalive-trap interval 500
Set successfully.
Related commands
show keepalive
Function
To show configurations of KeepAlive and statistics of transmitted packets, use this command.
Format
show keepalive
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show configurations of KeepAlive.
Raisecom#show keepalive
Keepalive Admin State:Disable
Keepalive trap interval:300 s
Keepalive trap count:0
Field Description
Keepalive Admin State Status of KeepAlive administration
Keepalive trap interval Interval for sending KeepAlive Trap packets
Keepalive trap count Number of Tx KeepAlive Trap packets
Related commands
N/A
12.9 RMON
12.9.1 clear rmon
Function
To restore configurations of Remote Network Monitoring (RMON) to the default setting, use
this command.
Format
clear rmon
Parameters
N/A
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
N/A
Examples
This example shows how to restore configurations of RMON to the default setting.
Raisecom#config
Raisecom(config)#clear rmon
Set successfully.
Related commands
N/A
Function
To add a RMON alarm to an alarm group, use this command. To delete the RMON alarm, use
the no form of this command.
Format
rmon alarm alarm-id mibvar [ interval period ] { absolute | delta } rising-threshold rising-
num [ rising-event ] falling-threshold falling-num [ falling-event ] [ owner owner-name]
no rmon alarm alarm-id
Parameters
Parameter Description
alarm-id Alarm index, an integer, ranging from 1 to 65535
mibvar MIB variables (MIB OIDs) that need to be remotely monitored.
interval Sampling interval of MIB variables. It is used to monitor MIB
changes periodically.
If you do not select this parameter, the value is configured to 2s by
default.
period Interval, an integer, ranging from 2 to 3600, in units of second
Parameter Description
absolute Show the absolute change of MIB variables. It is a method for
generating alarms.
Compare the changed MIB variable value to the configured threshold,
if the value is smaller than the minimum value or greater than the
maximum value, an alarm is generated.
delta Show the relative change of MIB variables. It is a method for
generating alarms.
If the delta increases, compare the delta to the maximum value, if the
delta is greater than the maximum value, an alarm is generated. If the
delta decreases, compare the delta to the minimum value, if the delta
is greater than the minimum value, an alarm is generated.
rising-threshold Maximum threshold
falling- Minimum threshold
threshold
rising-num Maximum value, an integer, ranging from 0 to 2147483647
falling-num Minimum value, an integer, ranging from 0 to 2147483647
falling-event Number of the event triggered when the value exceeds the minimum
value, an integer, ranging from 1 to 65535
owner Descriptions about the creator of the RMON alarm
owner-name Description string
Default conditions
There is no RMON alarm.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
RMON alarm management monitors specified MIB variables based on configured sampling
interval. When the value of monitored data exceeds the threshold, a related alarm is generated.
In general, alarm events are written into the system log or the device sends a trap to the NMS.
You can use this command to add a RMON alarm to or delete a RMON alarm from an alarm
group.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The MIB variable must be in dotted decimal notation and be valid. Otherwise, it cannot be
monitored.
Examples
This example shows how to add RMON alarm 1, how to set the OID of a monitored MIB
variable to 1.3.6.1.2.1.2.2.1.20.1, how to set the sampling interval to 20s, how to generate
alarm event 1 if the changed value exceeds the maximum value 10000, how to generate alarm
event 2 if the changed value is smaller than the minimum value 500, and how to configure the
creator to raisecom.
Raisecom#config
Raisecom(config)#rmon alarm 1 1.3.6.1.2.1.2.2.1.20.1 interval 20 absolute
rising-threshold 10000 1 falling-threshold 500 2 owner raisecom
Set successfully.
Related commands
show rmon
Function
To add a RMON event to an event group, use this command. To delete the RMON event, use
the no form of this command.
Format
rmon event event-id [ log ] [ trap ] [ description string ] [ owner owner-name ]
no rmon event event-id
Parameters
Parameter Description
event-id Event number, an integer, ranging from 1 to 65535
log Write the event to the system log.
trap Send a trap to the NView NNM.
description Event descriptions
string Description, a string of 1 to 127 characters
Parameter Description
owner Descriptions about the event creator
If you do not select this parameter, the descriptions are configured to
monitor event by default.
owner-name Description string
Default conditions
There is no event in an event group.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
The event group provides alarms generated by the RMON agent. When an event occurs, the
device can write it into the system log or send a trap to the NMS.
You can use this command to add an event to an event group.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to add RMON event 1 to an event group, how to configure the
processing mode to sending Trap only, and how to configure the event creator to raisecom.
Raisecom#config
Raisecom(config)#rmon event 1 trap owner raisecom
Set successfully.
Related commands
show rmon events
Function
To enable history group on an interface, use this command. To disable the history group, use
the no form of this command.
Format
rmon history interface-type interface-number [ shortinterval short-period ] [ longinterval
long-period ] [ buckets buckets-number ] [ owner owner-name ]
no rmon history interface-type interface-number
Parameters
Parameter Description
interface-type Enable history group on the specified interface.
interface-number The interface-type indicates interface type.
The interface-number indicates three dimensional interface list ID.
It supports a range, such as "1-3".
shortinterval Short sampling interval
Collect the network status statistics every a short period.
short-period Short period, an integer, ranging from 1 to 600, in units of second
longinterval Long sampling interval
Collect the network status statistics every a long period.
long-period Long period, an integer, ranging from 600 to 3600, in units of second
buckets History group data storage queue
buckets-number Queue size, an integer, ranging from 10 to 1000
owner Descriptions about the creator of the history group
owner-name Description string
Default conditions
There is no history group. By default, the shortinterval is configured to 30s; the longinterval
is configured to 1800s; the buckets is configured to 10; the string is configured to
monitorHistory.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
The history group collects and store network status statistics periodically. You can use this
command to enable history group on a specified interface. You can configure an interface for
querying network status and configure the size of a data storage queue.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable history group on Fastethernet 1/3/1, how to configure the
querying interval to 60s, how to configure the data storage queue size to 50, and how to
configure the description string to raisecom.
Raisecom#config
Raisecom(config)#rmon history fastethernet 1/3/1 shortinterval 60 buckets
50 owner raisecom
Set successfully.
Related commands
show rmon history
Function
To enable statistics group on an interface, use this command. To disable statistics group, use
the no form of this command.
Format
rmon statistics interface-type interface-number [ owner owner-name ]
no rmon statistics interface-type interface-number
Parameters
Parameter Description
interface-type Enable statistics group on a specified interface.
interface-number The interface-type indicates interface type.
The interface-number indicates three dimensional interface list ID.
It supports a range, such as "1-3".
owner Descriptions about the creator of the statistics group
owner-name Description string
Default conditions
Statistics group is enabled on all interfaces. By default, the owner parameter is configured to
monitoretherstats.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
RMON is a standard to monitor network data through the Agent and the NMS. It is used to
resolve the restriction of SNMP in a distributed network.
According to functions, RMON is divided into 9 groups. Statistics group is used to collect
basic statistics in each subnet. It is used to gather statistics of traffic and packet distribution at
certain network segment. In addition, it is used to gather statistics on number of error frames
and collision times.
You can use this command to enable statistics group on a specified interface.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable statistics group on Fastethernet 1/3/1 and how to configure
the creator name to raisecom.
Raisecom#config
Raisecom(config)#rmon statistics fastethernet 1/3/1 owner raisecom
Set successfully.
Related commands
show rmon statistics
Function
To show information about the RMON module, use this command.
Format
show rmon [ alarms | events ]
show rmon statistics [ interface-type interface-number ]
show rmon history interface-type interface-number
Parameters
Parameter Description
alarms Show information about the RMON alarm group.
events Show information about the RMON event group.
statistics Show information about the RMON statistics group.
history Show information about the RMON history group.
interface-type Show information about the RMON on a specified interface.
interface-number The interface-type indicates interface type.
The interface-number indicates three dimensional interface list ID.
It supports a range, such as "1-3".
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show information about RMON module.
Raisecom#show rmon
Alarm group information:
Alarm 1 is active, owned by test
Monitors 1.3.6.1.2.1.2.2.1.5.1 every 100 seconds
Taking absolute samples, last value was 0
Rising threshold is 1000, assigned to event 1
Falling threshold is 10, assigned to event 2
On startup enable rising and falling alarm
Related commands
N/A
Function
To enable cable diagnostics of the interface circuit, use this command.
Format
test cable-diagnostics interface-type interface-number
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Privileged EXEC
User level
11
Usage guidelines
Scenario
You can use this command to enable cable diagnostics of the interface circuit.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The interface rate and duplex mode are not changed before and after cable diagnostics.
When Combo interface initiates cable diagnostics, the interface should be forced to serve
as an electrical interface.
Examples
You can use this command to enable cable diagnostics on interface 1/1/1.
Raisecom#test cable-diagnostics gigaethernet1/1/1
Test on port port-list 1 will affect link state and traffic.
Test will take a few seconds to run on these ports.
Use 'show cable-diagnostics' to read the test results.
Related commands
show cable-diagnostics
Function
To show information about cable diagnostics of interface circuit, use this command.
Format
show cable-diagnostics [interface-type interface-number ]
Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
Default conditions
N/A
Command mode
Privileged EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show information about cable diagnostics of on interface 1/1/1
circuit.
Raisecom#show cable-diagnostics gigaethernet1/1/1
Port: gigaethernet1/1/1 Attribute:Issued
Time:01/01/2010 08:38:25
Pair Status Length(m)
----------------------------------------------------
TX1 Open 0 0
RX1 Open 0 0
TX2 Open 0 0
RX2 Open 0 0
Field Description
Port Interface ID
Attribute Attribute
Time Time
Pair Wiring pair
Status Status
Length(m) Length (m)
Related commands
N/A
Function
To enable temperature alarm and configure temperature alarm thresholds or temperature alarm
output modes, use this command. To disable this function, use the no form of this command.
Format
alarm temperature { high high-value | low low-value | notifies | syslog }
no alarm temperature { high | low | notifies | syslog }
Parameters
Parameter Description
high high-value High temperature threshold, an integer, ranging from -40 to 125 C
low low-value Low temperature threshold, an integer, ranging from -40 to 125 C
notifies Output temperature alarms in a form of Trap.
syslog Output temperature alarms in a form of Syslog.
Default conditions
The high temperature threshold is configured to 60 C and the low temperature is configured
to 20 C. Temperature alarms are output in a form of Trap or Syslog.
Command mode
Global configuration
Usage guidelines
Scenario
Temperature alarm must be enabled when the device works. It helps prevent the device from
working improperly caused by over high temperature.
You can use this command to configure temperature thresholds. When the device temperature
is higher than the high temperature threshold or is lower than the low temperature threshold,
an alarm is generated. You can use the no form of this command to restore the temperature
thresholds to the default setting.
You can use this command to configure temperature alarm output modes which are Trap and
Syslog. You can use the no form of this command to disable certain temperature alarm output
mode.
Prerequisite
N/A
Follow-up procedure
Use the show alarm command to display configurations of temperature alarms.
Precaution
N/A
Examples
This example shows how to configure the low temperature threshold to 10 C and the high
temperature threshold to 70 C.
Raisecom#config
Raisecom(config)#alarm temperature low 10
Set successfully.
Raisecom(config)#alarm temperature high 70
Set successfully.
Related commands
show alarm
Function
To enable voltage alarm and configure voltage alarm thresholds or voltage alarm output
modes, use this command. To disable this function, use the no form of this command.
Format
alarm voltage { high high-value | low low-value | notifies | syslog }
no alarm voltage { high | low | notifies | syslog }
Parameters
Parameter Description
high high-value High voltage threshold, an integer, ranging from 3450 to 3600 mV
low low-value Low voltage threshold, an integer, ranging from 3000 to 3300 mV
notifies Output voltage alarms in a form of Trap.
syslog Output voltage alarms in a form of Syslog.
Default conditions
The high voltage threshold is configured to 3450 mV and the low voltage is configured to
3150 mV. Voltage alarms are output in a form of Trap or Syslog
Command mode
Global configuration
Usage guidelines
Scenario
Voltage alarm must be enabled when the device works. It helps prevent the device from
working improperly caused by voltage anomaly.
You can use this command to configure voltage thresholds. When the device voltage is higher
than the high voltage threshold or is lower than the low voltage threshold, an alarm is
generated. You can use the no form of this command to restore the voltage thresholds to the
default setting.
You can use this command to configure voltage alarm output modes which are Trap and
Syslog. You can use the no form of this command to disable certain voltage alarm output
mode.
Prerequisite
N/A
Follow-up procedure
Use the show alarm command to display configurations of voltage alarms.
Precaution
N/A
Examples
This example shows how to set the low voltage threshold to 3100 mV and the high voltage
threshold to 3500 mV.
Raisecom#config
Raisecom(config)#alarm voltage low 3100
Set successfully.
Raisecom(config)#alarm voltage high 3500
Set successfully.
Related commands
show alarm
Function
To clear current alarms, use this command.
Format
clear alarm
Parameters
N/A
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to clear current alarms.
You can use this command to delete alarms from the current alarm list. And then a clearall
alarm is generated in the history alarm. If alarm global Trap output is enabled, this clearall
alarm is output in a form of Trap. If alarm global Syslog output is enabled, this clearall alarm
is output in a form of Syslog.
For alarms deleted from the current alarm list, the system does not process them when alarms
recover. In addition, these alarms are not re-displayed in the current alarm list.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to clear current alarms.
Raisecom#config
Raisecom(config)#clear alarm
Set successfully.
Related commands
show alarm current
show alarm history
Function
To enable global hardware monitoring alarm Syslog output, use this command. To disable this
function, use the no form of this command.
Format
logging alarm
no logging alarm
Parameters
N/A
Default conditions
Disabled
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
When the hardware environment is in anomaly, an alarm is generated. Therefore, you can take
actions immediately to prevent a failure. The monitored alarms contains dying Gasp alarms,
temperature alarms, voltage alarms, and interface status alarms.
Each alarm can be output in multiple forms:
Save alarms to the hardware monitoring alarm list.
Send Traps.
Saved to the system log.
You can use this command to enable global hardware monitoring alarm Syslog output.
When global hardware monitoring alarm Syslog output is enabled, an alarm cannot be
generated to the system log unless the Syslog output of the monitored alarm is enabled
concurrently.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable global hardware monitoring alarm Syslog output.
Raisecom#config
Raisecom(config)#logging alarm
Set successfully.
Related commands
show alarm
Function
To show configurations of global hardware monitoring alarms, use this command.
Format
show alarm
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
Scenario
You can use this command to display hardware monitoring information, including:
Status of global hardware monitoring alarm sending Trap switch
Status of global hardware monitoring alarm sending Syslog switch
Temperature threshold and temperature alarm output modes
Voltage threshold and voltage alarm output modes
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to show configurations of global hardware monitoring alarms.
Raisecom#show alarm
Traps alarm: Disabled
Temperature
High threshold(Celsius):60
Low threshold(Celsius): 20
Notifies: Enabled
Syslog: Enabled
Voltage
High threshold: 3450mV
Low threshold: 3150mV
Notifies: Disabled
Syslog: Disabled
Related commands
N/A
Function
To show current hardware monitoring alarms, use this command.
Format
show alarm current
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
Scenario
You can use this command to display existing hardware monitoring alarms.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to show current hardware monitoring alarms.
Raisecom#show alarm current
Alarm totals: 2
Related commands
N/A
Function
To show historical hardware monitoring alarms, use this command.
Format
show alarm history
Parameters
N/A
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
Scenario
You can use this command to show historical hardware monitoring alarms.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to show historical hardware monitoring alarms.
Raisecom#show alarm history
Alarm totals: 1
Related commands
N/A
Function
To show information related to the hardware environment, including information about the
power supply, temperature, and voltage, as well as alarms, use this command.
Format
show environment [ temperature | voltage ]
Parameters
Parameter Description
temperature Show temperature information.
voltage Show voltage information.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
N/A
Examples
This example shows how to show information related to the hardware environment.
Raisecom#show environment
Temperature:
High alarm times: 0
Low alarm times: 0
Units Celsius Fahrenheit
-----------------------------------
Current 41 105
Min 29 84
Max 41 105
Voltage:
Reference Current Min Max High Alarms Low Alarms
--------------------------------------------------------------------
Field Description
Temperature Temperature alarm
High alarm times Times of high temperature alarms
Low alarm times Times of low temperature alarms
Units Temperature type
Current: current temperature
Min: lowest temperature
Max: highest temperature
Related commands
N/A
Function
To enable global hardware monitoring alarm Trap output, use this command. To disable global
hardware monitoring alarm Trap output, use the disable form of this command.
Format
snmp-server alarm-trap { enable | disable }
Parameters
Parameter Description
Default conditions
Disabled
Command mode
Global configuration
User level
11
Usage guidelines
When the hardware environment is in anomaly, an alarm is generated. Therefore, you can take
actions immediately to prevent a failure. The monitored alarms contains dying Gasp alarms,
temperature alarms, voltage alarms, and interface status alarms.
Each alarm can be output in multiple forms:
Save alarms to the hardware monitoring alarm list.
Send Traps.
Saved to the system log.
You can use this command to enable global hardware monitoring alarm Trap output.
When global hardware monitoring alarm Trap output is enabled, the Trap cannot be sent
unless the Trap output of the monitored alarm is enabled concurrently.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
When you send alarms to the NMS in a form of Trap, you must configure the IP address of the
NMS on the device.
Examples
This example shows how to enable global hardware monitoring alarm Trap output.
Raisecom#config
Raisecom(config)#snmp-server alarm-trap enable
Set successfully.
Related commands
N/A
Function
To configure the maximum threshold of memory utilization, use this command.
Format
memory utilization threshold threshold-value
Parameters
Parameter Description
threshold-value Maximum threshold of memory utilization, an integer, ranging from 50
to 95, indicating 50% to 95%
Default conditions
The memory alarm threshold is 70 indicating 70%.
Command mode
Privileged EXEC
User level
11
Usage guidelines
Scenario
After memory threshold alarm sending Trap is enabled, during sampling interval (a specified
period), the system sends a Trap automatically when the memory utilization rate is over the
configured maximum threshold.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the maximum threshold to 80%.
Raisecom#config
Raisecom(config)#memory utilization threshold 80
Set success.
Related commands
show memory utilization threshold
Function
To enable memory utilization monitoring, use this command. To disable the function, use the
disable form of this command.
Format
memory utilization monitor { enable | disable }
Parameters
Parameter Description
enable Enable memory utilization monitoring.
disable Disable memory utilization monitoring.
Default conditions
Enabled
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to enable memory utilization monitoring. Then users will be
informed through a Trap when the device runs out of memory.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable memory monitoring.
Raisecom#config
Raisecom(config)#memory utilization monitor enable
Set successfully
Related commands
show memory
Function
To show memory utilization, use this command.
Format
show memory [ module { value | bufferpool | diff }| utilization threshold ]
Parameters
Parameter Description
module Specified module
value Value of module ID, an integer, ranging from 1 to 511
bufferpool Changes of memory pool
diff Changes of memory
utilization threshold Show configurations of memory utilization threshold.
Default conditions
N/A
Command mode
Any configuration except user EXEC
User level
5
Usage guidelines
Scenario
Use the show memory command to show memory information, including number of bytes
and blocks, number of bytes and blocks of the remaining memory, and the current memory
utilization rate.
Use the show memory command to show memory information of the card in place.
Use the show memory module value command to show the memory utilization information
of the specified module.
Use the show memory module bufferpool command to show statistics of every block
memory pool.
Use the show memory module diff command to show the added memory information
between two commands.
Use the show memory utilization threshold command to show the maximum threshold of
memory utilization.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to show the status of memory utilization rate.
Raisecom#show memory
status bytes blocks avg block max block
-------- -------------- ---------- ---------- ----------
current
free 155929984 6 25988330 155919800
alloc 49280832 32893 1498 -
internal 632 3 210 -
cumulative
alloc 3091111192 26190192 118 -
peak
alloc 51335408 - - -
Field Description
status Memory status
blocks Number of Memory blocks
avg block Average size of each block
max block Size of the maximum block
current Current utilization status of the memory
free Number of bytes of free memory
alloc Number of bytes of the memory in use
internal Memory utilization status inside the system
cumulative Accumulative memory utilization status
peak Peak value of the historical memory utilization
The Memory utilization Memory utilization rate
memory utilization switch Enabled status of memory utilization threshold
monitoring
memory utilization threshold Maximum alarm threshold of memory utilization
Related commands
N/A
Function
To clear global performance statistics history, use this command.
Format
clear performance statistics history
Parameters
N/A
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
N/A
Examples
This example shows how to clear global performance statistics history.
Raisecom#config
Raisecom(config)#clear performance statistics history
Set successfully.
Related commands
show performance statistics
Function
To configure performance statistics longinterval/shortinterval buckets, use this command. To
return to the default conditons use the no form of this command.
Format
performance statistics longinterval buckets longbuckets-number
performance statistics shortinterval buckets shortbuckets-number
no performance statistics longinterval buckets
no performance statistics shortinterval buckets
Parameters
Parameters Description
longbuckets-number Buckets value, an integer, ranging from 3 to 100, in units of stripe
shortbuckets- Buckets value, an integer, ranging from 10 to 100, in units of
number stripe
Default conditions
Performance statistics longbuckets value is 16, shortbuckets value is 3.
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
You can use this command to configure performance statistics longinterval/shortinterval
buckets. The over configured records will override the original ones.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to configure the shortinterval buckets of performance statistics to 10.
Raisecom#config
Raisecom(config)# performance statistics shortinterval buckets 10
Set successfully.
Related commands
show performance statistics
Function
To enable performance statistics based on interface, use this command. To disable this
function, use the disable form of this command
Format
performance statistics interface-type interface-number vlan vlan-list [ cos cos-value ]
{ enable | disable }
Parameters
Parameters Description
interface-type Interface number
interface-number The interface-type indicates interface type.
The interface-number indicates three-dimensional interface
number.
vlan-list VLAN ID list, an integer, ranging from 1 to 4049
It supports specific values, such as "1,2,3"; it also supports a
range, such as "1-3".
cos-value CoS value, an integer, ranging from 0 to 7.
enable Enable performance statistics based on interface.
disable Disable performance statistics based on interface.
Default conditions
N/A
Command mode
Global configuration
User level
11
Usage guidelines
Scenario
To show the number of egress/ingress bytes and packets on the interface, you can enable
performance statistics file saving feature based on interface and show them through the show
performance statistics command.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A
Examples
This example shows how to enable performance statistics based on interface
Raisecom#config
Raisecom(config)#performance statistics gigaethernet 1/1/3 vlan 1 cos 1
enable
Set successfully.
Related commands
show performance statistics
Function
To show performance statistics, use this command.
Format
show performance statistics vlan vlan-list { current | history } ]
Parameters
Parameter Description
current Current history of performance statistics
history Performance statistics of history group
vlan Statistics based on VLAN
vlan-list VLAN ID list, an integer, ranging from 1 to 4094
It supports specific values, such as "1,2,3"; it also supports a
range, such as "1-3".
Default conditions
N/A
Command mode
Any configuration
User level
5
Usage guidelines
N/A
Examples
This example shows how to show current history of global performance statistics.
Raisecom#show performance statistics
Performance statistics shortinterval buckets: 16
Performance statistics longinterval buckets: 3
Performance statistics file Status: Disable
Fields Description
Performance statistics shortinterval buckets Performance statistics shortinterval
buckets
Performance statistics longinterval buckets Performance statistics longinterval buckets
Performance statistics file Status Performance statistics file status
This example shows how to show current history of performance statistics based on VLAN1.
Raisecom#show performance statistics vlan 1 current
Short interval
Vlan: 1 Cos: 0
--------------------------
UpOctets: 0
UpFrames: 0
UpDiscards: 0
DownOctets: 0
DownFrames: 0
DownDiscards: 0
Long interval
Vlan: 1 Cos: 0
--------------------------
UpOctets: 0
......
DownDiscards: 0
Short interval
Vlan: 1 Cos: 1
--------------------------
UpOctets: 0
......
DownDiscards: 0
Field Description
UpOctets Number of uplink bytes
UpFrames Number of uplink packets
UpDiscards Number of discarded uplink packets
DownOctets Number of downlink bytes
DownFrames Number of downlink packets
DownDiscards Number of discarded downlink packets
Related commands
N/A
13 Index
enable ...............................15
end....................................17 hostname.......................... 22
erase .................................67
lldp message-transmission
hold-multiplier ...............763
m ........................................ 3
lldp message-transmission
interval ...........................764 mac-address aging-time. 154
mac-address blackhole .. 155
lldp restart-delay ............765
mac-address learning enable
lldp trap-interval ............766
....................................... 157
load-sharing mode .........589
mac-address move-restrain
local-priority to cos ........439 enable ............................ 156
logging alarm .................898 mac-address multicast drop-
unknown ........................ 160
logging buffered .............816
mac-address static ......... 162
logging buffered size .....818
mac-address threshold ... 159
logging buginf ................815
master-port..................... 590
logging console ..............819
match ............................. 467
logging discriminator .....821
mdi ................................. 105
logging facility ...............823
media-type ..................... 107
logging file .....................824
medium-priority ............ 104
logging history ...............826
memory utilization enable
logging history size ........827 ....................................... 907
logging host ...................828 memory utilization
logging monitor .............830 threshold ........................ 906
poe priority .................... 337
show mls qos queue shaping show process cpu ........... 869
interface .........................456
show radius-server......... 683
show mls qos queue
statistics interface...........455 show rate-limit interface 503
show oam peer event .....573 show snmp group .......... 778