CLI-Reference_latest
CLI-Reference_latest
CLI-Reference_latest
Support
For product and technical support, contact support at either of the following:
1.800.943.4526 (toll-free in USA and Canada)
+1.408.941.4300
www.silver-peak.com/support
We are dedicated to continually improving our products and documentation. If you have
suggestions or feedback for our documentation, send an e-mail to sp-techpubs@hpe.com.
4
CLI Reference February 08, 2024
interface cdp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
interface dhcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
interface inbound-max-bw . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
interface label . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
interface mac address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
interface mtu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
interface outbound-max-bw . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
interface pass-through . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
interface security-mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
interface shutdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
interface speed-duplex . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
interface ip address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
interface tunnel admin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
interface tunnel alias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
interface tunnel bind-tunnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
interface tunnel control-packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
interface tunnel create . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
interface tunnel gre-protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
interface tunnel ipsec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
interface tunnel max-bandwidth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
interface tunnel min-bandwidth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
interface tunnel mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
interface tunnel mtu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
interface tunnel nat-mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
interface tunnel packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
interface tunnel peer-name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
interface tunnel revert . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
interface tunnel tag-name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
interface tunnel threshold . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
interface tunnel traceroute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
interface tunnel udp-flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
interface tunnel udp-port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
interface virtual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
interface vrrp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
ip default-gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
ip domain-list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
ip host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
ip mgmt-ip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
ip name-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
ip route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
ip-tracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
logging facility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
logging files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
logging local . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
logging trap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
mtr . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
nat-map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
no opt-map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
no qos-map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
no route-map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
ntp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
ntpdate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
nat-map (no) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
nat-map activate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
nat-map comment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
nat-map match . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
nat-map modify-priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
nat-map set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
opt-map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
opt-map activate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
opt-map comment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
opt-map match . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
opt-map modify-priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
opt-map set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
overlay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
ping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
qos-map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
qos-map activate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
qos-map comment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
qos-map match . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
qos-map modify-priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
qos-map set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
radius-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
reboot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
reload . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
route-map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
route-map activate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
route-map comment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
route-map modify-priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
route-map match . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
route-map set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
proxy-arp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
saas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
selftest . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
shaper inbound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
shaper outbound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
slogin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
snmp-server user v3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
snmp-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
ssh client global . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
ssh client user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
ssh server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
ssl auth-certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
10
CLI Reference February 08, 2024
Configuration Commands
Configuration commands allow you to configure Silver Peak gateways:
Syntax
aaa authentication login default { method-1 | method-1 method-2 | method-1 method-2
method-3 }
no aaa authentication login
Arguments
Parameter Description
method-x Specifies the methods for authenticating the default login in the order
that they will be used.
The method options are:
- local
- radius
- tacacs+
Defaults
No default behavior or values.
Usage Guidelines
You can use up to three methods (or databases) for authentication, place the methods in any
order, and/or use any method more than once.
However, one of the methods that you include must be local.
Examples
To set the authentication login methods to be local and TACACS+, in that order:
Syntax
aaa authorization map default-user user
no aaa authorization map default-user
Arguments
Parameter Description
Defaults
None
Usage Guidelines
When you enter a user name, the system verifies in the database that the user ID is valid.
Examples
To set authorization mapping to check the remote database first:
access-list
Use the access-list command to configure Access Lists and their rules.
Use the no access-list command to delete a specific ACL rule or an entire ACL.
Command Mode: Global configuration mode
Syntax
access-list acl-name priority-value { permit | deny } protocol { IP-protocol-number | protocol-
name } { source-IP-addr/netmask | any } { dest-IP-addr/netmask | any } [dscp { dscp-value | any
}]
access-list acl-name priority-value { permit | deny } protocol { IP-protocol-number | protocol-
name } { source-IP-addr/netmask | any } { dest-IP-addr/netmask | any } [vlan { any | 1..4094 |
interface.tag | any.tag | interface.any | interface.native }]
access-list acl-name priority-value { permit | deny } protocol-ip { source-IP-addr/netmask |
any } { dest-IP-addr/netmask | any } [app { app-name | any }] [dscp { dscp-value | any }][vlan
{ any | 1..4094 | interface.tag | any.tag | interface.any | interface.native }]
access-list acl-name priority-value { permit | deny } protocol-ip { source-IP-addr/netmask |
any } { dest-IP-addr/netmask | any } [app { app-name | any }] [dscp { dscp-value | any }]
access-list acl-name priority-value { permit | deny } protocol-ip { source-IP-addr/netmask |
any } { dest-IP-addr/netmask | any } [vlan { any | 1..4094 | interface.tag | any.tag | interface.any
| interface.native }]
access-list acl-name priority-value { permit | deny } protocol { tcp | udp } { source-
IP-addr/netmask | any } { dest-IP-addr/netmask | any } [{ source-port-number | any } {
dest-port-number | any }] [dscp { dscp-value | any }]
access-list acl-name priority-value { permit | deny } protocol { tcp | udp } { source-
IP-addr/netmask | any } { dest-IP-addr/netmask | any } [{ source-port-number | any } {
dest-port-number | any }] [vlan { any | 1..4094 | interface.tag | any.tag | interface.any |
interface.native }]
access-list acl-name priority-value { permit | deny } app { app-name | any }
access-list acl-name priority-value { permit | deny } dscp { dscp-value | any } [vlan { any |
1..4094 | interface.tag | any.tag | interface.any | interface.native }]
access-list acl-name priority-value { permit | deny } matchstr { match-string | any }
access-list acl-name priority-value { permit | deny } vlan { any | 1..4094 | interface.tag | any.tag
| interface.any | interface.native }
access-list acl-name priority-value comment comment-text
no access-list acl-name [priority-value]
Arguments
Parameter Description
access-list Specifies the name of the ACL and the priority value for the (ACL) rule
acl-name that you want to add or modify. You can set any priority value between 1
priority-value and 65535.
permit Permits access to this ACL rule.
deny For traffic that matches this ACL rule, discontinue further processing by
this ACL, and continue to look for a match in the subsequent policy
entries.
comment Add a comment for specified access list entry.
protocol { Specifies the protocol to match:The available IP protocol numbers
IP-protocol- include 1 through 254.When you specify protocol ip, the assumption is
number | that you are allowing any IP protocol. In that case, you also need to
IP-protocol- specify an application. If you don’t, the CLI defaults to specifying any
name | ip | application.
tcp | udp }
{ source-IP- Matches against traffic that has a specific source IP address and
addr/netmask netmask (in slash notation). For example, enter 10.2.0.0 0.0.255.255 as
| any } 10.2.0.0/16.If you want to include traffic to all destinations, use any.
{ dest-IP- Matches against traffic that has a specific destination IP address and
addr/netmask netmask (in slash notation). For example, 10.2.0.0/16.If you want to
| any } include traffic to all destinations, use any.
{ source-port- When you specify protocol tcp or protocol udp, you can limit the traffic
number | any to specific source and/or destination ports. any is a wildcard.
} { dest-port-
number | any
}
app { Specifies a default or user-defined application name, or the name of a
app-name | user-defined application group. any is a wildcard.
any }
dscp { Specifies a DSCP value. The available values include:af11, af12, af13,
dscp-value | af21, af22, af23, af31, af32, af33, af41, af42, af43, be, cs1, cs2, cs3, cs4,
any } cs5, cs6, cs7, or ef.__any__ is a wildcard.
matchstr Adds a match string for specified access list entry.
match-string
vlan { any | Matches an interface and 802.1q VLAN tag. The available values include:
1..4094 | - 1..4094 number assigned to a VLAN
interface.tag | - interface.tag as in lan0.10
any.tag | - any.tag as in any.10
interface.any | - interface.any as in lan0.any
interface.native - interface.native as in lan0.native
} - any is a wildcard
any Is a wildcard.
Defaults
None
Usage Guidelines
You name a rule with a priority, which not only identifies the rule, but also specifies its sequence
in that ACL. Within an ACL, every priority value must be unique. In other words, no two rules in
a given ACL can have the same priority value. We recommend that you don’t make the priority
values contiguous, so that you can later insert a new rule between two existing rules, without
needing to change the priority values you’ve already set. For example, you might create an
ACL with rules (priorities) 10, 20, 30, and 40. If you need to add several rules at a later time,
you can easily place them between any of the existing rules.
If you need to replace an existing rule, just name the new rule with the same priority as the
one you want to replace. The CLI overwrites the existing rule with your new one.
If you specify a priority to create a rule for an ACL that doesn’t already exist, the CLI creates
the new ACL and populates it with the new rule.
Use the no form of this command to delete a rule within an ACL. If you delete the last rule
of an ACL, that ACL is removed. If you don’t specify a priority value in the no command, the
entire ACL is deleted.
Using Deny
Since access lists define the matching criteria and not the action, you should remember that
deny in this context does not actually “drop” traffic. Rather, the deny keyword is effectively
a sort of break statement, preventing further processing by that particular ACL, and sending
the traffic to look for matches against subsequent policy entries.
For example, if you wanted to accelerate all IP traffic except for ICMP traffic, you could enter
the following commands:
In this example, any ICMP traffic that attempts to match the ACL, a1, would immediately stop
processing at the deny statement and would pass through.
Examples
To create a rule for an ACL named acl2, that matches against all IGP traffic that has a DSCP
value of be (best effort):
ECV (config) # access-list acl2 10 permit protocol igp any any dscp be
ECV (config) # access-list a1 100 deny protocol icmp any any \newline
ECV (config) # access-list a1 200 permit protocol ip any any
To create a rule to match all IP traffic coming from the source 10.2.0.0 0.0.255.255:
To delete the priority 100 rule from the ACL named ac18:
active-flows
Use the active-flows command to configure all active flows.
Command Mode: Privileged EXEC mode
Syntax
active-flows { reset-all }
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
alarms
Use the alarms command to manage the alarms in the system.
Command Mode: Global configuration mode
Syntax
alarms { acknowledge | unacknowledge } alarm-seq-number
alarms clear alarm-seq-number
Arguments
Parameter Description
Defaults
None
Usage Guidelines
For a list of current alarms, use the following command:
The alarm sequence number is not the same as the alarm ID number.
Examples
None
application
Use the application command to configure applications on the appliance.
Use the no application command to delete an application.
Command Mode: Global configuration mode
Syntax
application app-priority app-name dscp dscp-value
application app-priority app-name protocol IP-protocol-number-or-name
application app-priority app-name protocol IP-protocol-number-or-name src-ip { source-IP-
addr-range | any } [src-port { source-port-range | any }]
application app-priority app-name protocol IP-protocol-number-or-name src-ip { source-IP-
addr-range | any } src-port { source-port-range | any } dst-ip {dest-IP-addr-range | any }
[dst-port { dest-port-range | any}]
application app-priority app-name protocol IP-protocol-number-or-name src-ip { source-IP-
addr-range | any } src-port { source-port-range | any } dst-ip {dest-IP-addr-range | any }
dst-port { dest-port-range | any } [dscp dscp-value]
application app-priority app-name protocol IP-protocol-number-or-name src-ip { source-IP-
addr-range | any } src-port { source-port-range | any } dst-ip {dest-IP-addr-range | any }
dst-port { dest-port-range | any } dscp dscp-value [vlan { any | 1..4094 | interface.tag | any.tag
| interface.any | interface.native }]
no application app-priority
Arguments
Parameter Description
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
To create an application, surf, for traffic that comes from the IP address, 192.4.4.11:
application-group
Use the application-group command to specify a group of (one or more) applications.
Use no application-group to remove one or more applications from an application group or
to delete the group, itself.
Command Mode: Global configuration mode
Syntax
application-group app-group-name app-1 [, app-2, app-3. . . ,app-n]
no application-group app-group-name [, app1, app2. . . ,app-n]
Arguments
Parameter Description
app-group- Defines a unique group name. The name is checked against existing
name application groups and, if the name does not exist, the CLI creates it. If
the name does exist, then the application(s) you specify are added to the
existing group.
app-x Specifies an existing application name, whether it’s built-in or
user-defined.
Defaults
None
Usage Guidelines
If your ACLs or policy maps contain match conditions that involve multiple applications, you
can simplify the match conditions with application groups. Application groups are identifiers
that you can create to represent a list of applications.
You create an application group by naming the group and specifying at least one application
that belongs in it. After creating it, you can modify the application group by adding or removing
applications.
To add applications to an application group that already exists, enter the name of the applica-
tion group, followed by the applications you are adding. For example, to add two applications
to the application group, omega, you might use the following command:
If omega did not exist, the CLI would create it and it would contain these two applications.
If you then wanted to remove http from omega, you would issue the following command:
• If you specify more than one application at a time for an application group, you must
separate the applications with commas. If you just use spaces, the CLI will respond with
an error message.
• If you attempt to delete an application that is not in the application group that you specify,
then the CLI displays an error message.
Examples
To create an application group, encrypted, that contains the applications SSH, HTTPS, and
SFTP:
ECV (config) # application-group encrypted ssh, https, sftp
banner login
Use the banner login command to create a message for the system login banner, such as
legal or welcome text.
Use the no form of this command to reset the system login banner.
Command Mode: Global configuration mode
Syntax
banner login message-string
no banner login
Arguments
Parameter Description
message-string Specifies the message to display before a user logs into the
appliance. A message that includes spaces requires quotes at the
beginning and end of the message string.
Defaults
None
Usage Guidelines
None
Examples
To configure the banner message, Gotcha!, to display at login:
To configure the banner message, “How about some coffee?”, to display at login:
banner motd
Use the banner motd command to create a “Message of the Day” banner.
Use the no form of this command to reset the system Message of the Day banner.
Command Mode: Global configuration mode
Syntax
banner motd message-string
no banner motd
Arguments
Parameter Description
message-string Specifies the message to display for the Message of the Day. A
message that includes spaces requires quotes at the beginning and
end of the message string. The Message of the Day appears after
successful login.
Defaults
None
Usage Guidelines
None
Examples
To configure the Message of the Day, Greetings, to display at login:
bgp
Use the bgp command to configure BGP (Border Gateway Protocol) on the appliance.
Command Mode: Global Configuration mode
Syntax
bgp asn 1-65535
no bgp asn 1-65535
bgp { disable | enable }
bgp neighbor Neighbor-IP-addr export-map Custom-BGP-bit-map-of-permitted-route-types-to-
export-(decimal) no bgp neighbor Neighbor-IP-addr export-map
bgp neighbor Neighbor-IP-addr import-disable no bgp neighbor Neighbor-IP-addr import-
disable
bgp neighbor Neighbor-IP-addr metric Neighbor-additional-route-cost no bgp neighbor
Neighbor-IP-addr metric
bgp neighbor Neighbor-IP-addr password Neighbor-MD5-pwd no bgp neighbor Neighbor-IP-
addr password
bgp neighbor Neighbor-IP-addr remote-as Neighbor-ASN { Branch | Branch-transit | PE-
router }
bgp__router-id__ IPv4-addr-recognizable-to-remote-peer no bgp__router-id__ IPv4-addr-
recognizable-to-remote-peer
no bgp neighbor Neighbor-IP-addr
Arguments
Parameter Description
Parameter Description
export-map Creates a BGP neighbor with customized export rules. Use the numbers
Custom-BGP- listed for the following options:
bit-map-of- 1 Local Locally configured
permitted- 2 Shared Learned via subnet sharing (from a non-BGP source)
route-types-to- 4 BGPBr Learned from a local BGP branch peer
export- 8 BGPTr Learned from a local BGP branch-transit peer
(decimal) 16 BGPPe Learned from a local BGP Provider Edge peer
32 RemBGP Remote BGP (learned via subnet sharing, but originally
from a BGP peer)
64 RemBGPTr Remote BGP branch-transit (learned via subnet sharing,
but originally from a BGP branch-transit peer)
neighbor Specifies a BGP neighbor.
Neighbor-IP-
addr
import- Disables the learning of routes from the neighbor.
disable
metric Configures additional metric for BGP neighbor.
Neighbor-
additional-
route-cost
password Creates an MD5 password for the BGP neighbor.
Neighbor-MD5-
pwd
remote-as Creates a BGP neighbor with a remote ASN (Autonomous System
Neighbor-ASN { Number):
Branch | Branch Configures Neighbor as branch type
Branch- Branch-transit Configures Neighbor as branch transit type
transit | PE-router Configures Neighbor as Provider Edge type
PE-router }
router-id Configures router IP ID. The router identifier is the IPv4 address which
IPv4-addr- the remote peer identifies the appliance for BGP purposes.
recognizable-
to-remote-peer
Defaults
None
Usage Guidelines
None
Examples
None
Syntax
bgp neighbor neighbor-IP-addr soft-reconfiguration
bgp segment segment-id neighbor neighbor-addr soft-reconfiguration
no bgp neighbor neighbor-IP-addr soft-reconfiguration
no bgp segment segment-id neighbor neighbor-addr soft-reconfiguration
Parameters
neighbor-IP-addr: The IP address of the BGP neighbor for which soft-reconfiguration is enabled.
Format is dotted decimal notation.
segment-id: The name of the network segment to which the command is applied.
Defaults
BGP neighbor soft-reconfiguration is disabled by default.
Usage Guidelines
None
Examples
None
boot system
Use the boot system command to specify which partition to boot from next time.
Command Mode: Global configuration mode
Syntax
boot system partition-number
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
To set the appliance to start using partition 2, by default, beginning at the next system boot:
bridge
Use the bridge command to configure bridge mode.
Command Mode: Global Configuration mode
Syntax
bridge propagate-linkdown { enable | disable }
bridge transition-fdb-age 1-300
bridge transition-time 1-300
Arguments
Parameter Description
propagate- When enabled, forces the WAN interface link to go down when the
linkdown { corresponding LAN interface goes down, and vice versa.
enable |
disable }
transition- Specifies the maximum age of a MAC entry, in seconds, during the time
fdb-age that a link is going down.
1-300
transition- Specifies, in seconds, the time to wait after the first link goes down
time before propagating the second link down.
1-300
Defaults
None
Usage Guidelines
None
Examples
To configure 30 seconds as the time to wait before propagating the WAN interface’s link down
to the LAN:
ECV (config) # bridge transition-time 30
arp
Use the arp command to add static entries to the Address Resolution Protocol (ARP) cache.
Use the no form of this command to remove a static entry from the ARP cache.
Command Mode: Global configuration mode
Syntax
arp ip-addr mac-addr
no arp ip-addr
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
To create an entry in the ARP table for a machine with the IP address 10.10.1.1 and MAC ad-
dress 00107654bd33:
ECV (config) # arp 10.10.1.1 00107654bd33
cli
Description
Use the cli command to configure CLI shell options.
Command Mode: Global configuration mode (cli session)
Command Mode: EXEC mode (all other cli commands)
Syntax
cli clear-history
cli default allow-all-show { enable | disable }
cli default auto-logout number-minutes
no cli default auto-logout
cli session auto-logout number-minutes
no cli session auto-logout
cli session paging enable
no cli session paging enable
cli session terminal length number-lines
cli session terminal type { xterm | ansi | vt100 }
no cli session terminal type
cli session terminal width number-char
Arguments
Parameter Description
Parameter Description
session paging enable Configures --- for this session only --- the ability to view
text one screen at a time. Paging is enabled, by default.
Use the no form of this command to prevent parsing of
text into individual, sequential screens.
session terminal length Sets --- for this session only --- the number of lines of text
number-lines for this terminal. The default terminal length is 24 rows.
session terminal type { Sets --- for this session only --- the terminal type:xterm --
xterm | ansi | vt100 } Sets terminal type to xterm.__ansi__ -- Sets terminal type
to ANSI.__vt100__ -- Sets terminal type to VT100.The
default type is xterm. Use the no form of the command to
clear the terminal type.
session terminal width Sets --- for this session only --- the maximum number of
number-char characters in a line.
Defaults
• The default auto-logout setting is 15 minutes.
• Paging is enabled, by default.
• The default terminal length is 24 rows.
• The default terminal type is xterm.
• The default number of characters per line is 80.
Usage Guidelines
None
Examples
To set 1.5 hours as the maximum time a session will last without keyboard activity, for this
session only:
cdp
Use the cdp command to configure Cisco Discovery Protocol (CDP) parameters.
Command Mode: Global Configuration mode
Syntax
cdp { enable | disable }
cdp holdtime 10-255
cdp timer 5-254
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
To specify that CDP packets be sent at 240 packets per second:
clear
Use the clear command to clear entries and/or counters.
Command Mode: EXEC mode (clear cluster, clear flow-redirection, clear proxy-ip-address)
Command Mode: Global configuration mode (all other clear commamds)
Syntax
clear arp-cache
clear bridge counters
clear bridge mac-address-table
clear cdp counters
clear cdp table
clear cluster spcp
clear flow-redirection
Arguments
Parameter Description
Defaults
None
Examples
None
clock set
Use the clock set command to set the system time and/or date.
Command Mode: Global Configuration mode
Syntax
clock set <hh>:<mm>:<ss> [<yyyy>/<mm>/<dd>]
Arguments
Parameter Description
<hh>:<mm>:<ss> Sets the hour, minute, and second of the current time, but leaves the
date unchanged. Time is based on a 24-hour clock.
<yyyy>/<mm>/<dd>Sets the system’s date by year/month/date.
Defaults
None
Usage Guidelines
None
Examples
To set the time and date to exactly one minute after midnight on the morning of August 11,
2007:
ECV (config) # clock set 00:01:00 2007/08/11
clock timezone
Use the clock timezone command to set the time zone for the system.
Use the no form of the command to reset the time to its default of Greenwich Mean Time,
GMT (also known as UTC).
Command Mode: Global Configuration mode
Syntax
clock timezone region . . .
no clock timezone
Arguments
Parameter Description
region Specify the region, country, locality, or timezone for the system.
Defaults
None
Usage Guidelines
You set the timezone by selecting from a series of menus. To see the list of possible values for
timezone, perform the following procedure:
Enter the following command at the command line:
The CLI displays a list of world regions, followed by the command prompt, as in the following
example:
Africa
America
Antarctica
Arctic
Asia
Atlantic_Ocean
Australia
Europe
GMT-offset
Indian_Ocean
Pacific_Ocean
UTC
Choose a region from the list and append the region to the command, along with a question
mark (?). For example, to specify America, you would enter the following command:
The CLI displays the regions in America, such as in the following example:
Caribbean
Central
North
South
Continue specifying the appropriate menu selections, ending each command with a question
mark to display the next menu. When the CLI displays <cr>, press Enter to complete the com-
mand.
The CLI is case-sensitive.
Examples
None
cluster
Use the cluster command to configure a cluster of appliances for flow redirection.
Use the no form of this command to delete a peer appliance from a cluster.
Command Mode: Global Configuration mode
Syntax
cluster interface intf-name
cluster peer IP-addr-1, IP-addr-2, . . . ., IP-addr-N
no cluster peer IP-addr-X
Arguments
Parameter Description
Defaults
None
Usage Guidelines
If you specify mgmt1 as the cluster interface, then when created a list of peers, use the mgmt1
IP addresses in the comma-delimited list.
Examples
To configure mgmt1 as the cluster interface:
To create a cluster from appliances with the cluster interfaces, 10.10.10.3, 10.10.20.2, and
10.10.30.5:
ECV (config) # cluster peer 10.10.10.3, 10.10.20.2, 10.10.30.5
configuration
Use the configuration command to manipulate configuration files.
Command Mode: Global configuration mode
Syntax
configuration copy source-file dest-file
configuration delete filename
configuration download URL or scp://username:password@hostname/path/filename [filename]
configuration download cancel
configuration factory filename
configuration merge filename
configuration move source-file dest-file
configuration new filename
configuration reboot-next filename
configuration revert saved
configuration upload { active | filename } URL or scp://username:password@hostname/path/filename
configuration upload cancel
configuration write
configuration write to filename
Arguments
Parameter Description
copy source-file dest-file Makes a copy of a configuration file. Specify, in order, the
names of the existing source file and the new destination
(configuration) file.
delete filename Deletes the named configuration file. The filename you
specify must be one of the configuration files listed on the
appliance.
download { URL or Downloads a configuration file from a remote host.
Optionally, you can rename the downloading file.
scp://username:password@hostname/path/filename
} [new filename]
download cancel Cancels a configuration file download.
factory filename Creates a new configuration file.
merge filename Merges settings from the specified configuration file to the
currently active configuration file.
move source-file dest-file Renames a configuration file. First enter the current file
name, followed by the new file name.
Parameter Description
new filename Creates a new configuration file with all defaults plus
active licenses.
reboot-next filename Loads the named configuration file at the next reboot.
revert saved Reverts to the last saved configuration.
upload filename URL* or Uploads an existing, inactive configuration file to a remote
host, as specified by a URL or an SCP path.
scp://username:password@hostname/path/filename
upload active URL or Uploads the currently active configuration file to a remote
host, as specified by a URL or an SCP path.
scp://username:password@hostname/path/filename
upload cancel Cancels the configuration file upload.
write Saves the running configuration to the active
configuration file (same as the write memory).
write to filename Saves the running configuration to an inactive file and
makes that copy the active file.
Defaults
None
Usage Guidelines
To display a list of available files, enter the command that displays the information you re-
quire:
Examples
To make a copy of the configuration file, “Texas”, and rename it “Texarkana” (three possible
ways):
To merge the setting from the inactive configuration file, “lanes”, with the currently active con-
figuration file:
To upload the configuration file, “initial.bak” to an account at the remote SCP host, “ocean”,
and rename the file to “coyotes.bak”:
To upload the configuration file, “initial.bak” to an account at the remote SCP host, 10.0.55.28,
and rename the file to “coyotes.bak” at the destination:
To save the running configuration as a new file named, “newDeployment”, and make it the
active configuration:
configure terminal
Use the configure terminal command to enter configuration mode. Use the no form of this
command to leave the configuration mode.
Command Mode: Privileged EXEC mode (not available in Global configuration mode)
Syntax
configure terminal
Arguments
None
Defaults
None
Usage Guidelines
To exit the configuration mode, you may also use the exit command.
The CLI also accepts these two shortened versions of configure terminal:
ECV # config t
ECV # co t
ECV (config) #
Examples
None
Syntax
debug generate dump
Arguments
None
Defaults
None
Usage Guidelines
None
Examples
None
disable
Use the disable command to exit Privileged EXEC mode.
Command Mode: Privileged EXEC mode (not available in Global configuration mode)
Syntax
disable
Arguments
None
Defaults
None
Usage Guidelines
When you use the disable command, you enter the User EXEC mode.
Examples
To go from Privileged EXEC Mode to User EXEC mode (command followed by result):
ECV # disable
ECV >
dns cache
Use the dns cache command to configure the DNS cache.
Command Mode: Privileged EXEC mode (dns cache flush)
Command Mode: Global Configuration mode (dns cache http)
Syntax
dns cache flush
dns cache http { disable | enable }
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
enable password
Use the enable password command to set the password required to enter Privileged EXEC
mode.
Use the no form of the command to remove the requirement of a password to enter Privileged
EXEC mode.
Command Mode: Global Configuration mode
Syntax
enable password pwd-clear
no enable password
enable password 0 pwd-clear
enable password 7 pwd-encrypt
Arguments
Parameter Description
password Sets the password required to enter enable mode. By default, it will be
pwd-clear in cleartext. Use the no form of this command to remove the
requirement of a password to enter Privileged EXEC mode.
password 0 Sets the enable password with a clear text string.
pwd-clear
password 7 Sets the enable password with an encrypted string. Encrypted password
pwd-encrypt entries aren’t visible when viewing a history of commands.
Defaults
None
Usage Guidelines
To require the cleartext password, ratchet, for entering enable mode:
Examples
None
enable
Use the enable command to enter Privileged EXEC mode.
Command Mode: EXEC mode
Syntax
enable
Arguments
None
Defaults
None
Usage Guidelines
The CLI also accepts this shortened version of enable:
ECV > en
Examples
To go from User EXEC Mode to Privileged EXEC mode (command followed by result):
excess-flow
Use the excess-flow command to manage flows that exceed the number of flows that an
appliance supports.
Command Mode: Global configuration mode
Syntax
excess-flow bypass
excess-flow bypass dscp-marking { enable | disable }
excess-flow drop
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
exit
Use the exit command to log out of the CLI from the User EXEC or Privileged EXEC modes. If
you use the exit command from the Global Configuration mode, you enter the Privileged EXEC
mode.
Command Mode: All modes
Syntax
exit
Arguments
None
Defaults
None
Usage Guidelines
None
Examples
None
flow-debug
Use the flow-debug command to configure the flow debugging feature to isolate a single
flow.
Use the no form of this command to remove the previous criteria for isolating a specific flow.
Command Mode: Privileged EXEC mode
Syntax
flow-debug { disable | enable }
flow-debug flow-id flow-id
no flow-debug flow-id flow-id
flow-debug ip1 { ip-addr | any } ip2 { ip-addr | any } protocol { 1..255 | any }
no flow-debug ip1 ip-addr ip2 ip-addr protocol 1..255
flow-debug ip1 { ip-addr | any } ip2 { ip-addr | any } protocol { 1..255 | any } port1 { port-no
| any } port2 { port-no | any }
no flow-debug ip1 ip-addr ip2 ip-addr protocol 1..255 port1 port-no port2 port-no
flow-debug reset
Arguments
Parameter Description
Defaults
None
Usage Guidelines
The flow-debug commands let you narrow down to a single flow and then generate output
about that flow. You can isolate a flow by using the flow’s ID number or by entering specifics
about the endpoints, protocol, and/or ports. When more than one flow fit the criteria you
specify, then the first match is what displays.
Generally, you first specify the flow, then enable it, and finally, use the show flow-debug
command to generate the informational output.
You can enable and disable at will. Once you’ve specified a flow, it remains the target flow until
you specify another flow.
Examples
None
flow-export
Use the flow-export command to configure the export of data to NetFlow collectors.
Command Mode: Global Configuration mode
Syntax
flow-export active-flow-timeout <1-30 minutes>
flow-export destination { 1 | 2 } Collector-IP-addr Collector-port
no flow-export destination { 1 | 2 }
flow-export { disable | enable }
flow-export engine-id < 0-255 >
flow-export engine-type < 0-255 >
flow-export traffic-type { lan-rx | lan-tx | wan-rx | wan-tx }
no flow-export traffic-type { lan-rx | lan-tx | wan-rx | wan-tx }
Arguments
Parameter Description
Defaults
When you enable flow exporting, it defaults to the WAN Tx interface.
Usage Guidelines
The appliance lets you turn on up to four interfaces for flow exporting. However, you must
specify each interface by using a separate command.
Examples
To configure NetFlow Collector #2, located at 10.10.10.4, using port 146:
flow-redirection
Use the flow-redirection command to configure flow redirection.
Command Mode: Global Configuration mode
Syntax
flow-redirection { enable | disable }
flow-redirection wait-time < 0 - 500 >
Arguments
Parameter Description
Defaults
None
Usage Guidelines
Redirection enabled simply enables and disables redirection on the selected appliance.
Examples
None
help
Use the help command to view a description of the interactive help system.
Command Mode: EXEC mode
Syntax
help
Arguments
None
Defaults
None
Usage Guidelines
None
Examples
If "<cr>" is shown, that means that what you have entered so far
is a complete command, and you may press Enter (carriage return)
to execute it.
hostname
Use the hostname command to set host name for the appliance.
Use the no form of this command to remove the host name from the appliance.
Command Mode: Global Configuration mode
Syntax
hostname name-text
no hostname
Arguments
Parameter Description
name-text Designates the host name for the appliance, not including the domain
name.
Defaults
None
Usage Guidelines
Hostnames may contain letters, numbers, periods (“.”), and hyphens (“-”), but may not begin
with a hyphen. Hostnames may not contain spaces.
The hostname is limited to 60 characters.
When you remove the hostname, the system reverts to the identifier assigned before shipping.
For example, silverpeak-2f8598.
Examples
To rename the appliance to Chicago:
iflabel
Use the iflabel command to assign labels to interfaces.
Command Mode: Global Configuration mode
Syntax
iflabel add { lan-label | wan-label } label-string-with-no-spaces
iflabel delete { lan-label | wan-label } label-string-with-no-spaces
Arguments
Parameter Description
Defaults
None
Usage Guidelines
No spaces allowed in the label string.
Examples
To add a WAN label, Internet:
ECV (config) # iflabel wan-label internet
image boot
The image boot command specifies the system image to boot by default.
Command Mode: Global configuration mode
Syntax
image boot partition-number
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
image install
Use the image install command to download and install an image file onto the inactive system
partition.
Command Mode: Privileged EXEC mode
Syntax
image install URL or scp://username:password@hostname/path/filename
image install cancel
Arguments
Parameter Description
URL or Enter the path for the remote host from which to download and install
the image file. You can specify the SCP server by IP address or
scp://username:password@hostname/path/filename
hostname.
install cancel Cancel the system upgrade.
Defaults
None
Usage Guidelines
Software image files are .zip files.
Examples
To download the image file, “image-2.4.0.0_15984.zip”, from the remote SCP host, 10.0.55.28,
to the inactive system partition:
image upgrade
Use the image upgrade command to download, install, and reboot using a new image file.
Command Mode: Privileged EXEC mode
Syntax
image upgrade URL or scp://username:password@hostname/path/filename
Arguments
Parameter Description
URL or Enter the path for the remote host from which to download and install
the image file. You can specify the SCP server by IP address or
scp://username:password@hostname/path/filename
hostname.
Defaults
None
Usage Guidelines
Software image files are .zip files.
Examples
To download the image file, “image-2.4.0.0_45678.zip”, from the remote SCP host, 10.0.55.44,
to the inactive system partition, install it, and reboot to using it:
interface cdp
Use the interface cdp command to enable or disable Cisco Discovery Protocol (CDP) for this
interface.
Command Mode: Global Configuration mode
Syntax
interface intf-name cdp { enable | disable }
Arguments
Parameter Description
Defaults
None
Usage Guidelines
To see a list of the available interface names you may use, enter the following command:
Examples
None
interface dhcp
Use the interface dhcp command to enable Dynamic Host Configuration Protocol (DHCP) for
this interface.
Use the no form of this command to disable DHCP for this interface.
Command Mode: Global Configuration mode
Syntax
interface intf-name dhcp
interface intf-name dhcp renew
no interface intf-name dhcp
Arguments
Parameter Description
Defaults
None
Usage Guidelines
To see a list of the available interface names you may use, enter the following command:
Examples
None
interface inbound-max-bw
Use the interface inbound-max-bw command to configure the maximum bandwidth for in-
bound traffic.
Command Mode: Global Configuration mode
Syntax
interface intf-name inbound-max-bw BW-in-kbps
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
interface label
Use the interface label command to configure a label for the interface.
Use the no form of this command to remove the label from this interface.
Command Mode: Global Configuration mode
Syntax
interface intf-name label label-string
no interface intf-name label
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
Syntax
interface intf-name mac address MAC-addr-of-interface-to-use
no interface intf-name mac address
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
interface mtu
Use the interface mtu command to configure MTU (Maximum Transmission Unit) for this
interface.
Use the no form of this command to reset the MTU for this interface to its default.
Command Mode: Global Configuration mode
Syntax
interface intf-name mtu MTU-bytes
no interface intf-name mtu
Arguments
Parameter Description
Defaults
The default MTU is 1500.
Usage Guidelines
To see a list of the available interface names you may use, enter the following command:
Examples
None
interface outbound-max-bw
Use the interface outbound-max-bw command to configure maximum bandwidth for out-
bound traffic.
Command Mode: Global Configuration mode
Syntax
interface intf-name outbound-max-bw BW-kbps
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
interface pass-through
Use the interface pass-through command to configure the pass-through parameters for the
WAN interface.
Command Mode: Global Configuration mode
Syntax
interface pass-through { max-bandwidth bw-kbps | min-bandwidth bw-kbps }
Arguments
Parameter Description
Defaults
None
Usage Guidelines
If you try to configure too high a maximum bandwidth, the CLI returns a message telling you
what the maximum allowable value is, given the configured System Bandwidth.
Examples
To set the maximum bandwidth for pass-through traffic at the wan0 interface to 9000 kilobits
per second:
interface security-mode
Use the interface security-mode command to configure the firewall mode.
Command Mode: Global Configuration mode
Syntax
interface intf-name security-mode { 0 | 1 | 2 | 3 }
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
interface shutdown
Use the interface shutdown command to disable an interface.
Use the no form of this command to enable this interface.
Command Mode: Global Configuration mode
Syntax
interface intf-name shutdown
no interface intf-name shutdown
Arguments
Parameter Description
Defaults
None
Usage Guidelines
To see a list of the available interface names you may use, enter the following command:
Examples
None
interface speed-duplex
Use the interface speed-duplex command to configure the speed and duplex of this inter-
face.
Command Mode: Global Configuration mode
Syntax
interface intf-name speed-duplex speed-duplex
Arguments
Parameter Description
Defaults
None
Usage Guidelines
To see a list of the available interface names you may use, enter the following command:
Examples
None
interface ip address
The interface ip address command configures IP address and netmask for a specified inter-
face.
The no interface ip address command erases the IP address and netmask for a specified
interface.
Command Mode: Global Configuration mode
Syntax
interface intf-name ip-address ip-addr-netmask
interface intf-name ip address ip-addr-netmask nexthop ip-addr
interface intf-name ip address ip-addr-netmask nexthop ip-addr portlist port-list-num
no interface intf-name ip address
Arguments
Parameter Description
Defaults
None
Usage Guidelines
To see a list of the available interface names you may use, enter the following command:
Syntax
interface tunnel tunnel-name admin { up | down }
no interface tunnel tunnel-name admin
Arguments
Parameter Description
Defaults
The default for Admin is down.
Command Mode
Global Configuration Mode
Usage Guidelines
To see a list of the available tunnel names you may use, enter the following command:
Examples
To enable the tunnel, Rosenkrantz, for diagnostics only:
Syntax
interface tunnel tunnel-name alias tunnel-alias
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
Syntax
interface tunnel tunnel-name bind-tunnel tunnel-name
no interface tunnel tunnel-name bind-tunnel tunnel-name
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
Syntax
interface tunnel tunnel-name control-packet dscp DSCP-mark-for-tunnel
Arguments
Parameter Description
Defaults
The default (and recommended) tunnel health DSCP setting is be.
Usage Guidelines
None
Examples
None
Syntax
interface tunnel tunnel-name create ip-addr-local ip-addr-remote
interface tunnel tunnel-name create ip-addr-local ip-addr-remote MinBW-kbps { MaxBW-kbps
| auto } [gre | gre_sp | gre_ip | udp | udp_sp | no_encap]
interface tunnel tunnel-name create ip-addr-local ip-addr-remote MinBW-kbps unshaped
interface tunnel tunnel-name create ip-addr-appliance ip-addr-remote
interface tunnel tunnel-name create ip-addr-appliance ip-addr-remote MinBW-kbps { MaxBW-
kbps | auto }
interface tunnel tunnel-name create bonded-tunnel tag-name overlay-name [bonded-id overlay-
ID]
Arguments
Parameter Description
Parameter Description
Defaults
None
Usage Guidelines
To see a list of the available tunnel names you may use, enter the following command:
Examples
None
Syntax
interface tunnel tunnel-name gre-protocol Layer-2-protocol-ID
no interface tunnel tunnel-name gre-protocol
Arguments
Parameter Description
Defaults
The default Layer-2 protocol ID in the GRE header (decimal) is 2048.
Usage Guidelines
To see a list of the available tunnel names you may use, enter the following command:
Examples
None
Syntax
interface tunnel tunnel-name ipsec auth-algorithm { default | sha1 | sha256 | sha384 |
sha512 }
interface tunnel tunnel-name ipsec crypto-algorithm { default | aes128 | aes256 }
interface tunnel tunnel-name ipsec { disable | enable }
interface tunnel tunnel-name ipsec enable preshared-key key-text
interface tunnel tunnel-name ipsec enable preshared-key key-text crypto-algorithm { de-
fault | aes128 | aes256 } [auth-algorithm { default | sha1 | sha256 | sha384 | sha512
}]
interface tunnel tunnel-name ipsec preshared-key key-text
interface tunnel tunnel-name ipsec enable replay-check-window { 64 | 1024 | disable |
auto }
Arguments
Parameter Description
Parameter Description
replay-check- Configures the IPSec anti-replay-check window for this tunnel. The IPSec
window { 64 | Anti-replay window provides protection against an attacker duplicating
1024 | disable encrypted packets by assigning a unique sequence number to each
| auto } encrypted packet. The decryptor keeps track of which packets it has
seen on the basis of these numbers.The default window size is 64
packets.
Defaults
None
Usage Guidelines
To see a list of the available tunnel names you may use, enter the following command:
• To determine whether packets are falling outside of the antireplay window, execute the
following CLI command:
Examples
None
Syntax
interface tunnel tunnel-name max-bandwidth { kbps | auto }
Arguments
Parameter Description
Defaults
None
Usage Guidelines
To see a list of the available tunnel names you may use, enter the following command:
Examples
None
Syntax
interface tunnel tunnel-name min-bandwidth kbps
Arguments
Parameter Description
Defaults
None
Usage Guidelines
To see a list of the available tunnel names you may use, enter the following command:
Examples
None
Syntax
interface tunnel tunnel-name mode { gre | udp }
no interface tunnel tunnel-name mode
Arguments
Parameter Description
Defaults
The default mode is gre.
Usage Guidelines
None
Examples
To configure the tunnel, Paris_London, for UDP mode:
Syntax
interface tunnel tunnel-name mtu { MTU-bytes | auto }
no interface tunnel tunnel-name mtu
Arguments
Parameter Description
tunnel-name Specifies the name for this tunnel. The range is 700 to 2400.
MTU-bytes Specifies the Maximum Transmission Unit (MTU) in bytes.
auto Sets MTU automatically.
Defaults
The default MTU is 1500.
Usage Guidelines
None
Examples
None
Syntax
interface tunnel nat-mode { none | snat }
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
Syntax
interface tunnel tunnel-name packet coalesce { disable | enable }
interface tunnel tunnel-name packet coalesce wait TIME-msecs
no interface tunnel tunnel-name packet coalesce wait
interface tunnel tunnel-name packet fec { disable | enable | auto }
interface tunnel tunnel-name packet fec ratio { 1:1 | 1:10 | 1:2 | 1:20 | 1:5 }
no interface tunnel tunnel-name packet fec ratio
interface tunnel tunnel-name packet reorder wait TIME-msecs
no interface tunnel tunnel-name packet reorder wait
Arguments
Parameter Description
Defaults
The default packet coalesce wait time is 0 milliseconds. The default packet reorder wait time
is 0 milliseconds.
Usage Guidelines
To see a list of the available tunnel names you may use, enter the following command:
Examples
To reset the packet coalesce wait time for the tunnel, big-pipe, to the default value of 0 (zero):
Syntax
interface tunnel tunnel-name peer-name peer-name-text
no interface tunnel tunnel name peer-name
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
Syntax
interface tunnel tunnel-name revert
Arguments
Parameter Description
Defaults
Factory defaults
Usage Guidelines
None
Examples
None
Syntax
interface tunnel tunnel-name tag-name tag-name
Arguments
Parameter Description
Defaults
Factory defaults
Usage Guidelines
None
Examples
None
Syntax
interface tunnel tunnel-name threshold fastfail { disable | enable }
interface tunnel tunnel-name threshold fastfail-wait { base-ms wait-time-ms | rtt-x
multiple-RTT }
interface tunnel tunnel-name threshold jitter jitter-ms
interface tunnel tunnel-name threshold latency latency-ms
interface tunnel tunnel-name threshold loss loss-percentage
interface tunnel tunnel-name threshold retry-count retry-count-number
Arguments
Parameter Description
Defaults
The default number of retries is 10.
Usage Guidelines
To see a list of the available tunnel names you may use, enter the following command:
Examples
None
Syntax
interface tunnel tunnel-name traceroute
Arguments
None
Defaults
None
Usage Guidelines
None
Examples
None
Syntax
interface tunnel tunnel-name udp-flow flows
no interface tunnel tunnel-name udp-flow
Arguments
Parameter Description
Defaults
The default number of flows is 256.
Usage Guidelines
To see a list of the available tunnel names you may use, enter the following command:
Examples
To set the maximum number of UDP flows for the tunnel, HastaLaVista:
ECV (config) # interface tunnel HastaLaVista udp-flow 1024
To reset the number of UDP flows to the default of 256 for the tunnel, HastaLaVista:
ECV (config) # no interface tunnel HastaLaVista udp-flow
Syntax
interface tunnel tunnel-name udp-port UDP-dest-port
no interface tunnel tunnel-name udp-port
Arguments
Parameter Description
Defaults
The default UDP destination port is 4163.
Usage Guidelines
To see a list of the available tunnel names you may use, enter the following command:
Examples
To make UDP port 407 the destination for the tunnel, MataHari:
interface virtual
Use the interface virtual command to create or modify a virtual network interface.
Use the no command to remove a virtual network interface.
Command Mode: Global Configuration mode
Syntax
interface intf-name virtual virtual-intf-type username PPPoE-username password PPPoE-pwd
etherdev phy-ether-intf
no interface intf-name virtual virtual-intf-type
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
interface vrrp
Use the interface vrrp commands to configure network interface Virtual Router Redundancy
Protocol (VRRP) instances.
Command Mode: Global Configuration mode
Syntax
interface intf-name vrrp < 1--255 > admin { down | up }
no interface intf-name vrrp < 1--255 >
interface intf-name vrrp < 1--255 > authentication auth-text
no interface intf-name vrrp < 1--255 > authentication
interface intf-name vrrp < 1--255 > debug action { dump_info | clear_stats | mem_stats }
Arguments
Parameter Description
intf-name Specifies the name of this interface. Currently, wan0 is the sole available
interface.
vrrp < 1-255 > The ID for the VRRP. Valid numbers are from 1 through 255, inclusive.
admin down Disables the VRRP instance.
admin up Enables the VRRP instance.
Parameter Description
Defaults
The default priority is 128.
The default advertisement interval is 1 second.
Usage Guidelines
The interface vrrp commands are only valid when the appliance is in router mode. Also, they
only support the wan0 interface.
To see a list of the available interface names you may use, enter the following command:
Examples
To delete the vrrp authentication strong for the VRRP ID, 7:
To reset the appliance priority level to the default value for the VRRP ID, 243:
ip default-gateway
Use the ip default-gateway command to set the default route to the specified next-hop or
interface.
Use the no form of this command to remove the current default route or all the default
routes.
Command Mode: Global Configuration mode
Syntax
ip default-gateway next-hop-IP-address intf-name
ip default-gateway next-hop-IP-address intf-name metric [src]
no ip default-gateway
no ip default-gateway next-hop-IP-address [metric]
Arguments
Parameter Description
Defaults
None
Usage Guidelines
The complete command, no ip default gateway, removes all the default routes.
Examples
To set the default gateway to 10.10.4.5:
ip domain-list
Use the ip domain-list command to add a domain name to use when resolving hostnames.
Use the no form of this command to remove a domain name.
Command Mode: Global Configuration mode
Syntax
ip domain-list domain-name
no ip domain-list domain-name
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
To add the domain name, “silver-peak”:
ip host
Use the ip host command to configure a static hostname or IP address mapping.
Use the no form of this command to remove static hostname or IP address mapping.
Command Mode: Global Configuration mode
Syntax
ip host host-name IP-addr
no ip host host-name IP-addr
Arguments
Parameter Description
Defaults
None
Usage Guidelines
Useful for a URL definition where you want to use a name instead of an IP address.
Examples
To be able to use the name, “redshoes”, for the IP address, 10.10.10.4:
ECV (config) # ip host redshoes 10.10.10.4
ip mgmt-ip
The ip mgmt-ip command configures the source IP address for gateway management ser-
vices. The source IP must be previously configured on a physical or virtual network interface
with its Interface Type set to LAN. Management services include HTTPS, Orchestrator, DHCP
Relay, NTP, NetFlow, RADIUS/TACACS+, SNMP, SSH, and Syslog. This setting only takes effect
when the mgmt0 interface is down or does not exist.
This command does not apply to Cloud Portal reachability and websocket connections. These
connections are established using the source IP address of the interface from which the Cloud
Portal and websocket reachability tests are successful.
When Routing Segmentation (VRF) is disabled, this command specifies the source IP address
for all management services.
When Routing Segmentation (VRF) is enabled, this command is deprecated by the Manage-
ment Services feature available on Orchestrator. Therefore, this command only affects the
source IP address for management services assigned to the default segment and have their
interface set to any.
The no ip mgmt-ip command removes the gateway management services configuration from
the gateway.
Command Mode: Global Configuration mode
Syntax
ip mgmt-ip IP-addr
no ip mgmt-ip
Arguments
Parameter Description
Defaults
The ip mgmt-ip command function is not configured by default.
Usage Guidelines
None
Examples
None
ip name-server
Use the ip name-server command to add a DNS server.
Use the no form of this command to remove a DNS server.
Command Mode: Global Configuration mode
Syntax
ip name-server IP-addr
no ip name-server IP-addr
Arguments
Parameter Description
Defaults
None
Usage Guidelines
The system allows a maximum of three DNS servers and tells you when you try to request
more.
The appliance tries to access DNS servers, as needed, in the order they were configured. Also,
if you remove the first host in a list of three, the second host becomes the first host. A newly
added host always goes to the bottom of the list.
Examples
To add a Domain Name Server with the IP address, 172.30.56.89:
ECV (config) # ip name-server 172.30.56.89
ip route
Use the ip route command to add a static route. Static routes help the appliance route man-
agement traffic out of the appliance to different subnets.
Use the no form of this command to remove a static route.
Command Mode: Global Configuration mode
Syntax
ip route network-prefix mask-length next-hop-IP-addr intf-name [ metric ]
ip route network-prefix mask-length next-hop-IP-addr intf-name metric [ src ]
no ip route network-prefix mask-length [next-hop-IP-addr]
no ip route network-prefix mask-length next-hop-IP-addr [ intf-name ]
no ip route network-prefix mask-length next-hop-IP-addr intf-name [ metric ]
Arguments
Parameter Description
network-prefix Specifies a network prefix to the IP route. This has the format,
nnn.nnn.nnn.0.
mask-length Specifies a mask length in slash notation.
next-hop-IP- Specifies the next-hop IP address for the IP route.
addr
next-hop-IP- Binds the next-hop to the named interface, in this case, either mgmt0 or
addr mgmt1.
intf-name
metric Specifies the metric of the subnet. Value must be between 0 and 100.
When a peer has more than one tunnel with a matching subnet (for
example, in a high availability deployment), it chooses the tunnel with
the greater numerical value.
src Specifies the Source IP to use in the header after the packet reaches the
next hop.
Defaults
None
Usage Guidelines
None
Examples
None
ip-tracking
The ip-tracking command configures IP tracking on the appliance.
The no ip-tracking commands disable specified IP tracking objects.
Command Mode: Global Configuration mode
Syntax
ip-tracking action action-name attributes text-string
no ip-tracking action action-name
ip-tracking manager manager-name { attributes text-string | comment comment-text | dis-
able | enable }
no ip-tracking manager manager-name
ip-tracking operation operation-name attributes text-string
no ip-tracking operation operation-name
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
license
Use the license command to install or remove a license key.
Command Mode: Global configuration mode
Syntax
license delete license-number
license install license-key
no license install
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
logging
Use the logging command to configure event logging to a specific syslog server.
Use the no form of this command to abstain from sending event log messages to this server.
Command Mode: Privileged EXEC mode
Syntax
logging IP-addr
no logging IP-addr
logging IP-addr facility { facility-level | all }
no logging IP-addr facility { facility-level | all }
logging IP-addr trap severity-level
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
To configure the server, 10.10.4.4, to not receive any event logs:
logging facility
Use the logging facility command to configure event logging to a specific syslog server.
Command Mode: Global configuration mode
Syntax
logging facility auditlog facility-level
logging facility flow facility-level
logging facility node { local0 | local1 | local2 | local3 | local4 | local5 | local6 | local7 }
logging facility system facility-level
Arguments
Parameter Description
facility-level Specifically sets the facility for messages to this syslog server to
one of the following: Local 0, Local 1, Local 2, Local 3, Local 4, Local
5, Local 6, or Local 7
auditlog Specifies the log facility setting for audit log.
flow Specifies the log facility setting for flow.
node Specifies the log facility setting for the node.
system Specifies the log facility setting for the system.
Defaults
None
Usage Guidelines
None
Examples
None
logging files
Use the logging files command to configure settings for local log files.
Command Mode: Global configuration mode
Syntax
logging files rotation criteria frequency { daily | weekly | monthly }
logging files rotation criteria size size-megabytes
logging files rotation criteria size-pct size-percent
logging files rotation force
logging files rotation max-num number-files
logging files upload filename URL or scp://username:password@hostname/path/filename
logging files upload cancel
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
To delete the four oldest local log files:
To upload the log file, “messages” to an account at the remote SCP host, “ocean”, and rename
the file to “messages_April2007”:
To upload the log file, “messages.2.gz” to the URL, www.catchall.com/tmp/, and keep the orig-
inal file name:
ECV (config) # logging files upload messages.2.gz www.catchall.com/tmp/
To rotate the log files when the /var partition surpasses 85% per log file:
logging local
The logging local command sets minimum severity of log messages saved on the local disk.
Use the no form of this command to negate writing event log messages to the local disk.
Command Mode: Global configuration mode
Syntax
logging local severity-level
no logging local
Arguments
Parameter Description
local severity-level Sets the minimum severity of log messages saved on the local
disk. You can choose from the following severity options:
none Disables logging
emerg Emergency: system is unusable
alert Action must be taken immediately
crit Critical conditions
err Error conditions
warning Warning conditions
notice Normal but significant condition
info Informational messages
debug Debug-level messages
Defaults
None
Usage Guidelines
None
Examples
To disable local logging of all events related to system resources, use one of the following two
commands:
logging trap
Use the logging trap to set the minimum severity of log messages sent to all syslog servers.
Use the no form of this command to negate sending events to all syslog servers.
Command Mode: Global configuration mode
Syntax
logging trap severity-level
no logging trap
Arguments
Parameter Description
trap severity-level Specifies the minimum severity of log messages sent to all
syslog servers. You can choose from the following severity
options:
none Disables logging
emerg Emergency: system is unusable
alert Action must be taken immediately
crit Critical conditions
err Error conditions
warning Warning conditions
notice Normal but significant condition
info Informational messages
debug Debug-level messages
Defaults
None
Usage Guidelines
None
Examples
To set the minimum severity level of log messages sent to all syslog servers to “critical”:
(config) # logging trap crit
monitor
Use the monitor command to monitor interface bandwidth statistics.
Command Mode: EXEC mode
Syntax
monitor intf [intf ] [intf ] [intf ] [-t]
Arguments
Parameter Description
Defaults
None
Usage Guidelines
Once you execute the command, the output updates every second. To discontinue, use Ctrl
+ C.
The available interfaces include:
• wan0
• lan0
• mgmt0
• mgmt1
• wan1
• lan1
Examples
To monitor the lan0 and wan0 interfaces:
ECV (config) # monitor lan0 wan0
mtr
Use the mtr command to probe and report on routers and their response time on an individual
route path.
Command Mode: EXEC mode
Syntax
mtr [-hvrctglspniu46] [--help] [--version] [--report] [--report-wide] [--report-cycles COUNT] [--
curses] [--split] [--raw] [--no-dns] [--gtk] [--address IP.ADD.RE.SS] [--interval SECONDS] [--psize
BYTES | -s BYTES] HOSTNAME [PACKETSIZE]
Arguments
Parameter Description
mtr-options Specifies the type of mtr. Select one of the following options:
-h help. Print the summary of command line argument options.
-v version. Print the installed version of mtr.
-r report. This option puts mtr into report mode. When in this
mode, mtr will run for the number of cycles specified by the -c
option, and then print statistics and exit. This mode is useful for
generating statistics about network quality. Note that each running
instance of mtr generates a significant amount of network traffic.
Using mtr to measure the quality of your network may result in
decreased network performance.
-w report-wide. This option puts mtr into wide report mode. When
in this mode, mtr will not cut hostnames in the report.
-c report-cycles COUNT. Use this option to set the number of pings
sent to determine both the machines on the network and the
reliability of those machines. Each cycle lasts one second.
Parameter Description
Defaults
None
Usage Guidelines
mtr combines the functionality of traceroute and ping in a single network diagnostic tool.
mtr probes routers on the route path by limiting the number of hops that individual pack-
ets may traverse, and listening to responses of their expiry. It regularly repeats this process,
usually once per second, and keep track of the response times of the hops along the path.
mtr combines the functionality of the traceroute and ping programs in a single network di-
agnostic tool.
[from Linux man page] As mtr starts, it investigates the network connection between the host
mtr runs on and HOSTNAME. by sending packets with purposely low TTLs. It continues to
send packets with low TTL, noting the response time of the intervening routers. This allows
mtr to print the response percentage and response times of the internet route to HOSTNAME.
A sudden increase in packet loss or response time is often an indication of a bad (or simply
overloaded) link.
Examples
nat-map
The appliance can perform source network address translation (Source NAT or SNAT) on in-
bound or outbound traffic.
Two use cases illustrate the need for NAT:
Inbound NAT. The appliance automatically creates a source NAT map when retrieving sub-
net information from the Silver Peak Cloud portal. This ensures that traffic destined to SaaS
servers has a return path to the appliance from which that traffic originated.
Outbound NAT. The appliance and server are in the cloud, and the server accesses the inter-
net. For example, a Citrix thin client accesses its cloud-based server, and the server accesses
the internet.
For deployments in the cloud, best practice is to NAT all traffic --- either inbound (WAN-to-
LAN) or outbound (LAN-to-WAN), depending on the direction of initiating request. This avoids
black-holing that can result from cloud-specific IP addressing requirements.
Enabling NAT on inbound traffic applies NAT policies to pass-through traffic as well as opti-
mized traffic, ensuring that black-holing doesn’t occur. Enabling NAT on outbound traffic only
applies to pass-through traffic.
If Fallback is enabled, the appliance moves to the next IP (if available) when ports are ex-
hausted on the current NAT IP.
In general, when applying NAT policies, configure separate WAN and LAN interfaces to ensure
that NAT works properly. You can do this by deploying the appliance in Router mode in-path
with two (or four) interfaces.
There are two types of NAT policies:
Dynamic -- created automatically by the system for inbound NAT when the SaaS Optimiza-
tion feature is enabled and SaaS service(s) are selected for optimization. The appliance polls
the Silver Peak Unity Cloud Intelligence service for a directory of SaaS services, and NAT poli-
cies are created for each of the subnets associated with selected SaaS service(s), ensuring that
traffic destined for servers in use by those SaaS services has a return path to the appliance.
Manual -- created by the administrator for specific IP addresses / ranges or subnets. When as-
signing priority numbers to individual policies within a NAT map, first view dynamic policies to
ensure that the manual numbering scheme doesn’t interfere with dynamic policy numbering
(that is, the manually assigned priority numbers cannot be in the range: 40000-50000). The
default (no-NAT) policy is numbered 65535.
NAT maps are comprised of ordered entries. Each map entry consists of a match statement
paired with a set action. Set actions are specific to the type of map.
A NAT map entry can match traffic that satisfies either a pre-defined ACL or any of the following
attributes:
• ICMP or IP Protocol
• DSCP value
• VLAN
If you want to reuse the same match criteria in more than one map, you can pre-define ACLs,
which are, essentially, reusable match statements.
Set actions are specific to the type of map. A NAT map has set actions for the following fea-
tures:
• NAT type
• NAT direction
• NAT IP
• Fallback
Map entries are ordered according to their assigned priorities. Priorities identify, as well as
order, entries within a map. Across entries, all priority values must be unique (in other words,
no two entries in a given map can have the same priority value). match
In the following example, we’ll add a new entry, with a priority of 50, to the default map, map1.
The first statement matches all traffic associated with the application, AOL. The second state-
ment causes the source address and the source port to change in the IP header of that inbound
traffic:
ECV (config) # nat-map map1 50 match app aol
ECV (config) # nat-map map1 50 set nat-type source-nat direction inbound
If you enter a new priority statement for an existing map, the CLI adds that entry to the map.
However, if the map already has a match or set statement with the same priority, the new entry
overwrites the previous one (and the CLI does not provide a warning).
If you want to create a new map, the CLI creates the map the first time you name it in a match
statement.
Every map automatically includes a default entry with the priority, 65535, the highest possible
number.
By default, one map is always active. You can change the active map at any time, simply by
activating a different map.
no opt-map
Use the no opt-map command to delete an optimization map or a specific priority entry from
an optimization map.
Command Mode: Global Configuration mode
Syntax
no opt-map map-name
no opt-map map-name priority-value
Arguments
Parameter Description
Defaults
None
Usage Guidelines
You can only delete an optimization map if it’s inactive. Therefore, to delete the active opti-
mization map, you must first activate a different optimization map. For example:
You can also delete a specific entry in an optimization map by using the no opt-map command
and specifying a priority value. For example, the following statement deletes the priority 100
entry (match and set statements) from the optimization map, fred:
no qos-map
Use the no qos-map command to delete a QoS map or a specific priority entry from a QoS
map.
Command Mode: Global Configuration mode
Syntax
no qos-map map-name
no qos-map map-name priority-value
Arguments
Parameter Description
Defaults
None
Usage Guidelines
You can only delete a QoS map if it’s inactive. To delete the active QoS map, you must first
activate a different QoS map. For example:
You can also delete a specific entry in a QoS map by using the no qos-map command and
specifying a priority value. For example, the following statement deletes the priority 100 entry
(match and set statements) from the QoS map, fred:
no route-map
You can use the no route-map command to delete a route map or a specific priority entry
from a route map.
Command Mode: Global Configuration mode
Syntax
no route-map map-name
no route-map map-name priority-value
Arguments
Parameter Description
Defaults
None
Usage Guidelines
You can only delete a route map if it’s inactive. To delete the active route map, you must first
activate a different route map. For example:
You can also delete a specific entry in a route map by using the no route-map command and
specifying a priority value. For example, the following statement deletes the priority 100 entry
(match and set statements) from the route map, fred:
ntp
Use the ntp commands to configure Network Time Protocol (NTP) on the appliance.
Use the no forms of the command to negate certain NTP options.
Command Mode: Privileged EXEC (ntp status command)
Command Mode: Global configuration mode (all other ntp commands)
Syntax
ntp { disable | enable }
no ntp { disable | enable }
ntp server IP-addr
no ntp server IP-addr
ntp status <remote> <refid> <st> <t> <when> <poll> <reach> <delay> <offset> <jitter>
ntp server IP-addr version ver-number
ntp server IP-addr disable
no ntp server IP-addr disable
ntp status
Arguments
Parameter Description
Defaults
None
Usage Guidelines
Use the no form of ntp enable and ntp disable to negate the NTP option. In other words, to
disable NTP, you can use the no ntp enable; to enable NPT, use the no ntp disable.
To remove an NTP server with the address, 170.10.10.4:
ECV (config) # no ntp server 170.10.10.4
Usage Guidelines
None
Examples
None
ntpdate
Use the ntpdate command to set the system clock once from a remote server using Network
Time Protocol (NTP).
Command Mode: Privileged EXEC mode
Syntax
ntpdate IP-addr
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
To synchronize the server to the NTP server, 216.27.190.202:
nat-map (no)
Use the no nat-map command to delete a Network Address Translation (NAT) map or a spe-
cific priority entry from a NAT map.
Command Mode: Global Configuration mode
Syntax
no nat-map map-name
no nat-map map-name priority-value
Arguments
Parameter Description
Defaults
None
Usage Guidelines
You can only delete a NAT map if it’s inactive. Therefore, to delete the active NAT map, you
must first activate a different NAT map. For example:
You can also delete a specific entry in a NAT map by using the no nat-map command and
specifying a priority value. For example, the following statement deletes the priority 100 entry
(match and set statements) from the NAT map, fred:
nat-map activate
Use the nat-map activate command to activate an inactive NAT map.
Command Mode: Global Configuration mode
Syntax
nat-map map-name activate
Arguments
Parameter Description
Defaults
None
Usage Guidelines
Only one NAT map can be active at a time. The Silver Peak appliance has a default NAT map,
map1, that’s active until you create and activate a new NAT map.
Examples
None
nat-map comment
Use the nat-map comment command to add a comment for a specified NAT map entry.
Command Mode: Global Configuration mode
Syntax
nat-map map-name priority-value comment comment-text
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
nat-map match
Use the nat-map match command to create a NAT map entry that uses match criteria to
delineate traffic. Also use this command to change the matching conditions associated with
an existing entry.
Command Mode: Global Configuration mode
Syntax
nat-map map-name priority-value match acl ACL-name
nat-map map-name priority-value match app app-name
nat-map map-name priority-value match dscp { any | dscp-value }
nat-map map-name priority-value match matchstr match-string
nat-map map-name priority-value match protocol icmp { source-IP-addr-mask | any | any-
ipv4 | any-ipv6 } { dest-IP addr-mask | any | any-ipv4 | any-ipv6 } [ dscp { any | dscp-value
}] [ vlan { any | 1..4094 | intf.tag | any.tag | intf.any | intf.native }]
nat-map map-name priority-value match protocol ip { source-IP-addr-mask | any | any-ipv4
| any-ipv6 } { dest-IP addr-mask | any | any-ipv4 | any-ipv6 } [ app app-name ] [ dscp { any
| dscp-value }] [ vlan { any | 1..4094 | intf.tag | any.tag | intf.any | intf.native }]
nat-map map-name priority-value match vlan { any | 1..4094 | intf.tag | any.tag | intf.any |
intf.native }
Arguments
Parameter Description
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
nat-map modify-priority
Use the nat-map modify-priority commands to modify an existing NAT map priority value.
Command Mode: Global Configuration mode
Syntax
nat-map map-name current-priority-value modify-priority new-priority-value
Arguments
Parameter Description
Defaults
None
Usage Guidelines
If you try renumber the entry to a priority number that already exists, the CLI informs you that
that’s the case and that you can’t make that modification.
Examples
To change the priority of entry 40 to be 60 for the map, map1:
nat-map set
Use the nat-map set command specifies or modifies an entry’s action. You cannot create a
set command for an entry until you first issue a match command.
Command Mode: Global Configuration mode
Syntax
nat-map map-name priority-value set nat-type source-nat direction { inbound | outbound
| none }
nat-map map-name priority-value set nat-type source-nat direction inbound nat-ip { intf-
IP-addr | auto | tunnel_endpoint } fallback { enable | disable }
nat-map map-name priority-value set nat-type source-nat direction outbound nat-ip { intf-
IP-addr | auto } fallback { enable | disable }
nat-map map-name priority-value set nat-type source-nat direction none nat-ip { intf-IP-
addr | auto } fallback { enable | disable }
nat-map map-name priority-value set nat-type no-nat direction inbound nat-ip { intf-IP-addr
| auto | tunnel_endpoint } fallback { enable | disable }
nat-map map-name priority-value set nat-type no-nat direction outbound nat-ip { intf-IP-
addr | auto } fallback { enable | disable }
nat-map map-name priority-value set nat-type no-nat direction none nat-ip { intf-IP-addr |
auto } fallback { enable | disable }
Arguments
Parameter Description
Parameter Description
nat-ip Specifies the NAT IP address. To display the existing interface addresses,
intf-IP-addr you can type, nat-ip ?
nat-ip { auto Specifies how the system should choose the NAT IP address.
| tun-
nel_endpoint
}
fallback Specifies fallback to the next available NAT IP address upon port
enable exhaustion with the current NAT IP address.
fallback Specifies not to fallback to the next available NAT IP address upon port
disable exhaustion.
Defaults
The default is no network address translation.
Usage Guidelines
You cannot create a set command for an entry until you first issue a match command. And,
until you create a set command, no Set Actions exist for that entry’s priority.
Usage Guidelines
None
Examples
None
opt-map
The Silver Peak appliance allows you to configure how your traffic is optimized by creating
optimization maps. Optimization maps make it easy for you to explicitly filter for the traffic you
want to optimize, and then apply an action to that flow.
Optimization maps are made up of ordered entries. Each entry consists of a match statement
paired with a set action. Set actions are specific to the type of map.
A map entry can match traffic that satisfies either a pre-defined ACL or any of the following
attributes:
• Protocol
• Source IP Address / Subnet
• Destination IP Address / Subnet
• Source Port Number
• Destination Port Number
• Application (standard or user-defined, or a user-defined application group)
• DSCP value
• VLAN
If you want to reuse the same match criteria in more than one map, you can pre-define ACLs,
which are, essentially, reusable match statements.
Set actions are specific to the type of map. An optimization map has set actions related to
optimization and compression features:
• Network Memory
• IP header compression
• Payload compression
• TCP acceleration
• Protocol acceleration (CIFS, SSL, SRDF)
Map entries are ordered according to their assigned priorities. Priorities identify, as well as
order, entries within a map. Across entries, all priority values must be unique (in other words,
no two entries in a given map can have the same priority value).
In the following example, we’ll add a new entry, with a priority of 50, to the default map, map1.
The first statement matches all traffic associated with the application, AOL. The second state-
ment enables CIFS acceleration as the action for that traffic:
ECV (config) # opt-map map1 50 match app aol
ECV (config) # opt-map map1 50 set cifs enable
If you enter a new priority statement for an existing optimization map, the CLI adds that entry
to the optimization map. However, if the map already has a match or set statement with the
same priority, the new entry overwrites the previous one (and the CLI does not provide a
warning).
If you want to create a new optimization map, the CLI creates the map the first time you name
it in a match statement.
Every optimization map automatically includes a default entry with the priority, 65535, the
highest possible number. That default entry applies all the optimization and compression
features to all traffic subject to the optimization map.
By default, optimization maps have additional entries that enable protocol-specific optimiza-
tions for CIFS, SSL, iSCSI, SRDF, Citrix, and their common ports.
By default, one optimization map is always active. You can change the active map at any time,
simply by activating a different map.
opt-map activate
Use the opt-map activate command to activate an inactive optimization map.
Command Mode: Global Configuration mode
Syntax
opt-map map-name activate
Arguments
Parameter Description
Defaults
None
Usage Guidelines
Only one optimization map can be active at a time. The Silver Peak appliance has a default
optimization map, map1, that’s active until you create and activate a new optimization map.
Examples
To activate the new optimization map, rambo:
opt-map comment
Use the opt-map comment command to add a comment for a specified NAT map entry.
Command Mode: Global Configuration mode
Syntax
opt-map map-name priority-value comment comment-text
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
opt-map match
Use the opt-map match command to create an optimization map entry that uses match crite-
ria to delineate traffic. Also use this command to change the matching conditions associated
with an existing entry.
Command Mode: Global Configuration mode
Syntax
opt-map map-name priority-value match acl ACL-name
opt-map map-name priority-value match app { app-name | app-group }
opt-map map-name priority-value match dscp { dscp-value | any }
opt-map map-name priority-value match matchstr match-string
opt-map map-name priority-value match protocol IP-protocol-number-name { source-ip-addr-
netmask | any } { dest-ip-addr-netmask | any } [ dscp { dscp-value | any }] [ vlan {any | 1..4094
| intf.tag | any.tag | intf.any | intf.native }]
opt-map map-name priority-value match protocol ip { source-ip-addr-netmask | any } { dest-
ip-addr-netmask | any } [ app { app-name | any }] [ dscp { dscp-value | any }] [ vlan { any |
1..4094 | intf.tag | any.tag | intf.any | intf.native }]
opt-map map-name priority-value match protocol { tcp | udp } { source-ip-addr-netmask | any
} { dest-ip-addr-netmask | any } [{ source-port-number | any } { dest-port-number | any }] [
dscp { dscp-value | any }] [ vlan { any | 1..4094 | intf.tag | any.tag | intf.any | intf.native }]
opt-map map-name priority-value match vlan { any | 1..4094 | intf.tag | any.tag | intf.any |
intf.native }
Arguments
Parameter Description
Parameter Description
Parameter Description
Defaults
None
Usage Guidelines
You can specify one of the following standard (built-in) applications (alphabetically left to
right):
For each opt-map match command with a given priority, you must create an opt-map set
command(s) with the same priority. But, you cannot create the set command without having
first created the match command.
Examples
To create a match criteria with a priority of “100” for the map, “express”, that filters for all traffic
coming from the LAN with a DSCP marking of “best effort”:
To create a match criteria with a priority of “70” for the map, “express”, that filters for the
application group, “secure”:
To create a match criteria with a priority of “20” for “map2” that filters for all AOL traffic that’s
headed from the LAN to 172.34.8.0:
ECV (config) # opt-map map2 20 match protocol ip any 172.34.8.0 aol
Since you haven’t specified a DSCP value, the criteria will include all DSCP values, as if you had
written it as follows:
ECV (config) # opt-map map2 20 match protocol ip any 172.34.8.0 aol any
To create a match criteria with a priority of “30” for the map, “arthouse” that filters for all UDP
traffic coming from port 41 and having a destination of 122.33.44.0/24:
ECV (config) # opt-map arthouse 30 match protocol udp any 122.33.4.0/24 41:0
Since you haven’t specified a DSCP value, the criteria will include all DSCP values, as if you had
written it as follows:
ECV (config) # opt-map arthouse 30 match protocol udp any 122.33.4.0/24 41:0 any
To create a match criteria with a priority of “10” for the map, “waldo” that filters for all Interior
Gateway Protocol (IGP) traffic that has a DSCP marking of “af11”:
ECV (config) # opt-map waldo 10 match protocol igp any any dscp af11
opt-map modify-priority
Use opt-map modify-priority command to modify the priority value of an existing entry in
the optimization map.
Command Mode: Global Configuration mode
Syntax
opt-map map-name current-priority-value modify-priority new-priority-value
Arguments
Parameter Description
Defaults
None
Usage Guidelines
If you try renumber the entry to a priority number that already exists, the CLI informs you that
that’s the case and that you can’t make that modification.
Examples
To change the priority of entry 40 to be 60 for the map, wiser:
opt-map set
The opt-map set command specifies or modifies an entry’s set action. You cannot create a
set command for an entry until you first issue a match command.
Command Mode: Global Configuration mode
Syntax
opt-map map-name priority-value set header { enable | disable }
opt-map map-name priority-value set network-memory { disable | balanced | min-latency
| max-reduction }
opt-map map-name priority-value set payload { enable | disable }
opt-map map-name priority-value set tcp { enable | disable }
opt-map map-name priority-value set protocol-specific { none | cifs | ssl | srdf | citrix |
iscsi } [network-memory { disable | balanced | min-latency | max-reduction }]
opt-map map-name priority-value set protocol-specific { none | cifs | ssl | srdf | citrix |
iscsi } network-memory { disable | balanced | min-latency | max-reduction } payload {
enable | disable } header { enable | disable } tcp { enable | disable }
opt-map map-name priority-value set advanced-tcp adjust-mss-to-mtu { enable | disable
}
opt-map map-name priority-value set advanced-tcp auto-reset-flows { enable | disable }
opt-map map-name priority-value set advanced-tcp congestion-control { standard | opti-
mized | aggressive }
opt-map map-name priority-value set advanced-tcp e2e-fin-handling { enable | disable }
opt-map map-name priority-value set advanced-tcp ip-black-listing { enable | disable }
opt-map map-name priority-value set advanced-tcp keep-count threshold
opt-map map-name priority-value set advanced-tcp keep-idle seconds
opt-map map-name priority-value set advanced-tcp keep-interval seconds
opt-map map-name priority-value set advanced-tcp lanside-wsfclamp threshold
opt-map map-name priority-value set advanced-tcp max-l2w-buffer Kbytes
opt-map map-name priority-value set advanced-tcp max-w2l-buffer Kbytes
opt-map map-name priority-value set advanced-tcp persist-drop seconds
opt-map map-name priority-value set advanced-tcp preserve-pkt-boundary { enable | dis-
able }
opt-map map-name priority-value set advanced-tcp propagate-syn { enable | disable }
opt-map map-name priority-value set advanced-tcp reset-to-default
Arguments
Parameter Description
Parameter Description
Parameter Description
Defaults
By default, the optimization map entry enables protocol-specific acceleration for CIFS and
SSL.
Usage Guidelines
You cannot create a set command for an entry until you first issue a match command. And,
until you create a set command, no Set Actions exist for that entry’s priority.
Examples
None
overlay
Use the overlay command to configure applications on the appliance.
Command Mode: Global Configuration mode
Syntax
overlay add overlay-name overlay-id
overlay common internal-subnets list-subnets
overlay delete overlay-name
overlay overlay-name bonding-policy { high-availability | high-quality | high-throughput
| raw }
overlay overlay-name brownout-thres { jitter jitter-ms | latency latency-ms | loss loss-percent
}
overlay overlay-name comment comment-overlay
overlay overlay-name internet-traffic policy local-breakout { backup Internet-traffic-
backuptunnels | primary Internet-traffic-primary-tunnels }
overlay overlay-name internet-traffic policy-list list-internet-traffic-policies
overlay overlay-name overlay-priority priority-number links { add link-name | delete link-
name }
overlay overlay-name overlay-priority priority-number state { use-sla | use-active }
overlay overlay-name topology node-type { non-hub | hub }
Arguments
Parameter Description
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
ping
Use the ping command to send Internet Control Message Protocol (ICMP) echo requests to a
specified host.
Command Mode: EXEC mode
Syntax
ping ping-options destination
Arguments
Parameter Description
ping-options Specifies the type of ping. Select one of the following options:
-a Audible ping.
-A Adaptive ping. Interpacket interval adapts to round-trip time,
so that effectively not more than one (or more, if preload is set)
unanswered probes present in the network. Minimal interval is 200
msec if not super-user. On networks with low rtt this mode is
essentially equivalent to flood mode.
-b Allow pinging a broadcast address.
-B Do not allow ping to change source address of probes. The
address is bound to the one selected when ping starts.
-c count: Stop after sending count ECHO_REQUEST packets.
With deadline option, ping waits for count ECHO_REPLY packets,
until the time-out expires.
-d Set the SO_DEBUG option on the socket being used. This
socket option is unused.
-F flow label: Allocate and set 20 bit flow label on echo request
packets. If value is zero, kernel allocates random flow label.
-f Flood ping. For every ECHO_REQUEST sent a period “.” is
printed, while for ever ECHO_REPLY received a backspace is printed.
This provides a rapid display of how many packets are being
dropped. If interval is not given, it sets interval to zero and outputs
packets as fast as they come back or one hundred times per second,
whichever is more. Only the super-user may use this option with
zero interval.
-i interval: Wait interval seconds between sending each packet.
The default is to wait for one second between each packet normally,
or not to wait in flood mode. Only super-user may set interval to
values less 0.2 seconds.
-I interface address: Set source address to specified interface
address. Argument may be numeric IP address or name of device.
Parameter Description
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
qos-map
The Silver Peak appliance allows you to configure the Quality of Service (QoS) for your traffic
by creating QoS maps. QoS maps make it easy for you to explicitly match the traffic that you
want to queue, and then (1) send that traffic to a particular queue, and (2) specify the DSCP
markings for WAN and LAN packets.
You can create elaborate combinations of match criteria, using IP addresses, ports, protocol,
and/or DSCP markings. You can also create more complex matches within ACLs. Or, you can
choose to simplify your match criteria by using well-known or user-defined applications, or
application groups. By default, one QoS map is always active, and you can change the active
map at any time, simply by activating a different map.
Each QoS map may have multiple entries. A map entry consists of one or more match state-
ments, which specifies packet fields to be matched, and one set statement, which specifies the
traffic class, or queue, for the traffic. You can also specify DSCP markings for the LAN (inner)
and WAN (outer, or tunnel) packets.
For example, in the following example, the first statement matches all traffic that is associated
with the application, AOL. The second statement specifies a traffic class ID of 9 for that traffic:
You create a new QoS map with a single, default entry which serves as a catch-all. In this
example, if the QoS map, fred, did not exist, the CLI would create it when you entered the
match statement.
Entries in a map are ordered according to their assigned priorities. Priorities are used to iden-
tify, as well as to order entries within a map. All priority values must be unique (in other words,
no two entries in a given map can have the same priority value). In the above example, the
priority for the entries is 50.
If you enter a new priority statement for an existing QoS map, the CLI adds that entry to the
QoS map. However, if you enter a statement that has the same priority as one that already
exists, the new entry overwrites the previous one (and the CLI does not provide a warning).
A QoS map entry can match traffic that satisfies either a pre-defined ACL or any of the following
attributes:
• IP Protocol
• Source IP Address
• Destination IP Address
• Source Port Number
• Destination Port Number
• Application
• DSCP value
• VLAN
To edit the ten available traffic classes, use the shaper command.
qos-map activate
Use the qos-map activate command to activate an inactive QoS map.
Command Mode: Global Configuration mode
Syntax
qos-map map-name activate
Arguments
Parameter Description
Defaults
None
Usage Guidelines
Only one QoS map can be active at time. The Silver Peak appliance has a default QoS map,
map1, that is active until you create and activate a new QoS map.
Examples
To activate the new QoS map, houdini:
qos-map comment
Use the qos-map comment command to add a comment for a specified QoS map entry.
Command Mode: Global Configuration mode
Syntax
qos-map map-name priority-value comment comment-text
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
qos-map match
Use the qos-map match command to create a QoS map entry that uses match criteria to
delineate traffic. Also use this command to change the matching conditions associated with
an existing entry.
Command Mode: Global Configuration mode
Syntax
qos-map map name priority-value match acl ACL-name
qos-map map name priority-value match app { app-name | app-group }
qos-map map name priority-value match dscp { dscp-value | any }
qos-map map name priority-value match matchstr match-string
qos-map map name priority-value match protocol IP-protocol-number-name { source-ip-addr-
mask | any } { dest-ip-addr-mask | any } [ dscp { dscp-value | any }] [ vlan { any | 1..4094 |
intf.tag | any.tag | intf.any | intf.native }]
qos-map map name priority-value match protocol ip { source-ip-addr-mask | any } { dest-ip-
addr-mask | any } [ app { app-name | any }] [ dscp { dscp-value | any }] [ vlan { any | 1..4094
| intf.tag | any.tag | intf.any | intf.native }]
qos-map map name priority-value match protocol { tcp | udp } { source-ip-addr-mask | any
} { dest-ip-addr-mask | any } [{ source-port-number | any } { dest-port-number | any }] [ dscp {
dscp-value | any }] [ vlan { any | 1..4094 | intf.tag | any.tag | intf.any | intf.native }]
qos-map map name priority-value match vlan { any | 1..4094 | intf.tag | any.tag | intf.any |
intf.native }
Arguments
Parameter Description
qos map map Specifies which QoS map. If the name doesn’t exist, the CLI creates it.
name
priority-value Designates a priority value for the map entry. Acceptable values are
from 1 to 65534. By default, the appliance reserves 65535 for the default
entry.
match acl Creates an entry that uses an existing ACL to match traffic. Also use this
ACL-name command to change the ACL associated with an existing entry.
match app Creates an entry that uses a built-in or user-defined application---or an
app-name application group---to match traffic. Also use this command to change
the application associated with an existing entry.
Parameter Description
match dscp { Creates or modifies an entry that matches traffic with a specific DSCP
dscp-value | marking. You can use any of the following values:af11, af12, af13, af21,
any } af22, af23, af31, af32, af33, af41, af42, af43, be, cs1, cs2, cs3, cs4, cs5,
cs6, cs7, or ef.__any__ is a wildcard.
match Creates or modifies a QoS map that matches a string.
matchstr
match-string
any any is a wildcard.
match Creates or modifies an entry that matches traffic with a specific protocol
protocol that is NOT named specifically as ip, tcp, or udp.
IP-protocol-
number-name
match Creates or modifies an entry that matches specific IP addresses.When
protocol ip you specify protocol ip, the assumption is that you are allowing any IP
protocol. In that case, you also need to specify an application (or
application group). If you don’t, the CLI defaults to specifying any
application.If you don’t choose to specify a DSCP value in the full
command, then the CLI defaults to specifying any DSCP value in the
policy entry.
match Creates or modifies an entry that matches specific TCP or UDP
protocol { tcp addresses.If you don’t choose to specify source and destination ports in
| udp } the full command, then the CLI defaults to specifying 0:0 (any source
port and any destination port) in the policy entry.If you don’t choose to
specify a DSCP value in the full command, then the CLI defaults to
specifying any DSCP value in the policy entry.
match vlan { Creates or modifies an entry that matches an interface and 802.1q VLAN
any | 1..4094 tag. The available values include:
| intf.tag | *1..4094* the number assigned to a VLAN*
any.tag | intf.tag* as in lan0.10
intf.any | *any.tag* as in any.10
intf.native } *intf.any* as in lan0.any
*intf.native* as in lan0.native
any is a wildcard
source-ip-addr- Specifies the source IP address and netmask in slash notation. For
mask example, 10.2.0.0 0.0.255.255 should be entered as 10.2.0.0/16.
dest-ip-addr- Specifies the destination IP address and netmask in slash notation. For
mask example, 10.2.0.0/16.
Defaults
None
Usage Guidelines
For each qos-map match command with a given priority, you must create a qos-map set
command with the same priority. But, you cannot create a set command without having first
created the match command.
Examples
To create a match criteria with a priority of “100” for the map, “express”, that filters for all traffic
coming from the LAN with a DSCP marking of “best effort”:
To create a match criteria with a priority of “70” for the map, “express”, that filters for the
application group, “secure”:
To create a match criteria with a priority of “20” for “map2” that filters for all AOL traffic that’s
headed from the LAN to 172.34.8.0:
ECV (config) # qos-map map2 20 match protocol ip any 172.34.8.0 aol
Since you haven’t specified a DSCP value, the criteria will include all DSCP values, as if you had
written it as follows:
ECV (config) # qos-map map2 20 match protocol ip any 172.34.8.0 aol any
To create a match criteria with a priority of “30” for the map, “arthouse” that filters for all UDP
traffic coming from port 41 and having a destination of 122.33.44.0/24:
ECV (config) # qos-map arthouse 30 match protocol udp any 122.33.4.0/24 41:0
Since you haven’t specified a DSCP value, the criteria will include all DSCP values, as if you had
written it as follows:
ECV (config) # qos-map arthouse 30 match protocol udp any 122.33.4.0/24 41:0 any
To create a match criteria with a priority of “10” for the map, “waldo” that filters for all Interior
Gateway Protocol (IGP) traffic that has a DSCP marking of “af11”:
ECV (config) # qos-map waldo 10 match protocol igp any any dscp af11
qos-map modify-priority
Use qos-map modify-priority command to modify the priority value of an existing entry.
Command Mode: Global Configuration mode
Syntax
qos-map map-name current-priority-value modify-priority new-priority-value
Arguments
Parameter Description
Defaults
None
Usage Guidelines
If you try renumber the entry to a priority number that already exists, the CLI informs you that
that’s the case and that you can’t make that modification.
Examples
To change the priority of entry 40 to be 60 for the map, DesMoines:
qos-map set
The qos-map set command specifies or modifies the set statement in a QoS map entry. You
cannot use a set command until you first issue a match command.
Command Mode: Global Configuration mode
Syntax
qos-map map-name priority-value set traffic-class traffic-class-ID
qos-map map-name priority-value set traffic-class traffic-class-ID lan-qos { trust-lan | dscp-
value } wan-qos { trust-lan | dscp-value }
qos-map map-name priority-value set lan-qos { trust-lan | dscp-value }
qos-map map-name priority-value set wan-qos { trust-lan | dscp-value }
Arguments
Parameter Description
Defaults
By default, the set part of the default optimization map entry (priority 65535) is:
qos-map set traffic-class 1 lan-qos trust-lan wan-qos trust-lan
Usage Guidelines
You cannot create a set command for an entry until you first issue a match command. And,
until you create a set command, no Set Actions exist for that entry’s priority.
• When creating an entry (priority) with the Appliance Manager Graphical User Interface,
the QoS map defaults are:
– Traffic class = 1
– LAN QoS = trust-lan
– WAN QoS = trust-lan
• When you create the first qos-map set command for a priority with the CLI and you use
a syntax that doesn’t specify all three Set Actions, the CLI automatically creates the rest
as defaults in the background.
For example, if your first set command for priority “10” in “map1” is:
then, the CLI also creates the following two additional entries behind the scenes:
You can verify these results by using the command, show qos-map.
For pass-through traffic, any lan-qos specification is ignored. Any wan-qos specification is
placed in the ToS field of the packet.
Examples
None
radius-server
Use the radius-server command to configure RADIUS server settings for user authentica-
tion.
Command Mode: Global configuration mode
Syntax
radius-server host IP-addr [auth-port port] [key string] [retransmit 0. . . 3] [timeout 1. . . 15]
no radius-server host IP-addr [auth-port port]
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
To define the RADIUS shared secret as “mysecret”:
To specify the RADIUS server’s IP address as 208.20.20.4 with authentication port 500 and a
timeout of 10 seconds:
ECV (config) # radius-server host 208.20.20.4 auth-port 500 timeout 10
To set the number of times the global RADIUS server retransmits to its default value:
reboot
Use the reboot command to reboot or shutdown the system.
Command Mode: EXEC mode (reboot - without parameters)
Command Mode: Privileged EXEC mode (all other reboot commands)
Syntax
reboot { clean | force | halt | halt noconfirm | noconfirm }
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
reload
Use the reload command to reboot or shutdown the system.
Command Mode: Privileged EXEC mode
Syntax
reload { clean | force | halt | halt noconfirm | noconfirm }
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
route-map
The Silver Peak appliance allows you to manage your packet flow by creating route maps.
Route maps make it easy for you to identify exactly the traffic that you need to manage.
You can create elaborate combinations of match criteria, using IP addresses, ports, proto-
col, and/or DSCP markings. You can also create more complex matches within ACLs. Or, you
can choose to simplify your match criteria by using well-known or user-defined applications,
or application groups. By default, one route map is always active, and you can change the
active map at any time, simply by activating a different map.
Each route map may have multiple entries. A map entry consists of one or more match state-
ments, which specifies packet fields to be matched, and one set statement, which takes action
on the matched traffic, such as sending it to a tunnel or dropping it.
For example, in the following example, the first statement matches all traffic that is associated
with the application, AOL. The second statement sends that AOL traffic through the tunnel
named Holland:
ECV (conf) # route-map fred 50 match app aol
ECV (conf) # route-map fred 50 set tunnel Holland
You create a new route map with a single, default entry which serves as a catch-all. In this
example, if the route map, fred, did not exist, the CLI would create it when you entered the
match statement.
Entries in a map are ordered according to their assigned priorities. Priorities are used to iden-
tify, as well as to order entries within a map. All priority values must be unique (in other words,
no two entries in a given map can have the same priority value). In the above example, the
priority for the entries is 50.
If you enter a new priority statement for an existing route map, the CLI adds that entry to the
route map. However, if you enter a statement that has the same priority as one that already
exists, the new entry overwrites the previous one (and the CLI does not provide a warning).
A route map entry can match traffic that satisfies either a pre-defined ACL or any of the fol-
lowing attributes:
• IP protocol
• Source IP address and subnet mask
• Destination IP address and subnet mask
• Source port number
• Destination port number
• Application
• DSCP value
• VLAN
route-map activate
Use the route-map activate command to activate a route map.
Command Mode: Global Configuration mode
Syntax
route-map map-name activate
Arguments
Parameter Description
Defaults
None
Usage Guidelines
Only one route map can be active at time. The Silver Peak appliance has a default route map,
map1, that is active until you create and activate a new route map.
Examples
To activate the new route map, whichway:
route-map comment
Use the route-map comment command to add a comment for a specified QoS map entry.
Command Mode: Global Configuration mode
Syntax
route-map map-name priority-value comment comment-text
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
route-map modify-priority
Use route-map modify-priority command to modify the priority value of an existing entry.
Command Mode: Global Configuration mode
Syntax
route-map map-name current-priority-value modify-priority new-priority-value
Arguments
Parameter Description
Defaults
None
Usage Guidelines
If you try renumber the entry to a priority number that already exists, the CLI informs you that
that’s the case and that you can’t make that modification.
Examples
To change the priority of entry 40 to be 60 for the map, lunar:
route-map match
Use the route-map match command to create a route map entry that uses match criteria to
delineate traffic. Also use this command to change the matching conditions associated with
an existing entry.
Command Mode: Global Configuration mode
Syntax
route-map map-name priority-value match acl ACL-name
route-map map-name priority-value match app { app-name | app-group }
route-map map-name priority-value match dscp { dscp-value | any }
route-map map-name priority-value match matchstr match-string
route-map map-name priority-value match protocol IP-protocol-number-name { source-ip-
addr-mask | any } { dest-ip-addr-mask | any } [ dscp { dscp-value | any }] [ vlan { any | 1..4094
| intf.tag | any.tag | intf.any | intf.native }]
route-map map-name priority-value match protocol ip { source-ip-addr-mask | any } { dest-ip-
addr-mask | any } [ app { app-name | any }] [ dscp { dscp-value | any }] [ vlan { any | 1..4094
| intf.tag | any.tag | intf.any | intf.native }]
route-map map-name priority-value match protocol { tcp | udp } { source-ip-addr-mask | any
} { dest-ip-addr-mask | any } [{ source-port-number | any } { dest-port-number | any }] [ dscp {
dscp-value | any }] [ vlan { any | 1..4094 | intf.tag | any.tag | intf.any | intf.native }]
route-map map-name priority-value match vlan { any | 1..4094 | intf.tag | any.tag | intf.any |
intf.native }
Arguments
Parameter Description
route map Specifies which route map. If the name doesn’t exist, the CLI creates it.
map-name
priority-value Designates a priority value for the map entry. Acceptable values are
from 1 to 65534. By default, the appliance reserves 65535 for the default
entry.
match acl Creates an entry that uses an existing ACL to match traffic. Also use this
ACL-name command to change the ACL associated with an existing entry.
match app Creates an entry that uses a built-in or user-defined application---or an
app-name application group---to match traffic. Also use this command to change
the application associated with an existing entry.
Parameter Description
match dscp { Creates or modifies an entry that matches traffic with a specific DSCP
dscp-value | marking. You can use any of the following values: af11, af12, af13, af21,
any } af22, af23, af31, af32, af33, af41, af42, af43, be, cs1, cs2, cs3, cs4, cs5,
cs6, cs7, or ef.
any is a wildcard.
match Creates or modifies a route map that matches a string.
matchstr
match-string
any any is a wildcard.
match Creates or modifies an entry that matches traffic with a specific protocol
protocol that is NOT named specifically as ip, tcp, or udp.
IP-protocol-
number-name
match Creates or modifies an entry that matches specific IP addresses. When
protocol ip you specify protocol ip, you allow any IP protocol. In that case, you need
to specify an application (or application group). Otherwise, the CLI
defaults to specifying any application. If you do not specify a DSCP value
in the full command, then the CLI defaults to specifying any DSCP value
in the policy entry.
match Creates or modifies an entry that matches specific TCP or UDP
protocol { tcp addresses. If you don’t choose to specify source and destination ports in
| udp } the full command, then the CLI defaults to specifying 0:0 (any source
port and any destination port) in the policy entry. If you don’t choose to
specify a DSCP value in the full command, then the CLI defaults to
specifying any DSCP value in the policy entry.
match vlan { Creates or modifies an entry that matches an interface and 802.1q VLAN
any | 1..4094 tag. The available values include:
| intf.tag | *1..4094* the number assigned to a VLAN
any.tag | *intf.tag* as in lan0.10
intf.any | *any.tag* as in any.10
intf.native } *intf.any* as in lan0.any
*intf>.native* as in lan0.native
any is a wildcard
source-ip-addr- Specifies the source IP address and netmask in slash notation. For
mask example, 10.2.0.0 0.0.255.255 should be entered as 10.2.0.0/16.
dest-ip-addr- Specifies the destination IP address and netmask in slash notation. For
mask example, 10.2.0.0/16.
Defaults
None
Usage Guidelines
For each route-map match command with a given priority, a route-map set command with
the same priority is required. However, you cannot create a set command before creating the
match command.
Examples
To create a match criteria with a priority of “100” for the map, “vinnie”, that filters for all traffic
coming from the LAN with a DSCP marking of “best effort”:
To create a match criteria with a priority of “70” for the map, “vinnie”, that filters for the appli-
cation group, “secure”:
To create a match criteria with a priority of “20” for “map2” that filters for all AOL traffic that’s
headed from the LAN to 172.34.8.0:
ECV (config) # route-map map2 20 match protocol ip any 172.34.8.0 aol
Since you haven’t specified a DSCP value, the criteria will include all DSCP values, as if you had
written it as follows:
ECV (config) # route-map map2 20 match protocol ip any 172.34.8.0 aol any
To create a match criteria with a priority of “30” for the map, “arthouse” that filters for all UDP
traffic coming from port 41 and having a destination of 122.33.44.0/24:
ECV (config) # route-map arthouse 30 match protocol udp any 122.33.4.0/24 41:0
Since you haven’t specified a DSCP value, the criteria will include all DSCP values, as if you had
written it as follows:
ECV (config) # route-map arthouse 30 match protocol udp any 122.33.4.0/24 41:0 any
To create a match criteria with a priority of “10” for the map, “autobahn” that filters for all
Interior Gateway Protocol (IGP) traffic that has a DSCP marking of “af11”:
ECV (config) # route-map autobahn 10 match protocol igp any any dscp af112
route-map set
The route-map set command specifies or modifies the SET part of an entry in a given route
map. You cannot use a set command until you first issue a match command.
Command Mode: Global Configuration mode
Syntax
route-map map-name priority-value set auto-opt-balance [ if-down { pass-through | pass-
through-unshaped | drop }]
route-map map-name priority-value set auto-opt-low-latency [ if-down { pass-through |
pass-through-unshaped | drop }]
route-map map-name priority-value set auto-opt-low-loss [ if-down { pass-through | pass-
through-unshaped | drop }]
route-map map-name priority-value set auto-opt-overlay-id overlay-name [ if-down { pass-
through | pass-through-unshaped | drop }]
route-map map-name priority-value set auto-opt-preferred-if { intf-name | wan0 }
route-map map-name priority-value set auto-optimize [ if-down { pass-through | pass-
through-unshaped | drop }]
route-map map-name priority-value set drop
route-map map-name priority-value set pass-through { shaped | unshaped }
route-map map-name priority-value set peer-balance peer-hostname [ if-down { pass-
through | pass-through-unshaped | drop | continue }]
route-map map-name priority-value set peer-low-latency peer-hostname [ if-down { pass-
through | pass-through-unshaped | drop | continue }]
route-map map-name priority-value set peer-low-loss peer-hostname [ if-down { pass-
through | pass-through-unshaped | drop | continue }]
route-map map-name priority-value set tunnel tunnel-name [ if-down { pass-through | pass-
through-unshaped | drop | continue }]
Arguments
Parameter Description
Parameter Description
Defaults
The default action for if-down is to send the traffic through as pass-through and shaped.
Usage Guidelines
• You cannot use a set command until you first issue a match command.
• By default, the set part of the default route map entry (with priority 65535) is auto-
optimize, which means that the appliances determine the appropriate, available tunnel
for the traffic. You can modify this to drop or pass-through unshaped as follows:
route-map map-name 65535 set drop
route-map map-name 65535 set pass-through-unshaped
Examples
None
proxy-arp
The proxy-arp command enables Proxy ARP on the specified interface. By default, Proxy ARP
is disabled on all interfaces
Proxy ARP is a method where ARP requests for an IP Address that is not on a given network
is answered by a proxy server on that network. The proxy provides its MAC Address as the
destination, then directs traffic directed to the proxy address to its intended destination.
The no proxy-arp command disables Proxy ARP on the specified interface.
Command Mode: EXEC mode
Syntax
proxy-arp intf-name
no proxy-arp intf-name
Arguments
Parameter Description
intf-name The interface upon which Proxy ARP is enabled. May be an interface
name or interface label.
Defaults
Proxy ARP is disabled
Usage Guidelines
None
Examples
This command enables Proxy ARP on WAN2 interface.
saas
Use saas command to configure the system SaaS (Software as a Service) options.
Command Mode: Global Configuration mode
Syntax
saas { enable | disable }
saas ping-src-interface source-intf-SaaS-RTT-pings
saas rtt-interval seconds
saas rtt-num-req-per-host number
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
selftest
Use the selftest command to run a self test and diagnostics.
Command Mode: Privileged EXEC mode
Syntax
selftest start disk
selftest stop disk
Arguments
Parameter Description
Defaults
None
Usage Guidelines
When you enter
This is an intrusive self test. This test puts the system in bypass mode
and perform read/write operations on the disks. The system will not process
any network traffic for the duration of the test. At the end of the test, you
need to reboot the system. While the test is running, if you attempt to run
other commands, you will receive errors.
Do you want to proceed? (y/n) (If you don't proceed, the question times out.)
Examples
None
shaper inbound
Use shaper inbound command to shape individual WAN, LAN, or management interfaces, or
to shape the aggregate WAN interface.
Use the no command to remove an inbound shaper.
Command Mode: Global Configuration mode
Syntax
shaper inbound shaper-name { enable | disable }
shaper inbound shaper-name accuracy usec
shaper inbound shaper-name max-bandwidth kbps
shaper inbound shaper-name traffic-class 1-10 excess-weight weight
shaper inbound shaper-name traffic-class 1-10 flow-rate-limit kbps
shaper inbound shaper-name traffic-class 1-10 max-bandwidth percent-interface-bw
shaper inbound shaper-name traffic-class 1-10 max-wait ms
shaper inbound shaper-name traffic-class 1-10 min-bandwidth percent-interface-bw
shaper inbound shaper-name traffic-class 1-10 priority 1-10
no shaper inbound { shaper-name | default | wan }
Arguments
Parameter Description
Parameter Description
max-wait ms Specifies the maximum wait time in milliseconds. Any packets waiting
longer than the specified Max Wait Time are dropped.
min- Specifies the shaper’s minimum bandwidth in kilobits per second. Each
bandwidth traffic class is guaranteed this percentage of bandwidth, allocated in the
percent- order of priority. However, if the sum of the percentages is greater than
interface-bw 100%, then lower-priority traffic classes might not receive their
guaranteed bandwidth if it is all consumed by higher-priority traffic.
priority 1-10 Specifies the shaper traffic class priority. This determines the order in
which each class’s minimum bandwidth is allocated - 1 is first, 10 is last.
traffic-class Specifies the shaper traffic class.
1-10
Defaults
None
Usage Guidelines
The inbound Shaper provides a simplified way to globally configure QoS (Quality of Service)
on the appliances.
Examples
None
shaper outbound
Use shaper outbound command to shape individual WAN, LAN, or management interfaces,
or to shape the aggregate WAN interface.
Use the no command to remove an outbound shaper.
Command Mode: Global Configuration mode
Syntax
shaper outbound shaper-name { enable | disable }
shaper outbound shaper-name accuracy usec
shaper outbound shaper-name max-bandwidth kbps
shaper outbound shaper-name traffic-class 1-10 excess-weight weight
shaper outbound shaper-name traffic-class 1-10 flow-rate-limit kbps
shaper outbound shaper-name traffic-class 1-10 max-bandwidth percent-interface-bw
shaper outbound shaper-name traffic-class 1-10 max-wait ms
shaper outbound shaper-name traffic-class 1-10 min-bandwidth percent-interface-bw
shaper outbound shaper-name traffic-class 1-10 priority 1-10
no shaper outbound { shaper-name | default | wan }
Arguments
Parameter Description
Parameter Description
max- Specifies traffic class maximum bandwidth (kilobits per second). You can
bandwidth limit the maximum bandwidth that a traffic class will use by specifying a
percent- percentage. The bandwidth usage for the traffic class never exceeds this
interface-bw value.
max-wait ms Specifies the maximum wait time in milliseconds. Any packets waiting
longer than the specified Max Wait Time are dropped.
min- Specifies shaper’s minimum bandwidth (kilobits per second). Each traffic
bandwidth class is guaranteed this percentage of bandwidth, allocated in the order
percent- of priority. However, if the sum of the percentages is greater than 100%,
interface-bw then lower-priority traffic classes might not receive their guaranteed
bandwidth if it is all consumed by higher-priority traffic.
priority 1-10 Specifies the shaper traffic class priority. This determines the order in
which each class’s minimum bandwidth is allocated - 1 is first, 10 is last.
traffic-class Specifies the shaper traffic class.
1-10
Defaults
None
Usage Guidelines
The Shaper provides a simplified way to globally configure QoS (Quality of Service) on the
appliances.
Examples
None
slogin
Use the slogin command to securely log into another system using Secure Shell (SSH).
Command Mode: EXEC mode
Syntax
slogin slogin-options [ user-text ] hostname-text [ command ]
Arguments
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
snmp-server user v3
Use the snmp-server user v3 command to configure SNMP access on a per-user basis for v3
security parameters.
Command Mode: Global Configuration mode
Syntax
snmp-server user { v3-username | admin }
snmp-server user { v3-username | admin } v3 [ enable ]
no snmp-server user { v3-username | admin } v3 [ enable ]
snmp-server user { v3-username | admin } v3 auth { md5 | sha } pwd
snmp-server user { v3-username | admin } v3 auth { md5 | sha } pwd priv { des | aes-128 }
[ pwd ]
snmp-server user { v3-username | admin } v3 encrypted auth { md5 | sha } pwd
snmp-server user { v3-username | admin } v3 encrypted auth { md5 | sha } pwd priv {
__de__s | aes-128 } [ pwd ]
snmp-server user { v3-username | admin } v3 prompt auth { md5 | sha } pwd
snmp-server user { v3-username | admin } v3 prompt auth { md5 | sha } pwd priv { des |
aes-128 } [ pwd ]
Arguments
Parameter Description
Parameter Description
Defaults
The default privacy (encryption) program is AES-128.
Usage Guidelines
• Only admin is allowed as an SNMP v3 user.
• Passwords must be at least eight (8) characters in length.
Examples
To configure the passwords for admin’s SNMP v3 security parameters as a follow-up after
entering the command:
ECV (config) # snmp-server user admin v3 prompt auth md5 priv des
Auth password: ________
Confirm: ________
Privacy password: __________
Confirm: __________
ECV (config) #
snmp-server
Use the snmp-server command to configure SNMP server options.
Command Mode: Global Configuration mode
Syntax
snmp-server community community-name [ ro ]
no snmp-server community
snmp-server contact name-contact
no snmp-server contact
snmp-server enable
no snmp-server enable
snmp-server enable traps
no snmp-server enable traps
snmp-server encrypt { md5 | sha } { plaintext pwd-plain | prompt }
Arguments
Parameter Description
community Configures the name for the SNMP read-only community, which is
community- required to make SNMP queries. Use the no form of this command to
name [ ro reset the community string to its default.
]
contact Sets a value for the syscontact variable in MIB-II. Use the no form of this
name-contact command to clear the contents of the syscontact variable.
Parameter Description
enable Enables the SNMP server. Use the no form of this command to disable
the SNMP server.
enable traps Enables the sending of SNMP traps from this system. Use the no form of
this command to disable sending of SNMP traps from this system.
encrypt { Generate the encrypted form of the password from plain text, using one
md5 | sha } of the following hash types:
md5 Message-Digest algorithm 5 (a hash function with a 128-bit hash
value)
sha Secure Hash Algorithm, SHA-1
host IP-addr Configures the hosts to which to send SNMP traps. Use the no form of
this command to stop sending SNMP traps to a specified host.
host IP-addr Temporarily disables sending of traps to this host. Use the no form of
disable this command to reenable sending of SNMP traps to a specified host.
host IP-addr Sends SNMP traps to the specified host. The community string noted
traps version here is the V3 username; it’s used for particular trap destination hosts.
3 v3-username
host IP-addr Specifies the SNMP version of traps to send to this host:
traps version 1 is SNMPv1.
{ 1 | 2c } 2c is SNMPv2c.
community- The community string noted here is also a community name (string
string name); it’s used for particular trap destination hosts.
listen enable Enables SNMP interface restriction access to this system. Use the no
form of this command to disable SNMP interface restriction access to
this system.
listen Specifies the interface you want to add to the SNMP server access
interface intf restriction list. The supported interfaces are mgmt0 and mgmt1. Use
the no form of this command to remove an interface to the SNMP
server access restriction list.
location Specifies the value for the syslocation variable in MIB-II. Use the no form
system-location of this command to clear the contents of the syslocation variable.
plaintext Specifies the plaintext password to be encrypted.
pwd-plain
prompt Asks to specify the password securely with the following prompt, at
which the user will enter text.
traps event Generates a trap for each alarm that is raised and cleared. Use the no
raise-alarm form of this command to negate this setting.
Defaults
None
Usage Guidelines
You need an SNMP manager application such as HP OpenViewTM to browse the MIB II data
and receive traps. There are many shareware and freeware SNMP manager applications avail-
able from the internet.
Examples
None
Syntax
ssh client global host-key-check { yes | no | ask }
no ssh client global host-key-check
ssh client global known-host known-host-entry
no ssh client global known-host known-host-entry
ssh client global known-hosts-file filename
no ssh client global known-hosts-file
Arguments
Parameter Description
host-key-check policy Configures global SSH client host key check settings.
The policy choices are:
yes Strict host key checking: only permit connection if
a matching host key is already in the known hosts file
no Non-strict host key checking: always permit
connection, and accept any new or changed host keys
without checking
ask Medium-strict host key checking: prompt user to
accept new host keys, but do not permit a connection if
there was already a known host entry that does not
match the one presented by the host.
Use the no form of this command to reset global SSH
client host key check settings.
known-host known-host-entry Adds a global SSH client known host entry. This can be
a hostname or an IP address. Use the no form of this
command to remove a global SSH client known host
entry by host.
known-hosts-file filename Configures gobal SSH client known_hosts file settings.
Use the no form of this command to rest a global SSH
client known_hosts file settings.
Defaults
None
Usage Guidelines
None
Examples
None
Syntax
ssh client user username-text authorized-key sshv2 public-key-code
no ssh client user username-text authorized-key sshv2 public-key-code
ssh client user username-text identity rsa2 { generate | private-key private-key-code |
public-key public-key-code }
no ssh client user username-text identity rsa2
ssh client user username-text identity dsa2 { generate | private-key private-key-code |
public-key public-key-code }
no ssh client user username-text identity dsa2
no ssh client user username-text identity
ssh client user username-text known-host known-host-text remove
Arguments
Parameter Description
Parameter Description
private-key private-key-code Sets the private key SSH client identity settings
for the user.
public-key public-key-code Sets the public key SSH client identity settings for
the user.
Defaults
None
Usage Guidelines
To negate the SSHv2 authorized-key settings for a specified user named “Chris”, where the
public key ID is “columbus”:
To delete all SSH client identity keys for a specified user named “Chris”:
Examples
None
ssh server
Use the ssh server command to configure the Secure Shell (SSH) server.
Command Mode: Global configuration mode
Syntax
ssh server enable
no ssh server enable
ssh server host-key key-type-code { private-key private-key-code | public-key public-key-code
}
ssh server host-key generate
ssh server listen enable
no ssh server listen enable
ssh server listen interface intf-name
no ssh server listen interface intf-name
ssh server min-version version-number
no ssh server min-version
ssh server ports port-1 [ port-2 ] [ port-3 ] . . .
Arguments
Parameter Description
Parameter Description
Defaults
None
Usage Guidelines
If you use the optional listen argument, then the ssh server listen enable command enables
SSH interface restriction access to this system.
Examples
To remove lan0 from the SSH server access restriction list:
ECV (config) # no ssh server listen interface lan0
ssl auth-certificate
Use the ssl auth-certificate command to configure SSL certificate authority parameters.
Command Mode: Privileged EXEC mode
Syntax
ssl auth-certificate delete all
ssl auth-certificate delete subject-name cert-subject-name
ssl auth-certificate install cert-file cert-file-or-URL
ssl auth-certificate install pfx-file PFX-file-or-URL
ssl auth-certificate install pfx-file PFX-file-or-URL mac-password MAC-pwd
ssl auth-certificate list [ brief | detail | subject-name cert-subject-name ]
ssl auth-certificate list subject-name cert-subject-name [ brief | detail ]
ssl auth-certificate list subject-name cert-subject-name issuer-name cert-issuer-name [
brief | detail ]
Arguments
Parameter Description
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
ssl builtin-signing
Use the ssl builtin-signing command to configure the SSL host to use the built-in certificate
to sign.
Command Mode: Global Configuration mode
Syntax
ssl builtin-signing { enable | disable }
Arguments
Parameter Description
enable Enables the SSL host to use the built-in certificate to sign.
disable Disables the SSL host to use the built-in certificate to sign.
Defaults
None
Usage Guidelines
None
Examples
None
ssl cert-substitution
Use the ssl cert-substitution command to configure SSL certificate substitution.
Command Mode: Global Configuration mode
Syntax
ssl cert-substitution { enable | disable }
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
ssl host-certificate
Use the ssl host-certificate command to configure SSL host certificate parameters.
Command Mode: Privileged EXEC mode
Syntax
ssl host-certificate delete all
ssl host-certificate delete subject-name cert-subject-name
ssl host-certificate delete subject-name cert-subject-name issuer-name cert-issuer-name
ssl host-certificate install cert-file cert-file-or-URL key-file private-key-file-or-URL [ key-
passphrase private-key-file-or-URL ]
ssl host-certificate install pfx-file PFX-file-or-URL
ssl host-certificate install pfx-file PFX-file-or-URL mac-password pwd-mac [ crypt-password
pwd-encrypt ]
ssl host-certificate list [ brief | detail | subject-name cert-subject-name ]
ssl host-certificate list subject-name cert-subject-name [ brief | detail ]
ssl host-certificate list subject-name cert-subject-name issuer-name cert-issuer-name [ brief
| detail ]
Arguments
Parameter Description
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
ssl signing-certificate
Use the ssl signing-certificate command to configure SSL signing certificate parameters.
Command Mode: Privileged EXEC mode
Syntax
ssl signing-certificate delete all
ssl signing-certificate delete subject-name cert-subject-name
ssl signing-certificate delete subject-name cert-subject-name issuer-name cert-issuer-name
ssl signing-certificate install cert-file cert-file-or-URL key-file private-key-file-or-URL [ key-
passphrase private-key-file-or-URL ]
ssl signing-certificate install pfx-file PFX-file-or-URL
ssl signing-certificate install pfx-file PFX-file-or-URL mac-password pwd-mac [ crypt-
password pwd-encrypt ]
ssl signing-certificate list [ brief | detail | subject-name cert-subject-name ]
ssl signing-certificate list subject-name cert-subject-name [ brief | detail ]
ssl signing-certificate list subject-name cert-subject-name issuer-name cert-issuer-name [
brief | detail ]
Arguments
Parameter Description
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
ssl subs-certificate
Use the ssl subs-certificate command to configure SSL substitute certificate parameters.
Command Mode: Privileged EXEC mode
Syntax
ssl subs-certificate list [ brief | detail | subject-name cert-subject-name ]
ssl subs-certificate list subject-name cert-subject-name [ brief | detail ]
ssl subs-certificate list subject-name cert-subject-name issuer-name cert-issuer-name [ brief
| detail ]
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
subnet
Use the subnet command to configure subnets.
Use the no form of this command to remove a specific subnet.
Command Mode: Global Configuration mode
Syntax
subnet ip-prefix/length advertize { enable | disable }
subnet ip-prefix/length advertize-bgp { enable | disable }
subnet ip-prefix/length advertize-ospf { enable | disable }
subnet ip-prefix/length comment
subnet ip-prefix/length exclude { enable | disable }
subnet ip-prefix/length local { enable | disable }
subnet ip-prefix/length metric 0-100
no subnet ip-prefix/length
Arguments
Parameter Description
Parameter Description
Defaults
None
Usage Guidelines
Use these commands to build each appliance’s subnet table.
Examples
None
system auto-ipid
Use the system auto-ipid command to configure the auto IP ID feature.
Command Mode: Global Configuration mode
Syntax
system auto-ipid { disable | enable }
Arguments
Parameter Description
Defaults
The default state is enabled.
Usage Guidelines
This command is part of three auto-discovery strategies: auto IP ID, auto SYN, and auto-
subnet. All three are enabled by default.
Examples
None
system auto-mac-configure
Use the system auto-mac-configure command to configure the virtual appliance to auto-
configure the MACs (Media Access Control).
Command Mode: Global Configuration mode
Syntax
system auto-mac-configure { disable | enable }
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
system auto-policy-lookup
Use the system auto-policy-lookup command to configure periodic policy lookups.
Command Mode: Global Configuration mode
Syntax
system auto-policy-lookup interval 0..65535
Arguments
Parameter Description
interval Configures the interval for periodic policy lookups. The interval is
0..65535 expressed as the number of seconds between lookups.
Defaults
None
Usage Guidelines
None
Examples
None
system auto-subnet
Use the system auto-subnet command to configure the auto-subnet feature.
Command Mode: Global Configuration mode
Syntax
system auto-subnet add-local-lan { disable | enable }
system auto-subnet add-local-wan { disable | enable }
system auto-subnet bgp-redistribute { disable | enable }
system auto-subnet add-local metric 0 - 100
system auto-subnet { disable | enable }
Arguments
Parameter Description
Defaults
The default state is enabled.
Usage Guidelines
None
Examples
None
system auto-syn
Use the system auto-syn command to configure the auto SYN feature.
Command Mode: Global Configuration mode
Syntax
system auto-syn { disable | enable }
Arguments
Parameter Description
Defaults
The default state is enabled.
Usage Guidelines
This command is part of three auto-discovery strategies: auto IP ID, auto SYN, and auto-
subnet. All three are enabled by default.
Examples
None
system bandwidth
Use the system bandwidth command to configure appliance bandwidth.
Command Mode: Global Configuration mode
Syntax
system bandwidth max kbps
system bandwidth if-rx-target [ enable | disable ]
Arguments
Parameter Description
max kbps Configures maximum bandwidth for traffic transmitted to the WAN
side in kilobits per second. This is a total of all tunnelized traffic and
pass-through shaped traffic.
if-rx-target Receive-side target bandwidth for the WAN interface.
disable Disables Interface DRC (Dynamic Rate Control).
enable Enables Interface DRC (Dynamic Rate Control).
Defaults
None
Usage Guidelines
Receive-side bandwidth (also known as Dynamic Rate Control) is a feature that prevents one
appliance from overwhelming another appliance as a result of sending it more data than the
recipient can process.
Examples
To configure the appliance to transmit at a maximum bandwidth of 8000 kilobits per second:
system bonding
Use the system bonding command to configure the appliance etherchannel bonding option.
When using a four-port Silver Peak appliance, you can bond pairs of Ethernet ports into a
single port with one IP address per pair.
Command Mode: Global Configuration mode
Syntax
system bonding { disable | enable }
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
system bypass
Use the system bypass command to configure the appliance bypass option. With this, the
appliance mechanically isolates itself from the network, allowing traffic to flow without inter-
vention.
Use the no form of this command to remove bypass capability when you’ve augmented and
configured a virtual appliance’s stock hardware with a Silicom BPVM or BPUSB card.
Command Mode: Global Configuration mode
Syntax
system bypass { disable | enable }
system bypass type { bpvm | bpusb } mac address mac-addr
no system bypass
Arguments
Parameter Description
Defaults
None
Usage Guidelines
Virtual appliances generally don’t have a bypass card because they use stock hardware, like
a Dell server. However, motivated customers can open up the server and add a Silicom card
to get the same capabilities as one of Silver Peak’s NX hardware appliances. Silicom calls this
card BPVM.
As part of configuring the BPVM (part of a separate, documented procedure), you must indi-
cate which network interface can be used to communicate with the card by specifying the MAC
address.
Examples
To configure the appliance so that all traffic flows through the appliance without processing
any of the traffic:
system contact
Use the system contact command to configure contact information for this appliance.
Command Mode: Global Configuration mode
Syntax
system contact contact-info
Arguments
Parameter Description
Defaults
None
Usage Guidelines
If you want to include spaces in the contact information, wrap the entire phrase in quotes.
Examples
To configure Sherlock Holmes as the system contact:
Syntax
system disk encryption { disable | enable }
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
system disk
Use the system disk command to insert or remove a disk from the RAID array.
Command Mode: Privileged EXEC mode
Syntax
system disk disk-ID { insert | remove }
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
To add disk 9 back into an NX-8500’s RAID array:
system dpc
Use the system dpc command to configure Dynamic Path Control (DPC) for this appliance.
Command Mode: Global Configuration mode
Syntax
system dpc failover-behavior { disable | fail-back | fail-stick }
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
system eclicense
Use the system eclicense command to configure a Silver Peak EdgeConnect license.
Command Mode: Global configuration mode
Syntax
system eclicense boost bandwidth bandwidth-limit-in-kbps
system eclicense boost { disable | enable }
system eclicense plus { disable | enable }
Arguments
Parameter Description
Defaults
None
Usage Guidelines
This command is only available for EdgeConnect appliances.
Examples
None
system firmware
Use the system firmware command to manage the appliance firmware.
Command Mode: Global configuration mode
Syntax
system firmware update { LCC | BIOS | SAS | NIC }
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
system arp-table-size
Use the system arp-table-size command to configure the maximum system ARP table size.
Command Mode: Global Configuration mode
Syntax
system arp-table-size max-arp-table-size
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
system hostname
Use the system hostname command to configure host name for this appliance.
Command Mode: Global Configuration mode
Syntax
system hostname hostname-text
Arguments
Parameter Description
Defaults
None
Usage Guidelines
Hostnames may contain letters, numbers, periods (“.”), and hyphens (“-”), but may not begin
with a hyphen. Hostnames cannot contain spaces.
Examples
None
system int-hairpin
Use the system int-hairpin command to configure the internal hairpinning feature.
Command Mode: Global Configuration mode
Syntax
system int-hairpin { disable | enable }
Arguments
Parameter Description
Defaults
None
Usage Guidelines
Hairpinning redirects inbound LAN traffic back to the WAN.
Examples
None
system location
Use the system location command to configure location information for this appliance.
Command Mode: Global Configuration mode
Syntax
system location location-info
Arguments
Parameter Description
Defaults
None
Usage Guidelines
If you want to include spaces in the contact information, wrap the entire phrase in quotes.
Examples
To specify the appliance location as “Pittsburgh”:
system mode
Use the system mode command to configure the appliance’s mode (bridge or router) and
next-hop IP. When using a 4-port appliance, you can configure two next-hops (one for each
WAN interface).
Use the no form of the command to reset the router or bridge mode setting to its default.
Command Mode: Global Configuration mode
Syntax
system mode bridge intf inbound-max-bawndwidth bw-kbps
system mode bridge intf outbound-max-bandwidth bw-kbps
system mode bridge ip IP-addr mask-length nexthop IP-addr [ second-ip IP-addr mask-length
second-nexthop IP-addr ]
system mode router intf inbound-max-bandwidth bw-kbps
system mode router intf outbound-max-bandwidth bw-kbps
system mode router ip IP-addr mask-length nexthop IP-addr [ second-ip IP-addr mask-length
second-nexthop IP-addr ]
system mode router intf IP-addr mask-length nh IP-addr
system mode router intf IP-addr mask-length nh IP-addr intf IP-addr mask-length nh IP-addr
system mode router intf IP-addr mask-length nh IP-addr intf IP-addr mask-length nh IP-addr
system mode router intf IP-addr mask-length nh IP-addr intf IP-addr mask-length nh IP-addr
intf IP-addr mask-length nh IP-addr intf IP-addr mask-length nh IP-addr
system mode server
system mode server inbound-max-bandwidth bw-kbps
system mode server outbound-max-bandwidth bw-kbps
no system mode
Arguments
Parameter Description
Parameter Description
Defaults
The default system mode is bridge (in-line) mode.
Usage Guidelines
None
Examples
To configure an appliance with the IP address, 172.27.120.1 to be in router mode, with a net-
mask of 255.255.255.0 and a next-hop IP address of 172.27.120.2:
system nat-all-inbound
Use the system nat-all-inbound command to configure the inbound source NAT feature.
Command Mode: Global Configuration mode
Syntax
system nat-all-inbound disable
system nat-all-inbound nat-ip { intf-IP-addr | auto }
system nat-all-inbound nat-ip { intf-IP-addr | auto } fallback { enable | disable }
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
system nat-all-outbound
Use the system nat-all-outbound command to configure the inbound source NAT feature.
Command Mode: Global Configuration mode
Syntax
system nat-all-outbound disable
system nat-all-outbound nat-ip { intf-IP-addr | auto }
system nat-all-outbound nat-ip { intf-IP-addr | auto } fallback { enable | disable }
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
system network-memory
Use the system network-memory command to configure system network memory.
Command Mode: Privileged EXEC mode (system erase)
Command Mode: Global Configuration mode (system media)
Syntax
system network-memory erase
system network-memory media ram
system network-memory media ram-and-disk
Arguments
Parameter Description
Defaults
The default Network Memory mode is 0.
Usage Guidelines
None
Examples
None
system passthru-to-sender
Use the system passthru-to-sender command to configure passthrough L2 return to
sender.
Command Mode: Global configuration mode
Syntax
system passthru-to-sender
system passthru-to-sender { disable | enable }
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
system peer-list
Use the system peer-list command to assign a priority to a peer.
Use the no form of this command to remove the peer name from the priority list.
Command Mode: Global configuration mode
Syntax
system peer-list peer-name weight
no system peer-list peer-name
Arguments
Parameter Description
Defaults
None
Usage Guidelines
When an appliance receives a Subnet with the same Metric from multiple remote or peer
appliances, it uses the Peer Priority list as a tie-breaker.
If a Peer Priority is not configured, then the appliance randomly distributes flows among mul-
tiple peers.
The lower the number, the higher the peer’s priority.
Examples
None
system registration
Use the system registration command to register the appliance with the Silver Peak portal.
Use the no form of this command to remove Silver Peak portal registration data.
Command Mode: Global Configuration mode
Syntax
system registration Account-Key Account-Name
system registration Account-Key Account-Name App-Group-Name
system registration Account-Key Account-Name App-Group-Name App-Site-Name
no system registration
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
system router
Use the system router command to configure in-line router mode.
Use the no form of this command to remove in-line router mode in whole or in part.
Command Mode: Global Configuration mode
Syntax
system router router-name create interface intf { lan | wan }
no system router router-name
system router router-name dhcp
system router router-name dhcp vlan VLAN-ID [ inbound-max-bw bw-kbps | label intf-label
| outbound-max-bw bw-kbps | renew | security-mode security-mode-intf ]
system router router-name ip IP-addr [ inbound-max-bw bw-kbps | label intf-label |
outbound-max-bw bw-kbps | security-mode security-mode-intf ]
system router router-name ip IP-addr mask nexthop IP-addr [ vlan VLAN-ID ]
system router router-name pppoe [ Unit-number ]
system router router-name pppoe Unit-number [ inbound-max-bw bw-kbps | label intf-label
| outbound-max-bw bw-kbps | security-mode security-mode-intf ]
no system router router-name dhcp [ vlan VLAN-ID]
no system router router-name dhcp vlan VLAN-ID label
no system router router-name ip IP-addr label
no system router router-name pppoe Unit-number [ label ]
Arguments
Parameter Description
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
system routing
Use the system routing command to configure interface routing.
Use the no form of this command to reset system-level routing information.
Command Mode: Global Configuration mode
Syntax
system routing inline
system routing redundancy { default | none | lan-native | lan-native-vlan | lan-and-wan
| all }
no system routing inline
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
system smb-signing
Use the system smb-signing command to enable or disable SMB signing.
Command Mode: Global Configuration mode
Syntax
system smb-signing { disable | enable }
Arguments
Parameter Description
Defaults
The default is disabled.
Usage Guidelines
This command must be executed together with the cifs signing delegation domain com-
mand.
Examples
None
system ssl-ipsec-override
Use the system ssl-ipsec-override command to configure SSL IPSec override.
Command Mode: Global Configuration mode
Syntax
system ssl-ipsec-override { disable | enable }
Arguments
Parameter Description
Defaults
This feature is disabled by default.
Usage Guidelines
None
Examples
None
tacacs-server
Use the tacacs-server command to configure hosts TACACS+ server settings for user authen-
tication.
Command Mode: Global configuration mode
Syntax
tacacs-server host IP-addr [auth-port port] [auth-type { ascii | pap }] [key string]
[retransmit 0. . . 3] [timeout 1. . . 15]
tacacs-server { key string | retransmit 0..3 | timeout 1. . . 15 }
no tacacs-server host IP-addr [auth-port port]
no tacacs-server { key | retransmit | timeout }
Arguments
Parameter Description
Defaults
None
Usage Guidelines
When you don’t specify a host IP, then configurations for host, key, and retransmit are global
for TACACS+ servers.
Examples
To define the TACACS+ shared secret as “mysecret”:
To specify that the TACACS+ server with the IP address of 10.10.10.10 uses PAP authentication
and tries to retransmit a maximum of 9 times:
ECV (config) # tacacs-server host 10.10.10.10 auth-type pap retransmit 9
To reset, to its default, the number of seconds after which the TACACS+ server times out after
keyboard inactivity:
tca
Use the tca command to set the parameters for threshold crossing alerts.
Use the no form of this command to return a special instance (that is, specific values for a
named tunnel) to the default values.
Use no tca tca-name default to delete the TCA instance.
Command Mode: Global configuration mode
Syntax
tca tca-name default { rising | falling } raise-threshold value clear-threshold value [sample-
count number-samples]
tca tca-name tunnel-name { rising | falling } raise-threshold value clear-threshold value
[sample-count number-samples]
tca tca-name { pass-through | pass-through-unshaped } { rising | falling } raise-threshold
value clear-threshold value [sample-count number-samples]
no tca tca-name { default | tunnel-name }
no tca tca-name {default | tunnel-name} [rising | falling]
tca tca-name { default | tunnel-name } { enable | disable }
tca tca-name { pass-through | pass-through-unshaped } { enable | disable }
Arguments
Parameter Description
tca tca-name Specifies which threshold crossing alert to configure. Some apply to one
or more types of traffic. Others only have default values.The options
are: file-system-utilization How much of the file system space has
been used, expressed as a percentage.
lan-side-rx-throughput LAN--side Receive throughput, in kilobits per
second (kbps).
latency Tunnel latency, in milliseconds (ms).
loss-post-fec Tunnel loss, as tenths of a percent, after applying
Forward Error Correction (FEC).
loss-pre-fec Tunnel loss, as tenths of a percent, before applying
Forward Error Correction (FEC).
oop-post-poc Tunnel out-of-order packets, as tenths of a percent, after
applying Packet Order Correction (POC).
oop-pre-poc Tunnel out-of-order packets, as tenths of a percent,
before applying Packet Order Correction (POC).
optimized flows Total number of optimized flows.__reduction Tunnel
reduction, in percent (%__).
total-flows Total number of flows.__utilization Tunnel utilization, as a
percent (%__).
wan-side-tx-throughput WAN--side transmit throughput, in kilobits per
second (kbps).
default Sets the tca tca-name argument values for any tunnels that weren’t
specifically named in configuring an argument. For example, if you
configured latency values for tunnel_1 but not for tunnel_2 and
tunnel_3, then configuring default would only apply values to tunnel_2
and tunnel_3.
tunnel-name For specifying an individual tunnel for threshold configuration.
falling Specifies a threshold crossing alarm for when the stat value falls too low.
rising Specifies a threshold crossing alarm for when the stat value rises too
high.
raise- Specifies at what value to raise an alert.
threshold
value
clear- After an alarm has been raised, specifies at what value to clear the alert.
threshold For a rising alarm, the clear-threshold value is equal to or less than the
value raise-threshold.
For a falling alarm, the clear-threshold value is equal to or more than
the raise-threshold
sample-count Sets the number of samples that the metric must sustain below (or
number- above) the threshold in order to raise (or clear) the alert.
samples
enable Enables this threshold control alert instance.
disable Disables this threshold control alert instance.
Defaults
None
Usage Guidelines
This table lists the default state of each type of threshold crossing alert:
TCA Type Unit Default [ON, OFF] allow rising allow falling
Examples
To raise an alert when the percent reduction for tunnel_a falls below 60% and to clear the alarm
as soon as reduction reaches 70%:
ECV (config) # tca reduction tunnel_a falling raise-threshold 60 clear-threshold 70
tcpdump
Use the tcpdump command to display packets on a network.
Command Mode: Privileged EXEC mode
Syntax
tcpdump [ tcpdump-options ]
Arguments
Parameter Description
Parameter Description
Parameter Description
-L List the known data link types for the interface and exit.
-m Load SMI MIB module definitions from file module. This option can
be used several times to load several MIB modules into tcp-dump.
-M Use secret as a shared secret for validating the digests found in
TCP segments with the TCP-MD5 option (RFC 2385), if present.
-n Don’t convert host addresses to names. This can be used to avoid
DNS lookups.
-nn Don’t convert protocol and port numbers etc. to names either.
-N Don’t print domain name qualification of host names. For example,
if you give this flag then tcpdump will print nic instead of nic.ddn.mil.
-O Do not run the packet-matching code optimizer. This is useful only
if you suspect a bug in the optimizer.
-p Don’t put the interface into promiscuous mode. Note that the
interface might be in promiscuous mode for some other reason; hence,
-p cannot be used as an abbreviation for “ether host {local-hw-addr} or
ether broadcast”.
-q Quick (quiet?) output. Print less protocol information so output
lines are shorter.
-R Assume ESP/AH packets to be based on old specification (RFC1825
to RFC1829). If specified, tcpdump will not print replay prevention field.
Since there is no protocol version field in ESP/AH specification, tcpdump
cannot deduce the version of ESP/AH protocol.
-r Read packets from file (which was created with the -w option).
Standard input is used if file is ‘’-’’.
-S Print absolute, rather than relative, TCP sequence numbers.
-s Snarf snaplen bytes of data from each packet rather than the
default of 68 (with SunOS’s NIT, the minimum is actually 96). 68 bytes is
adequate for IP, ICMP, TCP, and UDP but may truncate protocol
information from name server and NFS packets. Packets truncated
because of a limited snapshot are indicated in the output with
[__|__proto], where proto is the name of the protocol level at which the
truncation has occurred.
Note that taking larger snapshots both increases the amount of time it
takes to process packets and, effectively, decreases the amount of
packet buffering. This may cause packets to be lost. You should limit
snaplen to the smallest number that will capture the protocol
information you’re interested in. Setting snaplen to 0 means use the
required length to catch whole packets.
Parameter Description
Parameter Description
-w Write the raw packets to file rather than parsing and printing them
out. They can later be printed with the -r option. Standard output is
used if file is “-”.
-W Used in conjunction with the -C option, this will limit the number of
files created to the specified number, and begin overwriting files from
the beginning, thus creating a “rotating” buffer. In addition, it will name
the files with enough leading 0s to support the maximum number of
files, allowing them to sort correctly.
-x Print each packet (minus its link level header) in hex. The smaller of
the entire packet or snaplen bytes will be printed. Note that this is the
entire link-layer packet, so for link layers that pad (e.g. Ethernet), the
padding bytes will also be printed when the higher layer packet is
shorter than the required padding.
-xx Print each packet, including its link level header, in hex.
-X Print each packet (minus its link level header) in hex and ASCII. This
is very handy for analyzing new protocols.
-XX Print each packet, including its link level header, in hex and ASCII.
-y Set the data link type to use while capturing packets to datalinktype.
-Z Drops privileges (if root) and changes user ID to user and the group
ID to the primary group of user. This behavior can also be enabled by
default at compile time.
Defaults
None
Usage Guidelines
None
Examples
None
tcptraceroute
Use the tcptraceroute command to record route information in environments where tradi-
tional ICMP traceroute is defeated by firewalls or other filters.
Command Mode: EXEC mode
Syntax
tcptraceroute [-nNFSAE] [-i intf-name ] [-f first-ttl ] [ -l packet-length ][-q number-queries*] [-t
tos][-m max-ttl] [-pP] source-port] [-s source-address][-w wait-time] host-text [dest-port] [packet-
length]
Arguments
Parameter Description
tcptraceroute- Specifies the type of tcptraceroute. Select from the following options:
options -n Display numeric output, rather than doing a reverse DNS lookup for
each hop. By default, reverse lookup is not attempted on RFC1918
address space, regardless of -n flag.
-N Perform a reverse DNS lookup for each hop, including RFC1918
addresses.
-f Set initial TTL used in first outgoing packet. Default is 1.
-m Set the maximum TTL used in outgoing packets. Default is 30.
-p Use the specified local TCP port in outgoing packets. The default is
to obtain a free port from the kernel using bind. Unlike with traditional
traceroute, this number will not increase with each hop.
-s Set source address for outgoing packets. See -i flag.
-i Use the specified interface for outgoing packets.
-q Set the number of probes to be sent to each hop. Default is 3.
-w Set the timeout, in seconds, to wait for a response for each probe.
Default is 3.
-S Set the TCP SYN flag in outgoing packets. This is the default, if
neither -S or -A is specified.
-A Set the TCP ACK flag in outgoing packets. By doing so, it is possible
to trace through stateless firewalls which permit outgoing TCP
connections.
-E Send ECN SYN packets, as described in RFC2481.
Parameter Description
Defaults
The probe packet length is 40.
Usage Guidelines
• tcptraceroute is a traceroute implementation using TCP packets.
• The more traditional traceroute sends out either UDP or ICMP ECHO packets with a TTL
of one, and increments the TTL until the destination has been reached. By printing the
gateways that generate ICMP time exceeded messages along the way, it is able to deter-
mine the path packets are taking to reach the destination.
• The problem is that with the widespread use of firewalls on the modern Internet, many
of the packets that traceroute sends out end up being filtered, making it impossible to
completely trace the path to the destination.
However, in many cases, if hosts sitting behind the firewall are listening for connections
on specific ports, then these firewalls will permit inbound TCP packets to those ports.
By sending out TCP SYN packets instead of UDP or ICMP ECHO packets, tcptraceroute
is able to bypass the most common firewall filters.
• It is worth noting that tcptraceroute never completely establishes a TCP connection with
the destination host.
If the host is not listening for incoming connections, it will respond with an RST indicating
that the port is closed.
If the host instead responds with a SYN|ACK, the port is known to be open, and an RST
is sent by the kernel tcptraceroute is running on to tear down the connection without
completing three-way handshake. This is the same half-open scanning technique that
nmap uses when passed the -sS flag.
Examples
None
telnet
Use the telnet command to log into another system by using telnet.
Command Mode: EXEC mode
Syntax
telnet [telnet-options] host [port]
Arguments
Parameter Description
telnet-options Specifies the type of tcptraceroute. Select from the following options:
-8 Specify an 8-bit data path. This causes an attempt to negotiate the
TELNET BINARY option on both input and output.
-E Stop any character from being recognized as an escape character.
-F Forward a forwardable copy of the local credentials to the remote
system.
-K Specify no automatic login to the remote system.
-L Specify an 8-bit data path on output. This causes the BINARY option
to be negotiated on output.
-S tos Set the IP type-of-service (TOS) option for the telnet connection
to the value tos, which can be a numeric TOS value (in decimal, or a hex
value preceded by 0x, or an octal value preceded by a leading 0) or, on
systems that support it, a symbolic TOS name found in the /etc/iptos file.
-X atype Disable the atype type of authentication.
-a Attempt automatic login. This sends the user name via the USER
variable of the ENVIRON option, if supported by the remote system. The
name used is that of the current user as returned by getlogin(2) if it
agrees with the current user ID; otherwise it is the name associated with
the user ID.
-c Disable the reading of the user’s .telnetrc file.
-d Set the initial value of the debug flag to TRUE.
-e escape char Set the initial telnet escape character to escape char. If
escape char is omitted, then there will be no escape character.
-f Forward a copy of the local credentials to the remote system.
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
terminal
Use the terminal command to set terminal parameters.
Command Mode: EXEC mode
Syntax
terminal length number-lines
terminal type terminal-type
no terminal type
terminal width number-chars
Arguments
Parameter Description
Defaults
The default terminal length is 24 rows.
The default terminal width is 80 characters.
The default terminal type is xterm.
Usage Guidelines
None
Examples
To set the line width to 120 characters for this terminal:
ECV (config) # terminal width 120
traceroute
Use the traceroute command to trace the route that packets take to a destination.
Command Mode: EXEC mode
Syntax
traceroute [traceroute-options] host [packet-length]
Arguments
Parameter Description
Parameter Description
-q nqueries
-r Bypass normal routing tables and send directly to a host on
an attached network. If the host is not on a directly-attached
network, an error is returned. Use this option to ping a local host
through an interface with no route through it (such as after the
interface was dropped by routed(8C)).
-s Use the specifiedIP address (usually given as an IP number,
not a hostname) as the source address in outbound probe
packets. On multi-homed hosts (those with more than one IP
address), this option can be used to force the source address to a
value other than the IP address of the interface the probe packet
is sent on. If the IP address is not one of this machine’s interface
addresses, an error is returned and nothing is sent. (See the -i flag
for another way to do this.)
-t Set type-of-service in probe packets to specified value (default
zero) which is a decimal integer between 0 to 255. This option
determines if different types-of-service result in different paths.
(If you are not running 4.4bsd, this may not matter since normal
network services like telnet and ftp does not control TOS). Not all
values of TOS are legal or meaningful - see IP spec for definitions.
If TOS value is changed by intermediate routers, (TOS=<value>!) is
printed once: value is the decimal value of the changed TOS byte.
-T Use TCP SYN for tracerouting.
-U Use UDP datagram (default) for tracerouting.
-V Print version info and exit.
-w Set wait time (seconds) for a response to a probe (default 5
sec.).
-z Set the time (in milliseconds) to pause between probes
(default 0). Some systems such as Solaris and routers such as
Ciscos rate limit icmp messages. A good value to use with this is
500 (e.g. 1/2 second).
host Specifies the name, alias, or Internet address of the remote host.
packet-length Specifies the packet length in bytes.
Defaults
The default packet length is 40 bytes.
Usage Guidelines
None
Examples
None
traffic-class
Use the traffic-class command to assign a name to a specific traffic class.
Use the no form of this command to remove a name from a traffic class.
Command Mode: Global Configuration mode
Syntax
traffic-class 1-10 name tc-name
no traffic-class traffic-class-id
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
username
Use the username command to configure user accounts.
Use the no form of the command to delete the specific user account.
Command Mode: Global configuration mode
Syntax
username username-text capability { admin | monitor }
no username username-text capability
username username-text disable
no username username-text disable
username username-text password
username username-text password 0 pwd-clear
username username-text password 7 pwd-encrypt
no username username-text
Arguments
Parameter Description
username Specifies the user ID to whom you want to grant capability. Use no
username-text username to delete this user account.
capability Grants admin user privileges to this user account. Use the no form of
admin the command to reset capability for this user account to the default.
capability Grants monitor user privileges to this user account. Use the no form of
monitor the command to reset capability for this user account to the default.
disable Disables the ability to login to this user account. Use the no form of the
command to re-enable this account.
password When followed immediately by a carriage return, specifies to prompt for
the login password rather than entering it on the command line.
password 0 Specifies a login password in clear text.
pwd-clear
password 7 Specifies a login password with an encrypted string. Once the password
pwd-encrypt is entered, the original characters are not recoverable by looking
through the history or scrolling back in the file.
Defaults
The default username and the default password are both admin.
Usage Guidelines
Some guidance about password creation:
• There should be at least one lower case letter and one upper case letter.
Examples
To delete the user account, franklin:
wccp
Use the wccp command to configure the Web Cache Communications Protocol (WCCP).
Use the no form of the command to remove a WCCP configuration.
Command Mode: Global Configuration mode
Syntax
wccp { enable | disable }
wccp multicast-ttl 1..15
wccp 51..255 admin { up | down }
wccp 51..255 assignment method { hash | mask | either }
wccp 51..255 assignment method { hash | mask | either } assignment-detail { lan-ingress
| wan-ingress }
wccp 51..255 assignment method { hash | mask | either } assignment-detail custom
hash-srcip { enable | disable } hash-dstip { enable | disable } hash-srcport { enable |
disable } hash-dstport { enable | disable } mask-srcip 32-bit-hex mask-dstcip 32-bit-hex
mask-srcport 16-bit-hex mask-dstport 16-bit-hex
wccp 51..255 compatibility-mode { ios | nexus }
wccp 51..255 force-l2-return { enable | disable }
wccp 51..255 forwarding-method { gre | l2 | either }
wccp 51..255 password pwd-text
wccp 51..255 router IP-addr protocol { tcp | udp } interface { lan0 | wan0 }
wccp 51..255 router IP-addr protocol { tcp | udp } interface { lan0 | wan0 } priority 0..255
[ forwarding-method { gre | l2 | either }]
wccp 51..255 router IP-addr protocol { tcp | udp } interface { lan0 | wan0 } priority 0..255
forwarding-method { gre | l2 | either } [ weight 0..65535 ]
wccp 51..255 router IP-addr protocol { tcp | udp } interface { lan0 | wan0 } priority 0..255
forwarding-method { gre | l2 | either } weight 0..65535 [ password pwd-text ]
wccp 51..255 weight 0..100
no wccp 51..255
Arguments
Parameter Description
Parameter Description
Parameter Description
Defaults
None
Usage Guidelines
To generate output for the assignment and detail arguments, enable WCCP after configura-
tion.
Examples
None
web
Use the web command to configure the Web-based management User Interface.
Command Mode: Global configuration mode
Syntax
web auto-logout number-minutes
no web auto-logout
web { enable | disable }
web http { enable | disable }
web https { enable | disable }
web session max 5. . . 50
no web session max
Arguments
Parameter Description
Defaults
The default auto-logout setting is 15 minutes.
Web HTTP is disabled.
Web HTTPS is enabled.
The default HTTP port is 80.
The default HTTPS port is 443.
The maximum number of simultaneous Web sessions for an appliance is 10.
Usage Guidelines
The acceptable range is between one minute and 1440 minutes (one day).
Examples
To set the maximum length of keyboard inactivity to 7 hours before automatic logout:
write
Use the write command to save or display the commands in the running configuration.
Command Mode: Privileged EXEC mode
Syntax
write memory
write terminal
Arguments
Parameter Description
Defaults
None
Usage Guidelines
When you execute write terminal command, the CLI displays commands in the following
categories:
Network interface configuration
Routing configuration
Other IP configuration
Logging configuration
AAA configuration
System network configuration
Tunnel creation
Tunnel configuration
Pass-through configuration
Network management configuration
Examples
None
Display Commands
This section describes the display commands. These commands provide status and perfor-
mance information.
show aaa
Use the show aaa command to display AAA authentication settings.
Command Mode: Privileged EXEC mode
Syntax
show aaa
Arguments
None
Defaults
None
Usage Guidelines
None
Examples
ECV (config) #
show access-list
Use the show access-list command to display all existing Access Control Lists (ACLs). You can
also specify a particular ACL to display.
Command Mode: Privileged EXEC mode
Syntax
show access-list
show access-list ACL-name
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
The following displays the rules in the ACL, acl1:
show alarms
Use the show alarms command to display the details for all outstanding alarms.
Command Mode: Privileged EXEC mode
Syntax
show alarms [ alarm-ID | outstanding | summary ]
Arguments
Parameter Description
Defaults
None
Usage Guidelines
If you use the show alarms command without an argument, the CLI displays all outstanding
alarms in detail.
Examples
To view a list of all alarm details:
Alarm Id: 1
Severity: MAJ
Type: EQU
Sequence Id: 5
Name: equipment_gateway_connect
Description: Datapath Gateway Connectivity Test Failed
Source: system
Time: 2007/06/11 17:40:19
Acknowledged: no
Active: yes
Clearable: no
Service Affect: yes
Alarm Id: 2
Severity: CRI
Type: TUN
Sequence Id: 4
Name: tunnel_down
Description: Tunnel state is Down
Source: HQ-to-BranchA
Time: 2007/06/11 17:38:22
Acknowledged: no
Active: yes
Clearable: no
Service Affect: yes
Alarm Id: 3
Severity: MAJ
Type: EQU
Sequence Id: 2
Name: equipment_if_link_down
Description: Network Interface Link Down
Source: wan0
Time: 2007/06/11 17:37:09
Acknowledged: no
Active: yes
Clearable: yes
Service Affect: yes
ECV (config) #
show application-builtin
Use the show application-builtin command to display all of the appliance’s built-in applica-
tions, along with their associated ports.
Command Mode: Privileged EXEC mode
Syntax
show application-builtin
Arguments
None
Defaults
None
Usage Guidelines
None
Examples
Application Ports
------------ ------
aol 5191-5193
aol_im 4443,5190
backweb 370
cifs_smb 139,445
cisco_skinny 2000-2001
citrix 1494,1604
cuseeme 7648-7652,24032
dns 53
show application-group
Use the show application-group command to display a list of all application groups, or to
display the contents of a specific application group.
Command Mode: Privileged EXEC mode
Syntax
show application-group
show application-group app-group
show application-group app-group debug
Arguments
Parameter Description
Defaults
None
Usage Guidelines
To get a list of the available application groups, enter the following command:
Examples
To display all existing application-groups within the appliance:
show application
Use the show application command to display custom (user-defined) applications, with their
associated information for protocol, port(s), DSCP, and VLAN.
Command Mode: Privileged EXEC mode
Syntax
show application
show application app-priority [ flows | stats ]
show application [ brief | stats ]
show application name app-name
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
To display all user-defined applications:
ECV (config) #
ECV (config) #
show arp
Use the show arp command to display the contents of the ARP cache.
Command Mode: Privileged EXEC mode
Syntax
show arp [ static ]
show arp statistics
Arguments
Parameter Description
static Limits the returned results to all statically configured ARP entries,
omitting the dynamic entries.
statistics Displays all ARP cache statistics
Defaults
None
Usage Guidelines
If you use the show arp command with no arguments, the CLI displays all static and dynamic
entries in the ARP cache.
Examples
show banner
Use show banner command to display the Message of the Day (MOTD) and Login message
banners.
Command Mode: EXEC mode
Syntax
show banner
Arguments
None
Defaults
None
Usage Guidelines
None
Examples
show bgp
Use the show bgp command to display BGP--related information.
Command Mode: Privileged EXEC mode
Syntax
show bgp neighbors
show bgp summary
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
show bootvar
Use show bootvar command to display installed system images and boot parameters.
Command Mode: EXEC mode
Syntax
show bootvar
Arguments
None
Defaults
None
Usage Guidelines
None
Examples
Partition 2:
hidalgo 2.0.0.0_15619 #1-dev 2007-06-07 20:00:58 x86_64 root@bigchief:unknown
show bridge
Use the show bridge command to display bridge information.
Command Mode: Privileged EXEC mode
Syntax
show bridge
show bridge [ brief | bridge-info ]
show bridge interface { lan0 | wan0 | lan1 | wan1 }
show bridge mac-address-table [ address ip-addr | bridge bridge-info | interface intf-name
]
Arguments
Parameter Description
Defaults
None
Usage Guidelines
MAC table information is not available in router mode.
Examples
To display bridge information for the lan1 interface:
show cdp
Use the show cdp command to display Cisco Discovery Protocol (CDP) information.
Command Mode: Privileged EXEC mode
Syntax
show cdp
show cdp neighbors [ detail ]
show cdp traffic
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
To show the basic CDP settings:
show cli
Use the show cli command to display Command Line Interface options.
Command Mode: EXEC mode
Syntax
show cli
Arguments
None
Defaults
None
Usage Guidelines
None
Examples
show clock
Use the show clock command to display system time and date.
Command Mode: EXEC mode
Syntax
show clock
Arguments
None
Defaults
None
Usage Guidelines
None
Examples
show cluster
Use the show cluster command to display cluster information.
Command Mode: Privileged EXEC mode
Syntax
show cluster
show cluster spcp
Arguments
Parameter Description
cluster Displays the cluster interface and the appliances in the cluster.
cluster spcp Displays the Silver Peak Communication Protocol statistics.
Defaults
None
Usage Guidelines
None
Examples
None
show configuration
Use the show configuration command to display the commands necessary to recreate the
active, saved configuration.
Command Mode: Privileged EXEC mode
Syntax
show configuration [ full ]
show configuration files [ filename ]
show configuration [ running | running full ]
show configuration [ download status | upload status ]
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
To display the commands to recreate the active, saved configuration -- excluding those com-
mands that set default values:
ECV > show configuration
To display the commands to recreate the active, saved configuration -- including the com-
mands that set default values:
ECV > show configuration full
To display the commands to recreate the current, running configuration -- excluding those
commands that set default values:
ECV > show configuration running
To display the commands to recreate the current, running configuration -- including the com-
mands that set default values:
ECV > show configuration running full
show excess-flow
Use the show excess-flow command to display information about flows exceeding the num-
ber that the appliance supports.
Command Mode: Privileged EXEC mode
Syntax
show excess-flow
show excess flow log
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
show files
Use the show files command to display a list of available files and/or display their contents.
Command Mode: EXEC mode (show files system command)
Command Mode: Privileged EXEC mode (all other show files commands)
Syntax
show files debug-dump [ filename ]
show files job upload status
show files stats [ filename ]
show files system
show files tcpdump
show files upload status
Arguments
Parameter Description
debug-dump [ Displays the list of debug-dump files. If you specify a filename, the CLI
filename ] displays the contents of the file.Debug dump files have the suffix, .tgz.
job upload Displays job-output file upload status. You would use this when running
status the file job upload command.
stats Displays a list of statistics reports. Debug dump files have the suffix,
.csv.
system Displays information on user-visible file systems.
tcpdump Displays tcpdump output files.
upload status Displays files upload status.
Defaults
None
Usage Guidelines
If you use the show files debug-dump command without the argument, the CLI displays a list
of available debug dump files.
Examples
To display a list of debug-dump files:
show flow-debug
Use the show flow-debug command to display the flow-debug summary for the specified
flow.
Command Mode: Privileged EXEC mode
Syntax
show flow-debug
show flow-debug description
show flow-debug detail
Arguments
Parameter Description
description Displays the names of the statistics, along with their definitions.
detail Displays the detailed state of the selected flow.
Defaults
None
Usage Guidelines
If multiple flows fit the criteria for the configured and enabled flow-debug command, then
only the first match displays.
Examples
None
show flow-export
Use the show flow-export command to display the NetFlow flow export configuration param-
eters.
Command Mode: Privileged EXEC mode
Syntax
show flow-export
Arguments
None
Defaults
None
Usage Guidelines
None
Examples
show flow-redirection
Use the show flow-redirection command to display the flow redirection state and statistics.
Command Mode: Privileged EXEC mode
Syntax
show flow-redirection
Arguments
None
Defaults
None
Usage Guidelines
None
Examples
ECV #
show hosts
Use the show hosts command to display hostname, DNS (Domain Name Server) configura-
tion, and static host mappings.
Command Mode: EXEC mode
Syntax
show hosts
Arguments
None
Defaults
None
Usage Guidelines
None
Examples
show iflabels
Use the show iflabels command to display the labels available for interfaces.
Command Mode: Privileged EXEC mode
Syntax
show iflabels [ lan-labels | wan-labels ]
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
To display information about the system images and boot parameters for the appliance,
Tallinn:
show image
Use the show image command to display information about system images and boot param-
eters.
Command Mode: EXEC mode
Syntax
show image [ status ]
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
To display information about the system images and boot parameters for the appliance,
ECV:
ECV (config) # show image
Installed images:
Partition 1:
hidalgo 2.0.0.0_15449 #1-dev 2007-05-30 06:12:39 x86_64 root@bigchief:unknown
Partition 2:
hidalgo 2.0.0.0_15619 #1-dev 2007-06-07 20:00:58 x86_64 root@bigchief:unknown
show interfaces
Use the show interfaces command to display the detailed running state for any or all inter-
faces.
Command Mode: Privileged EXEC mode
Syntax
show interfaces [ brief | configured ]
show interfaces [ intf-name ]
show interfaces intf-name [ brief | configured ]
Arguments
Parameter Description
Defaults
None
Usage Guidelines
For a list of all the available interfaces only, login in Privileged EXEC Mode or Global Configu-
ration Mode, and enter the following command:
ECV # show interfaces ?
Examples
To show the detailed running state for lan0:
RX bytes: 0
RX packets: 0
RX mcast packets: 0
RX discards: 0
RX errors: 0
RX overruns: 0
RX frame: 0
TX bytes: 0
TX packets: 0
TX discards: 0
TX errors: 0
TX overruns: 0
TX carrier: 0
TX collisions: 0
ECV (config) #
Syntax
show interfaces intf-name cdp
show interfaces intf-name cdp neighbors [ detail ]
Arguments
Parameter Description
interfaces Shows the CDP state for the specified interface, only.
intf-name
neighbors Displays the CDP neighbors that are connected to this interface.
neighbors Displays detailed information about CDP neighbors connected to this
detail interface.
Defaults
None
Usage Guidelines
None
Examples
To display basic CDP information about a network interface:
Syntax
show interfaces pass-through
show interfaces pass-through configured
show interfaces pass-through stats { flow [ traffic-class_1-10 ] | qos [ DSCP-value ] | traffic-
class }
Arguments
Parameter Description
Defaults
None
Usage Guidelines
This command’s functionality is the same as show pass-through .
Examples
To display the detailed state of pass-through traffic:
Tx Bytes: 258
Tx Pkts: 2
ECV (config) #
Traffic Class:
ID Priority Min Bw Max Bw Weight
1 5 500000 1000000 1
2 10 0 1000000 1
3 10 0 1000000 1
4 10 0 1000000 1
5 10 0 1000000 1
6 10 0 1000000 1
7 10 0 1000000 1
8 10 0 1000000 1
9 10 0 1000000 1
10 10 0 1000000 1
To display statistics for pass-through traffic with a DSCP marking of Best Effort:
RX processed packets: 0
RX process bytes: 0
RX invalid packets: 0
RX lost packets: 0
RX duplicate packets: 0
Syntax
show interfaces security
Arguments
None
Defaults
None
Usage Guidelines
None
Examples
Syntax
show interfaces tunnel [ brief | configured | peers | summary ]
show interfaces tunnel tunnel-name [ brief | configured | fastfail | ipsec [ status ] |
summary ]
show interfaces tunnel tunnel-name stats flow [traffic-class_1-10]
show interfaces tunnel tunnel-name stats ipsec
show interfaces tunnel tunnel-name stats latency
show interfaces tunnel tunnel-name stats qos [ DSCP-value ]
show interfaces tunnel tunnel-name stats traffic-class
show interfaces tunnel tunnel-name traceroute
Arguments
Parameter Description
Parameter Description
Defaults
The default DSCP value for QoS is be (Best Effort).
Usage Guidelines
If you don’t specify a tunnel, then the output includes information for all tunnels.
If you do specify a tunnel, then the output is limited to that tunnel.
This command is equivalent to the show tunnel command.
Examples
To display summary information for the tunnel, “HQ-to-Branch”:
Syntax
show interfaces virtual
Arguments
None
Defaults
None
Usage Guidelines
None
Examples
None
Syntax
show interfaces intf-name vrrp
show interfaces intf-name vrrp { brief | configured }
show interfaces intf-name vrrp 1-255 { brief | configured }
Arguments
Parameter Description
interfaces intf-name Shows the running state for the specified interface, only.
vrrp Displays the detailed running state for all VRRPs.
brief Displays brief running state info for all VRRPs.
configured Display configured info for all VRRPs on this interface.
1-255 A specific VRRP Group ID.
Defaults
None
Usage Guidelines
None
Examples
None
show ip-tracking
Use the show ip-tracking command to display IP tracking (IPSLA) information.
Command Mode: Privileged EXEC mode
Syntax
show ip-tracking ipsla-debug
show ip-tracking ipsla-if-debug
show ip-tracking ipsla-ip-debug
show ip-tracking manager
show ip-tracking summary
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
To view the IP Tracking manager table:
show ip
Use the show ip command to display IP-related information.
Command Mode: EXEC mode (show ip mgmt command)
Command Mode: Privileged EXEC mode (all other listed show ip commands)
Syntax
show ip
show ip datapath route
show ip default-gateway [ static ]
show ip mgmt-ip
show ip route [ static ]
Arguments
Parameter Description
Defaults
None
Usage Guidelines
If you’re using DHCP for mgmt0, then it displays:
Examples
To display the active default datapath route:
show licenses
Use the show licenses command to display the installed licenses and licensed features.
Command Mode: EXEC mode
Syntax
show licenses
Arguments
None
Defaults
None
Usage Guidelines
None
Examples
show log-files
Use the show log-files command to display the a specific log listing.
Command Mode: Privileged EXEC mode
Syntax
show log-files file-number [ list matching reg-exp ]
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
To see what log files are available:
To list log lines in the archived log file, “1”, that match the expression “system”:
Syntax
show log-list matching reg-exp
Arguments
Parameter Description
matching reg-exp Lists selected log lines that match the given expression.
Defaults
None
Usage Guidelines
None
Examples
None
show log
Use the show log command to view event log contents.
Command Mode: Privileged EXEC mode
Syntax
show log
show log alert
show log alert continuous
show log alert files [ file-number ]
show log alert files file-number [ matching reg-exp ]
show log alert matching reg-exp
show log continuous [ matching reg-exp ]
show log continuous not matching reg-exp
show log files [ file-number ]
show log files file-number matching reg-exp
show log files file-number not matching reg-exp
show log matching reg-exp
show log not matching reg-exp
Arguments
Parameter Description
Defaults
• Without arguments, the command, show log, displays the current event log.
• The command, show log alert, displays the current alerts log .
• The appliance keeps up to 30 archived alert log files. The older the file, the higher the file
number. The newest file has no number, and the most recent archived file is numbered,
“1”.
Usage Guidelines
To see what archived logs are available, use one of the following:
Examples
To show a list of all available alert log files:
To show all archived files that match the expression, “ping”, in any string:
r dumping
Jun 17 17:24:45 localhost rename_ifs: Mapping MAC: 00:0C:BD:00:7F:4A to interface name
: wan0
Jun 17 17:24:45 localhost rename_ifs: Mapping MAC: 00:0C:BD:00:7F:4B to interface name
: lan0
Jun 17 17:24:45 localhost rename_ifs: Mapping MAC: 00:E0:81:2F:85:98 to interface name
: mgmt0
Jun 17 17:24:45 localhost rename_ifs: Mapping MAC: 00:E0:81:2F:85:99 to interface name
: mgmt1
Jun 17 17:25:09 Tallinn sysd[798]: TID 1084225888: [sysd.NOTICE]: WDOG: Gateway
datapath ping test disabled when in BYPASS.
Jun 17 17:28:09 Tallinn sysd[798]: TID 1084225888: [sysd.ERR]: WDOG: Gateway datapath
ping test FAILED: 2
Jun 17 17:29:09 Tallinn sysd[798]: TID 1084225888: [sysd.ERR]: WDOG: Gateway datapath
ping test FAILED: 2
Jun 17 17:30:09 Tallinn sysd[798]: TID 1084225888: [sysd.ERR]: WDOG: Gateway datapath
ping test FAILED: 2
Jun 17 17:33:09 Tallinn sysd[798]: TID 1084225888: [sysd.ERR]: WDOG: Gateway datapath
ping test FAILED: 2
Jun 17 17:34:09 Tallinn sysd[798]: TID 1084225888: [sysd.ERR]: WDOG: Gateway datapath
ping test FAILED: 2
Jun 17 17:34:24 Tallinn cli[2411]: [cli.NOTICE]: user admin: Executing command:
show log matching ping
/tmp/messages_filtered-rvzGgG lines 39947-39958/39958 (END)
show logging
Use the show logging command to display the logging configuration.
Command Mode: EXEC mode
Syntax
show logging
show logging facilities
show logging files upload status
show logging tech-support
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
To view the logging configuration:
To monitor the progress of a logging files as it’s being copied from the appliance to a remote
host.
ECV (config) # show logging files upload status
File Upload Status
Name: -not set-
Status: Ready
Last Upload Status: The system is ready for upload
Start time: -not set-
End time: -not set-
Total upload size: 0
Transferred size: 0
Transfer rate: 0 bps
Percent complete: 0%
ECV (config) #
show memory
Use the show memory command to display system memory usage.
Command Mode: EXEC mode
Syntax
show memory
Arguments
None
Defaults
None
Usage Guidelines
None
Examples
show nat-map
Use the show nat-map command to display a list of all the existing NAT maps. The CLI also
indicates which NAT map is currently active.
Command Mode: Privileged EXEC mode
Syntax
show nat-map
show nat-map NAT-map-name
show nat-map NAT-map-name priority-value
show nat-map NAT-map-name priority-value stats
Arguments
Parameter Description
Defaults
None
Usage Guidelines
The default entry in any map is always priority 65535. The NAT map specifics are:
65535 match
Protocol: ip
IP version: any
Source: any
Destination: any
Application: any
DSCP: any
VLAN: any.any
set
NAT Type: no-nat
NAT direction: None
NAT IP: auto
Fallback: disabled
Examples
None
Syntax
show nat statistics
Arguments
None
Defaults
None
Usage Guidelines
None
Examples
ECV (config) #
show ntp
Use the show ntp command to display NTP settings.
Command Mode: EXEC mode
Syntax
show ntp
Arguments
None
Defaults
None
Usage Guidelines
None
Examples
show opt-map
Use the show opt-map command to display a list of all the existing optimization maps. The
CLI also indicates which optimization map is currently active.
Command Mode: Privileged EXEC mode
Syntax
show opt-map
show opt-map opt-map-name
show opt-map opt-map-name priority-value
show opt-map opt-map-name priority-value advanced-tcp
show opt-map opt-map-name priority-value flows
show opt-map opt-map-name priority-value stats
Arguments
Parameter Description
Defaults
None
Usage Guidelines
The default entries in any new opt map are as follows:
10010 match
Protocol: tcp
Source: any
Destination: any
Source Port: any
Destination Port: 445
DSCP: any
VLAN: any.any
set
Network Memory: balanced
Payload Comp: enable
Proxy Type: cifs
10020 match
Protocol: tcp
Source: any
Destination: any
Source Port: any
Destination Port: 443
DSCP: any
VLAN: any.any
set
Network Memory: balanced
Payload Comp: enable
Proxy Type: ssl
65535 match
Protocol: ip
Source: any
Destination: any
Application: any
DSCP: any
VLAN: any.any
set
Network Memory: balanced
Payload Comp: enable
Proxy Type: tcp-only
ECV (config) #
You can view an appliance’s list of optimization maps---and determine which map is active---
with the command, show opt-map:
Examples
To view a list of all the priorities included in the optimization map, “map1”, for this appliance:
To find out how many flows match priority “100” in the optimization map, “ginger” :
Total flows:1
ECV (config) #
To display the statistics for the optimization map, “O-2-3500-2”, in the appliance,’’eh-3500-1’’
:
Priority 100:
Match Succeeded: 38918
Permits: 38918 Denies: 0
Match Failed: 0
Source IP Address: 0 Destination IP Address: 0
Source Port: 0 Destination Port: 0
Application: 0 DSCP Markings: 0 Protocol: 0
Priority 65535:
Match Succeeded: 0
Permits: 0 Denies: 0
Match Failed: 0
Source IP Address: 0 Destination IP Address: 0
Source Port: 0 Destination Port: 0
Application: 0 DSCP Markings: 0 Protocol: 0
ECV (config) #
show overlay-common
Use the show overlay-common command to display common configuration for overlays.
Command Mode: Privileged EXEC mode
Syntax
show overlay-common internal-subnets
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
show overlay
Use the show overlay command to display detailed information any or all overlays.
Command Mode: Privileged EXEC mode
Syntax
show overlay
show overlay overlay-name
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
To display all existing overlays:
show pass-through
Use the show pass-through command to display detailed information about pass-through
traffic.
This command’s functionality is the same as show interfaces pass-through
Command Mode: Privileged EXEC mode
Syntax
show pass-through
show pass-through configured
show pass-through stats { flow [ traffic-class_1-10 ] | qos [ DSCP-value ] | traffic-class }
Arguments
Parameter Description
Defaults
The default traffic class is 1.
Usage Guidelines
Use the command without arguments to display a detailed state of pass-through traffic.
Examples
To display the pass-through QoS statistics:
RX processed packets: 0
RX process bytes: 0
RX invalid packets: 0
RX lost packets: 0
RX duplicate packets: 0
show proxy-arp
The show proxy-arp command displays the enabled Proxy ARP status of the specified inter-
face.
Command Mode: EXEC mode
Syntax
show proxy-arp intf-name
Arguments
Parameter Description
intf-name The interface upon which the show command displays status.
Defaults
None
Usage Guidelines
None.
Examples
This command enables Proxy ARP status on WAN2 interface.
show qos-map
Use the show qos-map command to display a list of all the existing QoS maps. The CLI also
indicates which QoS map is currently active.
Command Mode: Privileged EXEC mode
Syntax
show qos-map
show qos-map qos-map-name
show qos-map qos-map-name priority-value
show qos-map qos-map-name priority-value flows
show qos-map qos-map-name [ priority-value ] stats
Arguments
Parameter Description
Defaults
None
Usage Guidelines
The default entry in any map is always priority 65535. The QoS map specifics are:
65535 match
Protocol: ip
Source: any
Destination: any
Application: any
DSCP: any
set
Traffic Class: 1
LAN QoS: trust-lan
WAN QoS: trust-lan
Examples
To show all the priorities in the QoS map, “map1”:
20 match
Protocol: ip
Source: 172.20.20.0/24
Destination: any
Application: any
DSCP: any
set
Traffic Class: 3
LAN QoS: af12
WAN QoS: trust-lan
40 match
Protocol: ip
Source: any
Destination: any
Application: aol
DSCP: any
set
Traffic Class: 3
LAN QoS: trust-lan
WAN QoS: trust-lan
60 match
Protocol: ip
Source: any
Destination: any
Application: any
DSCP: be
set
65535 match
Protocol: ip
Source: any
Destination: any
Application: any
DSCP: any
set
Traffic Class: 1
LAN QoS: trust-lan
WAN QoS: trust-lan
ECV (config) #
To display information similar about flows that match the conditions specified by priority 100
in the map, “ginger”:
Total flows:1
show radius
Use the show radius command to display RADIUS settings for user authentication.
Command Mode: Privileged EXEC mode
Syntax
show radius
Arguments
None
Defaults
None
Usage Guidelines
None
Examples
To show any RADIUS settings for the appliance, Tallinn:
show route-map
Use the show route-map command to display a list of all the existing route maps. The CLI
also indicates which route map is currently active.
Command Mode: Privileged EXEC mode
Syntax
show route-map
show route-map route-map-name
show route-map route-map-name priority-value
show route-map route-map-name priority-value flows
show route-map route-map-name priority-value stats
Arguments
Parameter Description
Defaults
None
Usage Guidelines
The default entry in any map is always priority 65535. The route map specifics are:
Examples
To show all the priorities in the route map, “map1”:
20 match
Protocol: etherip
Source: 10.10.10.0/24
Destination: 10.10.20.0/24
DSCP: any
set
Primary Tunnel: HQ-to-BranchA
Down Action: pass-through
65535 match
Protocol: ip
Source: any
Destination: any
Application: any
DSCP: any
set
Pass-through: Shaped
ECV (config) #
Priority 20:
Match Succeeded: 3212721
Permits: 3212721 Denies: 0
Match Failed: 483
Source IP Address: 479 Destination IP Address: 4
Source Port: 0 Destination Port: 0
Application: 0 DSCP Markings: 0 Protocol: 0
ECV (config) #
To list all the current flows that match priority 20 for the route map, R-2-3500-2:
Total flows:0
eh-3500-1 (config) # show route-map R-2-3500-2 20 flows
Flows matching Route Map R-2-3500-2 prio:20:
1155 (L->W) sip:3.3.3.132 dip:3.3.5.132 ports:54317/7079
954 (L->W) sip:3.3.3.60 dip:3.3.5.60 ports:46082/7078
5169 (L->W) sip:3.3.3.79 dip:3.3.5.79 ports:17516/37693
647 (L->W) sip:3.3.3.74 dip:3.3.5.74 ports:30370/62999
4200 (L->W) sip:3.3.3.19 dip:3.3.5.19 ports:48779/1720
4193 (L->W) sip:3.3.3.115 dip:3.3.5.115 ports:50455/63239
3395 (L->W) sip:3.3.3.103 dip:3.3.5.103 ports:48726/1720
640 (L->W) sip:3.3.3.101 dip:3.3.5.101 ports:53199/58066
1368 (L->W) sip:3.3.3.16 dip:3.3.5.16 ports:18124/7079
35468 (L->W) sip:3.3.3.160 dip:3.3.5.160 ports:5060/5060
4475 (L->W) sip:3.3.3.143 dip:3.3.5.143 ports:32129/10581
1219 (L->W) sip:3.3.3.101 dip:3.3.5.101 ports:22793/7078
162 (L->W) sip:3.3.3.77 dip:3.3.5.77 ports:18249/26865
680 (L->W) sip:3.3.3.134 dip:3.3.5.134 ports:31366/38078
4414 (L->W) sip:3.3.3.31 dip:3.3.5.31 ports:8352/28438
120 (L->W) sip:3.3.3.132 dip:3.3.5.132 ports:8972/57105
4325 (L->W) sip:3.3.3.88 dip:3.3.5.88 ports:36950/36893
2354 (L->W) sip:3.3.3.148 dip:3.3.5.148 ports:7078/41540
show running-config
Use the show running-config command to display the current running configuration.
Command Mode: Privileged EXEC mode
Syntax
show running-config [ full ]
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
Syntax
show selftest disk
Arguments
None
Defaults
None
Usage Guidelines
None
Examples
To view disk self test results:
ECV (config) # show selftest disk
A reboot is required after disk selftest. Do you want to restart the appliance? (y/n)
show shaper
Use the show shaper command to display the shaper statistics.
Command Mode: Privileged EXEC mode
Syntax
show shaper
show shaper [ configured | stats ]
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
To view the shaper configuration :
show snmp
Use the show snmp command to display SNMP settings.
Command Mode: EXEC mode
Syntax
show snmp [ engine ID | user ]
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
To display the SNMP settings:
ECV (config) # show snmp
SNMP enabled: yes
System location: third rock from the sun
System contact: ET Fone-Hoam
Read-only community: public
Traps enabled: yes
Events for which traps will be sent:
raise-alarm: System Alarm has been raised
Trap sinks:
172.20.2.191
Enabled: yes
Type: traps version 1
Community: textstring
Interface listen enabled: yes
No Listen Interfaces.
ECV (config) #
show ssh
Use the show ssh command to display SSH settings for server and/or client.
Command Mode: EXEC mode (show ssh server)
Command Mode: Privileged EXEC mode (show ssh client)
Syntax
show ssh client
show ssh server [ host-keys ]
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
To show the SSH server settings for the appliance, “ECV”:
show ssl
Use the show ssl command to list host certificate data.
Command Mode: Privileged EXEC mode
Syntax
show ssl
Arguments
None
Defaults
None
Usage Guidelines
None
Examples
ECV #
Syntax
show stats tunnel tunnel-name
show stats tunnel tunnel-name { latency | qos-error | qos-error traffic-class-number } [
pretty ]
show stats tunnel tunnel-name [ pretty ]
show stats tunnel default
Arguments
Parameter Description
Parameter Description
qos-error traffic-class-number Displays tunnel QoS error statistics for the specified
traffic class.
Defaults
None
Usage Guidelines
None
Examples
To view optimized traffic, formatted for easier reading:
show stats
Use the show stats command to display various traffic statistics.
Command Mode: EXEC mode
Syntax
show stats app app-name { optimized-traffic | pass-through-unshaped | pass-through |
all-traffic } [ pretty ]
show stats dscp DSCP-value { optimized-traffic | pass-through-unshaped | pass-through
| all-traffic } [ pretty ]
show stats flow { tcpacc | tcpnoacc | nontcp } { optimized-traffic | pass-through-
unshaped | pass-through | all-traffic } [ pretty ]
show stats ftype { tcpacc | tcpnoacc | nontcp } { optimized-traffic | pass-through-
unshaped | pass-through | all-traffic } [ pretty ]
show stats tclass traffic-class-number { optimized-traffic | pass-through-unshaped | pass-
through | all-traffic } [ pretty ]
Arguments
Parameter Description
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
None
show subif
Use the show subif command to display sub-interface information.
Command Mode: EXEC mode
Syntax
show subif
Arguments
None
Defaults
None
Usage Guidelines
None
Examples
None
show subnet
Use the show subnet command to display subnet-related information.
Command Mode: Privileged EXEC mode
Syntax
show subnet
show subnet bgp [ ipv4 ]
show subnet configured
show subnet debug { module | peer }
show subnet learned
show subnet ospf [ ipv4 ]
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
To display configured rules:
show system
Use the show system command to display system configuration information.
Command Mode: Privileged EXEC mode
Syntax
show system
show system arp-table-size
show system auto-mac-configure
show system bypass
show system disk [ brief | smart-data ]
show system firmware
show system network-memory media
show system [ nexthops | wan-next-hops ]
show system peer-list
show system registration
show system smb-signing
show system ssl-ipsec-override
Arguments
Parameter Description
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
To display the configured system ARP table size:
Disk ID 1
Status: OK
Size: 232 GB
Serial Number: WD-WCAL73275682
ECV (config) #
ECV (config) ##
show tacacs
Use the show tacacs command to display TACACS+ settings.
Command Mode: Privileged EXEC mode
Syntax
show tacacs
Arguments
None
Defaults
None
Usage Guidelines
None
Examples
show tca
Use the show tca command to display threshold crossing alert settings.
Command Mode: EXEC mode
Syntax
show tca
show tca tca-name
Arguments
Parameter Description
tca tca-name Specifies which threshold crossing alert to display. The options are:
file-system-utilization How much of the file system space has
been used, expressed as a percentage.
lan-side-rx-throughput LAN--side Receive throughput, in
kilobits per second (kbps).
latency Tunnel latency, in milliseconds (ms).
loss-post-fec Tunnel loss, as tenths of a percent, after applying
Forward Error Correction (FEC).
loss-pre-fec Tunnel loss, as tenths of a percent, before applying
Forward Error Correction (FEC).
oop-post-poc Tunnel out-of-order packets, as tenths of a
percent, after applying Packet Order Correction (POC).
oop-pre-poc Tunnel out-of-order packets, as tenths of a
percent, before applying Packet Order Correction (POC).
optimized flows Total number of optimized flows.
reduction Tunnel reduction, in percent (%).
total-flows Total number of flows.
utilization Tunnel utilization, as a percent (%).
wan-side-tx-throughput WAN--side transmit throughput, in
kilobits per second (kbps).
Defaults
None
Usage Guidelines
None
Examples
To display a summary of what the defaults are for the various threshold crossing alerts (this
information is static because it is not the same as reporting the current state of any alert):
show terminal
Use the show terminal command to display the current terminal settings.
Command Mode: EXEC mode
Syntax
show terminal
Arguments
None
Defaults
None
Usage Guidelines
None
Examples
show tunnel
Use the show tunnel command to display the detailed running state for all tunnels.
An equivalent command is show interfaces tunnel.
Command Mode: Privileged EXEC mode
Syntax
show tunnel [ brief | configured | peers | summary ]
show tunnel tunnel-name [ brief | configured | fastfail | ipsec [ status ] | summary |
traceroute ]
show tunnel tunnel-name stats flow [ traffic-class_1-10 ]
show tunnel tunnel-name stats ipsec
show tunnel tunnel-name stats latency
show tunnel tunnel-name stats qos [ DSCP-value ]
show tunnel tunnel-name stats traffic-class
show tunnel stats cifs
show tunnel stats ssl
Arguments
Parameter Description
Parameter Description
stats qos Displays the default QoS statistics for the designated tunnel. The default
DSCP value is be (best effort).
stats qos Displays the QoS statistics for the specified DSCP value in the designated
DSCP-value tunnel.
stats ssl Displays system-wide SSL statistics.
stats Displays the traffic class statistics for the designated tunnel.
traffic-class
summary Displays summary information for the tunnel(s).
traceroute Displays traceroute information for this tunnel.
tunnel Displays the detailed running state for this tunnel.
tunnel-name
Defaults
The default DSCP value for QoS is be (Best Effort).
Usage Guidelines
If you don’t specify a tunnel, then the output includes information for all tunnels. If you do
specify a tunnel, then the output is limited to that tunnel.
Examples
To display the IPSec status for the tunnel, “tunnel-2-7501”, in appliance, “eh-3500-1”:
To display the statistics for Traffic Class 41 for “t1”, in appliance, “eh-3500-1”:
show usernames
Use the show usernames command to display a list of user accounts.
Command Mode: Privileged EXEC mode
Syntax
show usernames
Arguments
None
Defaults
None
Usage Guidelines
None
Examples
show users
Use the show users command to display a list of the users that are currently logged in to the
appliance.
Command Mode: EXEC mode
Syntax
show users
show users history [ username username-text ]
Arguments
Parameter Description
Defaults
None
Usage Guidelines
None
Examples
To display which users are currently logged in:
show version
Use the show version command to display version information for current system image.
Command Mode: EXEC mode
Syntax
show version [ concise ]
Arguments
Parameter Description
Defaults
None
Usage Guidelines
To display verbose version information, use the show version command without an argument
.
Examples
To display version information for the current system image:
show vlan
Use the show vlan command to display VLAN information.
Command Mode: Privileged EXEC mode
Syntax
show vlan
Arguments
None
Defaults
None
Usage Guidelines
None
Examples
This is in Standard 4-port mode with two IPs:
show vrrp
Use the show vrrp command to display VRRP information for all instances on all configured
interfaces.
Command Mode: Privileged EXEC mode
Syntax
show vrrp [ brief | configured ]
Arguments
Parameter Description
brief Displays brief running state information for all VRRP instances.
configured Displays configured information for all VRRP instances.
Defaults
None
Usage Guidelines
The show vrrp command with no argument displays VRRP information for all instances on all
interfaces.
Examples
show wccp
Use the show wccp command to display Web Cache Communications Protocol (WCCP) set-
tings.
Command Mode: Privileged EXEC mode
Syntax
show wccp
show wccp 51-255
show wccp [ configured | detail ]
show wccp 51-255 [ assignment | configured | detail ]
Arguments
Parameter Description
Defaults
None
Usage Guidelines
Use the show wccp command without an argument to display global WCCP information.
Examples
To show an appliance’s global WCCP information:
Appliance information:
Appliance Identifier: 172.30.2.34
Protocol Version:
Multicast TTL: 5
Admin State: Disabled
ECV (config) #
show web
Use the show web command to display Web user interface configuration and status.
Command Mode: Privileged EXEC mode
Syntax
show web
Arguments
None
Defaults
None
Usage Guidelines
None
Examples
show whoami
Use the show whoami command to display the identity and capabilities of the current user.
Command Mode: EXEC mode
Syntax
show whoami
Arguments
None
Defaults
None
Usage Guidelines
None
Examples