Fastpath NOS CLI Guide Fastpath NOS CLI Guide Table of Contents

Total Page:16

File Type:pdf, Size:1020Kb

Fastpath NOS CLI Guide Fastpath NOS CLI Guide Table of Contents Fastpath NOS CLI guide Fastpath NOS CLI guide Table of Contents 1. Safety Information .............................................................................................................. 1 1.1. Conventions ............................................................................................................ 2 1.2. Acronyms ................................................................................................................ 3 1.3. Safety Information ................................................................................................... 6 1.3.1. Important Safety Instructions ......................................................................... 6 1.4. Disclaimer ............................................................................................................... 7 2. Console and Telnet Administration Interface ........................................................................ 8 2.1. Local Console Management .................................................................................... 9 2.2. Set Up your Switch Using Console Access ............................................................. 10 2.3. Set Up your Switch Using Telnet Access ................................................................ 11 2.4. Accessing the CLI ................................................................................................. 12 3. Introduction ...................................................................................................................... 13 4. Using the Command-Line Interface ................................................................................... 14 4.1. Command Syntax .................................................................................................. 15 4.2. Command Conventions .......................................................................................... 16 4.3. Common Parameter Values ................................................................................... 17 4.4. Slot/Port Naming Convention ................................................................................. 18 4.5. Using the No Form of a Command ........................................................................ 19 4.6. Executing Show Commands .................................................................................. 20 4.7. CLI Output Filtering ............................................................................................... 21 5. Fastpath modules ............................................................................................................. 22 5.1. Command Modes .................................................................................................. 23 5.2. Command Completion and Abbreviation ................................................................. 26 5.3. CLI Error Messages .............................................................................................. 27 5.4. CLI Line-Editing Conventions ................................................................................. 28 5.5. Using CLI Help ..................................................................................................... 29 5.6. Accessing the CLI ................................................................................................. 30 6. Management Commands .................................................................................................. 31 6.1. Network Interface Commands ................................................................................ 32 6.1.1. enable (Privileged EXEC access) ................................................................ 32 6.1.2. do (Privileged EXEC commands) ................................................................. 32 6.1.3. network parms ............................................................................................ 32 6.1.4. network protocol ......................................................................................... 32 6.1.5. network protocol dhcp ................................................................................. 33 6.1.6. show network ............................................................................................. 33 6.2. IPv6 Management Commands ............................................................................... 35 6.2.1. network ipv6 enable .................................................................................... 35 6.2.1.1. no network ipv6 enable .................................................................... 35 6.2.2. network ipv6 neighbor ................................................................................. 35 6.2.2.1. no network ipv6 neighbor ................................................................. 36 6.2.3. network ipv6 address .................................................................................. 36 6.2.3.1. no network ipv6 address .................................................................. 36 6.2.4. network ipv6 gateway ................................................................................. 36 6.2.4.1. no network ipv6 gateway .................................................................. 37 6.2.5. show network ipv6 neighbors ...................................................................... 37 6.2.6. show network ipv6 dhcp statistics ................................................................ 37 6.2.7. clear network ipv6 dhcp statistics ................................................................ 39 6.2.8. ping ipv6 .................................................................................................... 39 6.2.9. ping ipv6 interface ...................................................................................... 39 iii Fastpath NOS CLI guide 6.2.10. traceroute ................................................................................................. 40 6.2.11. traceroute ipv6 .......................................................................................... 42 6.3. Console Port Access Commands ........................................................................... 43 6.3.1. configuration ............................................................................................... 43 6.3.2. line ............................................................................................................. 43 6.3.3. serial baudrate ........................................................................................... 43 6.3.3.1. no serial baudrate ............................................................................ 43 6.3.4. serial timeout .............................................................................................. 44 6.3.4.1. no serial timeout .............................................................................. 44 6.3.5. show serial ................................................................................................. 44 6.4. Telnet Commands ................................................................................................. 45 6.4.1. ip telnet server enable ................................................................................ 45 6.4.1.1. no ip telnet server enable ................................................................. 45 6.4.2. telnet .......................................................................................................... 45 6.4.3. transport input telnet ................................................................................... 45 6.4.3.1. no transport input telnet ................................................................... 46 6.4.4. transport output telnet ................................................................................. 46 6.4.4.1. no transport output telnet ................................................................. 46 6.4.5. session-limit ................................................................................................ 46 6.4.5.1. no session-limit ................................................................................ 46 6.4.6. session-timeout ........................................................................................... 47 6.4.6.1. no session-timeout ........................................................................... 47 6.4.7. telnetcon maxsessions ................................................................................ 47 6.4.7.1. no telnetcon maxsessions ................................................................ 47 6.4.8. telnetcon timeout ........................................................................................ 47 6.4.8.1. no telnetcon timeout ......................................................................... 48 6.4.9. show telnet ................................................................................................. 48 6.4.10. show telnetcon ......................................................................................... 48 6.5. Secure Shell Commands ....................................................................................... 50 6.5.1. ip ssh ......................................................................................................... 50 6.5.2. ip ssh protocol ............................................................................................ 50 6.5.3. ip ssh server enable ................................................................................... 50 6.5.3.1. no ip ssh server enable ...................................................................
Recommended publications
  • Cisco Telepresence Codec SX20 API Reference Guide
    Cisco TelePresence SX20 Codec API Reference Guide Software version TC6.1 April 2013 Application Programmer Interface (API) Reference Guide Cisco TelePresence SX20 Codec D14949.03 SX20 Codec API Reference Guide TC6.1, April 2013. 1 Copyright © 2013 Cisco Systems, Inc. All rights reserved. Cisco TelePresence SX20 Codec API Reference Guide What’s in this guide? Table of Contents Introduction Using HTTP ....................................................................... 20 Getting status and configurations ................................. 20 TA - ToC - Hidden About this guide .................................................................. 4 The top menu bar and the entries in the Table of Sending commands and configurations ........................ 20 text anchor User documentation ........................................................ 4 Contents are all hyperlinks, just click on them to Using HTTP POST ......................................................... 20 go to the topic. About the API Feedback from codec over HTTP ......................................21 Registering for feedback ................................................21 API fundamentals ................................................................ 9 Translating from terminal mode to XML ......................... 22 We recommend you visit our web site regularly for Connecting to the API ..................................................... 9 updated versions of the user documentation. Go to: Password ........................................................................
    [Show full text]
  • IEEE 802.1Aq Standard, Is a Computer Networking Technology Intended to Simplify the Creation and Configuration of Networks, While Enabling Multipath Routing
    Brought to you by: Brian Miller Yuri Spillman - Specified in the IEEE 802.1aq standard, is a computer networking technology intended to simplify the creation and configuration of networks, while enabling multipath routing. - Link State Protocol - Based on IS-IS -The standard is the replacement for the older spanning tree protocols such as IEEE 802.1D, IEEE 802.1w, and IEEE 802.1s. These blocked any redundant paths that could result in layer 2(Data Link Layer), whereas IEEE 802.1aq allows all paths to be active with multiple equal cost paths, and provides much larger layer 2 topologies. 802.1aq is an amendment to the "Virtual Bridge Local Area Networks“ and adds Shortest Path Bridging (SPB). Shortest path bridging, which is undergoing IEEE’s standardization process, is meant to replace the spanning tree protocol (STP). STP was created to prevent bridge loops by allowing only one path between network switches or ports. When a network segment goes down, an alternate path is chosen and this process can cause unacceptable delays in a data center network. The ability to use all available physical connectivity, because loop avoidance uses a Control Plane with a global view of network topology Fast restoration of connectivity after failure, again because of Link State routing's global view of network topology Under failure, the property that only directly affected traffic is impacted during restoration; all unaffected traffic just continues Ideas are rejected by IEEE 802.1. accepted by the IETF and the TRILL WG is formed. Whoops, there is a problem. They start 802.1aq for spanning tree based shortest path bridging Whoops, spanning tree doesn’t hack it.
    [Show full text]
  • TRILL Deployment Nears
    TRILL Deployment Nears August 3rd – 5th 2010 Introduction An exciting milestone on the road to TRILL deployment occurred from August 3rd to 5th 2010 at the University of New Hampshire InterOperability Laboratory (UNH-IOL), as a group of companies attended the first multi-vendor TRILL plugfest. The plugfest was successful in demonstrating interoperability between TRILL devices. It was a first step towards wide deployment of TRILL and valuable knowledge for increasing TRILL interoperability was gained through the event. The UNH-IOL is excited to be hosting another TRILL plugfest in Q1 of 2011. This whitepaper discusses the TRILL protocol to help inform potential TRILL equipment customers about the benefits of adoption of TRILL in their networks along with describing what this plugfest means for those looking towards the deployment of TRILL. The Need for a Replacement for Spanning Tree In 2002, the Beth Israel Deaconess Medical Center in Boston, MA had a massive system failure caused by a Spanning Tree Protocol loop (1). This led Radia Perlman, the inventor of Spanning Tree Protocol (2), and others to come up with the concept of a “Routing Bridge” (RBridge) (3) and the protocol TRansparent Interconnection of Lots of Links (TRILL). Most of TRILL, the intended replacement for Spanning Tree Protocol, has been approved as a standard and the last part recently went into working group last call, meaning full standardization is nearly complete. For now, let’s see how Spanning Tree contributed to “one of the worst health-care IT disasters ever.” i The first sign that something was wrong was when it started to take several seconds to send and receive e-mail at the medical center.
    [Show full text]
  • Blue Coat SGOS Command Line Interface Reference, Version 4.2.3
    Blue Coat® Systems ProxySG™ Command Line Interface Reference Version SGOS 4.2.3 Blue Coat ProxySG Command Line Interface Reference Contact Information Blue Coat Systems Inc. 420 North Mary Ave Sunnyvale, CA 94085-4121 http://www.bluecoat.com/support/contact.html [email protected] http://www.bluecoat.com For concerns or feedback about the documentation: [email protected] Copyright© 1999-2006 Blue Coat Systems, Inc. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled, disassembled, published or distributed, in whole or in part, or translated to any electronic medium or other means without the written consent of Blue Coat Systems, Inc. All right, title and interest in and to the Software and documentation are and shall remain the exclusive property of Blue Coat Systems, Inc. and its licensors. ProxySG™, ProxyAV™, CacheOS™, SGOS™, Spyware Interceptor™, Scope™, RA Connector™, RA Manager™, Remote Access™ are trademarks of Blue Coat Systems, Inc. and CacheFlow®, Blue Coat®, Accelerating The Internet®, WinProxy®, AccessNow®, Ositis®, Powering Internet Management®, The Ultimate Internet Sharing Solution®, Permeo®, Permeo Technologies, Inc.®, and the Permeo logo are registered trademarks of Blue Coat Systems, Inc. All other trademarks contained in this document and in the Software are the property of their respective owners. BLUE COAT SYSTEMS, INC. DISCLAIMS ALL WARRANTIES, CONDITIONS OR OTHER TERMS, EXPRESS OR IMPLIED, STATUTORY OR OTHERWISE, ON SOFTWARE AND DOCUMENTATION FURNISHED HEREUNDER INCLUDING WITHOUT LIMITATION THE WARRANTIES OF DESIGN, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL BLUE COAT SYSTEMS, INC., ITS SUPPLIERS OR ITS LICENSORS BE LIABLE FOR ANY DAMAGES, WHETHER ARISING IN TORT, CONTRACT OR ANY OTHER LEGAL THEORY EVEN IF BLUE COAT SYSTEMS, INC.
    [Show full text]
  • LAB MANUAL for Computer Network
    LAB MANUAL for Computer Network CSE-310 F Computer Network Lab L T P - - 3 Class Work : 25 Marks Exam : 25 MARKS Total : 50 Marks This course provides students with hands on training regarding the design, troubleshooting, modeling and evaluation of computer networks. In this course, students are going to experiment in a real test-bed networking environment, and learn about network design and troubleshooting topics and tools such as: network addressing, Address Resolution Protocol (ARP), basic troubleshooting tools (e.g. ping, ICMP), IP routing (e,g, RIP), route discovery (e.g. traceroute), TCP and UDP, IP fragmentation and many others. Student will also be introduced to the network modeling and simulation, and they will have the opportunity to build some simple networking models using the tool and perform simulations that will help them evaluate their design approaches and expected network performance. S.No Experiment 1 Study of different types of Network cables and Practically implement the cross-wired cable and straight through cable using clamping tool. 2 Study of Network Devices in Detail. 3 Study of network IP. 4 Connect the computers in Local Area Network. 5 Study of basic network command and Network configuration commands. 6 Configure a Network topology using packet tracer software. 7 Configure a Network topology using packet tracer software. 8 Configure a Network using Distance Vector Routing protocol. 9 Configure Network using Link State Vector Routing protocol. Hardware and Software Requirement Hardware Requirement RJ-45 connector, Climping Tool, Twisted pair Cable Software Requirement Command Prompt And Packet Tracer. EXPERIMENT-1 Aim: Study of different types of Network cables and Practically implement the cross-wired cable and straight through cable using clamping tool.
    [Show full text]
  • RFS7000 Series RF Switch CLI Reference Guide MOTOROLA and the Stylized M Logo Are Registered in the US Patent & Trademark Office
    RFS7000 Series RF Switch CLI Reference Guide MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. Symbol is a registered trademark of Symbol Technologies, Inc. All other product or service names are the property of their respective owners. © Motorola, Inc. 2007. All rights reserved. About This Guide This preface introduces the RFS7000 Series CLI Reference Guide and contains the following sections: • Who Should Use this Guide • How to Use this Guide • Conventions Used in this Guide • Motorola Service Information Who Should Use this Guide The RFS7000 Series CLI Reference Guide is intended for system administrators responsible for the implementing, configuring, and maintaining the RFS7000 using the switch command line interface (CLI). It also serves as a reference for configuring and modifying most common system settings. The administrator must be familiar with wireless technologies, network concepts, ethernet concepts, as well as IP addressing and SNMP concepts. How to Use this Guide This guide helps you implement, configure, and administer the RFS7000 Switch and associated network elements. This guide is organized into the following sections: Table 1 Quick Reference on How This Guide Is Organized Chapter Jump to this section if you want to... Chapter 1, “Introduction” Review the overall feature-set of the RFS7000 Switch, as well as the many configuration options available. Chapter 2, “Common Commands” Summarize the commands common amongst many contexts and instance contexts within the RFS7000 Switch CLI. Chapter 3, “User Exec Commands” Summarize the User Exec commands within the RFS7000 Switch CLI. Chapter 4, “Privileged Exec Commands” Summarize the Priv Exec commands within the RFS7000 Switch CLI.
    [Show full text]
  • Stinger® Administration Guide
    Stinger® Administration Guide Part Number: 363-217-010R9.9.1 For software version 9.9.1 June, 2006 Copyright © 2002-2006 Lucent Technologies Inc. All rights reserved. This material is protected by the copyright laws of the United States and other countries. It may not be reproduced, distributed, or altered in any fashion by any entity (either internal or external to Lucent Technologies), except in accordance with applicable agreements, contracts, or licensing, without the express written consent of Lucent Technologies. For permission to reproduce or distribute, please email your request to [email protected]. Notice Every effort was made to ensure that the information in this document was complete and accurate at the time of printing, but information is subject to change. For latest information, refer to online product documentation at www.lucent.com/support. This product may utilize zlib for the execution of certain compression functions. (C) 1995-2002 Jean-loup Gailly and Mark Adler. Provided "AS IS" without warranty of any kind. European Community (EC) RTTE compliance Hereby, Lucent Technologies, declares that the equipment documented in this publication is in compliance with the essential require- ments and other relevant provisions of the Radio and Telecommunications Technical Equipment (RTTE) Directive 1999/5/EC. To view the official Declaration of Conformity certificate for this equipment, according to EN 45014, access the Lucent INS online documentation library at http://www.lucentdocs.com/ins. Safety, compliance, and warranty Information Before handling any Lucent Access Networks hardware product, read the Edge Access and Broadband Access Safety and Compliance Guide included in your product package.
    [Show full text]
  • Colasoft Capsa
    Technical Specifications (Capsa Standard) HP Unix Nettl Packet File (*.TRCO; TRC1) Deployment Environment Libpcap (Wireshark, Tcpdump, Ethereal, etc.) Shared networks (*.cap; *pcap) Switched networks (managed switches and Wireshark (Wireshark, etc.) (*.pcapang; unmanaged switches) *pcapang.gz; *.ntar; *.ntar.gz) Network segments Microsoft Network Monitor 1.x 2.x (*.cap) Proxy server Novell LANalyer (*.tr1) Network Instruments Observer V9.0 (*.bfr) Supported Network Types NetXRay 2.0, and Windows Sniffer (*.cap) Ethernet Sun_Snoop (*.Snoop) Fast Ethernet Visual Network Traffic Capture (*.cap) Gigabit Ethernet Supported Packet File Formats to Export Supported Network Adapters Accellent 5Views Packet File (*.5vw) 10/100/1000 Mbps Ethernet adapters Colasoft Packet File (V3) (*.rapkt) Colasoft Packet File (*.cscpkt) System Requirements Colasoft Raw Packet File (*.rawpkt) Operating Systems Colasoft Raw Packet File (V2) (*.rawpkt) Windows Server 2008 (64-bit) EtherPeek Packet File (V9) (*.pkt) Windows Server 2012 (64-bit)* HP Unix Nettl Packet File (*.TRCO; *.TRC1) Windows Vista (64-bit) Libpcap (Wireshark, Tcpdump, Ethereal, etc.) Windows 7 (64-bit) (*.cap; *pcap) Windows 8/8.1 (64-bit) Wireshark (Wireshark, etc.) (*.pcapang; Windows 10 Professional (64-bit) *pcapang.gz; *.ntar; *.ntar.gz) Microsoft Network Monitor 1.x 2.x (*.cap) * indicates that Colasoft Packet Builder is not Novell LANalyer (*.tr1) compatible with this operating system. NetXRay 2.0, and Windows Sniffer (*.cap) Minimum Sun_Snoop (*.Snoop)
    [Show full text]
  • 7956 Y. Li Category: Standards Track Huawei ISSN: 2070-1721 A
    Internet Engineering Task Force (IETF) W. Hao Request for Comments: 7956 Y. Li Category: Standards Track Huawei ISSN: 2070-1721 A. Qu MediaTec M. Durrani Equinix Inc. P. Sivamurugan IP Infusion September 2016 Transparent Interconnection of Lots of Links (TRILL) Distributed Layer 3 Gateway Abstract The base TRILL (Transparent Interconnection of Lots of Links) protocol provides optimal pair-wise data frame forwarding for Layer 2 intra-subnet traffic but not for Layer 3 inter-subnet traffic. A centralized gateway solution is typically used for Layer 3 inter- subnet traffic forwarding but has the following issues: 1. Sub-optimum forwarding paths for inter-subnet traffic. 2. A centralized gateway that may need to support a very large number of gateway interfaces in a Data Center, one per tenant per Data Label used by that tenant, to provide interconnect functionality for all the Layer 2 Virtual Networks in a TRILL campus. 3. A traffic bottleneck at the gateway. This document specifies an optional TRILL distributed gateway solution that resolves these centralized gateway issues. Status of This Memo This is an Internet Standards Track document. This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Further information on Internet Standards is available in Section 2 of RFC 7841. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc7956.
    [Show full text]
  • Freebsd Command Reference
    FreeBSD command reference Command structure Each line you type at the Unix shell consists of a command optionally followed by some arguments , e.g. ls -l /etc/passwd | | | cmd arg1 arg2 Almost all commands are just programs in the filesystem, e.g. "ls" is actually /bin/ls. A few are built- in to the shell. All commands and filenames are case-sensitive. Unless told otherwise, the command will run in the "foreground" - that is, you won't be returned to the shell prompt until it has finished. You can press Ctrl + C to terminate it. Colour code command [args...] Command which shows information command [args...] Command which modifies your current session or system settings, but changes will be lost when you exit your shell or reboot command [args...] Command which permanently affects the state of your system Getting out of trouble ^C (Ctrl-C) Terminate the current command ^U (Ctrl-U) Clear to start of line reset Reset terminal settings. If in xterm, try Ctrl+Middle mouse button stty sane and select "Do Full Reset" exit Exit from the shell logout ESC :q! ENTER Quit from vi without saving Finding documentation man cmd Show manual page for command "cmd". If a page with the same man 5 cmd name exists in multiple sections, you can give the section number, man -a cmd or -a to show pages from all sections. man -k str Search for string"str" in the manual index man hier Description of directory structure cd /usr/share/doc; ls Browse system documentation and examples. Note especially cd /usr/share/examples; ls /usr/share/doc/en/books/handbook/index.html cd /usr/local/share/doc; ls Browse package documentation and examples cd /usr/local/share/examples On the web: www.freebsd.org Includes handbook, searchable mailing list archives System status Alt-F1 ..
    [Show full text]
  • The Linux Command Line
    The Linux Command Line Second Internet Edition William E. Shotts, Jr. A LinuxCommand.org Book Copyright ©2008-2013, William E. Shotts, Jr. This work is licensed under the Creative Commons Attribution-Noncommercial-No De- rivative Works 3.0 United States License. To view a copy of this license, visit the link above or send a letter to Creative Commons, 171 Second Street, Suite 300, San Fran- cisco, California, 94105, USA. Linux® is the registered trademark of Linus Torvalds. All other trademarks belong to their respective owners. This book is part of the LinuxCommand.org project, a site for Linux education and advo- cacy devoted to helping users of legacy operating systems migrate into the future. You may contact the LinuxCommand.org project at http://linuxcommand.org. This book is also available in printed form, published by No Starch Press and may be purchased wherever fine books are sold. No Starch Press also offers this book in elec- tronic formats for most popular e-readers: http://nostarch.com/tlcl.htm Release History Version Date Description 13.07 July 6, 2013 Second Internet Edition. 09.12 December 14, 2009 First Internet Edition. 09.11 November 19, 2009 Fourth draft with almost all reviewer feedback incorporated and edited through chapter 37. 09.10 October 3, 2009 Third draft with revised table formatting, partial application of reviewers feedback and edited through chapter 18. 09.08 August 12, 2009 Second draft incorporating the first editing pass. 09.07 July 18, 2009 Completed first draft. Table of Contents Introduction....................................................................................................xvi
    [Show full text]
  • Introduction to Software Defined Networking (SDN)
    IntroductionIntroduction toto SoftwareSoftware DefinedDefined . NetworkingNetworking (SDN)(SDN) SDN=Standard Southbound API SDN = Centralization of control plane SDN=OpenFlow SDN = Separation of Control and Data Planes Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides and audio/video recordings of this class lecture are at: http://www.cse.wustl.edu/~jain/cse570-13/ Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ ©2013 Raj Jain 16-1 OverviewOverview 1. What is SDN? 2. Alternative APIs: XMPP, PCE, ForCES, ALTO 3. RESTful APIs and OSGi Framework 4. OpenDaylight SDN Controller Platform and Tools Note: This is the third module of four modules on OpenFlow, OpenFlow Controllers, SDN and NFV in this course. Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ ©2013 Raj Jain 16-2 OriginsOrigins ofof SDNSDN SDN originated from OpenFlow Centralized Controller Easy to program Change routing policies on the fly Software Defined Network (SDN) Initially, SDN= Application … Application Separation of Control and Data Northbound Plane API Network Controller Centralization of Control Southbound API OpenFlow OpenFlow to talk to the data plane Switch Switch … Switch Now the definition has changed significantly. Overlay (Tunnels) Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ ©2013 Raj Jain 16-3 WhatWhat isis SDN?SDN? SDN=OpenFlow SDN=Standard SDN = Centralization Southbound API of control plane SDN = Separation of Control and Data Planes All of these are mechanisms. SDN is not a mechanism. It is a framework to solve a set of problems Many solutions Washington University in St.
    [Show full text]