CLI Reference Guide for Arubaos-CX, Arubaos-Switch, Comware and Cisco IOS

Total Page:16

File Type:pdf, Size:1020Kb

CLI Reference Guide for Arubaos-CX, Arubaos-Switch, Comware and Cisco IOS CLI Reference Guide for ArubaOS-CX, ArubaOS-Switch, Comware and Cisco IOS Published: November 2018 Rev: 4 Table of Contents Introduction ..................................................................................................................................................................................... 3 Using This Guide ............................................................................................................................................................................ 4 Comware Differences .............................................................................................................................................................. 4 Navigation Differences Among CLIs .................................................................................................................................. 4 Configuration Differences Among CLIs ............................................................................................................................ 4 Terminology Differences ........................................................................................................................................................ 6 Disclaimer ......................................................................................................................................................................................... 6 Comparing View and Configuration Prompts .................................................................................................................... 6 Comparing Frequently Used Commands ............................................................................................................................. 7 Chapter 1 Basic Switch Management ................................................................................................................................... 8 Management Access CLI comparision .............................................................................................................................. 8 Management Access Configurable options .................................................................................................................... 8 Configuration Access CLI comparision ........................................................................................................................... 10 Configuration Access Configurable options ................................................................................................................. 10 Console and Virtual Terminal Access—Timeout CLI comparision ........................................................................ 12 Console and Virtual Terminal Access—Timeout Configurable options ............................................................. 12 Reload & Timed Reload CLI comparision ...................................................................................................................... 14 Reload & Timed Reload Configurable options ............................................................................................................ 14 USB CLI comparision .............................................................................................................................................................. 19 USB CLI comparision Configurable options .................................................................................................................. 19 System and Environment CLI comparision .................................................................................................................... 21 System and Environment Configurable options ......................................................................................................... 21 Remote Management Sessions—Viewing CLI comparision ................................................................................... 31 Remote Management Sessions—Viewing CLI Configurable options ................................................................. 31 Tech Support Information Output Listing CLI comparision .................................................................................... 33 Tech Support Information Output Listing CLI Configurable options .................................................................. 33 Motd CLI comparision ........................................................................................................................................................... 36 Motd CLI Configurable options ......................................................................................................................................... 36 Source Interface for Management Communications CLI comparision ............................................................... 37 Source Interface for Management Communications CLI Configurable options ............................................. 37 Chapter 2 Switch User ID and Password, and Console Access ................................................................................. 41 Local User ID and Password, and console access CLI comparision ..................................................................... 41 Local User ID and Password, and console access CLI Configurable options .................................................... 42 Recover lost password CLI comparision ....................................................................................................................... 51 Recover lost password CLI Configurable options ...................................................................................................... 51 Role based management CLI comparision .................................................................................................................... 53 Role based management CLI Configurable options .................................................................................................. 53 Chapter 3 Time Service ............................................................................................................................................................ 66 NTP CLI Comparison .............................................................................................................................................................. 66 NTP Service configurable options .................................................................................................................................... 66 Chapter 4 CLI Management Access – SSH ........................................................................................................................ 75 SSH CLI Comparison .............................................................................................................................................................. 75 SSH Service configurable options ..................................................................................................................................... 75 Chapter 5 GUI Management Access – HTTPS ................................................................................................................. 84 HTTPS CLI Comparision ........................................................................................................................................................ 84 HTTPS Service configurable options ................................................................................................................................ 85 Chapter 6 Discovery Protocols – LLDP ............................................................................................................................... 88 LLDP CLI Comparision ........................................................................................................................................................... 88 LLDP configurable options .................................................................................................................................................. 89 Chapter 7 Out-of-Band Management ................................................................................................................................ 98 Out-Of-Band CLI Comparision ........................................................................................................................................... 98 Out-Of-Band configurable options .................................................................................................................................. 99 Chapter 8 Interface or Port Information and Nomenclature .................................................................................. 115 Interface or Port Information CLI Comparision ........................................................................................................ 115 Interface or Port Information configurable options ............................................................................................... 115 Chapter 9 Link Aggregation – LACP and Trunk ........................................................................................................... 131 Link Aggregation Control Protocol (LACP) CLI comparision ............................................................................... 131 Chapter 10 MSTP ..................................................................................................................................................................... 141 MSTP CLI Comparison .......................................................................................................................................................
Recommended publications
  • 'Good Governance' in the Dutch Caribbean
    Obstacles to ‘Good Governance’ in the Dutch Caribbean Colonial- and Postcolonial Development in Aruba and Sint Maarten Arxen A. Alders Master Thesis 2015 [email protected] Politics and Society in Historical Perspective Department of History Utrecht University University Supervisor: Dr. Auke Rijpma Internship (BZK/KR) Supervisor: Nol Hendriks Introduction .............................................................................................................................. 2 1. Background ............................................................................................................................ 9 1.1 From Colony to Autonomy ......................................................................................................... 9 1.2 Status Quaestionis .................................................................................................................... 11 Colonial history .............................................................................................................................. 12 Smallness ....................................................................................................................................... 16 2. Adapting Concepts to Context ................................................................................................. 19 2.1 Good Governance ..................................................................................................................... 19 Development in a Small Island Context ........................................................................................
    [Show full text]
  • IEEE 802.1Aq Standard, Is a Computer Networking Technology Intended to Simplify the Creation and Configuration of Networks, While Enabling Multipath Routing
    Brought to you by: Brian Miller Yuri Spillman - Specified in the IEEE 802.1aq standard, is a computer networking technology intended to simplify the creation and configuration of networks, while enabling multipath routing. - Link State Protocol - Based on IS-IS -The standard is the replacement for the older spanning tree protocols such as IEEE 802.1D, IEEE 802.1w, and IEEE 802.1s. These blocked any redundant paths that could result in layer 2(Data Link Layer), whereas IEEE 802.1aq allows all paths to be active with multiple equal cost paths, and provides much larger layer 2 topologies. 802.1aq is an amendment to the "Virtual Bridge Local Area Networks“ and adds Shortest Path Bridging (SPB). Shortest path bridging, which is undergoing IEEE’s standardization process, is meant to replace the spanning tree protocol (STP). STP was created to prevent bridge loops by allowing only one path between network switches or ports. When a network segment goes down, an alternate path is chosen and this process can cause unacceptable delays in a data center network. The ability to use all available physical connectivity, because loop avoidance uses a Control Plane with a global view of network topology Fast restoration of connectivity after failure, again because of Link State routing's global view of network topology Under failure, the property that only directly affected traffic is impacted during restoration; all unaffected traffic just continues Ideas are rejected by IEEE 802.1. accepted by the IETF and the TRILL WG is formed. Whoops, there is a problem. They start 802.1aq for spanning tree based shortest path bridging Whoops, spanning tree doesn’t hack it.
    [Show full text]
  • TRILL Deployment Nears
    TRILL Deployment Nears August 3rd – 5th 2010 Introduction An exciting milestone on the road to TRILL deployment occurred from August 3rd to 5th 2010 at the University of New Hampshire InterOperability Laboratory (UNH-IOL), as a group of companies attended the first multi-vendor TRILL plugfest. The plugfest was successful in demonstrating interoperability between TRILL devices. It was a first step towards wide deployment of TRILL and valuable knowledge for increasing TRILL interoperability was gained through the event. The UNH-IOL is excited to be hosting another TRILL plugfest in Q1 of 2011. This whitepaper discusses the TRILL protocol to help inform potential TRILL equipment customers about the benefits of adoption of TRILL in their networks along with describing what this plugfest means for those looking towards the deployment of TRILL. The Need for a Replacement for Spanning Tree In 2002, the Beth Israel Deaconess Medical Center in Boston, MA had a massive system failure caused by a Spanning Tree Protocol loop (1). This led Radia Perlman, the inventor of Spanning Tree Protocol (2), and others to come up with the concept of a “Routing Bridge” (RBridge) (3) and the protocol TRansparent Interconnection of Lots of Links (TRILL). Most of TRILL, the intended replacement for Spanning Tree Protocol, has been approved as a standard and the last part recently went into working group last call, meaning full standardization is nearly complete. For now, let’s see how Spanning Tree contributed to “one of the worst health-care IT disasters ever.” i The first sign that something was wrong was when it started to take several seconds to send and receive e-mail at the medical center.
    [Show full text]
  • Netherlands 2019 Human Rights Report
    THE NETHERLANDS 2019 HUMAN RIGHTS REPORT EXECUTIVE SUMMARY The Kingdom of the Netherlands, a parliamentary constitutional monarchy, consists of four equal autonomous countries: the Netherlands, Aruba, Curacao, and Sint Maarten. The kingdom retains responsibility for foreign policy, defense, and other “kingdom issues.” The Netherlands includes the Caribbean islands of Bonaire, Saba, and Sint Eustatius, which are special municipalities. The six Caribbean entities collectively are known as the Dutch Caribbean. The Netherlands has a bicameral parliament. The country’s 12 provincial councils elect the First Chamber, and the Second Chamber is elected by popular vote. A prime minister and a cabinet representing the governing political parties exercise executive authority. Aruba, Curacao, and Sint Maarten have unicameral parliamentary systems, and each island country has one minister plenipotentiary representing them in the Kingdom Council of Ministers. Ultimate responsibility for safeguarding fundamental human rights and freedoms in all kingdom territories lies with the kingdom’s ministerial council, which includes the Dutch government and the plenipotentiary ministers of Curacao, Aruba, and Sint Maarten. (Note: The adjective “Dutch” throughout this report refers to “the Netherlands.”) Elections for seats in the European Parliament on May 23 and the Netherlands’ First Chamber on May 27 were considered free and fair. The national police maintain internal security in the Netherlands and report to the Ministry of Justice and Security, which oversees law enforcement organizations, as do the justice ministries in Aruba, Curacao, and Sint Maarten. The kingdom’s armed forces report to the Ministry of Defense and are responsible for external security but also have some domestic security responsibilities.
    [Show full text]
  • Race, Color, and Nationalism in Aruban and Curaçaoan Political Identities
    Thamyris/Intersecting No. 27 (2014) 117–132 Race, Color, and Nationalism in Aruban and Curaçaoan Political Identities Michael Orlando Sharpe This chapter focuses on the development and instrumentalization of race and color based Aruban and Curaçaoan nationalisms within processes of decolonization and reconstitution in the context of Dutch sovereignty and Dutch liberal democracy. I argue this instrumentalization of race and color as markers of national identity takes place within an overall framework of white supremacy. The following will describe the current political construction of the Dutch Kingdom and examine Aruban and Curaçaoan national myths of origin along with a brief history of Dutch colonialism and slavery including the 20th century relevance of oil refinement on these islands. Next, there will a discussion of the significance of the 1954 Charter for the Kingdom of the Netherlands or Statuut and the key role of Curaçao’s labor unrest of 30 May 1969 or “Trinta de Mei” in the development and deployment of racially and color based Aruban and Curaçaoan nationalisms as “invented traditions” and “social engineer- ing.” The chapter will conclude with an examination of the ways in which these notions of race and racism are reified in the Netherlands today. This discussion centers on developments around the Netherlands Antilles prior to its dissolution on 10 October 2010. Before 10/10/10, the Kingdom of the Netherlands was made up of the Netherlands, the Netherlands Antilles, and Aruba. The Netherlands Antilles was a federation of the five island states of Curaçao (admin- istrative capital), Bonaire, Saba, St. Eustatius, and St. Maarten. The current Dutch Kingdom consists of the Netherlands, Aruba, Curaçao, and St.
    [Show full text]
  • Technical Assistance Program for Disaster Risk Financing and Insurance in Caribbean Overseas Countries and Territories
    Technical Assistance Program for Disaster Risk Financing and Insurance in Caribbean Overseas Countries and Territories The Technical Assistance Program for Disaster Risk Financing and Insurance (DRFI) in Caribbean Overseas Countries and Territories (OCTs) launched in 2019, is a partnership between the European Union (EU), the World Bank Group, and the Global Facility for Disaster Reduction and Recovery (GFDRR). The Program is part of the EU-funded Caribbean OCTs Resilience, Sustainable Energy and Marine Biodiversity Program (ReSEMBiD), implemented by Expertise France, the World Bank and GFDRR. The objective of the Technical Assistance Program for DRFI in Caribbean OCTs is to enhance long term resilience and adaptation capacity in the Caribbean OCTs to adapt to extreme and recurrent natural events, to the benefit of the most vulnerable. | What we do | The Program supports the development of innovative disaster risk financing options, capacity building within OCTs on use of existing risk transfer mechanisms like the Caribbean Catastrophe Risk Insurance Facility (CCRIF) and working with the OCTs to promote informed decision-making on disaster risk financing. Specifically, activities focus on carrying out gap analysis for disaster risk financing, including both financial and policy considerations, and assessing demand for sovereign disaster risk financing products, identifying the financial exposure or contingent liability to geophysical and climate related disasters, enhancing the understanding of different yet complementary disaster risk financing tools, such as indemnity insurance, parametric products and contingency South-south knowledge exchange on disaster funds among others, to help them manage their risk financing products and budget classification fiscal risks related to natural disasters. will also be conducted, and activities.
    [Show full text]
  • 1 Methodist Education and Sociopolitical Development in Montserrat the Absence of Sustained Missionary Efforts Towards the Devel
    Methodist Education and Sociopolitical Development in Montserrat The absence of sustained missionary efforts towards the development of educational institutions for African slaves in the Caribbean has been documented.1 A closer analysis, however, credits the Wesleyan contribution to education in Montserrat with being a significant agent of societal transformation, certainly by effect if not by design. This was in some sense linked to the movement's self-understanding related to its mission to spread scriptural holiness for the transformation of the nation. While "the nation" referred in principle to Britain, the mandate to transform would, a century later, be extended to the Caribbean where the Methodist movement was pioneered in 1760 by Nathaniel Gilbert, an Antiguan born planter of British parentage, after his 1759 encounter in England with John Wesley. As early as 1809, Anne Gilbert had defied authorities and established a school at English Harbour in Antigua, from where Methodism made its way to the nearby island of Montserrat.2 In Montserrat as in the Leeward Islands generally, the Methodist missionary support for education was at odds with that of the Establishment which was essentially an extension of the Anglican Church and which fostered a certain parochialism that extended British ecclesiastical feuds into the Caribbean. The insistence on conformity to church discipline adversely affected the development of formal education which was vitally important to the social elevation of non- white populations. While the Wesleyans were intentional concerning a religious focus in education, they did not forcibly promote denominationalism in schools to the same extent.3 Methodism's direct involvement in primary education in Montserrat preceded the abolition of slavery, since general education classes had been conducted at Bethel in the east and at Cavalla Hill in the north west of the island since the 1820s.
    [Show full text]
  • Colasoft Capsa
    Technical Specifications (Capsa Standard) HP Unix Nettl Packet File (*.TRCO; TRC1) Deployment Environment Libpcap (Wireshark, Tcpdump, Ethereal, etc.) Shared networks (*.cap; *pcap) Switched networks (managed switches and Wireshark (Wireshark, etc.) (*.pcapang; unmanaged switches) *pcapang.gz; *.ntar; *.ntar.gz) Network segments Microsoft Network Monitor 1.x 2.x (*.cap) Proxy server Novell LANalyer (*.tr1) Network Instruments Observer V9.0 (*.bfr) Supported Network Types NetXRay 2.0, and Windows Sniffer (*.cap) Ethernet Sun_Snoop (*.Snoop) Fast Ethernet Visual Network Traffic Capture (*.cap) Gigabit Ethernet Supported Packet File Formats to Export Supported Network Adapters Accellent 5Views Packet File (*.5vw) 10/100/1000 Mbps Ethernet adapters Colasoft Packet File (V3) (*.rapkt) Colasoft Packet File (*.cscpkt) System Requirements Colasoft Raw Packet File (*.rawpkt) Operating Systems Colasoft Raw Packet File (V2) (*.rawpkt) Windows Server 2008 (64-bit) EtherPeek Packet File (V9) (*.pkt) Windows Server 2012 (64-bit)* HP Unix Nettl Packet File (*.TRCO; *.TRC1) Windows Vista (64-bit) Libpcap (Wireshark, Tcpdump, Ethereal, etc.) Windows 7 (64-bit) (*.cap; *pcap) Windows 8/8.1 (64-bit) Wireshark (Wireshark, etc.) (*.pcapang; Windows 10 Professional (64-bit) *pcapang.gz; *.ntar; *.ntar.gz) Microsoft Network Monitor 1.x 2.x (*.cap) * indicates that Colasoft Packet Builder is not Novell LANalyer (*.tr1) compatible with this operating system. NetXRay 2.0, and Windows Sniffer (*.cap) Minimum Sun_Snoop (*.Snoop)
    [Show full text]
  • 7956 Y. Li Category: Standards Track Huawei ISSN: 2070-1721 A
    Internet Engineering Task Force (IETF) W. Hao Request for Comments: 7956 Y. Li Category: Standards Track Huawei ISSN: 2070-1721 A. Qu MediaTec M. Durrani Equinix Inc. P. Sivamurugan IP Infusion September 2016 Transparent Interconnection of Lots of Links (TRILL) Distributed Layer 3 Gateway Abstract The base TRILL (Transparent Interconnection of Lots of Links) protocol provides optimal pair-wise data frame forwarding for Layer 2 intra-subnet traffic but not for Layer 3 inter-subnet traffic. A centralized gateway solution is typically used for Layer 3 inter- subnet traffic forwarding but has the following issues: 1. Sub-optimum forwarding paths for inter-subnet traffic. 2. A centralized gateway that may need to support a very large number of gateway interfaces in a Data Center, one per tenant per Data Label used by that tenant, to provide interconnect functionality for all the Layer 2 Virtual Networks in a TRILL campus. 3. A traffic bottleneck at the gateway. This document specifies an optional TRILL distributed gateway solution that resolves these centralized gateway issues. Status of This Memo This is an Internet Standards Track document. This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Further information on Internet Standards is available in Section 2 of RFC 7841. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc7956.
    [Show full text]
  • Introduction to Software Defined Networking (SDN)
    IntroductionIntroduction toto SoftwareSoftware DefinedDefined . NetworkingNetworking (SDN)(SDN) SDN=Standard Southbound API SDN = Centralization of control plane SDN=OpenFlow SDN = Separation of Control and Data Planes Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides and audio/video recordings of this class lecture are at: http://www.cse.wustl.edu/~jain/cse570-13/ Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ ©2013 Raj Jain 16-1 OverviewOverview 1. What is SDN? 2. Alternative APIs: XMPP, PCE, ForCES, ALTO 3. RESTful APIs and OSGi Framework 4. OpenDaylight SDN Controller Platform and Tools Note: This is the third module of four modules on OpenFlow, OpenFlow Controllers, SDN and NFV in this course. Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ ©2013 Raj Jain 16-2 OriginsOrigins ofof SDNSDN SDN originated from OpenFlow Centralized Controller Easy to program Change routing policies on the fly Software Defined Network (SDN) Initially, SDN= Application … Application Separation of Control and Data Northbound Plane API Network Controller Centralization of Control Southbound API OpenFlow OpenFlow to talk to the data plane Switch Switch … Switch Now the definition has changed significantly. Overlay (Tunnels) Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ ©2013 Raj Jain 16-3 WhatWhat isis SDN?SDN? SDN=OpenFlow SDN=Standard SDN = Centralization Southbound API of control plane SDN = Separation of Control and Data Planes All of these are mechanisms. SDN is not a mechanism. It is a framework to solve a set of problems Many solutions Washington University in St.
    [Show full text]
  • Testing TRILL (Transparent Interconnect for Lots of Links)
    University of New Hampshire InterOperability Laboratory 121 Technology Drive Suite 2 Durham, NH 03824 Testing TRILL (TRansparent Interconnect for Lots of Links) By: Christina Dube, Senior Manager, Ethernet Switching Technologies, UNH InterOperability Laboratory Abstract The University of New Hampshire InterOperability Laboratory (UNH-IOL) hosted its second TRansparent Interconnect of Lots of Links (TRILL) Interoperability Test Event the week of November 26 – December 1, 2012 at its 32,000+ square-foot facility in Durham, New Hampshire. The test event brought together implementers of TRILL as well as test equipment manufacturers that support TRILL. The purpose of the test event was to gain a perspective on the current status of TRILL implementation and interoperability. Participants included Hewlett-Packard Networking, Extreme Networks, Ixia and Spirent Communications. Introduction The Spanning Tree Protocol (STP) was created to ensure a loop-free topology for bridged Ethernet despite having redundant links within the topology. These redundant links allow for automatic fail over in the case of an inactive link. At the time of the Spanning Tree Protocol’s creation, data networking was in its infancy. Since then, as data communication networks have grown, and STP has been implemented in large scale networks, limitations of the protocol have come to light. TRILL provides a solution to current STP limitations by combining Layer 2 and Layer 3 technologies. It applies link state routing to Virtual Local-Area Network (VLAN) aware bridges, which allows for the deployment of large scale Layer 2 networks. Additionally, TRILL allows the current Spanning Tree topology to still exist, essentially filling in the limitations of the Spanning Tree.
    [Show full text]
  • INDIAN ARUBA in the HISTORICAL AGE Luc Aio F S
    TH(1636-1795E PEASANT) AMP THE REBEL: INDIAN ARUBA IN THE HISTORICAL AGE Luc Aio f s Abstract The Aruban population is proud of its Amerindian cultural legacy, which acts as a 'reinvented tradition' in Aruba's national identity. In this paper, I analyse the myth and facts of this Indian heritage in the colonial age (1636-1795). On one hand, Aruba was a place of refuge to Indian settlers on the almost but forgotten island. Aruba was a safe haven or a reserve to some of the last surviving Indian populations in the Caribbean archipel­ ago. On the other hand, during the 17"1 and 18™ century, Christianization took place and the formation of a unique Caribbean peasant type -'the cunucero'- occurred. The increasing presence and pressure by the Dutch administration resulted in protest and rebellion from the side of the Aruban Indians. During the 19^ century, the Amerindian population assimilated into the colonial society. Résumé La population d'Aruba estfière de son patrimoine culturel amérindien qui figure comme une 'tradition réinven­ tée' dans l'identité nationale d'Aruba. Ici je sépare le mythe des faits dans cet héritage de l'époque coloniale (1636-1795). D'une part Aruba était un refuge pour les Indiens qui voulaient s'établir dans l'île quasi oubliée à cette époque. Aruba a servi d'abri ou de refuge pour quelques-unes des dernières populations amérindiennes qui ont survécu dans l'archipel caraïbe. D'autre part, pendant le 17e et le 18e siècle la christianisation a pris pied et on a vu apparaître un type unique de paysan caraïbe nommé 'cunucero'.
    [Show full text]