Aruba HPE Networking and Cisco CLI Reference Guide

Total Page:16

File Type:pdf, Size:1020Kb

Aruba HPE Networking and Cisco CLI Reference Guide CoverCover design:Cover design: design:Stoere Stoere BinkenStoere Binken DesignBinken Design Design HPHP PressHP Press Press | www.hppress.com| www.hppress.com| www.hppress.com HP Networking and Cisco CLI Reference Guide Guide Reference CLI Cisco and Networking HP Not For Resale For Not HP Solutions Series Series HP Solutions HP Solutions Series HP Solutions Series Series HP Solutions HP Solutions person outside of your organization without the written permission of HPE. HPE. of permission written the without organization your of outside person Version 3.2 Version permission of HPE. You may not use these materials to deliver training to any any to training deliver to materials these use not may You HPE. of permission This is an HPE copyrighted work that may not be reproduced without the written written the without reproduced be not may that work copyrighted HPE an is This Guide Guide IncludesIncludesIncludes Comware Comware Comware 7 7 7 technical or editorial errors or omissions contained herein. contained omissions or errors editorial or technical be construed as constituting an additional warranty. HPE shall not be liable for for liable be not shall HPE warranty. additional an constituting as construed be statements accompanying such products and services. Nothing herein should should herein Nothing services. and products such accompanying statements and Cisco CLI Reference Reference CLI Cisco and ThirdThirdThird Edition Edition Edition warranties for HPE products and services are set forth in the express warranty warranty express the in forth set are services and products HPE for warranties The information contained herein is subject to change without notice. The only only The notice. without change to subject is herein contained information The CLICLICLI ReferenceReference Reference GuideGuide Guide © Copyright 2015 Hewlett Packard Enterprise Development LP Development Enterprise Packard Hewlett 2015 Copyright © ©© Copyright © Copyright Copyright 2015 2015 2015 Hewlett-Packard Hewlett-Packard Hewlett-Packard Development Development Development Company, Company, Company, L.P. L.P. L.P. Not Not NotFor For Resale.For Resale. Resale. Aruba HPE Networking Networking HPE Aruba HPHPHP NetworkingNetworking Networking andand and CiscoCisco Cisco HPHP PressHP Press Press HPHP HPSolutions Solutions Solutions Series Series Series HPE Solutions Series Solutions HPE materialsmaterialsmaterials to to deliver to deliver deliver training training training to to any toany personany person person outside outside outside of of your ofyour your or organization ganizationorganization without without without the the writtenthe written written permission permission permission of of HP. ofHP. HP. ThisThis Thisis isan anis HP an HP copyrighted HP copyrighted copyrighted work work work that that thatmay may may not not benot be reproduced be reproduced reproduced witho witho withoutut the utthe writtenthe written written permission permission permission of of HP. ofHP. YouHP. You Youmay may may not not usenot use theseuse these these constitutingconstitutingconstituting an an additional an additional additional warranty. warranty. warranty. HP HP shall HP shall shall not not benot be liable be liable liable for for technical for technical technical or or editorial oreditorial editorial errors errors errors or or omissions oromissions omissions contained contained contained herein. herein. herein. forthforthforth in inthe thein expressthe express express warranty warranty warranty statements statements statements accompanying accompanying accompanying such such such prod prod productsucts uctsand and services.and services. services. Nothing Nothing Nothing herein herein herein should should should be be construed be construed construed as as as TheThe informationThe information information contained contained contained herein herein herein is issubject subjectis subject to to change tochange change without without without notice. notice. notice. The The onlyThe only onlywarranties warranties warranties for for HP for HP products HP products products and and servicesand services services are are set are set set ToToTo learn learn learn more more more about about about HP HP HP Networking, Networking, Networking, visit visit visit hp.com/go/networking hp.com/go/networking hp.com/go/networking HP Networking and Cisco CLI Reference Guide HP Networking and Cisco CLI Reference Guide HP Networking and Cisco CLI Reference Guide HP Networking and Cisco CLI Reference Guide HP Networking and Cisco CLI Reference Guide Table of Contents Introduction ..................................................................................................................................................................................... 6 Revisions Status .............................................................................................................................................................................. 7 Version 3.0 ................................................................................................................................................................................... 7 Version 3.1 ................................................................................................................................................................................... 7 Version 3.2 ................................................................................................................................................................................... 7 Comware 5 and Comware 7 Integration ............................................................................................................................... 8 Using This Guide .......................................................................................................................................................................... 10 Comware Differences ............................................................................................................................................................ 10 Navigation Differences Among CLIs ................................................................................................................................ 10 Configuration Differences Among CLIs .......................................................................................................................... 10 Terminology Differences ...................................................................................................................................................... 11 Disclaimer ....................................................................................................................................................................................... 11 Comparing View and Configuration Prompts .................................................................................................................. 12 Comparing Frequently Used Commands ........................................................................................................................... 12 Chapter 1 Basic Switch Management ................................................................................................................................. 13 a) Management Access ......................................................................................................................................................... 13 b) Configuration Access........................................................................................................................................................ 14 c) Console Access—Baud Rate........................................................................................................................................... 15 c) Console and Virtual Terminal Access—Timeout .................................................................................................... 16 d) Reload & Timed Reload .................................................................................................................................................. 18 e) USB .......................................................................................................................................................................................... 23 f) System and Environment ................................................................................................................................................. 24 g) Remote Management Sessions—Viewing ............................................................................................................... 29 g) Remote Management Sessions—Terminating ....................................................................................................... 32 h) Tech Support Information Output Listing ................................................................................................................ 35 i) Filtering Output show running-config and display current-configuration ................................................... 37 j) Motd ......................................................................................................................................................................................... 38 k) Source Interface for Management Communications ........................................................................................... 39 Chapter 2 Switch User ID and Password, and Console Access ................................................................................. 42 1 a) Local
Recommended publications
  • 'Good Governance' in the Dutch Caribbean
    Obstacles to ‘Good Governance’ in the Dutch Caribbean Colonial- and Postcolonial Development in Aruba and Sint Maarten Arxen A. Alders Master Thesis 2015 [email protected] Politics and Society in Historical Perspective Department of History Utrecht University University Supervisor: Dr. Auke Rijpma Internship (BZK/KR) Supervisor: Nol Hendriks Introduction .............................................................................................................................. 2 1. Background ............................................................................................................................ 9 1.1 From Colony to Autonomy ......................................................................................................... 9 1.2 Status Quaestionis .................................................................................................................... 11 Colonial history .............................................................................................................................. 12 Smallness ....................................................................................................................................... 16 2. Adapting Concepts to Context ................................................................................................. 19 2.1 Good Governance ..................................................................................................................... 19 Development in a Small Island Context ........................................................................................
    [Show full text]
  • IEEE 802.1Aq Standard, Is a Computer Networking Technology Intended to Simplify the Creation and Configuration of Networks, While Enabling Multipath Routing
    Brought to you by: Brian Miller Yuri Spillman - Specified in the IEEE 802.1aq standard, is a computer networking technology intended to simplify the creation and configuration of networks, while enabling multipath routing. - Link State Protocol - Based on IS-IS -The standard is the replacement for the older spanning tree protocols such as IEEE 802.1D, IEEE 802.1w, and IEEE 802.1s. These blocked any redundant paths that could result in layer 2(Data Link Layer), whereas IEEE 802.1aq allows all paths to be active with multiple equal cost paths, and provides much larger layer 2 topologies. 802.1aq is an amendment to the "Virtual Bridge Local Area Networks“ and adds Shortest Path Bridging (SPB). Shortest path bridging, which is undergoing IEEE’s standardization process, is meant to replace the spanning tree protocol (STP). STP was created to prevent bridge loops by allowing only one path between network switches or ports. When a network segment goes down, an alternate path is chosen and this process can cause unacceptable delays in a data center network. The ability to use all available physical connectivity, because loop avoidance uses a Control Plane with a global view of network topology Fast restoration of connectivity after failure, again because of Link State routing's global view of network topology Under failure, the property that only directly affected traffic is impacted during restoration; all unaffected traffic just continues Ideas are rejected by IEEE 802.1. accepted by the IETF and the TRILL WG is formed. Whoops, there is a problem. They start 802.1aq for spanning tree based shortest path bridging Whoops, spanning tree doesn’t hack it.
    [Show full text]
  • TRILL Deployment Nears
    TRILL Deployment Nears August 3rd – 5th 2010 Introduction An exciting milestone on the road to TRILL deployment occurred from August 3rd to 5th 2010 at the University of New Hampshire InterOperability Laboratory (UNH-IOL), as a group of companies attended the first multi-vendor TRILL plugfest. The plugfest was successful in demonstrating interoperability between TRILL devices. It was a first step towards wide deployment of TRILL and valuable knowledge for increasing TRILL interoperability was gained through the event. The UNH-IOL is excited to be hosting another TRILL plugfest in Q1 of 2011. This whitepaper discusses the TRILL protocol to help inform potential TRILL equipment customers about the benefits of adoption of TRILL in their networks along with describing what this plugfest means for those looking towards the deployment of TRILL. The Need for a Replacement for Spanning Tree In 2002, the Beth Israel Deaconess Medical Center in Boston, MA had a massive system failure caused by a Spanning Tree Protocol loop (1). This led Radia Perlman, the inventor of Spanning Tree Protocol (2), and others to come up with the concept of a “Routing Bridge” (RBridge) (3) and the protocol TRansparent Interconnection of Lots of Links (TRILL). Most of TRILL, the intended replacement for Spanning Tree Protocol, has been approved as a standard and the last part recently went into working group last call, meaning full standardization is nearly complete. For now, let’s see how Spanning Tree contributed to “one of the worst health-care IT disasters ever.” i The first sign that something was wrong was when it started to take several seconds to send and receive e-mail at the medical center.
    [Show full text]
  • LLDP-MED and Cisco Discovery Protocol
    White Paper LLDP-MED and Cisco Discovery Protocol DEVICE DISCOVERY PROTOCOLS Device discovery protocols enable directly connected devices to discover information about each other. They advertise information about the device over every interface, allowing any device in the network to “know” everything it is connected to. Examples of applications that use the information conveyed by discovery protocols include: ● Network topology—A network management system (NMS) can accurately represent a map of the network topology. ● Inventory—A management system can query a switch to learn about all the devices connected to that switch. ● Emergency services—Location of a phone can be determined by the switch port to which it is connected. ● VLAN configuration—The switch can tell the phone which VLAN to use for voice. ● Power negotiation—The phone and the switch can negotiate the power that the phone can consume. Cisco Systems ® introduced the Cisco ® Discovery Protocol in 1994 to provide a mechanism for the management system to automatically learn about devices connected to the network. Cisco Discovery Protocol runs on Cisco devices (routers, switches, phones, etc.) and is also licensed to run on some network devices from other vendors. Using Cisco Discovery Protocol, network devices periodically advertise their own information to a multicast address on the network, making it available to any device or application that wishes to listen and collect it. Because Cisco Discovery Protocol runs over Ethernet, ATM, and Frame Relay links, it is independent of network protocol (for example, TCP/IP, Internetwork Packet Exchange [IPX], AppleTalk, etc.). With this capability in the network, Cisco customers can introduce a new network management application that can discover and display an accurate topology of all the Cisco devices active on the network.
    [Show full text]
  • Netherlands 2019 Human Rights Report
    THE NETHERLANDS 2019 HUMAN RIGHTS REPORT EXECUTIVE SUMMARY The Kingdom of the Netherlands, a parliamentary constitutional monarchy, consists of four equal autonomous countries: the Netherlands, Aruba, Curacao, and Sint Maarten. The kingdom retains responsibility for foreign policy, defense, and other “kingdom issues.” The Netherlands includes the Caribbean islands of Bonaire, Saba, and Sint Eustatius, which are special municipalities. The six Caribbean entities collectively are known as the Dutch Caribbean. The Netherlands has a bicameral parliament. The country’s 12 provincial councils elect the First Chamber, and the Second Chamber is elected by popular vote. A prime minister and a cabinet representing the governing political parties exercise executive authority. Aruba, Curacao, and Sint Maarten have unicameral parliamentary systems, and each island country has one minister plenipotentiary representing them in the Kingdom Council of Ministers. Ultimate responsibility for safeguarding fundamental human rights and freedoms in all kingdom territories lies with the kingdom’s ministerial council, which includes the Dutch government and the plenipotentiary ministers of Curacao, Aruba, and Sint Maarten. (Note: The adjective “Dutch” throughout this report refers to “the Netherlands.”) Elections for seats in the European Parliament on May 23 and the Netherlands’ First Chamber on May 27 were considered free and fair. The national police maintain internal security in the Netherlands and report to the Ministry of Justice and Security, which oversees law enforcement organizations, as do the justice ministries in Aruba, Curacao, and Sint Maarten. The kingdom’s armed forces report to the Ministry of Defense and are responsible for external security but also have some domestic security responsibilities.
    [Show full text]
  • Race, Color, and Nationalism in Aruban and Curaçaoan Political Identities
    Thamyris/Intersecting No. 27 (2014) 117–132 Race, Color, and Nationalism in Aruban and Curaçaoan Political Identities Michael Orlando Sharpe This chapter focuses on the development and instrumentalization of race and color based Aruban and Curaçaoan nationalisms within processes of decolonization and reconstitution in the context of Dutch sovereignty and Dutch liberal democracy. I argue this instrumentalization of race and color as markers of national identity takes place within an overall framework of white supremacy. The following will describe the current political construction of the Dutch Kingdom and examine Aruban and Curaçaoan national myths of origin along with a brief history of Dutch colonialism and slavery including the 20th century relevance of oil refinement on these islands. Next, there will a discussion of the significance of the 1954 Charter for the Kingdom of the Netherlands or Statuut and the key role of Curaçao’s labor unrest of 30 May 1969 or “Trinta de Mei” in the development and deployment of racially and color based Aruban and Curaçaoan nationalisms as “invented traditions” and “social engineer- ing.” The chapter will conclude with an examination of the ways in which these notions of race and racism are reified in the Netherlands today. This discussion centers on developments around the Netherlands Antilles prior to its dissolution on 10 October 2010. Before 10/10/10, the Kingdom of the Netherlands was made up of the Netherlands, the Netherlands Antilles, and Aruba. The Netherlands Antilles was a federation of the five island states of Curaçao (admin- istrative capital), Bonaire, Saba, St. Eustatius, and St. Maarten. The current Dutch Kingdom consists of the Netherlands, Aruba, Curaçao, and St.
    [Show full text]
  • Technical Assistance Program for Disaster Risk Financing and Insurance in Caribbean Overseas Countries and Territories
    Technical Assistance Program for Disaster Risk Financing and Insurance in Caribbean Overseas Countries and Territories The Technical Assistance Program for Disaster Risk Financing and Insurance (DRFI) in Caribbean Overseas Countries and Territories (OCTs) launched in 2019, is a partnership between the European Union (EU), the World Bank Group, and the Global Facility for Disaster Reduction and Recovery (GFDRR). The Program is part of the EU-funded Caribbean OCTs Resilience, Sustainable Energy and Marine Biodiversity Program (ReSEMBiD), implemented by Expertise France, the World Bank and GFDRR. The objective of the Technical Assistance Program for DRFI in Caribbean OCTs is to enhance long term resilience and adaptation capacity in the Caribbean OCTs to adapt to extreme and recurrent natural events, to the benefit of the most vulnerable. | What we do | The Program supports the development of innovative disaster risk financing options, capacity building within OCTs on use of existing risk transfer mechanisms like the Caribbean Catastrophe Risk Insurance Facility (CCRIF) and working with the OCTs to promote informed decision-making on disaster risk financing. Specifically, activities focus on carrying out gap analysis for disaster risk financing, including both financial and policy considerations, and assessing demand for sovereign disaster risk financing products, identifying the financial exposure or contingent liability to geophysical and climate related disasters, enhancing the understanding of different yet complementary disaster risk financing tools, such as indemnity insurance, parametric products and contingency South-south knowledge exchange on disaster funds among others, to help them manage their risk financing products and budget classification fiscal risks related to natural disasters. will also be conducted, and activities.
    [Show full text]
  • 1 Methodist Education and Sociopolitical Development in Montserrat the Absence of Sustained Missionary Efforts Towards the Devel
    Methodist Education and Sociopolitical Development in Montserrat The absence of sustained missionary efforts towards the development of educational institutions for African slaves in the Caribbean has been documented.1 A closer analysis, however, credits the Wesleyan contribution to education in Montserrat with being a significant agent of societal transformation, certainly by effect if not by design. This was in some sense linked to the movement's self-understanding related to its mission to spread scriptural holiness for the transformation of the nation. While "the nation" referred in principle to Britain, the mandate to transform would, a century later, be extended to the Caribbean where the Methodist movement was pioneered in 1760 by Nathaniel Gilbert, an Antiguan born planter of British parentage, after his 1759 encounter in England with John Wesley. As early as 1809, Anne Gilbert had defied authorities and established a school at English Harbour in Antigua, from where Methodism made its way to the nearby island of Montserrat.2 In Montserrat as in the Leeward Islands generally, the Methodist missionary support for education was at odds with that of the Establishment which was essentially an extension of the Anglican Church and which fostered a certain parochialism that extended British ecclesiastical feuds into the Caribbean. The insistence on conformity to church discipline adversely affected the development of formal education which was vitally important to the social elevation of non- white populations. While the Wesleyans were intentional concerning a religious focus in education, they did not forcibly promote denominationalism in schools to the same extent.3 Methodism's direct involvement in primary education in Montserrat preceded the abolition of slavery, since general education classes had been conducted at Bethel in the east and at Cavalla Hill in the north west of the island since the 1820s.
    [Show full text]
  • Provisioning Link Layer Discovery Protocol
    Provisioning Link Layer Discovery Protocol The Cisco Discovery Protocol (CDP) is a device discovery protocol that runs over Layer 2 (the data link layer) on all Cisco-manufactured devices (routers, bridges, access servers, and switches). CDP allows network management applications to automatically discover and learn about other Cisco devices connected to the network. To support non-Cisco devices and to allow for interoperability between other devices, the switch supports the IEEE 802.1AB Link Layer Discovery Protocol (LLDP). LLDP is a neighbor discovery protocol that is used for network devices to advertise information about themselves to other devices on the network. This protocol runs over the data link layer, which allows two systems running different network layer protocols to learn about each other. LLDP supports a set of attributes that it uses to discover neighbor devices. These attributes contain type, length, and value descriptions and are referred to as TLVs. LLDP supported devices can use TLVs to receive and send information to their neighbors. Details such as configuration information, device capabilities, and device identity can be advertised using this protocol. By default, LLDP is disabled globally and on interfaces. The switch supports these basic management TLVs. These are mandatory LLDP TLVs. • Port description TLV • System name TLV • System description • System capabilities TLV • Management address TLV These organizationally-specific LLDP TLVs are also advertised to support LLDP-MED. • Port VLAN ID TLV (IEEE 802.1 organizationally specific TLVs) • MAC/PHY configuration/status TLV (IEEE 802.3 organizationally specific TLVs) • How To Configure LLDP, page 2 • Other Commands For LLDP Configuration, page 8 Cisco ME 1200 Series Carrier Ethernet Access Devices Controller Configuration Guide, Cisco IOS 15.6(1)SN and Later Releases 1 Provisioning Link Layer Discovery Protocol How To Configure LLDP How To Configure LLDP Setting LLDP Global Configuration DETAILED STEPS Command or Action Purpose Step 1 configure terminal Enters global configuration mode.
    [Show full text]
  • Understanding and Configuring CDP
    CHAPTER20 Understanding and Configuring CDP This chapter describes how to configure Cisco Discovery Protocol (CDP) on the Catalyst 4500 series switch. It also provides guidelines, procedures, and configuration examples. This chapter includes the following major sections: • Overview of CDP, page 20-1 • Configuring CDP, page 20-2 Note For complete syntax and usage information for the commands used in this chapter, refer to the Cisco IOS Configuration Fundamentals Configuration Guide, Release 12.2; Cisco IOS System Management; Configuring Cisco Discovery Protocol (CDP) at this URL: http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/ffun_c/fcfprt3/fcf015.htm and to the Cisco IOS Configuration Fundamentals Command Reference, Release 12.1; Cisco IOS System Management Commands; and CDP Commands publication at this URL: http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/ffun_r/ffrprt3/frf015.htm Note For complete syntax and usage information for the switch commands used in this chapter, refer to the Catalyst 4500 Series Switch Cisco IOS Command Reference and related publications at http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/index.htm. Overview of CDP CDP is a protocol that runs over Layer 2 (the data link layer) on all Cisco routers, bridges, access servers, and switches. CDP allows network management applications to discover Cisco devices that are neighbors of already known devices, in particular, neighbors running lower-layer, transparent protocols.With CDP, network management applications can learn the device type and the SNMP agent address of neighboring devices. CDP enables applications to send SNMP queries to neighboring devices.
    [Show full text]
  • Colasoft Capsa
    Technical Specifications (Capsa Standard) HP Unix Nettl Packet File (*.TRCO; TRC1) Deployment Environment Libpcap (Wireshark, Tcpdump, Ethereal, etc.) Shared networks (*.cap; *pcap) Switched networks (managed switches and Wireshark (Wireshark, etc.) (*.pcapang; unmanaged switches) *pcapang.gz; *.ntar; *.ntar.gz) Network segments Microsoft Network Monitor 1.x 2.x (*.cap) Proxy server Novell LANalyer (*.tr1) Network Instruments Observer V9.0 (*.bfr) Supported Network Types NetXRay 2.0, and Windows Sniffer (*.cap) Ethernet Sun_Snoop (*.Snoop) Fast Ethernet Visual Network Traffic Capture (*.cap) Gigabit Ethernet Supported Packet File Formats to Export Supported Network Adapters Accellent 5Views Packet File (*.5vw) 10/100/1000 Mbps Ethernet adapters Colasoft Packet File (V3) (*.rapkt) Colasoft Packet File (*.cscpkt) System Requirements Colasoft Raw Packet File (*.rawpkt) Operating Systems Colasoft Raw Packet File (V2) (*.rawpkt) Windows Server 2008 (64-bit) EtherPeek Packet File (V9) (*.pkt) Windows Server 2012 (64-bit)* HP Unix Nettl Packet File (*.TRCO; *.TRC1) Windows Vista (64-bit) Libpcap (Wireshark, Tcpdump, Ethereal, etc.) Windows 7 (64-bit) (*.cap; *pcap) Windows 8/8.1 (64-bit) Wireshark (Wireshark, etc.) (*.pcapang; Windows 10 Professional (64-bit) *pcapang.gz; *.ntar; *.ntar.gz) Microsoft Network Monitor 1.x 2.x (*.cap) * indicates that Colasoft Packet Builder is not Novell LANalyer (*.tr1) compatible with this operating system. NetXRay 2.0, and Windows Sniffer (*.cap) Minimum Sun_Snoop (*.Snoop)
    [Show full text]
  • 7956 Y. Li Category: Standards Track Huawei ISSN: 2070-1721 A
    Internet Engineering Task Force (IETF) W. Hao Request for Comments: 7956 Y. Li Category: Standards Track Huawei ISSN: 2070-1721 A. Qu MediaTec M. Durrani Equinix Inc. P. Sivamurugan IP Infusion September 2016 Transparent Interconnection of Lots of Links (TRILL) Distributed Layer 3 Gateway Abstract The base TRILL (Transparent Interconnection of Lots of Links) protocol provides optimal pair-wise data frame forwarding for Layer 2 intra-subnet traffic but not for Layer 3 inter-subnet traffic. A centralized gateway solution is typically used for Layer 3 inter- subnet traffic forwarding but has the following issues: 1. Sub-optimum forwarding paths for inter-subnet traffic. 2. A centralized gateway that may need to support a very large number of gateway interfaces in a Data Center, one per tenant per Data Label used by that tenant, to provide interconnect functionality for all the Layer 2 Virtual Networks in a TRILL campus. 3. A traffic bottleneck at the gateway. This document specifies an optional TRILL distributed gateway solution that resolves these centralized gateway issues. Status of This Memo This is an Internet Standards Track document. This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Further information on Internet Standards is available in Section 2 of RFC 7841. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc7956.
    [Show full text]