S2350&S5300&S6300 Series Ethernet Switches V200R003(C00&C02) Compatible Commands Reference Issue 02 Date 2013-11-06 HUAWEI TECHNOLOGIES CO., LTD. Copyright © Huawei Technologies Co., Ltd. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd. Trademarks and Permissions and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders. Notice The purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied. Huawei Technologies Co., Ltd. Address: Huawei Industrial Base Bantian, Longgang Shenzhen 518129 People's Republic of China Website: http://www.huawei.com Email: support@huawei.com Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. i S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference About This Document About This Document Intended Audience This document is intended for: l Data configuration engineers l Commissioning engineers l Network monitoring engineers l System maintenance engineers Symbol Conventions The symbols that may be found in this document are defined as follows. Symbol Description Indicates an imminently hazardous situation which, if not avoided, will result in death or serious injury. Indicates a potentially hazardous situation which, if not avoided, could result in death or serious injury. Indicates a potentially hazardous situation which, if not avoided, may result in minor or moderate injury. Indicates a potentially hazardous situation which, if not avoided, could result in equipment damage, data loss, performance deterioration, or unanticipated results. NOTICE is used to address practices not related to personal injury. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. ii S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference About This Document Symbol Description Calls attention to important information, best practices and tips. NOTE NOTE is used to address information not related to personal injury, equipment damage, and environment deterioration. Command Conventions The command conventions that may be found in this document are defined as follows. Convention Description Boldface The keywords of a command line are in boldface. Italic Command arguments are in italics. [] Items (keywords or arguments) in brackets [ ] are optional. { x | y | ... } Optional items are grouped in braces and separated by vertical bars. One item is selected. [ x | y | ... ] Optional items are grouped in brackets and separated by vertical bars. One item is selected or no item is selected. { x | y | ... }* Optional items are grouped in braces and separated by vertical bars. A minimum of one item or a maximum of all items can be selected. [ x | y | ... ]* Optional items are grouped in brackets and separated by vertical bars. Several items or no item can be selected. &<1-n> The parameter before the & sign can be repeated 1 to n times. # A line starting with the # sign is comments. Interface Numbering Conventions Interface numbers used in this manual are examples. In device configuration, use the existing interface numbers on devices. Security Conventions l Issue 02 (2013-11-06) Password setting Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. iii S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference About This Document – When configuring a password in plain text, the password is saved in the configuration file in plain text. The plain text has high security risks. The cipher text is recommended. To ensure device security, change the password periodically. – When you configure a password in cipher text that starts and ends with %@%@ (the password can be decrypted by the device), the password is displayed in the same manner as the configured one in the configuration file. Do not use this setting. l Encryption algorithm Currently, the device uses the following encryption algorithms: DES, AES, SHA-1, SHA-2, and MD5. DES and AES are reversible, and SHA-1, SHA-2, and MD5 are irreversible. The encryption algorithm depends on actual networking. If protocols are used for interconnection, the locally stored password must be reversible. It is recommended that the irreversible encryption algorithm be used for the administrator password. l Personal data Some personal data may be obtained or used during operation or fault location of your purchased products, services, features, so you have an obligation to make privacy policies and take measures according to the applicable law of the country to protect personal data. Mappings between Product Software Versions and NMS Versions The mappings between product software versions and NMS versions are as follows. Product Software Version iManager U2000 V200R003C00 V100R009C00 V200R003C02 V100R009C10 Change History Changes between document issues are cumulative. Therefore, the latest document issue contains all updates made in previous issues. Changes in Issue 02 (2013-11-06) V200R003(C00&C02) Some contents are modified according to updates in the product. Changes in Issue 01 (2013-09-29) V200R003C00 Initial commercial release. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. iv S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference Contents Contents About This Document.....................................................................................................................ii 1 Basic Configuration Compatible Commands..........................................................................1 1.1 set save-configuration backup-to-server server..............................................................................................................2 1.2 set save-configuration.....................................................................................................................................................3 1.3 super................................................................................................................................................................................4 2 LAN Compatible Commands .....................................................................................................6 2.1 Link Aggregation Compatible Commands ....................................................................................................................7 2.1.1 load-balance.................................................................................................................................................................7 2.1.2 service-type tunnel.......................................................................................................................................................9 2.1.3 l2 field dport..............................................................................................................................................................10 2.1.4 ipv4 field dport..........................................................................................................................................................10 2.1.5 ipv6 field dport..........................................................................................................................................................11 2.1.6 mpls field dport..........................................................................................................................................................12 2.2 MAC Compatible Commands .....................................................................................................................................13 2.2.1 mac-address blackhole(interface view).....................................................................................................................13 2.2.2 mac-address static......................................................................................................................................................14 2.2.3 port-security mac-address sticky enable....................................................................................................................16 2.2.4 port-security maximum..............................................................................................................................................17 2.3 VLAN Compatible Commands ...................................................................................................................................18 2.3.1 port mux-vlan enable.................................................................................................................................................18 2.3.2 port vlan-stacking......................................................................................................................................................19 2.4 L2PT Compatible Commands .....................................................................................................................................21 2.4.1 bpdu-tunnel enable....................................................................................................................................................21 2.4.2 bpdu-tunnel vlan........................................................................................................................................................22 2.5 STP Compatible Commands .......................................................................................................................................23 2.5.1 bpdu filter..................................................................................................................................................................24 2.5.2 stp-snooping enable...................................................................................................................................................25 3 Interface Compatible Commands............................................................................................27 3.1 Ethernet Interface Compatible Commands...................................................................................................................28 3.1.1 port-down holdoff-time.............................................................................................................................................28 3.1.2 port media type..........................................................................................................................................................29 Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. v S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference Contents 3.1.3 display control-flap....................................................................................................................................................30 3.1.4 reset control-flap........................................................................................................................................................31 3.1.5 display ifnet controller-tree.......................................................................................................................................32 3.1.6 control-flap................................................................................................................................................................35 4 IP Service Compatible Commands..........................................................................................38 4.1 DHCP Compatible Commands.....................................................................................................................................39 4.1.1 expired.......................................................................................................................................................................39 4.1.2 dhcp server expired....................................................................................................................................................40 4.1.3 dhcp server forbidden-ip............................................................................................................................................42 4.1.4 dhcp server ip-pool....................................................................................................................................................43 4.1.5 dns-suffix...................................................................................................................................................................44 4.1.6 ip relay address .........................................................................................................................................................45 4.1.7 lease...........................................................................................................................................................................46 4.1.8 policy-vlan dhcp-generic...........................................................................................................................................48 4.1.9 policy-vlan dhcp-mac................................................................................................................................................49 4.1.10 policy-vlan dhcp-port..............................................................................................................................................51 5 IP Routing Compatible Commands.........................................................................................54 5.1 display bgp group.........................................................................................................................................................55 5.2 display bgp network......................................................................................................................................................56 5.3 display bgp paths..........................................................................................................................................................57 5.4 display bgp peer............................................................................................................................................................58 5.5 display bgp routing-table dampened.............................................................................................................................59 5.6 display bgp routing-table dampening parameter..........................................................................................................60 5.7 display bgp routing-table flap-info...............................................................................................................................60 5.8 display bgp routing-table label.....................................................................................................................................62 5.9 display bgp update-peer-group.....................................................................................................................................63 5.10 display ipv6 nexthop-indirection................................................................................................................................63 5.11 display ipv6 routing-table statistics............................................................................................................................64 5.12 display ipv6 routing-table time-range.........................................................................................................................66 5.13 display rm ipv6 interface............................................................................................................................................68 5.14 ipv6 route-static vpn6-instance...................................................................................................................................69 5.15 ipv6-family vpn6-instance..........................................................................................................................................71 5.16 isis vpn6-instance.......................................................................................................................................................72 5.17 reset ipv6 routing-table statistics protocol..................................................................................................................73 6 Multicast Compatible Commands...........................................................................................75 6.1 Layer 2 Multicast Compatible Commands...................................................................................................................76 6.1.1 display igmp-proxy configuration.............................................................................................................................76 6.1.2 display igmp-proxy....................................................................................................................................................77 6.1.3 display igmp-proxy port-info.....................................................................................................................................79 6.1.4 display igmp-proxy router-port.................................................................................................................................81 Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. vi S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference Contents 6.1.5 igmp-proxy enable.....................................................................................................................................................82 6.1.6 igmp-proxy group-limit.............................................................................................................................................83 6.1.7 igmp-proxy group-policy (interface view)................................................................................................................84 6.1.8 igmp-proxy group-policy (VLAN view)...................................................................................................................86 6.1.9 igmp-proxy lastmember-queryinterval......................................................................................................................87 6.1.10 igmp-proxy max-response-time...............................................................................................................................88 6.1.11 igmp-proxy prompt-leave........................................................................................................................................89 6.1.12 igmp-proxy query-interval.......................................................................................................................................91 6.1.13 igmp-proxy require-router-alert...............................................................................................................................92 6.1.14 igmp-proxy robust-count.........................................................................................................................................93 6.1.15 igmp-proxy router-aging-time.................................................................................................................................94 6.1.16 igmp-proxy send-query enable................................................................................................................................95 6.1.17 igmp-proxy send-query source-address...................................................................................................................96 6.1.18 igmp-proxy ssm-policy............................................................................................................................................97 6.1.19 igmp-proxy static-group..........................................................................................................................................98 6.1.20 igmp-proxy static-router-port..................................................................................................................................99 6.1.21 igmp-proxy table limit...........................................................................................................................................100 6.1.22 igmp-proxy version................................................................................................................................................101 6.1.23 igmp-snooping group-policy (interface view).......................................................................................................102 6.1.24 igmp-snooping group-policy (VLAN view)..........................................................................................................103 6.1.25 igmp-snooping proxy enable.................................................................................................................................104 6.1.26 igmp-snooping ssm-policy....................................................................................................................................105 6.1.27 igmp-snooping static-group...................................................................................................................................106 6.1.28 igmp-snooping suppression-time...........................................................................................................................107 6.1.29 igmp-snooping table limit......................................................................................................................................108 6.1.30 mld-snooping group-policy (interface view).........................................................................................................109 6.1.31 mld-snooping group-policy (VLAN view)............................................................................................................111 6.1.32 multicast user-vlan.................................................................................................................................................113 6.1.33 multicast-source-deny interface.............................................................................................................................114 6.1.34 reset igmp-proxy group.........................................................................................................................................115 6.1.35 undo igmp-proxy router-learning..........................................................................................................................116 6.1.36 undo igmp-proxy send-router-alert........................................................................................................................117 7 QoS compatible command.......................................................................................................118 7.1 cpu queue bpdu...........................................................................................................................................................119 7.2 port queue statistics enable.........................................................................................................................................120 7.3 qos drr (scheduling template view)............................................................................................................................121 7.4 qos local-precedence-queue-map................................................................................................................................122 7.5 qos queue....................................................................................................................................................................124 7.6 qos queue max-buffer.................................................................................................................................................126 7.7 qos queue max-length (tail drop template view)........................................................................................................127 7.8 qos queue statistics enable..........................................................................................................................................129 Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. vii S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference Contents 7.9 qos sred.......................................................................................................................................................................131 7.10 qos wrr (scheduling template view)..........................................................................................................................132 8 Security Compatible Commands............................................................................................135 8.1 AAA Compatible Commands.....................................................................................................................................136 8.1.1 adminuser-priority...................................................................................................................................................136 8.1.2 local-user level.........................................................................................................................................................136 8.1.3 local-user password old-password...........................................................................................................................137 8.1.4 radius-server test-user detect interval......................................................................................................................139 8.2 DHCP Snooping Compatible Commands..................................................................................................................140 8.2.1 dhcp option82 format...............................................................................................................................................140 8.2.2 dhcp snooping bind-table.........................................................................................................................................141 8.2.3 dhcp snooping information circuit-id......................................................................................................................142 8.2.4 dhcp snooping information remote-id.....................................................................................................................143 8.2.5 dhcp snooping information format..........................................................................................................................144 8.2.6 dhcp snooping check dhcp-rate enable....................................................................................................................145 8.2.7 dhcp snooping global max-user-number.................................................................................................................146 8.2.8 dhcp snooping sticky-mac.......................................................................................................................................147 8.2.9 dhcp snooping trust..................................................................................................................................................149 8.3 NAC Compatible Commands.....................................................................................................................................150 8.3.1 mac-authen username fixed password.....................................................................................................................150 8.3.2 web-auth-server (system view)................................................................................................................................151 8.4 Local Attack Defense Compatible Commands..........................................................................................................152 8.4.1 blacklist....................................................................................................................................................................152 8.4.2 car............................................................................................................................................................................153 8.4.3 car cpu-port..............................................................................................................................................................154 8.4.4 cpu-defend linkup-car bgp enable...........................................................................................................................155 8.4.5 deny.........................................................................................................................................................................156 8.5 IP Source Guard Compatible Commands...................................................................................................................157 8.5.1 ip anti-attack source-ip equals destinetion-ip drop..................................................................................................157 8.5.2 ip source check........................................................................................................................................................158 8.6 URPF Compatible Commands...................................................................................................................................159 8.6.1 urpf (interface view)................................................................................................................................................159 8.7 Traffic Suppression Compatible Commands..............................................................................................................160 8.7.1 broadcast-suppression..............................................................................................................................................161 8.7.2 multicast-suppression..............................................................................................................................................162 8.7.3 unicast-suppression..................................................................................................................................................163 8.8 ACL Compatible Commands.....................................................................................................................................164 8.8.1 acl ipv6....................................................................................................................................................................164 8.8.2 acl (system view).....................................................................................................................................................165 8.8.3 rule (ACL6).............................................................................................................................................................167 9 Reliability Compatible Commands.......................................................................................170 Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. viii S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference Contents 9.1 VRRP Compatible Commands...................................................................................................................................171 9.1.1 clear vrrp-config......................................................................................................................................................171 9.2 Smart Link Compatible Commands...........................................................................................................................171 9.2.1 load-balance reference-instance...............................................................................................................................172 9.3 Ethernet OAM Compatible Commands.....................................................................................................................173 9.3.1 efm trigger if-net......................................................................................................................................................173 9.3.2 error-shutdown auto-recovery cause efm-threshold-event......................................................................................174 9.3.3 error-shutdown auto-recovery interval....................................................................................................................175 10 Device Management Compatible Commands...................................................................177 10.1 vrbd...........................................................................................................................................................................179 10.2 _shell.........................................................................................................................................................................179 10.3 backup elabel............................................................................................................................................................181 10.4 cpu-usage threshold..................................................................................................................................................182 10.5 display autosave config............................................................................................................................................183 10.6 display environment.................................................................................................................................................184 10.7 display elabel unit.....................................................................................................................................................185 10.8 display fault-management.........................................................................................................................................188 10.9 display fault-management alarm information...........................................................................................................189 10.10 display reboot-info..................................................................................................................................................191 10.11 fault-management alarm.........................................................................................................................................192 10.12 reset reboot-info......................................................................................................................................................195 10.13 display alarm urgent...............................................................................................................................................196 10.14 reset alarm urgent...................................................................................................................................................197 10.15 temperature threshold unit......................................................................................................................................198 10.16 port-mirroring to observe-port................................................................................................................................199 10.17 poe power...............................................................................................................................................................201 10.18 port-mirroring.........................................................................................................................................................202 10.19 reset fault-management...........................................................................................................................................203 11 Network Management Compatible Commands............................................................... 205 11.1 Ping and Tracert Compatible Commands.................................................................................................................206 11.1.1 ping ipv6................................................................................................................................................................206 11.1.2 tracert ipv6.............................................................................................................................................................211 11.2 NTP Compatible Commands....................................................................................................................................216 11.2.1 ntp-service authentication-keyid............................................................................................................................216 11.3 SNMP Compatible Commands................................................................................................................................219 11.3.1 snmp-agent usm-user.............................................................................................................................................219 12 MPLS compatible command................................................................................................. 226 12.1 explicit-path..............................................................................................................................................................227 12.2 mpls te bypass-tunnel bandwidth.............................................................................................................................228 12.3 snmp-agent trap enable feature-name ldp.................................................................................................................229 Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. ix S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference Contents 12.4 static-cr-lsp ingress bandwidth.................................................................................................................................230 12.5 static-cr-lsp transit bandwidth..................................................................................................................................231 12.6 bandwidth (LSP attribute view)................................................................................................................................233 12.7 mpls te bandwidth.....................................................................................................................................................234 13 VPN compatible command....................................................................................................236 13.1 display bgp vpnv6 brief............................................................................................................................................237 13.2 display bgp vpnv6 vpn6-instance brief.....................................................................................................................238 13.3 display bgp vpnv6 vpn6-instance routing-table........................................................................................................239 13.4 display bgp vpnv6 vpn6-instance routing-table statistics.........................................................................................245 13.5 display ipv6 prefix-limit statistics............................................................................................................................248 13.6 display ipv6 routing-table limit................................................................................................................................250 13.7 display ipv6 routing-table vpn6-instance.................................................................................................................252 13.8 display ipv6 vpn6-instance.......................................................................................................................................258 13.9 link-alive...................................................................................................................................................................264 13.10 mpls l2vpn traffic-statistics capability enable........................................................................................................265 Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. x S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 1 1 Basic Configuration Compatible Commands Basic Configuration Compatible Commands About This Chapter 1.1 set save-configuration backup-to-server server 1.2 set save-configuration 1.3 super Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 1 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 1 Basic Configuration Compatible Commands 1.1 set save-configuration backup-to-server server Function The set save-configuration backup-to-server server command specifies the server where the system periodically saves the configuration file. By default, the system does not periodically save configurations to the server. Format set save-configuration backup-to-server server server-ip [ transport-type { ftp | sftp } ] path folder user user-name password password Parameters Parameter Description server server-ip Specifies the IP address of the server where the system periodically saves the configuration file. transport-type Specifies the mode in which the configuration file is transmitted to the server. The value can be ftp or sftp. user user-name Specifies the name of the user who saves the configuration file on the server. The value is a string of 1 to 64 case-sensitive characters without spaces. password password Specifies the password of the user who saves the configuration file on the server. The value is a string of 1 to 16 or 32 case-sensitive characters without spaces. path folder Value Specifies the relative save path on the The value is a string of 1 to 64 server. case-sensitive characters without spaces. Views System view Default Level 3: Management level Usage Guidelines Usage Scenario Run this command to periodically save the configuration file to the server. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 2 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 1 Basic Configuration Compatible Commands Precautions If the mode in which the configuration file is transmitted to the server is not specified, FTP is used. If the specified path on the server does not exist, configuration files cannot be sent to the server. The system then sends an alarm message indicating the transmission failure to the NMS, and the transmission failure is recorded as a log message on the device. The user name and password must be the same as those used in FTP or SFTP login mode. Example # Specify the server to which the system periodically sends the configuration file, and set the transmission mode to SFTP. <HUAWEI> system-view [HUAWEI] set save-configuration backup-to-server server 1.1.1.1 transport-type sftp path d:/ftp user huawei password huawei 1.2 set save-configuration Function Using the set save-configuration command, you can enable automatic saving of configurations. Using the undo set save-configuration command, you can disable automatic saving of configurations. By default, automatic saving of configurations is not enabled. Format set save-configuration nochange-time nochange-time undo set save-configuration nochange-time [ nochange-time ] Parameters Parameter Description Value nochange-time nochangetime Specifies a period and configures the system to automatically save configurations if no configurations are changed over the specified period. The value is an integer ranging from 30 to 43200, in minutes. The default value is 30. Views System view Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 3 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 1 Basic Configuration Compatible Commands Default Level 3: Management level Usage Guidelines If nochange-time nochange-time is specified in the command, the system automatically saves configurations if no configuration changes in the period specified by nochange-time. If the interval from the time of the last configuration to the current time is shorter than the set interval, the system cancels the current automatic saving operation. Example # Configure the system to automatically save configurations at 60-minute intervals if no configuration changes in the period. <HUAWEI> system-view [HUAWEI] set save-configuration nochange-time 60 1.3 super Function The super command changes the level of a user. Format super [ level ] Parameters Parameter Description level Value Specifies the user level. The value is an integer that ranges from 0 to 15. The default user level is 3. Views User view Default Level 0: Visit level Usage Guidelines Usage Scenario To prevent illegal intrusion of unauthorized users, when a user switches to a higher user level, the system authenticates the user identity by requiring the user to input the password for the higher user level. If the user inputs an incorrect password, the login fails. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 4 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 1 Basic Configuration Compatible Commands NOTE The device supports this command only when the super password command is configured in the history version and the device has upgraded to the current version. Precautions Users are assigned one of 16 levels, and these levels correspond to command levels. After logging in to the system, users can use only the commands whose levels are equal to or lower than their user levels. The password that the user enters is not displayed. If the user inputs the correct password within three times, the user switches to the higher user level. If the password is incorrect, the user level remains unchanged. Example # Switch users to level 3. <HUAWEI> super 3 Password: Now user privilege is 3 level, and only those commands whose level is equal to or less than this level can be used. Privilege note: 0-VISIT, 1-MONITOR, 2-SYSTEM, 3-MANAGE Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 5 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 2 2 LAN Compatible Commands LAN Compatible Commands About This Chapter 2.1 Link Aggregation Compatible Commands 2.2 MAC Compatible Commands 2.3 VLAN Compatible Commands 2.4 L2PT Compatible Commands 2.5 STP Compatible Commands Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 6 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 2 LAN Compatible Commands 2.1 Link Aggregation Compatible Commands 2.1.1 load-balance Function Using the load-balance command, you can set the load balancing mode of an Eth-Trunk. Format load-balance { dip | dmac | sip | smac | sipxordip | smacxordmac } Parameters Parameter Description Value dip Indicates load balancing based on the destination IP addresses. - dmac Indicates load balancing based on the destination MAC addresses. - sip Indicates load balancing based on the source IP addresses. - smac Indicates load balancing based on the source MAC addresses. - sipxordip Indicates load balancing based on the Exclusive-OR result of the source and destination IP addresses. - smacxordmac Indicates load balancing based on the Exclusive-OR result of the source and destination MAC addresses. - Views Eth-Trunk interface view Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 7 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 2 LAN Compatible Commands Default Level 2: Configuration level Usage Guidelines To ensure proper load balancing between the physical links of an Eth-Trunk interface and avoid link congestion, you can use the load-balance command to set the load balancing mode of the Eth-Trunk interface. Load balancing is valid only for the outbound traffic; therefore, the load balancing modes for the interfaces at both ends of the link can be different and do not affect each other. If you run the load-balance command repeatedly, only the latest configuration takes effect. You can set the load balancing mode according to the actual situation of the network. When a parameter of traffic changes frequently, you can set the load balancing mode based on this parameter to ensure that the traffic is load balanced evenly. The device supports the following load balancing modes: l dip: load balancing based on the destination IP address. In this mode, the system obtains the specified three bits from each of the destination IP address and the TCP or UDP port number in outgoing packets to perform the Exclusive-OR calculation, and then selects the outgoing interface from the Eth-Trunk table according to the calculation result. l dmac: load balancing based on the destination MAC address. In this mode, the system obtains the specified three bits from each of the destination MAC address, VLAN ID, Ethernet type, and incoming interface information to perform the Exclusive-OR calculation, and then selects the outgoing interface from the Eth-Trunk table according to the calculation result. l sip: load balancing based on the source IP address. In this mode, the system obtains the specified three bits from each of the source IP address and the TCP or UDP port number in incoming packets to perform the Exclusive-OR calculation, and then selects the outgoing interface from the Eth-Trunk table according to the calculation result. l smac: load balancing based on the source MAC address. In this mode, the system obtains the specified three bits from each of the source MAC address, VLAN ID, Ethernet type, and incoming interface information to perform the Exclusive-OR calculation, and then selects the outgoing interface from the Eth-Trunk table according to the calculation result. l sipxordip: load balancing based on the Exclusive-OR result of the source IP address and destination IP address. In this mode, the system performs the Exclusive-OR calculation between the Exclusive-OR results of the dip and sip modes, and then selects the outgoing interface from the Eth-Trunk table according to the calculation result. l smacxordmac: load balancing based on the Exclusive-OR result of the source MAC address and destination MAC address. In this mode, the system obtains three bits from each of the source MAC address, destination MAC address, VLAN ID, Ethernet type, and incoming interface information to perform the Exclusive-OR calculation, and then selects the outgoing interface from the Eth-Trunk table according to the calculation result. Example # Set the load balancing mode of Eth-Trunk 1 to dmac. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 8 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 2 LAN Compatible Commands <HUAWEI> system-view [HUAWEI] interface Eth-Trunk 1 [HUAWEI-Eth-Trunk1] load-balance dmac 2.1.2 service-type tunnel Function Using the service-type tunnel command, you can enable the service loopback function on an Eth-Trunk interface to loop back service packets over tunnels. Using the undo service-type tunnel command, you can disable the service loopback function on an Eth-Trunk interface. By default, the service loopback function is not enabled on an Eth-Trunk interface. NOTE S2350, S5300LI, S5306 do not support this command. Format service-type tunnel undo service-type tunnel Parameters None Views Eth-Trunk interface view Default Level 2: Configuration level Usage Guidelines An IPv6 packet is encapsulated in an IPv4 packet header by a device, and then is forwarded by the device according to the IPv4 routing table. NOTE After being configured as a service loopback interface, an Eth-Trunk interface can be used only to loop back service packets over tunnels. A device can be configured with only one service loopback interface. Example # Configure Eth-Trunk 0 as a service loopback interface. <HUAWEI> system-view [HUAWEI] interface eth-trunk 0 [HUAWEI-Eth-Trunk0] service-type tunnel Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 9 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 2 LAN Compatible Commands 2.1.3 l2 field dport Function The l2 field dport command sets the load balancing mode of Layer 2 packets to dport in a load balancing profile. The undo l2 field dport command deletes the load balancing mode of Layer 2 packets or restores the default load balancing mode of Layer 2 packets. Product Support S5300 Only the S5300HI and S5310EI support this configuration. S6300 Not supported Format l2 field dport undo l2 field dport Parameters None Views Load balancing profile view Default Level 2: Configuration level Usage Guidelines None 2.1.4 ipv4 field dport Function The ipv4 field dport command sets the load balancing mode of IPv4 packets to dportin a load balancing profile. The undo ipv4 field dport command deletes the load balancing mode of IPv4 packets or restores the default load balancing mode of IPv4 packets. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 10 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 2 LAN Compatible Commands Product Support S5300 Only the S5300HI and S5310EI support the ipv4 field command. S6300 Not supported Format ipv4 field dport undo ipv4 field dport Parameters None Views Load balancing profile view Default Level 2: Configuration level Usage Guidelines None. 2.1.5 ipv6 field dport Function The ipv6 field dport command sets the load balancing mode of IPv6 packets to dport in a load balancing profile. The undo ipv6 field dport command deletes the load balancing mode of IPv6 packets or restores the default load balancing mode of IPv6 packets. Product Support S5300 Only the S5300HI and S5310EI support the ipv6 field command. S6300 Not supported Format ipv6 field dport Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 11 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 2 LAN Compatible Commands undo ipv6 field dport Parameters None Views Load balancing profile view Default Level 2: Configuration level Usage Guidelines None 2.1.6 mpls field dport Function The mpls field dport sets the load balancing mode of MPLS packets to dport in a load balancing profile. The undo mpls field dport command deletes the load balancing mode of MPLS packets or restores the default load balancing mode of MPLS packets. Product Support S5300 Only the S5300HI and S5310EI support the mpls field command. S6300 Not supported Format mpls field dport undo mpls field dport Parameters None Views Load balancing profile view Default Level 2: Configuration level Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 12 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 2 LAN Compatible Commands Usage Guidelines None 2.2 MAC Compatible Commands 2.2.1 mac-address blackhole(interface view) Function Using the mac-address blackhole command, you can add a blackhole MAC address entry. Format mac-address blackhole mac-address [ interface-type interface-number ] vlan vlan-id1 [ cevlan vlan-id2 ] Parameters Parameter Description Value blackhole Indicates blackhole MAC address entries. If the source or destination MAC address of a packet is a blackhole MAC address, the device discards the packet. - mac-address Specifies the destination MAC address in a MAC address entry. The value is in H-H-H format. H is a hexadecimal number of 1 to 4 digits. interface-type interfacenumber Specifies the outbound interface in a MAC address entry. - l interface-type specifies the type of the outbound interface. l interface-number specifies the number of the outbound interface. vlan vlan-id1 Specifies the VLAN ID in the outer VLAN tag. The value is an integer that ranges from 1 to 4094. Views Ethernet interface view, GE interface view, XGE interface view, Eth-Trunk interface view Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 13 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 2 LAN Compatible Commands Default Level 2: Configuration level Usage Guidelines Usage Scenario Blackhole MAC address entries that are manually configured. A data frame is discarded if the source or destination MAC address matches a blackhole MAC address entry. Functions of static and blackhole MAC address entries are: Blackhole MAC address entries prevent untrusted devices from attacking the device. Precautions If you configure a blackhole MAC address entry when the MAC table is full, the device processes the MAC address entry as follows: l If a dynamic MAC address entry with the same MAC address exists in the MAC address table, the device replaces the dynamic MAC address entry with the configured entry. l If no dynamic MAC address entry with the same MAC address exists in the MAC address table, the MAC address entries cannot be added to the MAC address table. Example # Configure a blackhole MAC address entry to discard the Ethernet frames whose destination MAC address is 0004-0004-0004 and VLAN ID is VLAN 5. <HUAWEI> system-view [HUAWEI] interface GigabitEthernet 0/0/1 [HUAWEI-GigabitEthernet0/0/1] mac-address blackhole 4-4-4 vlan 5 2.2.2 mac-address static Function Using the mac-address static command, you can add a static MAC address entry . Format mac-address static mac-address interface-type interface-number vlan vlan-id1 Parameters Issue 02 (2013-11-06) Parameter Description Value static Indicates static MAC address entries, that is, MAC address entries configured manually. - Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 14 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 2 LAN Compatible Commands Parameter Description Value mac-address Specifies the destination MAC address in a MAC address entry. The value is in H-H-H format. H is a hexadecimal number of 1 to 4 digits. interface-type interfacenumber Specifies the outbound interface in a MAC address entry. - l interface-type specifies the type of the outbound interface. l interface-number specifies the number of the outbound interface. vlan vlan-id1 Specifies the VLAN ID in the outer VLAN tag. The value is an integer that ranges from 1 to 4094. Views Ethernet interface view, GE interface view, XGE interface view, Eth-Trunk interface view Default Level 2: Configuration level Usage Guidelines Usage Scenario Static MAC address entries that are manually configured. They take precedence over dynamic MAC address entries. Functions of static MAC address entries are: Static MAC address entries prevent bogus packets with trusted device MAC addresses sent from attackers and guarantee communication between the device and the upstream device or server. Configuration Impact You can configure multiple static MAC address entries by running the mac-address command multiple times. Precautions If you configure a static MAC address entry when the MAC table is full, the device processes the MAC address entry as follows: l Issue 02 (2013-11-06) If a dynamic MAC address entry with the same MAC address exists in the MAC address table, the device replaces the dynamic MAC address entry with the configured entry. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 15 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference l 2 LAN Compatible Commands If no dynamic MAC address entry with the same MAC address exists in the MAC address table, the MAC address entries cannot be added to the MAC address table. Example # Add a static MAC address entry to the MAC address table. The destination MAC address is 0003-0003-0003. The outbound interface is GigabitEthernet0/0/1, which belongs to VLAN 4. <HUAWEI> system-view [HUAWEI] mac-address static 3-3-3 GigabitEthernet 0/0/1 vlan 4 2.2.3 port-security mac-address sticky enable Function Using the port-security mac-address sticky enable, you can enable the sticky MAC function on an interface. Using the undo port-security mac-address sticky enable, you can disable the sticky MAC function on an interface. By default, the sticky MAC function is disabled on an interface. Format port-security mac-address sticky enable undo port-security mac-address sticky enable Parameters None Views Ethernet interface view, GE interface view, XGE interface view, Eth-Trunk interface view Default Level 2: Configuration level Usage Guidelines Usage Scenario After port security is enabled on an interface, MAC address entries learned by the interface are saved in the MAC address table as secure dynamic MAC address entries. After the sticky MAC function is enabled on an interface, the dynamic MAC addresses learned by the interface change to sticky MAC addresses. If the number of sticky MAC addresses does not reach the limit, the MAC addresses learned subsequently change to sticky MAC addresses. When the number of sticky MAC addresses reaches the limit, packets whose source MAC addresses do not match sticky MAC address entries are discarded. In addition, the system determines whether to send a trap message or shut down the interface according to the configured security protection action. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 16 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 2 LAN Compatible Commands Prerequisites Port security has been enabled by using the port-security enable command on the interface. Example # Enable the sticky MAC function on GigabitEthernet0/0/1. <HUAWEI> system-view [HUAWEI] interface gigabitethernet0/0/1 [HUAWEI-GigabitEthernet0/0/1] port-security enable [HUAWEI-GigabitEthernet0/0/1] port-security mac-address sticky enable 2.2.4 port-security maximum Function The port-security maximum command sets the maximum number of MAC addresses that can be learned on an interface. Format port-security maximum max-number Parameters Parameter Description max-number Specifies the maximum number of MAC addresses that can be learned by an interface. Value Views Ethernet interface view, GE interface view, XGE interface view, Eth-Trunk interface view Default Level 2: Configuration level Usage Guidelines Usage Scenario After enabling port security on an interface, you can run the port-security maximum command to limit the number of MAC addresses that the interface can learn. Prerequisites Port security has been enabled by using the port-security enable command on the interface. Configuration Impact Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 17 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 2 LAN Compatible Commands If you run the port-security maximum command multiple times in the same interface view, only the latest configuration takes effect. Precautions If the sticky MAC function is disabled, max-number limits the number of secure dynamic MAC addresses learned by the interface. If the sticky MAC function is enabled, max-number limits the number of sticky MAC addresses learned by the interface. Example # Set the maximum number of MAC addresses that can be learned by GigabitEthernet0/0/1 to 5. <HUAWEI> system-view [HUAWEI] interface gigabitethernet 0/0/1 [HUAWEI-GigabitEthernet0/0/1] port-security enable [HUAWEI-GigabitEthernet0/0/1] port-security maximum 5 2.3 VLAN Compatible Commands 2.3.1 port mux-vlan enable Function The port mux-vlan enable command enables the MUX VLAN function on an interface. The undo port mux-vlan enable command disables the MUX VLAN function on an interface. By default, the MUX VLAN function is disabled on an interface. Format port mux-vlan enable undo port mux-vlan enable Parameters None Views GE interface view, XGE interface view, Eth-Trunk interface view, port group view Default Level 2: Configuration level Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 18 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 2 LAN Compatible Commands Usage Guidelines Usage Scenario The MUX VLAN function isolates Layer 2 traffic between interfaces in a VLAN. This function involves a MUX VLAN and several subordinate VLANs. Subordinate VLANs are classified into subordinate group VLANs and subordinate separate VLANs. Subordinate VLANs can communicate with the principal VLAN but cannot communicate with each other. Interfaces in a subordinate group VLAN can communicate with each other, and interfaces in a subordinate separate VLAN are isolated from each other. The MUX VLAN function takes effect only after it is enabled on an interface. Prerequisites Before enable MUX VLAN function, complete the following task: l The port has been added to a principal or subordinate VLAN as an access, hybrid, or trunk interface. l The port has been added to only a VLAN. If the port has been added to multiple VLANs, the MUX VLAN function cannot be enabled on this port. l The port has been added to a principal or subordinate VLAN in untagged mode as an access or hybrid interface. Precautions Disabling MAC address learning or limiting the number of learned MAC addresses on an interface affects the MUX VLAN function on the interface. The MUX VLAN and port security functions conflict on an interface. That is, the port-security enable and port mux-vlan enable commands cannot be used on the same interface. The MUX VLAN and MAC address authentication conflict on an interface; therefore, the port mux-vlan enable and mac-authen command cannot be used on the same interface. The MUX VLAN and 802.1x authentication conflict on an interface; therefore, the port muxvlan enable and dot1x enable command cannot be used on the same interface. Example # Enable the MUX VLAN function on GE0/0/1. <HUAWEI> system-view [HUAWEI] interface gigabitethernet 0/0/1 [HUAWEI-GigabitEthernet0/0/1] port mux-vlan enable 2.3.2 port vlan-stacking Function The port vlan-stacking command enables selective QinQ. Format port vlan-stacking vlan vlan-id1 [ to vlan-id2 ] push vlan vlan-id3 { remark-8021p 8021pvalue | priority-inherit } Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 19 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 2 LAN Compatible Commands Parameters Parameter Description Value vlan vlan-id1 [ to vlan-id2 ] Specifies a range of customer VLAN (C-VLAN) IDs. The value of vlan-id1 is an integer that ranges from 1 to 4094. l vlan-id1 specifies the start C-VLAN ID. l to vlan-id2 specifies the last C-VLAN ID. The value of vlan-id2 must be greater than the value of vlan-id1. The vlan-id1 and vlan-id2 parameters identify a range of VLANs. The value of vlan-id2 is an integer that ranges from 1 to 4094. push vlan vlan-id3 Specifies the VLAN ID in the outer tags added to frames. The value is an integer that ranges from 1 to 4094. remark-8021p 8021p-value Specifies the internal priority in the stacked outer VLAN tag. The value is an integer that ranges from 0 to 7. The greater the value is, the higher the priority is. By default, the priority in the stacked outer VLAN tag is the same as the priority in the inner VLAN tag. priority-inherit Indicates that the 802.1p priority in the outer VLAN tag of data frames inherits the 802.1p priority in the stacked outer VLAN tag. - Views Ethernet interface view, GE interface view, XGE interface view, Eth-Trunk interface view Default Level 2: Configuration level Usage Guidelines When the user packets traverse the ISP network, you can use the port vlan-stacking command to add a VLAN tag to the data frames sent from user VLANs so that the data frames contain double VLAN tags. When you configure selective QinQ, pay attention to the following points: Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 20 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 2 LAN Compatible Commands l Selective QinQ can be configured only on hybrid interfaces and it takes effect only in the inbound direction. l The specified stack VLAN ID must exist and the interface must be added to the specified stack VLAN in untagged mode. Example # Configure selective QinQ on GigabitEthernet 0/0/1. Add outer VLAN tag 100 to the frames with C-VLAN IDs 10-13. <HUAWEI> system-view [HUAWEI] interface gigabitethernet [HUAWEI-GigabitEthernet0/0/1] qinq [HUAWEI-GigabitEthernet0/0/1] port [HUAWEI-GigabitEthernet0/0/1] port priority-inherit 0/0/1 vlan-translation enable hybrid untagged vlan 100 vlan-stacking vlan 10 to 13 push vlan 100 2.4 L2PT Compatible Commands 2.4.1 bpdu-tunnel enable Function The bpdu-tunnel enable command enables Layer 2 protocol transparent transmission on an interface. Format bpdu-tunnel { all | protocol-type &<1-14> } enable Parameters Parameter Description Value all Enables or disables transparent transmission of packets of all standard Layer 2 protocols and user-defined Layer 2 protocols. - protocol-type Enables or disables transparent transmission of packets of a specified Layer 2 protocol. - NOTE You can specify multiple protocols in the command. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 21 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 2 LAN Compatible Commands Views Ethernet interface view, XGE interface view, GE interface view, Eth-Trunk interface view, port group view Default Level 2: Configuration level Usage Guidelines After a user-side interface of a PE on an ISP network is enabled to transparently transmit Layer 2 protocol packets, the interface directly forwards Layer 2 protocol packets sent from a user network instead of sending the packets to the CPU. In this way, Layer 2 protocol packets are transparently transmitted through the ISP network. Generally, the bpdu-tunnel enable command is run on user-side interfaces of PEs. Example # Configure GE0/0/1 to transparently transmit all Layer 2 protocols. <HUAWEI> system-view [HUAWEI] interface gigabitethernet 0/0/1 [HUAWEI-GigabitEthernet0/0/1] bpdu-tunnel all enable 2.4.2 bpdu-tunnel vlan Function The bpdu-tunnel vlan command enables VLAN-based Layer 2 protocol transparent transmission on an interface. Format bpdu-tunnel { all | protocol-type &<1-14> } vlan { low-id [ to high-id ] } &<1-10> Parameters Issue 02 (2013-11-06) Parameter Description Value all Enables or disables transparent transmission of packets of all standard Layer 2 protocols and user-defined Layer 2 protocols. - Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 22 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 2 LAN Compatible Commands Parameter Description Value protocol-type Enables or disables transparent transmission of packets of a specified Layer 2 protocol. - NOTE You can specify multiple protocols in the command. low-id Specifies the start VLAN ID. The value is an integer that ranges from 1 to 4094. The value must be smaller than the end VLAN ID. high-id Specifies the end VLAN ID. The value is an integer that ranges from 1 to 4094. The value must be greater than the start VLAN ID. Views Ethernet interface view, XGE interface view, GE interface view, Eth-Trunk interface view, port group view Default Level 2: Configuration level Usage Guidelines After a user-side interface of a PE on an ISP network is enabled to transparently transmit Layer 2 protocol packets, the interface directly forwards Layer 2 protocol packets sent from a user network instead of sending the packets to the CPU. In this way, Layer 2 protocol packets are transparently transmitted through the ISP network. The bpdu-tunnel vlan command is usually used on user-side interfaces of PEs. Example # Enable GE0/0/1 to transparently transmit all Layer 2 protocols with VLAN tags ranging from 100 to 200. <HUAWEI> system-view [HUAWEI] vlan batch 100 to 200 [HUAWEI] interface gigabitethernet 0/0/1 [HUAWEI-GigabitEthernet0/0/1] port link-type trunk [HUAWEI-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 to 200 [HUAWEI-GigabitEthernet0/0/1] bpdu-tunnel all vlan 100 to 200 2.5 STP Compatible Commands Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 23 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 2 LAN Compatible Commands 2.5.1 bpdu filter Function Using the bpdu filter enable command, you can configure a port as a BPDU filter port. Using the bpdu filter disable command, you can configure a port as a non-BPDU filter port. By default, a port is a non-BPDU filter port. Format bpdu filter enable bpdu filter disable Parameters None Views Ethernet interface view, GE interface view, XGE interface view, Eth-Trunk interface view Default Level 2: Configuration level Usage Guidelines CAUTION After you run the bpdu filter enable command on a port, the port no longer process or send BPDUs. In this case, the port cannot negotiate the STP status with the directly connected port on the peer device; therefore, use this command with caution. It is recommended that you use this command on edge ports. This command is usually used on edge devices to prevent edge ports from processing and sending BPDUs. If this command is not used on an edge device, ports of the device are non-BPDU filter ports. In this case, the ports can send BPDUs even if they are configured as edge ports. Then BPDUs are sent to other networks, causing flapping of other networks. After you run the bpdu filter disable command on a port, the port becomes a non-BPDU filter port. This port remains a non-BPDU filter port after you run the stp bpdu-filter default command in the system view. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 24 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 2 LAN Compatible Commands Example # Configure GE0/0/1 on an edge device as a non-BPDU filter port. <HUAWEI> system-view [HUAWEI] interface gigabitethernet 0/0/1 [HUAWEI-GigabitEthernet0/0/1] bpdu filter disable # Configure GE0/0/2 on an edge device as a BPDU filter port. <HUAWEI> system-view [HUAWEI] interface gigabitethernet 0/0/2 [HUAWEI-GigabitEthernet0/0/2] bpdu filter enable 2.5.2 stp-snooping enable Function Using the stp-snooping enable command, you can enable STP snooping. Using the stp-snooping disable command, you can disable STP snooping. By default, STP snooping is disabled on interfaces. Format stp-snooping enable stp-snooping disable Parameters None Views System view Default Level 2: Configuration level Usage Guidelines After the l2protocol-tunnel command is used to enable transparent transmission of Layer 2 protocol packets on untagged interfaces or the l2protocol-tunnel vlan command is used to enable transparent transmission of Layer 2 protocol packets on tagged packets, the untagged or tagged interfaces directly forward Layer 2 protocol packets sent from user networks over the ISP's network rather than send them to the CPU for processing. When a device enabled with transparent transmission of Layer 2 protocol packets receives TC packets, if the stp-snooping enable command is used, the device clears the MAC entries and ARP entires and updates the forwarding table. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 25 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 2 LAN Compatible Commands Example # Enable STP snooping. <HUAWEI> system-view [HUAWEI] stp-snooping enable Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 26 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 3 3 Interface Compatible Commands Interface Compatible Commands About This Chapter 3.1 Ethernet Interface Compatible Commands Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 27 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 3 Interface Compatible Commands 3.1 Ethernet Interface Compatible Commands 3.1.1 port-down holdoff-time Function Using the port-down holdoff-time command, you can set the delay in reporting a port status change event. Format port-down holdoff-time interval Parameters Parameter Description Value interval Specifies the delay time. The value is an integer. The value can be 0 or in the range of 50 to 50000, in milliseconds. Views Ethernet interface view, GE interface view, XGE interface view Default Level 2: Configuration level Usage Guidelines Usage Scenario When the cable connected to an interface is faulty, the interface status may change frequently. When this occurs, the system frequently updates the matching entries. If link backup is configured on the interface, active/standby switchovers occur frequently. To prevent frequent status change, you can use the port-down holdoff-time command to set the delay in reporting a port status change event. If an S2350&S5300&S6300 interface is connected to a wavelength division multiplexing device, the interface becomes Down when a protective switchover occurs on the wavelength division multiplexing device, and services are interrupted. To prevent service interruption, you can set the delay in reporting a port Down event. Configuration Impact Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 28 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 3 Interface Compatible Commands If you run the port-down holdoff-time command multiple times in the same interface view, only the latest configuration takes effect. Example # Set the delay in reporting a port status change event to 1000 milliseconds on GigabitEthernet0/0/1. <HUAWEI> system [HUAWEI] interface gigabitethernet0/0/1 [HUAWEI-GigabitEthernet0/0/1] port-down holdoff-time 1000 3.1.2 port media type Function The port media type command determines whether an interface configuration item belongs to the optical interface or electrical interface. Format port media type { copper | fiber } Parameters Parameter Description Value copper Indicates that a configuration item belongs to the electrical interface. - fiber Indicates that a configuration item belongs to the optical interface. - Views GE interface view Default Level 2: Configuration level Usage Guidelines This command only distinguishes optical interface configuration and electrical interface configuration, and is not configurable. For example, an interface has the following configuration: # interface GigabitEthernet0/0/1 port media type copper undo negotiation auto Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 29 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 3 Interface Compatible Commands speed 100 port media type fiber undo negotiation auto # The preceding information shows that undo negotiation auto and speed 100 are configured on the electrical interface, and undo negotiation auto is configured on the optical interface. During configuration restoration, these configuration items are restored for the respective interfaces. 3.1.3 display control-flap Function The display control-flap command displays the statistics of flapping control on the interface including the status. You can adjust the flapping control parameters based on the statistics. If no interface is specified, the statistics of flapping control on all interfaces including the status are displayed. Format display control-flap [ interface interface-type interface-number ] Parameters Parameter Description Value interface interface-type interfacenumber Specifies the type and number of an interface. - Views All views Default Level 1: Monitoring level Usage Guidelines In the scenario where you need to monitor the status of an interface or locate an interface fault, you can use the display control-flap command to collect the statistics on the interface including the status. Through the displayed information, you can collect the traffic statistics and troubleshoot the interface. Example # Display the statistics of flapping control on the interface including the status. <HUAWEI> display control-flap Interface GigabitEthernet1/0/0 Control flap(IP) status:suppressed Flap(IP) count: 2 Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 30 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 3 Interface Compatible Commands IP current penalty: 1.543 Control flap parameter: suppress reuse 2.000 0.750 Interface GigabitEthernet2/0/0 Control flap(IP) status:unsuppressed Flap(IP) count: 1 IP current penalty: 0.423 Control flap parameter: suppress reuse 2.000 0.750 decay-ok 54 decay-ng 54 ceiling 20.000 decay-ok 54 decay-ng 54 ceiling 6.000 Table 3-1 Description of the display control-flap command output Item Description Control flap (IP) status: Suppression status of IP on the interface l Suppressed l Unsuppressed Flap (IP) count: Total times for suppressing IP IP current penalty: Current suppress penalty value of IP on the interface Control flap paramater: Flapping control configured on the interface suppress Threshold for suppressing the interface reuse Threshold for reusing the interface decay-ok Time to decay the penalty as half when the interface is Up decay-ng Time to decay the penalty as hale when the interface is Down ceiling Maximum suppress penalty value Related Topics 3.1.4 reset control-flap 3.1.4 reset control-flap Function The reset control-flap command clears related information about control-flap. Format reset control-flap { penalty | counter } interface interface-type interface-number Parameters Parameter Description Value penalty Clears the penalty value of the flapping control and release the suppression. - Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 31 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 3 Interface Compatible Commands Parameter Description Value counter Clears the flapping times of the interface. - interface-type Indicates the interface type. - interface-number Indicates the interface number. - Views User view Default Level 3: Management level Usage Guidelines In a certain situation, you need collect statistics of traffic during a specified period. Then you need to use this command to clear the original statistics on the interface and recollect the traffic statistics. Example # Clear the suppress penalty value of the flapping control on GE 1/0/0 <HUAWEI> reset control-flap penalty interface gigabitethernet 1/0/0 3.1.5 display ifnet controller-tree Function The display ifnet controller-tree command displays information about the control interface and related channel interfaces on devices. Format display ifnet controller-tree { controller-name | controller-type controller-number } [ slot slotid ] Parameters Parameter Description Value controller-name Specifies the name of a control interface. - controller-type controller-number Specifies the type and number of a control interface. - slot slot-id - Issue 02 (2013-11-06) Specifies the slot ID. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 32 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 3 Interface Compatible Commands Views Diagnostic view Default Level 3: Management level Usage Guidelines The display ifnet controller-tree command displays information about the control interface and related channel interfaces on devices. NOTE The control interface must be available on a device. Example # Display hierarchies under a controller. <HUAWEI> system-view [HUAWEI] diagnose [HUAWEI-diagnose] display ifnet controller-tree T3 1/2/0 slot 1 Controller Channel Node Information ------------------------------------------------------Channel Node Addr : 0xd2861af4 Next Node : 0xd2861c5c Prev Node: 0xd8b79fe0 Low Level Node Count : 1 Next Node : 0xd285e584 Prev Node : 0xd285e584 ID : 0 Speed : 64000 Type : T3 SubType : T1 Mode : NOT_SURE Framed : FRAMED Shutdown Flag : NOSHUTDOWN ―――――――――――――――――――――――――――――――――――― Channel Node Addr : 0xd285e584 Next Node : 0xd2861b00 Prev Node: 0xd2861b00 Low Level Node Count : 1 Next Node: 0xd285e674 Prev Node: 0xd285e674 ID : 1 Speed : 0 Type : T1 SubType : NOT_SURE Mode : CHANNELIZED Framed : FRAMED Shutdown Flag : NOSHUTDOWN ―――――――――――――――――――――――――――――――――――― Channel Node Addr : 0xd285e674 Next Node : 0xd285e590 Prev Node : 0xd285e590 Low Level Node Count : 0 Next Node: 0xd285e680 Prev Node : 0xd285e680 Channel Interface : Serial1/2/0/1:1 TimeSlot Mask : 0xe ID : 1 Speed : 64000 Type : CHANNEL_SET SubType : NOT_SURE Mode : NOT_SURE Framed : NOT_SURE Shutdown Flag : NOSHUTDOWN Table 3-2 Description of the display ifnet controller-tree command output Issue 02 (2013-11-06) Item Description Channel Node Addr Address of a channel node Next Node Next node of the current node Prev Node Previous node of the current node Low Level Node Count Number of lower-level nodes Channel Interface Name of a channel interface Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 33 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 3 Interface Compatible Commands Item Description ID ID of the current node Speed Rate of the current node Type Channel type: l NOT_SURE l CPOS l E3 l T3 l E1 l T1 l CHANNEL_SET l PRI_SET l TIMESLOT_LIST SubType Channel sub-type: l NOT_SURE l CPOS l E3 l T3 l E1 l T1 l CHANNEL_SET l PRI_SET l TIMESLOT_LIST Mode Working mode of the current node: l NOT_SURE: indicates that the working mode is uncertain. l CHANNELIZED: indicates the channelized mode. l UNCHANNELIZED: indicates the unchannelized mode. l CLEAR_CHANNELIZED: indicates the clear-channelized mode. l PRI-SET: indicates the channelized mode. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 34 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 3 Interface Compatible Commands Item Description Framed Whether the current node is framed: l NOT_SURE: indicates that whether the current node is framed is uncertain. l UNFRAMED: indicates that the current node is not framed. l FRAMED: indicates that the current node is framed. Shutdown Flag When a node is shut down: l SHUTDOWN: indicates that the node is shut down. l NOSHUTDOWN: indicates that the node is not shut down. 3.1.6 control-flap Function The control-flap command enables flapping control on the interface. The undo control-flap command disables flapping control on the interface. By default, flapping control is disabled. Format control-flap [ suppress reuse ceiling decay-ok decay-ng ] undo control-flap Parameters Parameter Description suppress Issue 02 (2013-11-06) Value Specifies the threshold for suppressing When the suppress penalty value the interface. exceeds the suppress value, the interface is suppressed. The value ranges from 1 to 20000. The default value is 2000. This value must be greater than the reuse value and smaller than the ceiling value. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 35 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 3 Interface Compatible Commands Parameter Description Value reuse Specifies the threshold for reusing the interface. When the suppress penalty value is smaller than the reuse value, the interface is released from suppression. The value ranges from 1 to 20000. The default value is 750. The reuse value must be smaller than the suppress value. ceiling Specifies the maximum suppress penalty value of the interface. The suppress penalty value does not increase when it exceeds the ceiling value. This value ranges from 1001 to 20000. The default value is 6000. The ceiling value must be greater than the suppress value of the interface. decay-ok Specifies the half-life for decaying the The value ranges from 1 to 900, in penalty value when the interface is Up. seconds. The default value is 54. Generally, the decay-ok value should be set smaller than or equal to the decay-ng value. decay-ng Specifies the half-life for decaying the penalty value when the interface is Down. The value ranges from 1 to 900, in seconds. The default value is 54. Generally, the decay-ng value should be set greater than or equal to the decayok value. Views Interface view Default Level 2: Configuration level Usage Guidelines Usage Scenario Flapping control applies to reduce the adverse impact on the network stability caused by the change of interface status. A penalty value is set for each interface. The greater the penalty value, the more unstable the interface. When an interface alternates between Up and Down, the penalty value changes. Each time an interface goes Down, the penalty value of the interface is increased by 1000. Each time the interface goes Up, the penalty value of the interface is calculated by the exponential backoff technology. When the penalty value reaches to a specified suppressvalue (suppress for short), the interface status is suppressed and not reported. The penalty value can be decreased by exponent (Half-life principle) as the time elapses. When the penalty value is decreased to a specified reusevalue (reuse for short), the interface status is no longer suppressed and reported. NOTE Half-life (decay-ok/decay-ng): an indicator that measures the decaying degrees of stability, indicating the time for the penalty value of the interface decays to the half. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 36 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 3 Interface Compatible Commands Precautions If the IP address of flapping control-enabled sub-interface is deleted when the sub-interface is in the suppressed state, the sub-interface will be always in the suppressed state. Interfaces, such as Dialer, VT, NULL and loopback, do not support flapping control. Do not run the control-flap command on an interface that a VRRP backup group tracks. If this command is run on the interface and the interface recovers from a fault, the interface goes Up after a specified delay. During the delay, the network-side route is unreachable, and the VRRP status changes from Backup to Master. User-side traffic directed to the interface will be discarded. Example # Enable flapping control on GE 1/0/0. <HUAWEI> system-view [HUAWEI] interface gigabitethernet 1/0/0 [HUAWEI-GigabitEthernet1/0/0] control-flap 2000 750 16000 15 15 Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 37 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 4 4 IP Service Compatible Commands IP Service Compatible Commands About This Chapter 4.1 DHCP Compatible Commands Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 38 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 4 IP Service Compatible Commands 4.1 DHCP Compatible Commands 4.1.1 expired Function The expired command sets the lease for IP addresses in a global IP address pool. By default, the lease of IP addresses is one day. Format expired { day day [ hour hour [ minute minute ] ] | unlimited } Parameters Parameter Description day day Specifies the number of days The value is an integer in the IP address lease. ranging from 0 to 999, in days. The default value is 1. hour hour Specifies the number of hours in the IP address lease. The value is an integer ranging from 0 to 23, in hours. The default value is 0. minute minute Specifies the number of minutes in the IP address lease. The value is an integer ranging from 0 to 59, in minutes. The default value is 0. unlimited Indicates that the IP address lease is unlimited. - Value Views IP address pool view Default Level 2: Configuration level Usage Guidelines Usage Scenario The expired-hide command applies to DHCP servers. To meet different client requirements, DHCP supports dynamic, automatic, and static address assignment. Different hosts require Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 39 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 4 IP Service Compatible Commands different IP address leases. For example, if some hosts such as a DNS server need to use certain IP addresses for a long time, configure expired as unlimited to set the IP address lease of the specified global address pool to unlimited. If some hosts such as a portable computer just need to user temporary IP addresses, set the IP address lease of the specified global address pool to the required time so that the expired IP addresses can be released and assigned to other clients. When a DHCP client starts or half of its IP address lease has passed, the DHCP client sends a DHCP Request packet to the DHCP server to renew the lease. If the IP address can still be assigned to the client, the DHCP server informs a renewed IP address lease to the client. If the IP address can no longer be assigned to this client, the DHCP server informs the client that the IP address lease cannot be renewed and it needs to apply for another IP address. Prerequisites Run the ip pool command to create a global IP address pool and the dhcp enable command to globally enable the DHCP server function. Precautions Different IP address leases can be specified for different global IP address pools on a DHCP server. In a global IP address pool, all addresses have the same lease. Example # Specify the IP address lease of the global address pool global1 to 1 day 2 hours and 30 minutes. <HUAWEI> system-view [HUAWEI] ip pool global1 [HUAWEI-ip-pool-global1] expired day 1 hour 2 minute 30 4.1.2 dhcp server expired Function The dhcp server expired command sets the lease for IP addresses in an interface IP address pool. By default, the lease of IP addresses is one day. Format dhcp server expired { day day [ hour hour [ minute minute ] ] | unlimited } Parameters Issue 02 (2013-11-06) Parameter Description day Specifies the number of days The value is an integer in the IP address lease. ranging from 0 to 999, in days. The default value is 1. hour Specifies the number of hours in the IP address lease. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. Value The value is an integer ranging from 0 to 23, in hours. The default value is 0. 40 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 4 IP Service Compatible Commands Parameter Description Value minute Specifies the number of minutes in the IP address lease. The value is an integer ranging from 0 to 59, in minutes. The default value is 0. unlimited Indicates that the IP address lease is unlimited. - Views VLANIF interface view Default Level 2: Configuration level Usage Guidelines Usage Scenario The dhcp server expired command applies to DHCP servers. To meet different client requirements, DHCP supports dynamic, automatic, and static address assignment. Different hosts require different IP address leases. For example, if some hosts such as a DNS server need to use certain IP addresses for a long time, run the dhcp server expired unlimited command to set the IP address lease of the specified VLANIF interface address pool to unlimited. If some hosts such as a portable computer just need to user temporary IP addresses, run the dhcp server expired command to set the IP address lease of the specified VLANIF interface address pool to the required time so that the expired IP addresses can be released and assigned to other clients. When a DHCP client starts or half of its IP address lease has passed, the DHCP client sends a DHCP Request packet to the DHCP server to renew the lease. If the IP address can still be assigned to the client, the DHCP server informs the client of a renewed IP address lease. If the IP address can no longer be assigned to this client, the DHCP server informs the client that the IP address lease cannot be renewed. Prerequisites Run the dhcp enable command to globally enable the DHCP function. Run the dhcp select interface command in the VLANIF interface view to enable the interface IP address pool. Precautions Different IP address leases can be specified for different interface IP address pools on a DHCP server. In an interface IP address pool, all IP addresses have the same lease. Example # Set the IP address lease of the IP address pool on VLANIF 100 to 2 days 2 hours and 30 minutes. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 41 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 4 IP Service Compatible Commands <HUAWEI> system-view [HUAWEI] interface vlanif 100 [HUAWEI-Vlanif100] dhcp server expired day 2 hour 2 minute 30 4.1.3 dhcp server forbidden-ip Function The dhcp server forbidden-ip command specifies the range of IP addresses that cannot be assigned to clients by the DHCP server. By default, the system does not configure the range of IP addresses that cannot be assigned to clients by the DHCP server. Format dhcp server forbidden-ip start-ip-address [ end-ip-address ] Parameters Parameter Description Value start-ip-address Specifies the start IP address that cannot be automatically assigned. The value is in dotted decimal notation. end-ip-address Specifies the end IP address that cannot be automatically assigned. If end-ip-address is not specified, only start-ipaddress cannot be assigned to clients. The value is in dotted decimal notation. end-ipaddress and start-ip-address must be on the same network segment and end-ip-address must be larger than start-ipaddress. Views System view Default Level 3: Management level Usage Guidelines Usage Scenario The dhcp server forbidden-ip command applies to DHCP servers. In an IP address pool, some IP addresses need to be reserved for other services, and some IP addresses are statically assigned to certain hosts (such as the DNS server) and cannot be automatically assigned to clients. You can run the dhcp server forbidden-ip command to specify the range of the IP addresses that cannot be automatically assigned to clients from the IP address pool. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 42 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 4 IP Service Compatible Commands Precautions l The excluded IP address must be in the IP address pool range. l The excluded IP address or IP address segment cannot be automatically assigned to clients from a local address pool. l If you run the dhcp server forbidden-ip command multiple times, you can specify multiple IP addresses or IP address segments that cannot be automatically assigned to clients from the specified address pool. Example # Configure that IP addresses in the address pool 10.10.10.10 to 10.10.10.20 cannot be automatically assigned to clients. <HUAWEI> system-view [HUAWEI] dhcp server forbidden-ip 10.10.10.10 10.10.10.20 4.1.4 dhcp server ip-pool Function The dhcp server ip-pool command creates a global IP address pool. The undo dhcp server ip-pool command delete a global IP address pool. By default, no IP address pool is created. Format dhcp server ip-pool pool-name undo dhcp server ip-pool pool-name Parameters Parameter Description Value pool-name Specifies the name of a global IP address pool. The value is a string of 1 to 64 characters without spaces. A combination of digits, letters, underscores (_), and dots (.) is allowed. Views System view Default Level 2: Configuration level Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 43 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 4 IP Service Compatible Commands Usage Guidelines The dhcp server ip-pool command applies to DHCP servers. When configuring a DHCP server, run the dhcp server ip-pool command to create an IP address pool and set parameters for the IP address pool, including a gateway address, the IP address lease, and a VPN instance. Then the configured DHCP server can assign IP addresses in the IP address pool to clients. If IP addresses in a global IP address pool are in use, this global address pool cannot be deleted. Example # Create a global IP address pool pool1. <HUAWEI> system-view [HUAWEI] dhcp server ip-pool pool1 Info:It's successful to create an IP address pool. [HUAWEI-ip-pool-pool1] quit 4.1.5 dns-suffix Function The dns-suffix command configures the domain name suffix to be assigned by the DHCP server to a DHCP client. By default, no domain name suffix is configured for a DHCP client. Format dns-suffix domain-name Parameters Parameter Description Value domain-name Specifies the domain name suffix to be assigned to a DHCP client. The value is a string of 1 to 50 characters without spaces. A combination of digits, letters, underscores (_), and dots (.) is allowed. Views IP address pool view Default Level 2: Configuration level Usage Guidelines Usage Scenario Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 44 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 4 IP Service Compatible Commands The dns-suffix command applies to DHCP servers. Each client has a domain name. To enable DHCP clients to communicate by using their domain names and prevent IP address conflicts, the DHCP server needs to specify domain name suffixes for these clients when allocating IP addresses to them. On the DHCP server, the dns-suffix command specifies a domain name suffix for each global address pool. When allocating IP addresses to clients, the DHCP server also sends the domain name suffixes to the clients. During domain name resolution, users only need to enter a part of the domain name, and then the system uses a complete domain name suffix for resolution. Precautions If no domain name suffix is configured for a global IP address pool, the DHCP server cannot send a domain name suffix to clients. In this situation, the clients cannot communicate. Example # Configure mydomain.com.cn as the domain name suffix of the IP address pool pool1. <HUAWEI> system-view [HUAWEI] ip pool pool1 Info:It's successful to create an IP address pool. [HUAWEI-ip-pool-pool1] dns-suffix mydomain.com.cn 4.1.6 ip relay address Function Using the ip relay address command, you can configure DHCP server addresses on a VLANIF interface enabled with DHCP relay. Using the undo ip relay address command, you can delete the configured DHCP server addresses. By default, no DHCP server address is configured on a VLANIF interface enabled with DHCP relay. Format ip relay address ip-address undo ip relay address { ip-address | all } Parameters Issue 02 (2013-11-06) Parameter Description Value ip-address Specifies the IP address of a DHCP server. The value is in dotted decimal notation. all Deletes all the DHCP server addresses configured on an interface. - Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 45 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 4 IP Service Compatible Commands Views VLANIF interface view Default Level 2: Configuration level Usage Guidelines Usage Scenario The ip relay address command is applicable to DHCP relay agents. When a DHCP client needs to send a DHCP request packet to a DHCP server on a different network segment by using a DHCP relay agent, run the ip relay address command on the DHCP relay agent to configure a DHCP server address. Prerequisites DHCP relay has been enabled on the VLANIF interface by using the dhcp select relay command. Precautions If you run the ip relay address command multiple times, multiple DHCP server addresses are configured. Example # Configure DHCP server addresses 2.2.2.2 on VLANIF 100 enabled with DHCP relay. <HUAWEI> system-view [HUAWEI] interface vlanif 100 [HUAWEI-Vlanif100] ip relay address 2.2.2.2 4.1.7 lease Function The lease command sets the lease for IP addresses in a global IP address pool. The undo lease command restores the default lease of IP addresses in a global IP address pool. By default, the lease of IP addresses is one day. Format lease day [ hour [ minute ] ] undo lease Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 46 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 4 IP Service Compatible Commands Parameters Parameter Description Value day Specifies the number of days The value is an integer in the IP address lease. ranging from 0 to 999, in days. The default value is 1. hour Specifies the number of hours in the IP address lease. The value is an integer ranging from 0 to 23, in hours. The default value is 0. minute Specifies the number of minutes in the IP address lease. The value is an integer ranging from 0 to 59, in minutes. The default value is 0. Views IP address pool view Default Level 2: Configuration level Usage Guidelines Usage Scenario The lease-hide command applies to DHCP servers. To meet different client requirements, DHCP supports dynamic, automatic, and static address assignment. Different hosts require different IP address leases. For example, if some hosts such as a DNS server need to use certain IP addresses for a long time, set the IP address lease of the current global address pool to unlimited. If some hosts such as a portable computer just need to use temporary IP addresses, run the lease command to set the IP address lease of the current global IP address pool to the required time so that the expired IP addresses can be released and assigned to other clients. When a DHCP client starts or half of its IP address lease has passed, the DHCP client sends a DHCP Request packet to the DHCP server to renew the lease. If the IP address can still be assigned to the client, the DHCP server informs a renewed IP address lease to the client. If the IP address can no longer be assigned to this client, the DHCP server informs the client that the IP address lease cannot be renewed and it needs to apply for another IP address. Precautions Different IP address leases can be specified for different global address pools on a DHCP server. In a global address pool, all addresses have the same lease. Example # Specify the IP address lease of the global address pool global1 to 1 day. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 47 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 4 IP Service Compatible Commands <HUAWEI> system-view [HUAWEI] ip pool global1 [HUAWEI-ip-pool-global1] lease 1 4.1.8 policy-vlan dhcp-generic Function Using the policy-vlan dhcp-generic command, you can configure generic DHCP policy VLAN. Using the undo policy-vlan dhcp-generic command, you can delete generic DHCP policy VLAN. By default, the function of generic DHCP policy VLAN is disabled on the device. Format policy-vlan dhcp-generic [ priority priority ] undo policy-vlan dhcp-generic Parameters Parameter Description Value priority priority Specifies the 802.1p priority of DHCP messages. The value is an integer that ranges from 0 to 7. The default value is 0. Views VLAN view Default Level 2: Configuration level Usage Guidelines You can configure three types of DHCP policy VLAN on the device at the same time. They are listed in descending order based on priorities as follows: l DHCP policy VLAN based on MAC addresses l DHCP policy VLAN based on interfaces l Generic DHCP policy VLAN User hosts that access the network for the first time apply generic DHCP policy VLAN only when they cannot apply DHCP policy VLAN based on MAC addresses or DHCP policy VLAN based on interfaces. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 48 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 4 IP Service Compatible Commands Example # Configure generic DHCP policy VLAN to associate DHCP messages to which DHCP policy VLAN based on MAC addresses and DHCP policy VLAN based on interfaces cannot be applied with VLAN 2, and specify the 802.1p priority of the DHCP messages as 5. <HUAWEI> system-view [HUAWEI] vlan 2 [HUAWEI-vlan2] policy-vlan dhcp-generic priority 5 Related Topics 4.1.9 policy-vlan dhcp-mac 4.1.10 policy-vlan dhcp-port 4.1.9 policy-vlan dhcp-mac Function Using the policy-vlan dhcp-mac command, you can configure DHCP policy VLAN based on MAC addresses. Using the undo policy-vlan dhcp-mac command, you can delete DHCP policy VLAN based on MAC addresses. By default, the function of DHCP policy VLAN based on MAC addresses is disabled on the device. Format policy-vlan dhcp-mac mac-address1 [ to mac-address2 ] [ priority priority ] undo policy-vlan dhcp-mac mac-address [ to mac-address ] Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 49 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 4 IP Service Compatible Commands Parameters Parameter Description Value dhcp-mac mac-address1 [ to mac-address2 ] Specifies the MAC addresses of user hosts that access the network for the first time. mac-address1 and macaddress2 are in the format of H-H-H. An H contains one to four hexadecimal numbers. l mac-address1 specifies the start MAC address. l to mac-address2 specifies the end MAC address. mac-address2 must be greater than macaddress1. mac-address2 and mac-address1 specify the MAC address range. If to mac-address2 is not specified, DHCP policy VLAN based on only the MAC address specified by mac-address1 is configured. priority priority Specifies the 802.1p priority of DHCP messages. NOTE The range specified by macaddress1 and mac-address2 cannot contain multicast MAC addresses, broadcast MAC addresses, and all 0 address. The value is an integer that ranges from 0 to 7. The default value is 0. Views VLAN view Default Level 2: Configuration level Usage Guidelines You can configure three types of DHCP policy VLAN on the device at the same time. They are listed in descending order based on priorities as follows: l DHCP policy VLAN based on MAC addresses l DHCP policy VLAN based on interfaces l Generic DHCP policy VLAN When multiple user hosts access the network through an interface on the device, you need to run the policy-vlan dhcp-mac command to configure DHCP policy VLAN based on MAC addresses so that the user hosts can obtain IP addresses from the DHCP server and be added to specific VLANs. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 50 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 4 IP Service Compatible Commands Example # Configure DHCP policy VLAN based on the MAC address of the host 0001-0001-0001 to associate DHCP messages from this host with VLAN 2, and specify the 802.1p priority of the DHCP messages as 5. <HUAWEI> system-view [HUAWEI] vlan 2 [HUAWEI-vlan2] policy-vlan dhcp-mac 1-1-1 priority 5 Related Topics 4.1.10 policy-vlan dhcp-port 4.1.8 policy-vlan dhcp-generic 4.1.10 policy-vlan dhcp-port Function Using the policy-vlan dhcp-port command, you can configure DHCP policy VLAN based on interfaces. Using the undo policy-vlan dhcp-port command, you can delete DHCP policy VLAN based on interfaces. By default, the function of DHCP policy VLAN based on interfaces is disabled on the device. Format policy-vlan dhcp-port interface-type { interface-number1 [ to interface-number ] } &<1–10> [ priority priority ] undo policy-vlan dhcp-port interface-type { interface-number1 [ to interface-number ] } &<1– 10> Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 51 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 4 IP Service Compatible Commands Parameters Parameter Description Value interface-type interfacenumber1 [ to interfacenumber ] &<1–10> Specifies the interface type and interface number. interface-type can be one of the following: l interface-type specifies the type of an interface. l eth-trunk l interface-number1 specifies the number of the start interface. l xgigabitethernet l gigabitethernet l to interface-number specifies the number of the end interface. interface-number must be greater than interface-number1. interfacenumber and interfacenumber1 specify the interface range. If to interface-number is not specified, DHCP policy VLAN based on only the interface specified by interface-number1 is configured. priority priority Specifies the 802.1p priority of DHCP messages. The value is an integer that ranges from 0 to 7. The default value is 0. Views VLAN view Default Level 2: Configuration level Usage Guidelines You can configure three types of DHCP policy VLAN on the device at the same time. They are listed in descending order based on priorities as follows: l DHCP policy VLAN based on MAC addresses l DHCP policy VLAN based on interfaces l Generic DHCP policy VLAN NOTE DHCP policy VLAN based on interfaces is valid only for hybrid interfaces. Ensure that the interfaces are hybrid interfaces before running the policy-vlan dhcp-port command. The interfaces to be configured with this function are hybrid interfaces by default. If not, you can configure an interface as a hybrid interface. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 52 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 4 IP Service Compatible Commands Example # Configure DHCP policy VLAN based on GigabitEthernet 0/0/1 to associate DHCP messages on this interface with VLAN 2, and specify the 802.1p priority of the DHCP messages as 5. <HUAWEI> system-view [HUAWEI] vlan 2 [HUAWEI-vlan2] policy-vlan dhcp-port gigabitethernet 0/0/1 priority 5 Related Topics 4.1.9 policy-vlan dhcp-mac 4.1.8 policy-vlan dhcp-generic Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 53 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 5 5 IP Routing Compatible Commands IP Routing Compatible Commands About This Chapter 5.1 display bgp group 5.2 display bgp network 5.3 display bgp paths 5.4 display bgp peer 5.5 display bgp routing-table dampened 5.6 display bgp routing-table dampening parameter 5.7 display bgp routing-table flap-info 5.8 display bgp routing-table label 5.9 display bgp update-peer-group 5.10 display ipv6 nexthop-indirection 5.11 display ipv6 routing-table statistics 5.12 display ipv6 routing-table time-range 5.13 display rm ipv6 interface 5.14 ipv6 route-static vpn6-instance 5.15 ipv6-family vpn6-instance 5.16 isis vpn6-instance 5.17 reset ipv6 routing-table statistics protocol Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 54 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 5 IP Routing Compatible Commands 5.1 display bgp group Function Using the display bgp group command, you can display the peer group. Format display bgp vpnv6 vpn6-instance vpn6-instance-name group [ group-name ] Parameters Parameter Description Value group-name Specifies the peer group. It is case-sensitive. vpnv6 Displays information about BGP VPNv6 peer groups. - vpn6-instance vpn6-instancename Specifies the name of the IPv6 VPN It is case-sensitive. instance. Views All views Default Level 1: Monitoring level Usage Guidelines If the peer group is specified, the detailed information on the specified peer group is displayed. If the peer group is not specified, the information on all peer groups is displayed. Example # Display information about all peer groups of the IPv6 VPN instance named vpn6 on the local switch. <HUAWEI> display bgp vpnv6 vpn6-instance vpn6 group BGP peer-group: g1 Remote AS: 65410 Type : external PeerSession Members: 2000::2 Peer Members: 2000::2 # Display information about the peer group named g1 of the IPv6 VPN instance named vpn6 on the local switch. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 55 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 5 IP Routing Compatible Commands <HUAWEI> display bgp vpnv6 vpn6-instance vpn6 group g1 BGP peer-group: g1 Remote AS: 65410 Type : external Configured hold timer value: 180 Keepalive timer value: 60 Minimum route advertisement interval is 30 seconds PeerSession Members: 2000::2 Peer Preferred Value: 0 No routing policy is configured Peer Members: Peer V AS MsgRcvd 2000::2 4 65410 103 MsgSent 90 OutQ Up/Down State PrefRcv 0 01:20:55 Established 0 5.2 display bgp network Function Using the display bgp network command, you can view the routes to be advertised by BGP through the network command. Format display bgp vpnv6 vpn6-instance vpn6-instance-name network Parameters Parameter Description Value vpn6 Displays the VPNv6 routes that are advertised through the network command. vpn6-instance vpn6-instance-name Displays information about the routes advertised by the specified IPv6 VPN instance. Views All views Default Level 1: Monitoring level Usage Guidelines This command is used to display all the configurations of the network command in the specified address family view. Routes can be imported and then advertised by BGP only when the route prefix satisfies the following conditions: l Issue 02 (2013-11-06) It is specified in the network command. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 56 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 5 IP Routing Compatible Commands l It already exists in the IP routing table. l It is active. Example # Display the routes of the IPv6 VPN instance named vpn1 advertised by BGP through the network command. <HUAWEI> display bgp vpnv6 vpn6-instance vpn1 network BGP Local Router ID is 1.1.1.1 Local AS Number is 100 Route Distinguisher: 100:1 (vpn1) Network Prefix Route-policy 2000:: policy1 100 5.3 display bgp paths Function Using the display bgp paths command, you can view the path attributes of BGP. Format display bgp vpnv6 vpn6-instance vpn6-instance-name paths [ as-regular-expression ] Parameters Parameter Description Value as-regular-expression Displays the regular express of the matching AS-Path. - vpnv6 Displays the path attributes of BGP VPNv6. - vpn6-instance vpn6-instance-name Displays the AS-Path of the specified VPN instance. - Views All views Default Level 1: Monitoring level Usage Guidelines None. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 57 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 5 IP Routing Compatible Commands Example # Display information about BGP4+ paths of IPv6 VPN instance named vpn1. <HUAWEI> display bgp vpnv6 vpn6-instance vpn1 paths Total routes of vpn6-instance vpn1: 4 Total Number of Paths: 4 Address 0x50EEF20 0x50EEEB8 0x50EEF88 0x50EF0C0 Refcount 1 1 1 1 MED 0 0 0 Path/Origin ? ? i 65410? # Display the BGP4+ paths, including AS_Path 65420, of IPv6 VPN instance named vpn1. <HUAWEI> display bgp vpnv6 vpn6-instance vpn1 paths 65420* Total routes of vpn6-instance vpn1: 1 Total Number of Paths: 1 Address 0x659D4A8 Refcount 1 MED 0 Path/Origin 65420? 5.4 display bgp peer Function Using the display bgp peer command, you can display the BGP peers. Format display bgp vpnv6 vpn6-instance vpn6-instance-name peer [ { group-name | ipv6-address } log-info | [ ipv6-address ] verbose ] Parameters Parameter Description log-info Displays the log of the peer. - verbose Displays the detailed information of the peer. - ipv6-address Specifies the address of the IPv6 peer. The prefix is a 128-bit hexadecimal number, in the format of X:X:X:X:X:X:X:X. vpnv6 Displays information about BGP VPNv6 peers. - vpn6-instance vpn6instance-name Displays the peers of IPv6 VPN instance. It is a string of 1 to 31 case-sensitive characters without any spaces. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. Value 58 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 5 IP Routing Compatible Commands Views All views Default Level 1: Monitoring level Usage Guidelines None. Example # Display log information about BGP peer groups of the IPv6 VPN instance. <HUAWEI> display bgp vpnv6 vpn6-instance vpn1 peer g1 log-info 5.5 display bgp routing-table dampened Function Using the display bgp routing-table dampened command, you can display BGP dampened routes. Format display bgp vpnv6 vpn6-instance vpn6-instance-name routing-table [ statistics ] dampened Parameters Parameter Description Value statistics Displays the statistics of dampened routes. - vpnv6 Displays BGP routes of VPNv6. - vpn6-instance vpn6-instancename Specifies the name of the IPv6 VPN It is case-sensitive. instance. Views All views Default Level 1: Monitoring level Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 59 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 5 IP Routing Compatible Commands Usage Guidelines None Example # Display dampened IPv6 routes in the VPNv6 BGP routing table. <HUAWEI> display bgp vpnv6 vpn6-instance vpn1 routing-table dampened 5.6 display bgp routing-table dampening parameter Function Using the display bgp routing-table dampening parameter command, you can display BGP route dampening parameters. Format display bgp vpnv6 vpn6-instance vpn6-instance-name routing-table dampening parameter Parameters Parameter Description Value vpnv6 Displays BGP route dampening parameters of VPNv6. - vpn6-instance vpn6-instance-name Specifies route dampening parameters of the IPv6 VPN instance. - Views All views Default Level 1: Monitoring level Usage Guidelines None. Example # Display BGP route dampening parameters of specified IPv6 VPN instance named vpn1. <HUAWEI> display bgp vpnv6 vpn6-instance vpn1 routing-table dampening parameter 5.7 display bgp routing-table flap-info Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 60 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 5 IP Routing Compatible Commands Function Using the display bgp routing-table flap-info command, you can view information about flapping BGP routes. Format display bgp vpnv6 vpn6-instance vpn6-instance-name routing-table flap-info [ regularexpression as-regular-expression ] display bgp vpnv6 vpn6-instance vpn6-instance-name routing-table flap-info { as-pathfilter as-path-filter-number | network-address [ prefix-length [ longer-match ] ] } Parameters Parameter Description Value regular-expression asregular-expression Displays the statistics of the The value is a string of 1 to route flapping that matches the 80 characters. AS-Path regular expression. as-path-filter Displays the statistics of the route flapping that matches the specified AS-Path filter. as-path-filter-number Specifies the number of the matching AS-Path filter. - network-address Displays the network address related to the dampening information. - mask | mask-length Specifies the network mask or mask length. - longer-match Matches according to the mask longer than the specified length. prefix-length Specifies the length of the prefix. vpnv6 Displays statistics of BGP route flapping of the VPNv6. vpn6-instance vpn6instance-name Specifies statistics of route flapping of the specified IPv6 VPN instance. - - Views All views Default Level 1: Monitoring level Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 61 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 5 IP Routing Compatible Commands Usage Guidelines None. Example # Display statistics of the BGP4+ route flapping of IPv6 VPN instance named vpn1. <HUAWEI> display bgp vpnv6 vpn6-instance vpn1 routing-table flap-info 5.8 display bgp routing-table label Function Using the display bgp routing-table label command, you can display the labeled routes in the BGP routing table. Format display bgp vpnv6 vpn6-instance vpn6-instance-name routing-table [ statistics ] label Parameters Parameter Description Value statistics Indicates the statistics of the labeled routes. vpnv6 Displays the labeled route of VPNv6. - vpn6-instance vpn6-instancename Specifies the name of a IPv6 VPN instance. It is case-sensitive. Views All views Default Level 1: Monitoring level Usage Guidelines None. Example # Display the BGP4+ labeled routes of the IPv6 VPN instance named vpna. <HUAWEI> display bgp vpnv6 vpn6-instance vpna routing-table label Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 62 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 5 IP Routing Compatible Commands 5.9 display bgp update-peer-group Function Using the display bgp update-peer-group command, you can view information about BGP update-groups. Format display bgp vpnv6 { vpn6-instance vpn6-instance-name } update-peer-group [ index updategroup-index ] Parameters Parameter Description Value vpnv6 Displays information about BGP VPNv6 update-groups. - vpn6-instance vpn6-instance-name Displays information about BGP update-groups in the specified IPv6 VPN instance. Views All views Default Level 1: Monitoring level Usage Guidelines You can specify the index of an update-group to view detailed information about the specified update-group. Example # Display information about the BGP update-group with the index being 0. <HUAWEI> display bgp vpnv6 vpn6-instance vpn1 update-peer-group index 0 5.10 display ipv6 nexthop-indirection Function The display ipv6 nexthop-indirection command displays information about the next-hop IPv6 VPN instance iterated control block. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 63 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 5 IP Routing Compatible Commands Format display ipv6 nexthop-indirection vpn6-instance vpn6-instance-name [ nexthop nexthop-ipv6address | indirecid indirectid ] Parameters Parameter Description Value vpn6-instance vpn6instance-name Displays next-hop indirect information about a specified IPv6 VPN instance. The value is a string of 1 to 31 case-sensitive characters, spaces not supported. nexthop nexthop-ipv6address Specifies the next-hop IPv6 address. The value is an IPv6 address. indirecid indirectid Specifies the keyword value of The value ranges from 0 to the next-hop indirection. FFFFFFFF, in hexadecimal notation. Views Diagnosis view Default Level 3: Management level Usage Guidelines None. Example # Display information about the IPv6 VPN instance named vpna iterated control block. <HUAWEI> system-view [HUAWEI] diagnose [HUAWEI-diagnose] display ipv6 nexthop-indirection vpn6-instance vpna indirectid 29 5.11 display ipv6 routing-table statistics Function Using the display ipv6 routing-table statistics command, you can view integrated route statistics of the routing tables of all IPv6 VPN instances. Format display ipv6 routing-table all-vpn6-instance statistics Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 64 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 5 IP Routing Compatible Commands Parameters Parameter Description Value all-vpn6-instance Displays integrated route statistics of the routing tables of all IPv6 VPN instances. Views All views Default Level 1: Monitoring level Usage Guidelines Integrated route statistics include the total number of routes, the number of added routes, and the number of deleted routes. Example # Display integrated route statistics of the routing tables of all IPv6 VPN instances. <HUAWEI> display ipv6 routing-table all-vpn6-instance statistics Summary Prefixes : 1 Protocol route active added deleted freed DIRECT 1 1 1 0 0 STATIC 0 0 0 0 0 RIPng 0 0 0 0 0 OSPFv3 0 0 0 0 0 IS-IS 0 0 0 0 0 BGP 0 0 0 0 0 Total 1 1 1 0 0 Table 5-1 Description of the display ipv6 routing-table all-vpn6-instance statistics command output Issue 02 (2013-11-06) Item Description Summary Prefixes Total number of prefixes in the current routing table Protocol Routing protocol route Number of routes in the current routing table active Number of active routes in the routing table added Number of active and inactive routes added in the routing table deleted Number of routes deleted from the routing table freed Number of released routes that are permanently deleted from the routing table Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 65 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 5 IP Routing Compatible Commands 5.12 display ipv6 routing-table time-range Function The display ipv6 routing-table time-range command displays information about routes generated in a specified time range in the IPv6 routing table of the specified VPN instance. Format display ipv6 routing-table vpn6-instance vpn6-instance-name time-range min-age max-age [ verbose ] Parameters Parameter Description Value vpn6-instance vpn6instance-name Displays information about The value is a string of 1 to 31 routes generated in a specified case-sensitive characters, spaces time range in the IPv6 routing not supported. table of the specified VPN instance. min-age Specifies the end time of the period when routes are generated. The format is xxdxxhxxmxxs. l The d indicates days. The value is an integer ranging from 0 to 10000. l The h indicates hours. The value is an integer ranging from 0 to 23. l The m indicates minutes. The value is an integer ranging from 0 to 59. l The s indicates seconds. The value is an integer ranging from 0 to 59. For example, you can enter 5d4h30m20s to specify 5 days, 4 hours, 30 minutes, and 20 seconds. NOTE If the value of the d is 10000, the values of the h, m, and s can be only 0. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 66 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 5 IP Routing Compatible Commands Parameter Description Value max-age Specifies the start time of the The format is xxdxxhxxmxxs. period when routes are l The d indicates days. The generated. value is an integer ranging from 0 to 10000. l The h indicates hours. The value is an integer ranging from 0 to 23. l The m indicates minutes. The value is an integer ranging from 0 to 59. l The s indicates seconds. The value is an integer ranging from 0 to 59. For example, you can enter 5d4h30m20s to specify 5 days, 4 hours, 30 minutes, and 20 seconds. NOTE If the value of the d is 10000, the values of the h, m, and s can be only 0. Displays detailed information about active and inactive routes. If you do not specify this parameter, the display ipv6 routing-table timerange command displays only summary information about active routes. verbose Views All views Default Level 1: Monitoring level Usage Guidelines Usage Scenario If route flapping occurs on a network, you can run the display ipv6 routing-table time-range command and specify a small time range for the command. By doing so, you can find the flapping route in a timely manner and accelerate fault locating. Precautions Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 67 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 5 IP Routing Compatible Commands You must make sure that max-age is greater that min-age. Otherwise, the display ipv6 routingtable time-range command does not display any information. If the specified max-age is greater than min-age and no route was generated within this time range, the display ipv6 routing-table time-range command displays only the table heading. Example # Display information about routes generated in the last 2 hours, 20 minutes, and 10 seconds in the IPv6 routing table of the VPN instance named vpna. <HUAWEI> display ipv6 routing-table vpn6-instance vpna time-range 0 2h20m10s 5.13 display rm ipv6 interface Function Using the display rm ipv6 interface command, you can view IPv6 VPN instance RM information of interfaces, including physical and logical interfaces. Format display rm ipv6 interface vpn6-instance vpn6-instance-name Parameters Parameter Description Value vpn6-instance vpn6-instancename Specifies the name of an IPv6 VPN It is case-sensitive. instance. Views All views Default Level 1: Monitoring level Usage Guidelines None. Example # Display RM information of all interfaces bound to IPv6 VPN instance named vpna. <HUAWEI> display rm ipv6 interface vpn6-instance vpna Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 68 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 5 IP Routing Compatible Commands 5.14 ipv6 route-static vpn6-instance Function Using the ipv6 route-static vpn6-instance command, you can configure IPv6 static routes in a VPN instance. Using the undo ipv6 route-static vpn6-instance command, you can withdraw the IPv6 unicast static routes in a VPN instance. By default, the system does not configure IPv6 static routes for VPN instances. Format ipv6 route-static vpn6-instance vpn6-instance-name dest-ipv6-address prefix-length [ interface-type interface-number ] nexthop-ipv6-address [ preference preference | tag tag ] * [ description text ] ipv6 route-static vpn6-instance vpn6-instance-name dest-ipv6-address prefix-length nexthopipv6-address [ public ] [ preference preference | tag tag ] * [ description text ] ipv6 route-static vpn6-instance vpn6-instance-name dest-ipv6-address prefix-length vpn6instance vpn6-destination-name nexthop-ipv6-address [ preference preference | tag tag ] * [ description text ] ipv6 route-static dest-ipv6-address prefix-length vpn6-instance vpn6-destination-name nexthop-ipv6-address [ preference preference | tag tag ] * [ description text ] undo ipv6 route-static vpn6-instance vpn6-instance-name dest-ipv6-address prefix-length [ interface-type interface-number [ nexthop-ipv6-address ] | nexthop-ipv6-address ] [ preference preference | tag tag ] * undo ipv6 route-static vpn6-instance vpn6-instance-name all Parameters Parameter Description vpn6-instance-name Specifies the name of an IPv6 The name is a string of 1 to 31 caseVPN instance. Each IPv6 VPN sensitive characters without any instance has its own unicast spaces. routing table, and the configured static routes are installed into the routing table of the specified IPv6 VPN instance. dest-ipv6-address Specifies the destination IPv6 The value is a 128-digit hexadecimal address. number, in the format of X:X:X:X:X:X:X:X. Issue 02 (2013-11-06) Value Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 69 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 5 IP Routing Compatible Commands Parameter Description Value prefix-length Specifies the length of an IPv6 It is an integer ranging from 1 to 128. prefix, namely, the number of consecutive 1s in the mask. interface-type Specifies the type of an interface. - interface-number Specifies the number of an interface. - nexthop-ipv6-address Specifies the next hop IPv6 address. The value is a 128-digit hexadecimal number, in the format of X:X:X:X:X:X:X:X. vpn6-destination-name Specifies the name of the The name is a string of 1 to 31 casedestination IPv6 VPN sensitive characters without any instance. After the destination spaces. IPv6 VPN instance name is configured, the switch can search the static routing table for the outbound interface to the destination IPv6 VPN instance according to the configured gateway address. public Indicates that the gateway address is a public network address. After a switch is configured to belong to an IPv6 VPN instance, the next hop or the next hop gateway router of this switch belongs to this IPv6 VPN instance or the public network. If the keyword public is specified in the command, it indicates that the next hop is specified as the public network router. preference preference Specifies the preference of a static route. tag tag Issue 02 (2013-11-06) It is an integer ranging from 1 to 255. Specifies the tag value of a The value is an integer ranging from static route. By configuring 1 to 4294967295. By default, it is 0. different tag values, you can classify static routes to implement different routing policies. For example, routing protocols can import routes with specified tag values through routing policies. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 70 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 5 IP Routing Compatible Commands Parameter Description Value description text Specifies the description of static routes. The description is a string of 1 to 19 characters that can contain spaces. all Deletes all the static routes configured for the specified IPv6 VPN instance. - Views System view Default Level 2: Configuration level Usage Guidelines Applicable Environment When an VPN network is simple, you can configure static routes for this VPN by using the ipv6 route-static vpn6-instance command. Properly configuring and using static routes can improve network performance. l To configure VPN users to access a public network, you can run the ipv6 route-static vpn6-instance command with the keyword public to configure the VPN route with the next hop being the public network address. l You can configure description text to add the description of static routes so that the administrator can check and maintain static routes easily. You can run the display this or display current-configuration command in the system view to view the description. Precautions If the destination address and the prefix length are set to all 0s, it indicates that a default route is configured. However, after network faults occur or the network topology changes, static routes cannot automatically change. Therefore, configure static routes with caution. Example # Configure a default route with the next hop 2001::1. <HUAWEI> system-view [HUAWEI] ipv6 route-static vpn6-instance vpn1 :: 0 2001::1 5.15 ipv6-family vpn6-instance Function Using the ipv6-family vpn6-instance command, you can enter the BGP-VPN6 instance view. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 71 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 5 IP Routing Compatible Commands Using the undo ipv6-family vpn6-instance command, you can remove all configurations in the BGP-VPN6 instance view. Format ipv6-family vpn6-instance vpn6-instance-name undo ipv6-family vpn6-instance vpn6-instance-name Parameters Parameter Description Value vpn6-instance vpn6-instance-name Binds the specified IPv6 VPN instance with the IPv6 address family. You can enter the BGPVPN6 instance view by using the parameter. Views BGP view Default Level 2: Configuration level Usage Guidelines None. Example # Enter the BGP-VPN6 instance view. <HUAWEI> system-view [HUAWEI] bgp 100 [HUAWEI-bgp] ipv6-family vpn6-instance vpna [HUAWEI-bgp6-vpna] 5.16 isis vpn6-instance Function Using the isis vpn6-instance command, you can start the IS-IS process and the specified IPv6 VPN instance. Using the undo isis command, you can cancel the specified IS-IS process. By default, an IS-IS process is runs in a public network instance. Format isis [ process-id ] vpn6-instance vpn6-instance-name Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 72 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 5 IP Routing Compatible Commands undo isis process-id Parameters Parameter Description Value process-id Specifies the process ID. The value is an integer ranging from 1 to 65535. vpn6-instance vpn6instance-name Specifies the name of the IPv6 VPN instance. The name is a string of 1 to 31 characters without spaces. It is case-sensitive. Views System view Default Level 2: Configuration level Usage Guidelines To make IS-IS work normally, do as follows: l Enable IS-IS process by using the isis command. l Set a Network Entity Title (NET) for the switch by using the network-entity command. l Enable each interface that needs to run IS-IS process by using the isis enable command. You can start IS-IS only when the above action is done. Example # Start an IS-IS routing process 1 which has the system ID 0000.0000.0002 and the area ID 01.0001. <HUAWEI> system-view [HUAWEI] isis 1 vpn6-instance vpna [HUAWEI-isis-1] network-entity 01.0001.0000.0000.0002.00 5.17 reset ipv6 routing-table statistics protocol Function Using the reset ipv6 routing-table statistics protocol command, you can clear statistics in the IPv6 routing table. Format reset ipv6 routing-table vpn6-instance vpn6-instance-name statistics protocol { all | protocol } Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 73 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 5 IP Routing Compatible Commands Parameters Parameter Description Value all Clears the statistics of all IPv6 routing protocols in the routing table. - protocol Clears the statistics of the specified routing protocol. This parameter can be bgp, direct, isis, ospfv3, ripng, or static. Views User view Default Level 2: Configuration level Usage Guidelines Statistics in the IPv6 routing table cannot be restored after you clear them. So, confirm the action before using the command. Example # Clear the statistics of all IPv6 routing protocols in the routing table. <HUAWEI> reset ipv6 routing-table vpn6-instance vpna statistics protocol all Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 74 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 6 Multicast Compatible Commands Multicast Compatible Commands About This Chapter 6.1 Layer 2 Multicast Compatible Commands Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 75 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands 6.1 Layer 2 Multicast Compatible Commands 6.1.1 display igmp-proxy configuration Function Using the display igmp-proxy configuration command, you can display the non-default IGMP proxy configuration. Format display igmp-proxy [ vlan [ vlan-id ] ] configuration Parameters Parameter Description Value vlan vlan-id Displays the non-default IGMP proxy configuration in the specified VLAN. vlan-id specifies the ID of a VLAN. The value is an integer that ranges from 1 to 4094. Views All views Default Level 1: Monitoring level Usage Guidelines Before running the display igmp-proxy configuration command, you must run the 6.1.5 igmpproxy enable command to enable IGMP proxy globally and in the VLAN. Otherwise, no information is displayed. If the optional parameter is not specified, the non-default IGMP proxy configurations of all VLANs are displayed. Example # Display the non-default IGMP proxy configuration of VLAN 2. <HUAWEI> display igmp-proxy vlan 2 configuration IGMP Snooping Configuration for VLAN 2 igmp-snooping enable igmp-snooping proxy Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 76 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands Table 6-1 Description of the display igmp-proxy configuration command output Item Description igmp-snooping enable IGMP snooping is enabled in the VLAN. igmp-snooping proxy IGMP proxy is enabled in the VLAN. 6.1.2 display igmp-proxy Function Using the display igmp-proxy command, you can view the default and non default configurations of IGMP proxy. Format display igmp-proxy [ vlan [ vlan-id ] ] Parameters Parameter Description Value vlan vlan-id Displays the configuration of the IGMP proxy in the specified VLAN. vlan-id specifies the ID of a VLAN. The value is an integer that ranges from 1 to 4094. Views All views Default Level 1: Monitoring level Usage Guidelines Before running the display igmp-proxy command, run the 6.1.5 igmp-proxy enable command to enable IGMP proxy globally and in the VLAN. Otherwise, no information is displayed. The IGMP proxy configuration, including the default configuration, is displayed only when the VLAN is in Up state. That is, at least one interface in the VLAN is in Up state. Example # Display the IGMP proxy configuration of VLAN 3. <HUAWEI> display igmp-proxy vlan 3 IGMP Snooping Information for VLAN 3 Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 77 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference IGMP IGMP IGMP IGMP IGMP IGMP IGMP IGMP IGMP IGMP IGMP IGMP IGMP IGMP IGMP IGMP IGMP IGMP IGMP 6 Multicast Compatible Commands Snooping is Enabled Version is Set to default 2 Query Interval is Set to default 125 Max Response Interval is Set to default 10 Robustness is Set to default 2 Last Member Query Interval is Set to default 1 Router Port Aging Interval is Set to 180s or holdtime in hello Filter Group-Policy is Set to default : Permit All Prompt Leave Disable Router Alert is Not Required Send Router Alert Enable Proxy Disable Report Suppress Disable Suppress Time is set to default 10 seconds Querier Disable Router Port Learning Enable SSM-Mapping Disable Limit Action Disable Suppress-dynamic-join Disable Table 6-2 Description of the display igmp-proxy command output Issue 02 (2013-11-06) Item Description IGMP Snooping is Enabled IGMP snooping is enabled in the VLAN. IGMP Version is Set to default 2 The version of IGMP messages that can be processed in the VLAN is the default version. Both IGMPv1 and IGMPv2 messages can be processed. IGMP Query Interval is Set to default 125 The interval at which IGMP General Query messages are sent in the VLAN is set to the default value, 125 seconds. IGMP Max Response Interval is Set to default 10 The maximum response time for IGMP Query messages in the VLAN is set to the default value, 10 seconds. IGMP Robustness is Set to default 2 The IGMP robustness variable is set to the default value 2. IGMP Last Member Query Interval is Set to default 1 The interval at which IGMP Group-Specific Query messages are sent in the VLAN is set to the default value, 1 second. IGMP Router Port Aging Interval is Set to 180s or holdtime in hello The aging time of router interfaces in the VLAN is set to the default value, 180 seconds or the holdtime in PIM Hello messages. IGMP Filter Group-Policy is Set to default : Permit All The default multicast group policy is used in the VLAN. That is, hosts in the VLAN can join all the multicast groups. IGMP Prompt Leave Disable Prompt leave is disabled for interfaces in the VLAN. IGMP Router Alert is Not Required The device does not require that the IGMP messages received in the VLAN contain the Router-Alert option in the IP header. IGMP Send Router Alert Enable The device sends the IGMP messages that contain the RouterAlert option in the IP headers to the hosts in the VLAN. IGMP Proxy Disable IGMP proxy is disabled in the VLAN. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 78 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands Item Description IGMP Report Suppress Disable IGMP Report message suppression is disabled in the VLAN. IGMP Suppress Time is set to default 10 seconds The suppress duration of IGMP Report messages is set to the default value, 10 seconds. IGMP Querier Disable IGMP querier is disabled in the VLAN. IGMP Router Port Learning Enable Learning of IGMP router interfaces is enabled in the VLAN. IGMP SSM-Mapping Disable IGMP SSM mapping is disabled in the VLAN. IGMP Limit Action Disable Multicast entry overwriting is disabled in the VLAN. IGMP Suppress-dynamicjoin Disable The system does not send Report or Leave messages to the upstream router interface where a static multicast group is configured. 6.1.3 display igmp-proxy port-info Function Using the display igmp-proxy port-info command, you can view information about member interfaces of a multicast group. Format display igmp-proxy port-info [ vlan vlan-id [ group group-address ] ] [ verbose ] Parameters Issue 02 (2013-11-06) Parameter Description Value vlan vlan-id Displays information about the member interfaces in the specified VLAN. vlan-id specifies the ID of a VLAN. The value is an integer that ranges from 1 to 4094. group group-address Displays information about the member interfaces of the specified multicast group in the VLAN. group-address specifies the address of a multicast group. The value of ranges from 224.0.1.0 to 239.255.255.255 in dotted decimal notation. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 79 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands Parameter Description Value verbose Displays detailed information about the member interfaces. - Views All views Default Level 1: Monitoring level Usage Guidelines This command displays information about the member interfaces of a multicast group, including the number of member interfaces and name of the member interfaces. Before running the display igmp-proxy port-info command, you must run the 6.1.5 igmpproxy enable command to enable IGMP proxy globally and in the VLAN. Otherwise, no information is displayed. Information about the member interfaces (static or dynamic) is displayed only if the interfaces are in Up state. If vlan-id is not specified, information about member interfaces of multicast groups in all the VLANs is displayed. Example # Display information about multicast member interfaces in VLAN 7. <HUAWEI> display igmp-proxy port-info vlan 7 ----------------------------------------------------------------------(Source, Group) Port Flag Flag: S:Static D:Dynamic M: Ssm-mapping ----------------------------------------------------------------------VLAN 7, 3 Entry(s) (1.1.1.1,225.1.1.1) GE0/0/1 D-1 port(s) (1.1.1.1,225.1.1.2) GE0/0/2 D-1 port(s) (1.1.1.1,225.1.1.3) GE0/0/3 D-1 port(s) Table 6-3 Description of the display igmp-snooping port-info command output Issue 02 (2013-11-06) Item Description (Source, Group) (S, G) entry, specifying the multicast source and multicast group. Port Outbound interface in an (S, G) entry. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 80 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands Item Description Flag Type of an outbound interface. l S:static member interface l D: dynamic member interface l M: member interface specified in an SSM mapping entry 6.1.4 display igmp-proxy router-port Function Using the display igmp-proxy router-port command, you can view information about router interfaces in the specified VLAN, including the static router interface and the dynamic router interface. Format display igmp-proxy router-port vlan vlan-id Parameters Parameter Description Value vlan vlan-id Displays information about the router interfaces in the specified VLAN. vlan-id specifies the ID of a VLAN. The value is an integer that ranges from 1 to 4094. Views All views Default Level 1: Monitoring level Usage Guidelines A router interface connects the S2350&S5300&S6300 to an upstream router. The router interface can be dynamically generated after the IGMP Query message is received, or statically configured. Before running the display igmp-proxy router-port command, run the 6.1.5 igmp-proxy enable command to enable IGMP proxy globally and in the VLAN. Otherwise, no information is displayed. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 81 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands You can run the display igmp-proxy router-port command to view information about the type, name, age, and remaining aging time of the router interface. NOTE Information about a router interface is displayed only when the interface is in Up state. Example # Display information about router interfaces in VLAN 2. <HUAWEI> display igmp-proxy router-port vlan 2 Port Name UpTime Expires Flags ------------------------------------------------------VLAN 2, 2 router-port(s) GE2/0/1 1d:22h 00:01:20 DYNAMIC GE2/0/3 2d:10h -STATIC Table 6-4 Description of the display igmp-proxy router-port command output Item Description Port Name Type and number of an interface. UpTime Age of a router interface, that is, time that elapsed since the interface became the router interface. Expires Remaining aging time of a router interface. l The remaining aging time is displayed for a dynamic router interface. l A static router interface does not age. Flags Type of the router interface, which can be either of the following: l STATIC: indicates a static router interface. l DYNAMIC: indicates a dynamic router interface. 6.1.5 igmp-proxy enable Function Using the igmp-proxy enable command, you can enable IGMP proxy. By default., IGMP proxy is disabled. Format igmp-proxy enable Parameters None Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 82 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands Views System view, VLAN view Default Level 2: Configuration level Usage Guidelines The differences of using the igmp-proxy enable command in the system view and VLAN view are as follows: l When you run the commands in the system view, IGMP proxy is enabled globally. l When you run the commands in the VLAN view, IGMP proxy is enabled or in the VLAN. l To enable IGMP proxy in a VLAN, you must first enable IGMP proxy globally. Example # Enable IGMP proxy globally. <HUAWEI> system-view [HUAWEI] igmp-proxy enable # Enable IGMP proxy in VLAN 3. <HUAWEI> system-view [HUAWEI] igmp-proxy enable [HUAWEI] vlan 3 [HUAWEI-vlan3] igmp-proxy enable 6.1.6 igmp-proxy group-limit Function Using the igmp-proxy group-limit command, you can set the maximum number of IGMP proxy entries on an interface. Format igmp-proxy group-limit limit-num vlan { vlan-id1 [ to vlan-id2 ] } & <1-10> Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 83 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands Parameters Parameter Description Value limit-num Specifies the maximum number of IGMP proxy entries on an interface. The value is an integer and the value range depends on the product model: l S2350: 1 to 1022 l S5300LI and S5300SI: 1 to 1024 l S5300EI, S5310EI, S5300HI, S5306, and S6300: 1 to 2048 vlan-id1 [ to vlan-id2 ] Specifies the ID of a user VLAN. The value is an integer that ranges from 1 to 4094. Views Ethernet interface view, GE interface view, XGE interface view, port group view, Eth-Trunk interface view Default Level 2: Configuration level Usage Guidelines After the igmp-proxy group-limit command is run, the number of IGMP proxy entries on the interface cannot exceeds the limit. Example # Set the maximum number of IGMP proxy entries in VLAN 10 on GE0/0/1 to 100. <HUAWEI> system view [HUAWEI] interface gigabitethernet 0/0/1 [HUAWEI-GigabitEthernet0/0/1] igmp-proxy group-limit 100 vlan 10 6.1.7 igmp-proxy group-policy (interface view) Function The igmp-proxy group-policy command configures a multicast group policy for a VLAN on an interface. The policy specifies the multicast groups that hosts in the VLAN can join. By default, no multicast group policy is configured for a VLAN. That is, hosts in the VLAN can join any multicast group. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 84 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands Format igmp-proxy group-policy acl-number [ version version-number ] vlan vlan-id1 [ to vlanid2 ] igmp-proxy group-policy acl-number vlan vlan-id1 [ to vlan-id2 ] version-number Parameters Parameter Description Value acl-number Specifies the number of the ACL that limits the multicast groups that hosts in a VLAN can join. The value is an integer that ranges from 2000 to 3999. version-number Applies the multicast group policy to only the IGMP messages of the specified version. The value is an integer that ranges from 1 to 3. The value 1 indicates IGMPv1, the value 2 indicates IGMPv2 and the value 3 indicates IGMPv3. vlan vlan-id1 [ to vlan-id2 ] Applies the multicast group policy to the specified VLANs on the interface. vlan-id1 and vlan-id2 are integers that range 1 from 4094. Views Ethernet interface view, GE interface view, XGE interface view, port group view, Eth-Trunk interface view Default Level 2: Configuration level Usage Guidelines Before running the igmp-proxy group-policy command, run the 6.1.5 igmp-proxy enable command to enable IGMP proxy globally and in the specified VLANs. By configuring a multicast group policy for a VLAN on an interface, you can prohibit hosts in the VLAN from joining the specified IP multicast groups. If the IGMP version is not specified, the device applies the multicast group policy to all IGMP messages regardless of their versions. Example # Prohibit hosts in VLAN 3 from join multicast group 225.1.1.123 on GE0/0/10. <HUAWEI> system-view [HUAWEI] acl number 2008 Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 85 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands [HUAWEI-acl-basic-2008] rule deny source 225.1.1.123 0 [HUAWEI-acl-basic-2008] quit [HUAWEI] igmp-proxy enable [HUAWEI] vlan 3 [HUAWEI-vlan3] igmp-proxy enable [HUAWEI-vlan3] quit [HUAWEI] interface gigabitehernet 0/0/10 [HUAWEI-GigabitEthernet0/0/10] igmp-proxy group-policy 2008 vlan 3 6.1.8 igmp-proxy group-policy (VLAN view) Function Using the igmp-proxy group-policy command, you can configure the multicast group policy in a VLAN. The policy specifies the multicast groups that hosts in the VLAN can join. By default, no multicast group policy is available in a VLAN. That is, hosts in a VLAN can join any multicast group. Format igmp-proxy group-policy acl-number [ [ version ] version-number ] Parameters Parameter Description Value acl-number Specifies the number of the ACL that limits the multicast groups that hosts in a VLAN can join. The value is an integer that ranges from 2000 to 3999. [ version ] version-number Applies the multicast group policy to only the IGMP messages of the specified version. The value is an integer that ranges from 1 to 3. The value 1 indicates IGMPv1, the value 2 indicates IGMPv2 and the value 3 indicates IGMPv3. Views VLAN view Default Level 2: Configuration level Usage Guidelines Before running the igmp-proxy group-policy command, run the 6.1.5 igmp-proxy enable command to enable IGMP proxy globally and in the VLAN. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 86 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands By setting the multicast group policy in a VLAN, you can restrict the access of hosts in the VLAN to multicast groups. If the IGMP version is not specified, the device applies the multicast group policy to all IGMP messages regardless of their versions. Example # Prevent hosts in VLAN 3 from joining multicast group 225.1.1.123. <HUAWEI> system-view [HUAWEI] acl number 2008 [HUAWEI-acl-basic-2008] rule deny source 225.1.1.123 0 [HUAWEI-acl-basic-2008] quit [HUAWEI] igmp-proxy enable [HUAWEI] vlan 3 [HUAWEI-vlan3] igmp-proxy enable [HUAWEI-vlan3] igmp-proxy group-policy 2008 6.1.9 igmp-proxy lastmember-queryinterval Function Using the igmp-proxy lastmember-queryinterval command, you can set the interval for sending Group-Specific Query messages (last member query) in a VLAN. By default, the interval for sending Group-Specific Query messages in a VLAN is 1 second. Format igmp-proxy lastmember-queryinterval lastmember-queryinterval Parameters Parameter Description Value lastmember-queryinterval Specifies the interval for sending IGMP GroupSpecific Query messages. The value is an integer that ranges from 1 to 5, in seconds. The default value is 1. Views VLAN view Default Level 2: Configuration level Usage Guidelines Before running the igmp-proxy lastmember-queryinterval command, run the 6.1.5 igmpproxy enable command to enable IGMP proxy globally and in the VLAN. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 87 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands By setting the interval for sending IGMP Group-Specific messages, you can: l Adjust and control the delay for hosts to leave a multicast group. For example, when memberships change frequently on the network, you can run the igmpproxy lastmember-queryinterval command to reduce the interval for sending IGMP Group-Specific Query messages. In this manner, the device can receive the response to the IGMP Group-Specific Query messages quickly. l Maintain forwarding entries. When receiving IGMP Leave messages from hosts, the device sets the aging time of member interfaces by using the following formula: Aging time = Interval for sending Group-Specific Query messages x IGMP robustness variable. When the device runs IGMPv1, hosts do not send Leave messages when leaving a multicast group. Therefore, the igmp-proxy lastmember-queryinterval command is valid only when IGMPv2 messages are processed in a VLAN. Example # Set the interval for sending Group-Specific Query messages in VLAN 3 to 4 seconds. <HUAWEI> system-view [HUAWEI] igmp-proxy enable [HUAWEI] vlan 3 [HUAWEI-vlan3] igmp-proxy enable [HUAWEI-vlan3] igmp-proxy lastmember-queryinterval 4 6.1.10 igmp-proxy max-response-time Function Using the igmp-proxy max-response-time command, you can set the maximum response time for IGMP messages in the VLAN. By default, the maximum response time for IGMP messages is 10 seconds. Format igmp-proxy max-response-time max-response-time Parameters Parameter Description Value max-response-time Specifies the maximum response time for IGMP messages. The value is an integer that ranges from 1 to 25, in seconds. The default value is 10. Views VLAN view Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 88 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands Default Level 2: Configuration level Usage Guidelines Before running the igmp-proxy max-response-time command, run the 6.1.5 igmp-proxy enable command to enable IGMP proxy globally and in the VLAN. By setting the maximum response time, you can: l Control the deadline for a host to send the IGMP Report message. A proper setting of the maximum response time enables hosts to quickly respond to Query messages, thus preventing the congestion caused by a large number of Response messages sent at the same time. l Adjust the aging time of member interfaces. When receiving IGMP Report messages from hosts, the device sets the aging time of member interfaces by using the following formula: Aging time = IGMP robustness variable x Interval for sending IGMP General Query messages + Maximum response time. NOTE The maximum response time must be shorter than the interval for sending IGMP General Query messages. If you run the igmp-proxy max-response-time command multiple times in the same VLAN view, the latest configuration takes effect. Example # Set the maximum response time in VLAN 3 to 20 seconds. <HUAWEI> system-view [HUAWEI] igmp-proxy enable [HUAWEI] vlan 3 [HUAWEI-vlan3] igmp-proxy enable [HUAWEI-vlan3] igmp-proxy max-response-time 20 6.1.11 igmp-proxy prompt-leave Function Using the igmp-proxy prompt-leave command, you can enable interfaces in a VLAN to promptly leave multicast groups. By default, interfaces are disabled from promptly leave multicast groups. Format igmp-proxy prompt-leave [ group-policy acl-number ] Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 89 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands Parameters Parameter Description Value group-policy basic-aclnumber Allows interfaces to promptly leave the specified multicast groups. aclnumber specifies the number of an ACL rule. The value is an integer that ranges from 2000 to 3999. Views VLAN view Default Level 2: Configuration level Usage Guidelines If group-policy basic-acl-number is not specified, interfaces in the VLAN can leave all multicast groups promptly. Before running the igmp-proxy prompt-leave command, run the 6.1.5 igmp-proxy enable command to enable IGMP proxy globally and in the VLAN. When an interface of the device receives an IGMP Leave message of a multicast group, the device deletes the forwarding entry of the multicast group corresponding to the interface from the forwarding table. This process is called prompt leave. When an interface is connected to only one host, the prompt leave mechanism can be used to release bandwidth resources quickly. The configuration is valid only when IGMPv2 messages can be processed in the VLAN. NOTE You can configure prompt leave for an interface only when each multicast member interface is connected to only one host in a VLAN. If the interface is connected to multiple host, the multicast traffic of other receivers in the same group is interrupted when prompt leave is enabled. Example # Enable interfaces in VLAN 3 to promptly leave multicast group 225.1.1.123. <HUAWEI> system-view [HUAWEI] igmp-proxy enable [HUAWEI] acl number 2008 [HUAWEI-acl-basic-2008] rule permit source 225.1.1.123 0 [HUAWEI-acl-basic-2000] rule deny source any [HUAWEI-acl-basic-2008] quit [HUAWEI] vlan 3 [HUAWEI-vlan3] igmp-proxy enable [HUAWEI-vlan3] igmp-proxy prompt-leave group-policy 2008 Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 90 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands 6.1.12 igmp-proxy query-interval Function Using the igmp-proxy query-interval command, you can set the interval for sending IGMP General Query messages in a VLAN. By default, the interval for sending Group-Specific Query messages in a VLAN is 125 seconds. Format igmp-proxy query-interval query-interval Parameters Parameter Description Value query-interval Specifies the interval for sending IGMP General Query messages. The value is an integer that ranges from 1 to 65535, in seconds. The default value is 60. Views VLAN view Default Level 2: Configuration level Usage Guidelines Before running the igmp-proxy query-interval command, run the 6.1.5 igmp-proxy enable command to enable IGMP proxy globally and in the VLAN. By setting interval for sending IGMP General Query messages, you can: l Configure the device to send IGMP General Query messages at the set intervals to maintain memberships of interfaces. The shorter the interval is, the more sensitive the device is and the more bandwidth and switch resources are occupied. l Adjust the aging time of member interfaces. When receiving IGMP Report messages from hosts, the device sets the aging time of member interfaces by using the following formula: Aging time = IGMP robustness variable x Interval for sending IGMP General Query messages + Maximum response time. NOTE The maximum response time must be shorter than the interval for sending IGMP General Query messages. If you run the igmp-proxy query-interval command multiple times in the same VLAN view, the latest configuration takes effect. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 91 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands Example # Set the interval for sending IGMP General Query messages in VLAN 3 to 100 seconds. <HUAWEI> system-view [HUAWEI] igmp-proxy enable [HUAWEI] vlan 3 [HUAWEI-vlan3] igmp-proxy enable [HUAWEI-vlan3] igmp-proxy query-interval 100 6.1.13 igmp-proxy require-router-alert Function Using the igmp-proxy require-router-alert command, you can configure the device to process only the IGMP messages that contain the Router-Alert option in the IP header after receiving the messages from a VLAN. By default, the device can process the IGMP messages that do not contain the Router-Alert option in the IP header. Format igmp-proxy require-router-alert Parameters None Views VLAN view Default Level 2: Configuration level Usage Guidelines After you run the igmp-proxy require-router-alert command , the device checks whether received IGMP messages contain the Router-Alert option in the IP header. If not, the device discards the IGMP messages. Before running the igmp-proxy require-router-alert command, run the 6.1.5 igmp-proxy enable command to enable IGMP proxy globally and in the VLAN. Example # Configure interfaces in VLAN 3 to process only the IGMP messages that contain the RouterAlert option in the IP header. <HUAWEI> system-view [HUAWEI] igmp-proxy enable [HUAWEI] vlan 3 [HUAWEI-vlan3] igmp-proxy enable [HUAWEI-vlan3] igmp-proxy require-router-alert Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 92 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands 6.1.14 igmp-proxy robust-count Function Using the igmp-proxy robust-count command sets the IGMP robustness variable in a VLAN, which specifies how many times IGMP Query messages are sent. By default, the robustness variable in a VLAN is 2. Format igmp-proxy robust-count robust-value Parameters Parameter Description Value robust-value Specifies the IGMP robustness variable in a VLAN. The value is an integer that ranges from 2 to 5. Views VLAN view Default Level 2: Configuration level Usage Guidelines Before running the igmp-proxy lastmember-queryinterval command, run the 6.1.5 igmpproxy enable command to enable IGMP proxy globally and in the VLAN. By setting the interval for sending IGMP Group-Specific messages, you can: l Specify the number of times the querier sends a Group-Specific Query message, which prevents packet loss on the network. When receiving an IGMP Leave message for a multicast group, the switch sends a GroupSpecific Query message certain times (specified by the IGMP robustness variable) to check whether this group has any other members. If the quality of transmission links is low, increase the IGMP robustness variable. l Change the aging time of multicast group member ports. When receiving an IGMP Report message from a host, the switch starts the aging timer for the member port. The aging time is calculated using the following formula: Aging time = IGMP robustness variable x General query interval + Maximum response time for General Query messages. The igmp-snooping robust-count command sets the general query count. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 93 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands Example # Set the IGMP robustness variable to 5 in VLAN 3. <HUAWEI> system-view [HUAWEI] igmp-proxy enable [HUAWEI] vlan 3 [HUAWEI-vlan3] igmp-proxy enable [HUAWEI-vlan3] igmp-proxy robust-count 5 6.1.15 igmp-proxy router-aging-time Function Using the igmp-proxy router-aging-time command, you can set the aging time of dynamic router interfaces in a VLAN. By default, the aging time of dynamic router interfaces in a VLAN is 180 seconds or equal to the holdtime contained in PIM Hello messages. Format igmp-proxy router-aging-time router-aging-time Parameters Parameter Description Value router-aging-time Specifies the aging time of dynamic router interfaces in a VLAN. The value is an integer that ranges from 1 to 1000, in seconds. The default value is 180 seconds or the holdtime contained in PIM Hello messages. Views VLAN view Default Level 2: Configuration level Usage Guidelines Before running the igmp-proxy router-aging-time command, run the 6.1.5 igmp-proxy enable command to enable IGMP proxy globally and in the VLAN. When receiving IGMP Query messages or PIM Hello messages from a dynamic router interface, the device resets the aging time of the router interface. By default, the device resets the aging time of the router interface as follows: Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 94 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands l If IGMP Query messages are received by the interface, the device resets the aging time of the interfaces to 180 seconds. l If PIM Hello messages are received by the interface and the holdtime of the Hello messages is greater than the remaining aging time of the interface, the device resets the aging time of the interface to the holdtime contained in the PIM Hello messages. Example # Set the aging time of router interfaces in VLAN 3 to 500 seconds. <HUAWEI> system-view [HUAWEI] igmp-proxy enable [HUAWEI] vlan 3 [HUAWEI-vlan3] igmp-proxy enable [HUAWEI-vlan3] igmp-proxy router-aging-time 500 6.1.16 igmp-proxy send-query enable Function Using the igmp-proxy send-query enable command, you can enable the device to send IGMP Query messages to non-router interfaces. By default, the device is disabled from sending IGMP Query messages to non-router interfaces. Format igmp-proxy send-query enable Parameters None Views System view Default Level 2: Configuration level Usage Guidelines Before using the igmp-proxy send-query enable command, you must run the 6.1.5 igmp-proxy enable command to enable IGMP proxy globally. In most situations, the device does not send IGMP Query messages. When the MSTP recalculation is triggered by changes of network topologies, the device sends IGMP General Query messages to detect whether multicast members exist on each interface. This is caused by changes of the forwarding path of packets. When IGMP General Query messages are sent to hosts, the hosts that remain as multicast members reply with IGMP Report messages. The device then updates information about multicast member interfaces according to the IGMP Report messages. In this manner, multicast Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 95 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands packets can be quickly switched to new forwarding paths. This ensures smooth transmission of multicast services. Example # Enable the device to send IGMP Query messages that respond to changes of network topologies to non-router interfaces. <HUAWEI> system-view [HUAWEI] igmp-proxy send-query enable 6.1.17 igmp-proxy send-query source-address Function Using the igmp-proxy send-query source-address command, you can set the source IP address contained in the IGMP messages sent by the device enabled with IGMP proxy. Format igmp-proxy send-query source-address ip-address Parameters Parameter Description Value ip-address Specifies the source IP address of IGMP messages. The address is in dotted decimal notation and the default value is 192.168.0.1. Views System view Default Level 2: Configuration level Usage Guidelines Before using the igmp-proxy send-query source-address command, you must run the 6.1.5 igmp-proxy enable command to enable IGMP proxy globally. If 192.168.0.1 is already used by other devices on the network, you can use the command to modify the source IP address of IGMP General Query messages and other messages sent by the device enabled with IGMP proxy. When multiple devices exist on a shared network, you can set the source IP address of IGMP messages to identify the devices. For example, you must specify different source IP addresses for different devicees when the election mechanism is applied to the devicees with different performances. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 96 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands If the command is run for multiple times in the same view, the latest configuration overwrites the earlier ones. Example # Set the source IP address of IGMP messages sent by the device enabled with IGMP proxy to 192.168.10.1. <HUAWEI> system-view [HUAWEI] igmp-proxy enable [HUAWEI] igmp-proxy send-query source-address 192.168.10.1 6.1.18 igmp-proxy ssm-policy Function The igmp-proxy ssm-policy command configures an SSM group policy for IGMP proxy. Format igmp-proxy ssm-policy basic-acl-number Parameters Parameter Description Value basic-acl-number Specifies the number of the basic ACL that defines the range of SSM group addresses. The value is an integer that ranges from 2000 to 2999. Views System view Default Level 2: Configuration level Usage Guidelines Before this command, enable IGMP snooping globally. By default, SSM group addresses range from 232.0.0.0 to 232.255.255.255. You can configure an SSM group policy to narrow or expand the range of SSM group addresses. Example # Configure multicast group 225.1.1.123 as an SSM group. <HUAWEI> system-view [HUAWEI] acl number 2008 Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 97 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands [HUAWEI-acl-basic-2008] rule permit source 225.1.1.123 0 [HUAWEI-acl-basic-2008] quit [HUAWEI] igmp-snooping enable [HUAWEI] igmp-proxy ssm-policy 2008 6.1.19 igmp-proxy static-group Function The igmp-proxy static-group command adds an interface statically to a multicast group. By default, an interface is not statically added to any multicast groups. Format igmp-proxy static-group group-ip-address1 [ to group-ip-address2 ] [ source-address sourceip-address ] vlan vlan-id Parameters Parameter Description Value group-ip-address1 to groupip-address2 Adds the interface to multiple multicast groups. The values of group-ip-address1 and group-ip-address2 must be in the same network segment (with a 24-bit mask). - source-address source-ipaddress Specifies the IP address of a multicast source. The value of source-ipaddress can be any Class A, Class B, or Class C address, in dotted decimal notation. vlan vlan-id Specifies the ID of a VLAN. The value is an integer that ranges from 1 to 4094. Views Ethernet interface view, GE interface view, XGE interface view, port group view, Eth-Trunk interface view Default Level 2: Configuration level Usage Guidelines In addition to dynamic multicast forwarding entries generated by Layer 2 protocol protocols, you can configure static Layer 2 multicast forwarding entries by binding interfaces to entries. After an interface is statically added to a multicast group, users connected to this interface can receive multicast data of the multicast group for a long time. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 98 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands Example # Add GE0/0/1 in VLAN 2 to multicast group 224.1.1.1. <HUAWEI> system-view [HUAWEI] interface gigabitethernet 0/0/1 [HUAWEI-GigabitEthernet0/0/1] igmp-proxy static-group 224.1.1.1 vlan 2 6.1.20 igmp-proxy static-router-port Function Using the igmp-proxy static-router-port command, you can configure an interface as a static router interface in a specified VLAN. Format igmp-proxy static-router-port vlan { vlan-id1 [ to vlan-id2 ] } &<1-10> Parameters Parameter Description Value vlan vlan-id Indicates a VLAN. vlan-id specifies the ID of a VLAN. The value is an integer that ranges from 1 to 4094. Views Ethernet interface view, GE interface view, XGE interface view, port group view, Eth-Trunk interface view Default Level 2: Configuration level Usage Guidelines Before running the igmp-proxy static-router-port command, run the 6.1.5 igmp-proxy enable command to enable IGMP proxy globally and in the VLAN. If the interface is not added to the VLAN specified by vlan-id before the command is run, the configuration is kept on the device and becomes valid until the interface is added to the specified VLAN. NOTE A static router interface does not age. Example # Configure GE0/0/1 in VLAN 3 as a static router interface. <HUAWEI> system-view [HUAWEI] igmp-proxy enable Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 99 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands [HUAWEI] vlan 3 [HUAWEI-vlan3] igmp-proxy enable [HUAWEI-vlan3] quit [HUAWEI] interface gigabitethernet 0/0/1 [HUAWEI-GigabitEthernet0/0/1] igmp-proxy static-router-port vlan 3 6.1.21 igmp-proxy table limit Function Using the igmp-proxy table limit command, you can set the maximum number of IGMP proxy entries on an interface. Format igmp-proxy table limit limit-num vlan { vlan-id1 [ to vlan-id2 ] } & <1-10> Parameters Parameter Description Value limit-num Specifies the maximum number of IGMP proxy entries on an interface. The value is an integer and the value range depends on the product model: l S2350: 1 to 1022 l S5300LI and S5300SI: 1 to 1024 l S5300EI, S5310EI, S5300HI, S5306, and S6300: 1 to 2048 vlan-id1 [ to vlan-id2 ] Specifies the ID of a user VLAN. The value is an integer that ranges from 1 to 4094. Views Ethernet interface view, GE interface view, XGE interface view, port group view, Eth-Trunk interface view Default Level 2: Configuration level Usage Guidelines After the igmp-proxy table limit command is run, the number of IGMP proxy entries on the interface cannot exceeds the limit. Example # Set the maximum number of IGMP proxy entries in VLAN 10 on GE0/0/1 to 100. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 100 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands <HUAWEI> system view [HUAWEI] interface gigabitethernet 0/0/1 [HUAWEI-GigabitEthernet0/0/1] igmp-proxy table limit 100 vlan 10 6.1.22 igmp-proxy version Function Using the igmp-proxy version command, you can configure the version of IGMP messages that can be processed by the IGMP proxy in a VLAN. By default, the IGMP proxy can process both IGMPv1 messages and IGMPv2 messages in a VLAN. Format igmp-proxy version version Parameters Parameter Description Value version Specifies the version of IGMP messages that can be processed in a VLAN. The value is an integer that ranges from 1 to 3. l The value 1 indicates that only IGMPv1 messages can be processed. l The value 2 indicates that both IGMPv1 and IGMPv2 messages can be processed. l The value 3 indicates that the system can process IGMPv1, IGMPv2, and IGMPv3 messages. Views VLAN view Default Level 2: Configuration level Usage Guidelines Hosts in the same VLAN must run the IGMP protocol of the same version. When hosts that run different IGMP versions exist in a VLAN, you need to run the igmp-proxy version command to configure the IGMP version. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 101 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands Before running the igmp-proxy version command, run the 6.1.5 igmp-proxy enable command to enable IGMP proxy globally and in the VLAN. Example # Configure the IGMP proxy to process only IGMPv1 messages in VLAN 2. <HUAWEI> system-view [HUAWEI] igmp-proxy enable [HUAWEI] vlan 2 [HUAWEI-vlan2] igmp-proxy enable [HUAWEI-vlan2] igmp-proxy version 1 6.1.23 igmp-snooping group-policy (interface view) Function The igmp-snooping group-policy command configures a multicast group policy for a VLAN on an interface. The policy specifies the multicast groups that hosts in the VLAN can join. By default, no multicast group policy is configured for a VLAN. That is, hosts in the VLAN can join any multicast group. Format igmp-snooping group-policy acl-number vlan vlan-id1 [ to vlan-id2 ] version-number Parameters Parameter Description Value acl-number Specifies the number of the ACL that limits the multicast groups that hosts in a VLAN can join. The value is an integer that ranges from 2000 to 3999. version-number Applies the multicast group policy to only the IGMP messages of the specified version. The value is an integer that ranges from 1 to 3. The value 1 indicates IGMPv1, the value 2 indicates IGMPv2 and the value 3 indicates IGMPv3. vlan vlan-id1 [ to vlan-id2 ] Applies the multicast group policy to the specified VLANs on the interface. vlan-id1 and vlan-id2 are integers that range 1 from 4094. Views Ethernet interface view, GE interface view, XGE interface view, port group view, Eth-Trunk interface view Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 102 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands Default Level 2: Configuration level Usage Guidelines Before running the igmp-snooping group-policy command, enable IGMP snooping globally and in the specified VLANs. By configuring a multicast group policy for a VLAN on an interface, you can prohibit hosts in the VLAN from joining the specified IP multicast groups. Example # Prohibit hosts in VLAN 3 from join multicast group 225.1.1.123 on GE0/0/10. <HUAWEI> system-view [HUAWEI] acl number 2008 [HUAWEI-acl-basic-2008] rule deny source 225.1.1.123 0 [HUAWEI-acl-basic-2008] quit [HUAWEI] igmp-snooping enable [HUAWEI] vlan 3 [HUAWEI-vlan3] igmp-snooping enable [HUAWEI-vlan3] quit [HUAWEI] interface gigabitethernet 0/0/10 [HUAWEI-GigabitEthernet0/0/10] igmp-snooping group-policy 2008 vlan 3 2 6.1.24 igmp-snooping group-policy (VLAN view) Function Using the igmp-snooping group-policy command, you can configure the multicast group policy in a VLAN. The policy specifies the multicast groups that hosts in the VLAN can join. By default, no multicast group policy is available in a VLAN. That is, hosts in a VLAN can join any multicast group. Format igmp-snooping group-policy acl-number version-number Parameters Issue 02 (2013-11-06) Parameter Description Value acl-number Specifies the number of the ACL that limits the multicast groups that hosts in a VLAN can join. The value is an integer that ranges from 2000 to 3999. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 103 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands Parameter Description Value version-number Applies the multicast group policy to only the IGMP messages of the specified version. The value is an integer that ranges from 1 to 3. The value 1 indicates IGMPv1, the value 2 indicates IGMPv2 and the value 3 indicates IGMPv3. Views VLAN view Default Level 2: Configuration level Usage Guidelines Before running the igmp-snooping group-policy command, enable IGMP snooping globally and in the VLAN. By setting the multicast group policy in a VLAN, you can restrict the access of hosts in the VLAN to multicast groups. Example # Prevent hosts in VLAN 3 from joining multicast group 225.1.1.123. <HUAWEI> system-view [HUAWEI] acl number 2008 [HUAWEI-acl-basic-2008] rule deny source 225.1.1.123 0 [HUAWEI-acl-basic-2008] quit [HUAWEI] igmp-snooping enable [HUAWEI] vlan 3 [HUAWEI-vlan3] igmp-snooping enable [HUAWEI-vlan3] igmp-snooping group-policy 2008 2 6.1.25 igmp-snooping proxy enable Function Using the igmp-snooping proxy enable command, you can enable IGMP snooping globally. By default., IGMP snooping is disabled globally. Format igmp-snooping proxy enable Parameters None Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 104 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands Views System view Default Level 2: Configuration level Usage Guidelines None Example # Enable IGMP proxy globally. <HUAWEI> system-view [HUAWEI] igmp-snooping proxy enable # Enable IGMP proxy in VLAN 3. 6.1.26 igmp-snooping ssm-policy Function The igmp-snooping ssm-policy command configures an SSM group policy for IGMP snooping. All the multicast groups permitted by the SSM group policy are SSM groups. Format igmp-snooping ssm-policy basic-acl-number Parameters Parameter Description Value basic-acl-number Specifies the number of the basic ACL that defines the range of SSM groups. The value is an integer that ranges from 2000 to 2999. Views System view Default Level 2: Configuration level Usage Guidelines Perform the following operations before using this command: Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 105 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands l Create a basic ACL. l Enable IGMP proxy globally. By default, SSM group addresses range from 232.0.0.0 to 232.255.255.255. If hosts need to join multicast groups out of this range or they are only allowed to join some of multicast groups in the range, you can configure an SSM group policy to specify the SSM group range. Example # Configure multicast group 225.1.1.123 as an SSM group. <HUAWEI> system-view [HUAWEI] acl number 2000 [HUAWEI-acl-basic-2000] rule permit source 225.1.1.123 0 [HUAWEI-acl-basic-2000] quit [HUAWEI] igmp-proxy enable [HUAWEI] igmp-snooping ssm-policy 2000 6.1.27 igmp-snooping static-group Function The igmp-snooping static-group command adds an interface statically to a multicast group. By default, an interface is not statically added to any multicast groups. Format igmp-snooping static-group group-ip-address1 [ to group-ip-address2 ] [ source-address source-ip-address ] vlan vlan-id Parameters Issue 02 (2013-11-06) Parameter Description Value group-ip-address1 to groupip-address2 Adds the interface to multiple multicast groups. The values of group-ipaddress1 and group-ipaddress2 must be in the same network segment (with a 24bit mask). - source-address source-ipaddress Specifies the IP address of a multicast source. The value of source-ipaddress can be any Class A, Class B, or Class C address, in dotted decimal notation. vlan vlanid Specifies the ID of a VLAN. The value is an integer that ranges from 1 to 4094. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 106 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands Views Ethernet interface view, GE interface view, XGE interface view, port group view, Eth-Trunk interface view Default Level 2: Configuration level Usage Guidelines In addition to dynamic multicast forwarding entries generated by Layer 2 protocol protocols, you can configure static Layer 2 multicast forwarding entries by binding interfaces to entries. After an interface is statically added to a multicast group, users connected to this interface can receive multicast data of the multicast group for a long time. Example # Add GE0/0/1 in VLAN 2 to multicast group 224.1.1.1. <HUAWEI> system-view [HUAWEI] interface gigabitethernet 0/0/1 [HUAWEI-GigabitEthernet0/0/1] igmp-snooping static-group 224.1.1.1 vlan 2 6.1.28 igmp-snooping suppression-time Function The igmp-snooping suppression-time command sets the global IGMP message suppression time. Format igmp-snooping suppression-time suppression-time Parameters Parameter Description Value suppression-time Specifies the global IGMP message suppression time. The value is an integer that ranges from 0 to 300, in seconds. The default value is 10. Views System view Default Level 2: Configuration level Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 107 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands Usage Guidelines To reduce the IGMP messages sent to the upstream router and protects the router from attacks, enable the device to suppress IGMP Report and IGMP Leave messages sent by hosts. After this function is enabled, the device processes IGMP Report and IGMP Leave messages as follows: l After receiving an IGMP Report message and forwarding the message, the device does not forward the same type of messages to the router interface within the suppression time. l If the device receives an IGMP General Query message or Group-Specific message, the device does not suppress the first IGMP Report message that responds to the General Query message. In addition, the device resets the suppression timer when receiving the first IGMP Report message. The igmp-snooping suppression-time command sets the period during which IGMP Report and IGMP Leave messages are suppressed. Example # Set the global IGMP message suppression time to 15 seconds. <HUAWEI> system-view [HUAWEI] igmp-snooping suppression-time 15 6.1.29 igmp-snooping table limit Function Using the igmp-snooping table limit command, you can set the maximum number of the entries that can be configured or learnt by the IGMP snooping module on an interface. Format igmp-snooping table limit limit-num vlan vlan-id Parameters Parameter Description Value limit-num Specifies the maximum number of the entries that can be configured or learnt by the IGMP snooping module on an interface. The value is an integer and the value range depends on the product model: l S2350: 1 to 1022 l S5300LI and S5300SI: 1 to 1024 l S5300EI, S5310EI, S5300HI, S5306, and S6300: 1 to 2048 vlan vlan-id Issue 02 (2013-11-06) Specifies a VLAN ID. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. The value is an integer that ranges from 1 to 4094. 108 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands Views Ethernet interface view, GE interface view, XGE interface view, port group view, Eth-Trunk interface view Default Level 2: Configuration level Usage Guidelines After the igmp-snooping table limit command is used, the number of the entries that can be configured or learnt by the IGMP snooping module on an interface cannot exceed the maximum number. Example # Set the maximum number of the entries that can be configured or learnt by the IGMP snooping module on GE0/0/1 in VLAN 4 to 100. <HUAWEI> system view [HUAWEI] interface gigabitethernet 0/0/1 [HUAWEI-GigabitEthernet0/0/1] igmp-snooping table limit 100 vlan 4 6.1.30 mld-snooping group-policy (interface view) Function The mld-snooping group-policy command configures an IPv6 multicast group policy on an interface. Format mld-snooping group-policy acl6-number vlan vlan-id mld-version [ default-permit ] Parameters Issue 02 (2013-11-06) Parameter Description Value acl6-number Specifies the number of an IPv6 ACL that defines a range of multicast groups. A basic or advanced ACL can be used in an IPv6 multicast group policy. The value is an integer that ranges from 2000 to 3999. vlan vlan-id Applies the IPv6 multicast group policy to a specified VLAN on an interface. The value is an integer that ranges from 1 to 4094. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 109 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands Parameter Description Value mld-version Specifies an MLD version. The multicast group policy is applied only to the MLD messages of this version. If this parameter is not specified, the multicast group policy applies to all MLD messages. The value is 1 or 2. Configures the multicast group policy to permit all groups by default. That is, if the referenced ACL has no rules, the multicast group policy allows hosts in the VLAN to join all groups. - default-permit l 1: MLDv1 l 2: MLDv2 Views Ethernet interface view, GE interface view, XGE interface view, port group view, Eth-Trunk interface view Default Level 2: Configuration level Usage Guidelines An IPv6 multicast group policy controls the multicast programs that users can order on a device with Multicast Listener Discovery (MLD) snooping enabled. In multicast applications, user hosts send MLD Report messages to join a group when they order programs of this group. When the upstream Layer 2 device receives the Report messages, it processes the Report messages differently depending on whether the group policy configured on the inbound interface has the default-permit keyword specified: l If default-permit is not specified, the group policy prevents hosts in the VLAN from joining any group by default. A filter rule must be configured by specifying the permit keyword in the rule command. If the Report messages match the filter rule, the Layer 2 device allows the hosts in the VLAN to join the group and forwards the Report messages. If the Report messages do not match the filter rule, the Layer 2 device prevents the hosts from joining the group and drops the Report messages. l If default-permit is specified, the group policy allows hosts in the VLAN to join all groups by default. A filter rule must be configured by specifying the deny keyword in the rule command. If the Report messages match the filter rule, the Layer 2 device prevents the hosts in the VLAN from joining the group and drops the Report messages. If the Report messages do not match the filter rule, the Layer 2 device allows the hosts to join the group and forwards the Report messages. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 110 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands Example # Prevent hosts in VLAN 10 on GE0/0/1 from joining IPv6 multicast group ff1c::3/32. <HUAWEI> system-view [HUAWEI] acl ipv6 number 2000 [HUAWEI-acl6-basic-2000] rule deny source ff1c::3/32 [HUAWEI-acl6-basic-2000] quit [HUAWEI] mld-snooping enable [HUAWEI] vlan 10 [HUAWEI-vlan10] mld-snooping enable [HUAWEI-vlan10] quit [HUAWEI] interface gigabitethernet 0/0/1 [HUAWEI-GigabitEthernet0/0/1] port link-type trunk [HUAWEI-GigabitEthernet0/0/1] port trunk allow-pass vlan 10 [HUAWEI-GigabitEthernet0/0/1] mld-snooping group-policy 2000 vlan 10 default-permit # Allow hosts in VLAN 10 connected to GE0/0/1 to join IPv6 multicast group ff1c::3/32. <HUAWEI> system-view [HUAWEI] acl ipv6 number 2000 [HUAWEI-acl6-basic-2000] rule permit source ff1c::3/32 [HUAWEI-acl6-basic-2000] quit [HUAWEI] mld-snooping enable [HUAWEI] vlan 10 [HUAWEI-vlan10] mld-snooping enable [HUAWEI-vlan10] quit [HUAWEI] interface gigabitethernet 0/0/1 [HUAWEI-GigabitEthernet0/0/1] port link-type trunk [HUAWEI-GigabitEthernet0/0/1] port trunk allow-pass vlan 10 [HUAWEI-GigabitEthernet0/0/1] mld-snooping group-policy 2000 vlan 10 6.1.31 mld-snooping group-policy (VLAN view) Function The mld-snooping group-policy command configures an IPv6 multicast group policy in a VLAN. Format mld-snooping group-policy acl6-number mld-version [ default-permit ] undo mld-snooping group-policy Parameters Issue 02 (2013-11-06) Parameter Description Value acl6-number Specifies the number of an IPv6 ACL that defines a range of multicast groups. A basic or advanced ACL can be used in an IPv6 multicast group policy. The value is an integer that ranges from 2000 to 3999. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 111 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands Parameter Description Value mld-version Applies the multicast group policy only to the MLD messages of the specified version. If this parameter is not specified, the multicast group policy applies to all MLD messages. The value is 1 or 3. Configures the multicast group policy to permit all groups by default. That is, if the referenced ACL has no rules, the multicast group policy allows hosts in the VLAN to join all groups. - default-permit l 1: MLDv1 l 2: MLDv2 Views VLAN view Default Level 2: Configuration level Usage Guidelines An IPv6 multicast group policy controls the multicast programs that users can order on a device with Multicast Listener Discovery (MLD) snooping enabled. In multicast applications, user hosts send MLD Report messages to join a group when they order programs of this group. When the upstream Layer 2 device receives the Report messages, it processes the Report messages differently depending on whether the group policy configured in the VLAN has the defaultpermit keyword specified: l If default-permit is not specified, the group policy prevents hosts in the VLAN from joining any group by default. A filter rule must be configured by specifying the permit keyword in the rule command. If the Report messages match the filter rule, the Layer 2 device allows the hosts in the VLAN to join the group and forwards the Report messages. If the Report messages do not match the filter rule, the Layer 2 device prevents the hosts from joining the group and drops the Report messages. l If default-permit is specified, the group policy allows hosts in the VLAN to join all groups by default. A filter rule must be configured by specifying the deny keyword in the rule command. If the Report messages match the filter rule, the Layer 2 device prevents the hosts in the VLAN from joining the group and drops the Report messages. If the Report messages do not match the filter rule, the Layer 2 device allows the hosts to join the group and forwards the Report messages. Example # Prevent hosts in VLAN 4 from joining IPv6 multicast group ff1e::1/32. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 112 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands <HUAWEI> system-view [HUAWEI] acl ipv6 number 2001 [HUAWEI-acl6-basic-2001] rule deny source ff1e::1/32 [HUAWEI-acl6-basic-2001] quit [HUAWEI] mld-snooping enable [HUAWEI] vlan 4 [HUAWEI-vlan4] mld-snooping enable [HUAWEI-vlan4] mld-snooping group-policy 2001 default-permit # Allow hosts in VLAN 4 to join IPv6 multicast group ff1e::1/32. <HUAWEI> system-view [HUAWEI] acl ipv6 number 2001 [HUAWEI-acl6-basic-2001] rule permit source ff1e::1/32 [HUAWEI-acl6-basic-2001] quit [HUAWEI] mld-snooping enable [HUAWEI] vlan 4 [HUAWEI-vlan4] mld-snooping enable [HUAWEI-vlan4] mld-snooping group-policy 2001 6.1.32 multicast user-vlan Function Using the multicast user-vlan command, you can set the mapping between a multicast VLAN and a user VLAN. Format multicast user-vlan vlan-id1 [ to vlan-id2 ] Parameters Parameter Description Value vlan-id1 [ to vlan-id2 ] Specifies the ID of a user VLAN. The value is an integer that ranges from 1 to 4094. Views VLAN view Default Level 2: Configuration level Usage Guidelines A user VLAN can be mapped to only one multicast VLAN. If you configure a multicast VLAN for a user VLAN, and then you configure another multicast VLAN for the user VLAN, the latest configured multicast VLAN overrides the previous configuration. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 113 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands Example # Set the mapping between a multicast VLAN with the ID as 1 and a user VLAN with the ID as 2 after VLAN 1 is enabled with the multicast VLAN function. [HUAWEI] vlan 1 [HUAWEI-vlan1] multicast user-vlan 2 # Set the mappings between a multicast VLAN with the ID as 1 and user VLANs with the IDs ranging from 2 to 10 after VLAN 1 is enabled with the multicast VLAN function. [HUAWEI] vlan 1 [HUAWEI-vlan1] multicast user-vlan 2 to 10 6.1.33 multicast-source-deny interface Function The multicast-source-deny interface command enables the switch to filter outer multicast data packets sent from a VLAN on specified interfaces. By default, multicast data packets from all VLANs are accepted. Format multicast-source-deny interface interface-type interface-num1 [ to interface-num2 ] & <1-10> Parameters Parameter Description Value interface-type interfacenum1 [ to interface-num2 ] Specifies the interfaces on which the multicast packet filtering function needs to be enabled. - Views VLAN view Default Level 2: Configuration level Usage Guidelines When some interfaces need to reject multicast data packets sent from a VLAN (for example, a user VLAN), you can run the multicast-source-deny command in this VLAN and specify these interfaces in the command. Example # Filter out multicast data packets received from VLAN 10 on GE0/0/1. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 114 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands <HUAWEI> system-view [HUAWEI] vlan 10 [HUAWEI-vlan10] multicast-source-deny interface gigabitethernet 0/0/1 6.1.34 reset igmp-proxy group Function Using the reset igmp-proxy group command, you can clear the dynamic forwarding entries from the multicast forwarding table. Format reset igmp-proxy group vlan { vlan-id | all } all Parameters Parameter Description Value vlan vlan-id vlan-id specifies the ID of a VLAN. If this parameter is specified, the device clears the dynamic forwarding entries of the specified VLAN. The value is an integer that ranges from 1 to 4094. all Clears the dynamic forwarding entries of all VLANs from the multicast forwarding table. - Views User view Default Level 3: Management level Usage Guidelines Before running the reset igmp-proxy group command, you need to run the 6.1.5 igmp-proxy enable command to enable IGMP proxy globally. If the command clears the dynamic forwarding entries of a VLAN from the multicast forwarding table, the hosts in the VLAN cannot receive the multicast packets temporarily. The hosts can receive multicast packets only when they send IGMP Report messages and the device generates dynamic forwarding entries. NOTE This command cannot clear static forwarding entries. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 115 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands Example # Clear the dynamic forwarding entries of all VLANs. <HUAWEI> reset igmp-proxy group vlan all all # Clear all dynamic forwarding entries of VLAN 3. <HUAWEI> reset igmp-proxy group vlan 3 all 6.1.35 undo igmp-proxy router-learning Function The undo igmp-proxy router-learning command disables dynamic router interface learning in a VLAN. By default, dynamic router interface learning is enabled in a VLAN. Format undo igmp-proxy router-learning Parameters None Views VLAN view Default Level 2: Configuration level Usage Guidelines Before running the undo igmp-proxy router-learning command, run the 6.1.5 igmp-proxy enable command to enable IGMP proxy globally and in the VLAN. A device running IGMP snooping considers an interface as a router interface when the interface receives an IGMP General Query message with any source IP address except 0.0.0.0 or a PIM Hello message. The device records all the router interfaces in the router interface list. Too many router interfaces make it difficult for the device to control the multicast flows that users can receive. To control the multicast flows received by users, disable router interface learning in VLANs. Example # Disable router interface learning in VLAN 3. <HUAWEI> system-view [HUAWEI] igmp-proxy enable [HUAWEI] vlan 3 [HUAWEI-vlan3] igmp-proxy enable [HUAWEI-vlan3] undo igmp-proxy router-learning Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 116 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 6 Multicast Compatible Commands 6.1.36 undo igmp-proxy send-router-alert Function Using the undo igmp-proxy send-router-alert command, you can configure the device to send IGMP messages not containing the Router-Alert option in the IP header. By default, the device sends IGMP messages that contain the Router-Alert option in the IP header. Format undo igmp-proxy send-router-alert Parameters None Views VLAN view Default Level 2: Configuration level Usage Guidelines Before running the undo igmp-proxy send-router-alert command, run the 6.1.5 igmp-proxy enable command to enable IGMP proxy globally and in the VLAN. Example # Configure the device to send IGMP messages that does not contain the Router-Alert option in the IP header to VLAN 3. <HUAWEI> system-view [HUAWEI] igmp-proxy enable [HUAWEI] vlan 3 [HUAWEI-vlan3] igmp-proxy enable [HUAWEI-vlan3] undo igmp-proxy send-router-alert Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 117 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 7 7 QoS compatible command QoS compatible command About This Chapter 7.1 cpu queue bpdu 7.2 port queue statistics enable 7.3 qos drr (scheduling template view) 7.4 qos local-precedence-queue-map 7.5 qos queue 7.6 qos queue max-buffer 7.7 qos queue max-length (tail drop template view) 7.8 qos queue statistics enable 7.9 qos sred 7.10 qos wrr (scheduling template view) Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 118 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 7 QoS compatible command 7.1 cpu queue bpdu Function Using the cpu queue bpdu command, you can set the bandwidth consumed by BPDUs sent to the queues on the CPU. NOTE This command is only supported by S5300SI and S5300EI. Format cpu queue bpdu cir cir pir pir Parameters Parameter Description Value cir cir Specifies the Committed Information Rate (CIR) of BPDUs sent to the queues on the CPU. The value is an integer that ranges from 64 to 512, in kbit/ s. By default, the CIR is 128 kbit/s. pir pir Specifies the Peak Information Rate (PIR) of BPDUs sent to the queues on the CPU. The value is an integer that ranges from 64 to 512, in kbit/ s. By default, the PIR is 128 kbit/s. Views System view Default Level 2: Configuration level Usage Guidelines If packet loss occurs during the transmission of BPDUs, you can use the cpu queue bpdu command to set the bandwidth of BPDUs sent to the queues on the CPU. In this manner, less BPDUs are lost. Example # Set the CIR and PIR of BPDUs sent to the queues on the CPU to 512 kbit/s. <Quidway> system-view [Quidway] cpu queue bpdu cir 512 pir 512 Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 119 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 7 QoS compatible command 7.2 port queue statistics enable Function Using the port queue statistics enable command, you can enable traffic statistics on a specified queue and set parameters. Using the undo port queue statistics enable command, you can disable traffic statistics on a specified queue. By default, traffic statistics on a specified queue is disabled. NOTE This command is only supported by S5300EI. Format port queue statistics enable queue-index queue-index inbound interface interface-type interface-number port queue statistics enable queue-index queue-index outbound interface interface-type interface-number [ from interface interface-type interface-number ] Parameters Parameter Description Value queue-index Specifies a queue index. The value is an integer that ranges from 0 to 7. Value 0 to value 7 correspond to queue 0 to queue 7 respectively. interface-type interfacenumber Specifies the type and number of an interface. The interface type can be ethernet, gigabitethernet, xgigabitethernet. from interface interfacetype interface-number Enables traffic statistics on a specified queue from a specified inbound interface to a specified outbound interface. The interface type can be ethernet, gigabitethernet, xgigabitethernet. Views System view Default Level 2: Configuration level Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 120 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 7 QoS compatible command Usage Guidelines If you have enabled traffic statistics on a specified queue, you can view the number of passed packets in the queue. NOTE port queue statistics enable queue-index queue-index outbound interface interface-type interfacenumber The device supports traffic statistics on a maximum of eight queues. Example # Display traffic statistics on queue 7 on the ingress interface GigabitEthernet 0/0/1. <Quidway> system-view [Quidway] port queue statistics enable queue-index 7 inbound interface gigabitethernet 0/0/1 7.3 qos drr (scheduling template view) Function Using the qos drr command, you can set parameters for queues on which the DRR scheduling is used. Using the undo qos drr command, you can restore default values of parameters for queues on which the DRR scheduling is used. By default, the DRR scheduling weight value of a queue is 1. NOTE This command can be configured only on the S5300SI. Format qos drr queue-index queue-index weight weight-value undo qos drr queue-index Parameters Issue 02 (2013-11-06) Parameter Description Value queue-index Specifies the index of a queue. The value is an integer that ranges from 0 to 7. Value 0 to value 7 correspond to queue 0 to queue 7 respectively. weight-value Specifies the DRR scheduling weight value of a queue. The value is an integer that ranges from 0 to 127. The default value is 1. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 121 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 7 QoS compatible command Views Scheduling template view Default Level 2: Configuration level Usage Guidelines You can set parameters for queues on which the DRR scheduling is used only when the scheduling mode in the scheduling template view is DRR; otherwise, you need to run the qos (scheduling template view) command to change the scheduling mode on an interface to DRR first. By default, the scheduling mode of the device is WRR. If the qos drr command is repeatedly run in the same scheduling template view for the same queue, the later configuration overrides the previous configuration. Example # Set the scheduling mode of queue 3 to DRR, and then set the scheduling weight value to 20 in global scheduling template a. <Quidway> system-view [Quidway] qos schedule-profile a [Quidway-qos-schedule-profile-a] qos drr [Quidway-qos-schedule-profile-a] qos drr queue-index 3 weight 20 7.4 qos local-precedence-queue-map Function Using the qos local-precedence-queue-map command, you can configure the mapping between a local precedence and a queue. Using the undo qos local-precedence-queue-map command, you can restore the default mapping between a local precedence and a queue. NOTE This command is only supported by S5300EI and S5300SI. Format qos local-precedence-queue-map local-precedence queue-index undo qos local-precedence-queue-map Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 122 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 7 QoS compatible command Parameters Parameter Description Value local-precedence Specifies a local precedence. The value is an integer that ranges from 0 to 7. The greater the value, the higher the priority. queue-index Specifies the index of a queue. The value is an integer that ranges from 0 to 7. Value 0 to value 7 correspond to queue 0 to queue 7 respectively. Views System view Default Level 2: Configuration level Usage Guidelines If the qos local-precedence-queue-map command is run repeatedly in the same system view, the later configuration overrides the previous configuration. The device sends packets to the specified queue according to the mapping between a local precedence and a queue. By default, the mapping between a local precedence and a queue is shown in the following table. Table 7-1 Mapping between a local precedence and a queue Issue 02 (2013-11-06) Local Precedence Queue Index 7 7 6 6 5 5 4 4 3 3 2 2 1 1 0 0 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 123 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 7 QoS compatible command Example # Map queue 3 to local precedence 4. <Quidway> system-view [Quidway] qos local-precedence-queue-map 4 3 7.5 qos queue Function Using the qos queue command, you can configure scheduling parameters for queues of each class of service on an interface. Using the undo qos queue command, you can restore the default scheduling parameters for queues of each class of service on an interface. Format qos queue { af1 | af2 | af3 | af4 | be | cs6 | cs7 | ef } cir cir-value pir pir-value [ cbs cbs-value pbs pbs-value ] undo qos queue { af1 | af2 | af3 | af4 | be | cs6 | cs7 | ef } NOTE This command is only supported by S5300SI and S5300EI. Parameters Issue 02 (2013-11-06) Parameter Description Value af1, af2, af3, af4 Indicates queues that guarantee bandwidths, corresponding to queues Q1, Q2, Q3, and Q4 respectively. - be Indicates the best effort (BE) queue, corresponding to queue Q0. cs6, cs7 Indicates high priority queues that correspond to queue Q6 and queue Q7 respectively. - ef Indicates the low-delay queue that corresponds to queue Q5. - Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 124 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 7 QoS compatible command Parameter Description Value cir cir-value Specifies a CIR, that is, guaranteed bandwidth of an interface. It is an integer ranging from 64 to the interface bandwidth, in kbit/s. For example, the bandwidth of a GE interface is 1000000 kbit/s, and that of a 10GE interface is 10000000 kbit/s. pir pir-value Specifies a PIR, that is, restricted bandwidth of an interface. It is an integer ranging from 64 to the interface bandwidth, in kbit/s. For example, the bandwidth of a GE interface is 1000000 kbit/s, and that of a 10GE interface is 10000000 kbit/s. The default value is the interface bandwidth. cbs cbs-value Specifies a Committed Burst Size (CBS), that is, the committed traffic size that can pass at a burst of traffic. It is an integer ranging from 4096 bytes to 16773120 bytes. The default cbs-value is related to the configured cir-value. pbs pbs-value Specifies a Peak Burst Size (PBS), that is, the peak traffic size that can pass at a burst of traffic. It is an integer ranging from 4096 bytes to 16773120 bytes. The default pbs-value is related to the configured pir-value. NOTE The priorities of queues Q7, Q6, …, Q1, and Q0 are 7, 6, …, 1, and 0 respectively, in an descending order on an interface. Views GE interface view, 10GE interface view Default Level 2: Configuration level Usage Guidelines When the rate of an interface on a downstream device is lower than the rate of an interface on an upstream device, traffic congestion may occur on the interface of the upstream device. In this case, you can configure traffic shaping for queues on the outbound interface of the upstream device and adjust the sending rate of the interface. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 125 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 7 QoS compatible command Example # Configure traffic shaping for queue 2 on GE0/0/1. Set the CIR to 300 kbit/s and the PIR to 500 kbit/s. <Quidway> system-view [Quidway] interface gigabitethernet 0/0/1 [Quidway-GigabitEthernet0/0/1] qos queue af2 cir 300 pir 500 7.6 qos queue max-buffer Function Using the qos queue max-buffer command, you can set the maximum buffer size of all packets in a specified queue for a tail drop template. Using the qos queue green max-buffer command, you can set the maximum buffer size of green packets in a specified queue for a tail drop template. Using the undo qos queue max-buffer command, you can delete the maximum buffer size of all packets in a specified queue set for a tail drop template. Using the undo qos queue green max-buffer command, you can delete the maximum buffer size of green packets in a specified queue set for a tail drop template. Format qos queue { af1 | af2 | af3 | af4 | be | cs6 | cs7 | ef } max-buffer cell-number [ green maxbuffer cell-number ] qos queue { af1 | af2 | af3 | af4 | be | cs6 | cs7 | ef } green max-buffer cell-number undo qos queue { af1 | af2 | af3 | af4 | be | cs6 | cs7 | ef | all } max-buffer [ green maxbuffer ] undo qos queue { af1 | af2 | af3 | af4 | be | cs6 | cs7 | ef | all } green max-buffer NOTE Only the S5300SI supports this command. Parameters Issue 02 (2013-11-06) Parameter Description Value af1, af2, af3, af4 Indicates bandwidth guaranteed queues that correspond to queues Q1, Q2, Q3, and Q4 respectively. - be Indicates the BE queue that corresponds to queue Q0. - Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 126 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 7 QoS compatible command Parameter Description Value cs6, cs7 Indicates high priority queues that correspond to queues Q6 and Q7 respectively. - ef Indicates the low-delay queue that corresponds to queue Q5. - max-buffer cell-number Specifies the maximum buffer size of all packets in a specified queue. The value is an integer that ranges from 1 to 5134, in cells. The size of a cell is 256 bytes. The default value is 24. green max-buffer cellnumber Specifies the maximum buffer size of green packets in a specified queue. The value is an integer that ranges from 1 to 5134, in cells. The size of a cell is 256 bytes. The default value is 12. Views Tail drop template view Default Level 2: Configuration level Usage Guidelines After running the qos tail-drop-profile command to create a tail drop template, you can run the qos queue max-buffer command to set the maximum buffer size of all packets or green packets in a specified queue for a tail drop template. Example # Create a global tail drop template named a, and then set the maximum buffer size of all packets in a BE queue for the global tail drop template to 200, in cells. <Quidway> system-view [Quidway] qos tail-drop-profile a [Quidway-qos-tail-drop-profile-a] qos queue be max-buffer 200 7.7 qos queue max-length (tail drop template view) Function Using the qos queue max-length command, you can set the maximum length of all packets in a specified queue for a tail drop template. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 127 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 7 QoS compatible command Using the qos queue green max-length command, you can set the maximum length of green packets in a specified queue for a tail drop template. Using the undo qos queue max-length command, you can delete the maximum length of all packets in a specified queue set for a tail drop template. Using the undo qos queue green max-length command, you can delete the maximum length of green packets in a specified queue set for a tail drop template. NOTE Only the S5300SI supports this command. Format qos queue { af1 | af2 | af3 | af4 | be | cs6 | cs7 | ef } max-length packet-number [ green maxlength packet-number ] qos queue { af1 | af2 | af3 | af4 | be | cs6 | cs7 | ef } green max-length packet-number undo qos queue { af1 | af2 | af3 | af4 | be | cs6 | cs7 | ef | all } max-length [ green maxlength ] undo qos queue { af1 | af2 | af3 | af4 | be | cs6 | cs7 | ef | all } green max-length Parameters Issue 02 (2013-11-06) Parameter Description Value af1, af2, af3, af4 Indicates bandwidth guaranteed queues that correspond to queues Q1, Q2, Q3, and Q4 respectively. - be Indicates the BE queue that corresponds to queue Q0. - cs6, cs7 Indicates high priority queues that correspond to queues Q6 and Q7 respectively. - ef Indicates the low-delay queue that corresponds to queue Q5. - max-length packet-number Specifies the maximum length of all packets in a specified queue. The value is an integer that ranges from 1 to 5134, in packets. The default value is 22. green max-length packetnumber Specifies the maximum length of green packets in a specified queue. The value is an integer that ranges from 1 to 5134, in packets. The default value is 11. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 128 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 7 QoS compatible command Views Tail drop template view Default Level 2: Configuration level Usage Guidelines After running the qos tail-drop-profile command to create a tail drop template, you can run the qos queue max-length command in the tail drop template view to set the maximum length of all packets or green packets in a specified queue for the tail drop template. Example # Create a global tail drop template named a, and then set the maximum length of all packets in a BE queue for the global tail drop template to 200, in packets. <Quidway> system-view [Quidway] qos tail-drop-profile a [Quidway-tail-drop-profile-a] qos queue be max-length 200 7.8 qos queue statistics enable Function Using the qos queue statistics enable command, you can enable the queue statistics function on a specified outbound interface. Using the undo qos queue statistics enable command, you can disable the queue statistics function on a specified outbound interface. By default, the queue statistics function is disabled. NOTE This command is only supported by S5300EI. Format qos queue statistics enable interface interface-type interface-number undo qos queue statistics enable Parameters Issue 02 (2013-11-06) Parameter Description Value interface interface-type interface-number Specifies the type and number of an interface. The interface type can be ethernet, gigabitethernet, xgigabitethernet. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 129 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 7 QoS compatible command Views System View Default Level 2: Configuration level Usage Guidelines After enabling the queue statistics function on a specified outbound interface, you can view the number of packets in the queue. When you repeatedly run the qos queue statistics enable command in the system view, the latest configuration overrides the previous ones. The function of the qos queue statistics enable command is similar to that of the port queue statistics enable command, but the port queue statistics enable command can flexibly configure the statistics function of eight queues according to the interface, queue, and direction. The port queue statistics enable command provides powerful functions, but the configuration is complicated. The qos queue statistics enable command simplifies the configuration and can take the statistics on packets entering the queue and discarded in the queue on the specified interface. For problems of packet scheduling and packet loss in the queue, the qos queue statistics enable command provides initial location information. NOTICE The qos queue statistics enable command is exclusive with the port queue statistics enable command. l If the port queue statistics enable command has been used, the following error message is displayed on the device when the qos queue statistics enable command is used: Error: Can't perform this operation because the port-queue-statistics is enabled. l If the qos queue statistics enable command has been used, the following error message is displayed on the device when the port queue statistics enable command is used: Error: Can't perform this operation because the qos-queue-statistics is enabled. After the qos queue statistics enable command is used, the statistics on discarded packets in queues on other interfaces except for the specified interface are not taken. The output of the display hol-drop command is affected. Therefore, the output of the display hol-drop command is inaccurate. After the undo qos queue statistics enable command is run, the statistics on discarded packets in queues on all the interfaces are taken. Example # Take the statistics on outgoing packets of the queue on GE 0/0/1. <Quidway> system-view [Quidway] qos queue statistics enable interface gigabitethernet 0/0/1 Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 130 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 7 QoS compatible command 7.9 qos sred Function Using the qos sred command, you can set the SRED threshold and drop probability for queues on an outbound interface. Using the undo qos sred command, you can restore the default configuration. By default, the SRED threshold and drop probability for queues on an outbound interface are not set. NOTE This command is only supported by S5300EI. Format qos sred queue-index queue-index red start-discard-point discard-probability discardprobability yellow start-discard-point discard-probability discard-probability undo qos sred [ queue queue-index ] Parameters Parameter Description Value queue-index Specifies the index of a queue. The value is an integer that ranges from 0 to 7. Value 0 to value 7 correspond to queue 0 to queue 7 respectively. start-discard-point Specifies a threshold for discarding packets. The value ranges from 4 to 2047. discard-probability Specifies a probability for discarding packets. The value ranges from 0 to 7. The mapping between the values and percentages is as follows: l 0: 100% l 1: 6.25% l 2: 3.125% l 3: 1.5625% l 4: 0.78125% l 5: 0.390625% l 6: 0.1953125% l 7: 0.09765625% Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 131 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 7 QoS compatible command Views System view Default Level 2: Configuration level Usage Guidelines NOTE Using the trust 8021p command, you can configure an interface to trust priorities carried in packets. Then, the device colors the packets red or yellow according to the 802.1p priorities of the packets; the device sets a threshold for dropping red packets and a threshold for dropping yellow packets. When congestion avoidance based on the SRED is configured, l A threshold for discarding red packets and the drop probability that are set for queues 0 to 4 take effect. l A threshold for discarding yellow packets and the drop probability that are set for queues 0 to 4 do not take effect. l A threshold for discarding yellow packets and the drop probability that are set for queues 5 to 7 take effect. l A threshold for discarding red packets and the drop probability that are set for queues 5 to 7 do not take effect. Using the trust 8021p command, you can configure an interface to trust DSCP values of packets. Then, the device colors the packets red or yellow according to drop precedences of packets; packets enter different queues according to mappings between DSCP values and 802.1p priorities; the device drops packets according to thresholds for dropping packets and drop precedences that are set in queues. Configuring an SRED threshold impacts on thresholds for discarding packets in all queues on an interface. When you repeatedly run the qos sred command for the same queue, the later configuration overwrites the previous configuration. When the number of packets in a queue is greater than a threshold for discarding packets, conformed packets are dropped from the tail of the queue according to the drop probability set by a user. Example # Configure queue 0 in the system view. Set a threshold for discarding red packets to 10. Set the drop probability for red packets to 5. Set a threshold for discarding yellow packets to 20. Set the drop probability for yellow packets to 4. <Quidway> system-view [Quidway] qos sred queue-index 0 red 10 discard-probability 5 yellow 20 discardprobability 4 7.10 qos wrr (scheduling template view) Function Using the qos wrr command, you can set parameters for queues on which the WRR scheduling is used. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 132 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 7 QoS compatible command Using the undo qos wrr command, you can restore default values of parameters for queues on which WRR scheduling is used. By default, the WRR scheduling weight value of a queue is 1. NOTE Only the S5300SI supports this command. Format qos wrr queue-index queue-index weight weight-value undo qos wrr queue-index Parameters Parameter Description Value queue-index Specifies the index of a queue. The value is an integer that ranges from 0 to 7. Value 0 to value 7 correspond to queue 0 to queue 7 respectively. weight-value Specifies the WRR scheduling weight value of a queue. The value is an integer that ranges from 0 to 127. The default value is 1. Views Scheduling template view Default Level 2: Configuration level Usage Guidelines The device forwards packets of queues round according to values of WRR scheduling parameters. The ratio of WRR weight values refers to the ratio of the number of packets in queues for forwarding. If the qos wrr command is repeatedly run in the same scheduling template view for the same queue, the later configuration overrides the previous configuration. Example # In global scheduling template a, set the scheduling mode of queue 3 to WRR, and then set the scheduling weight value to 20. <Quidway> system-view [Quidway] qos schedule-profile a Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 133 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 7 QoS compatible command [Quidway-qos-schedule-profile-a] qos wrr [Quidway-qos-schedule-profile-a] qos wrr queue-index 3 weight 20 Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 134 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 8 8 Security Compatible Commands Security Compatible Commands About This Chapter 8.1 AAA Compatible Commands 8.2 DHCP Snooping Compatible Commands 8.3 NAC Compatible Commands 8.4 Local Attack Defense Compatible Commands 8.5 IP Source Guard Compatible Commands 8.6 URPF Compatible Commands 8.7 Traffic Suppression Compatible Commands 8.8 ACL Compatible Commands Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 135 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 8 Security Compatible Commands 8.1 AAA Compatible Commands 8.1.1 adminuser-priority Function The adminuser-priority command configures a user as an administrator to log in to the device and sets the administrator level during login. Format adminuser-priority level Parameters Parameter Description level Value Specifies the level of an administrator. The value is an integer ranging from 0 to 15. After logging in to the device, a user can run only the commands of the same level or lower levels. Views Service scheme view Default Level 2: Configuration level Usage Guidelines The adminuser-priority command configures a user as an administrator to log in to the device and sets the administrator level during login. Example # Configure a user as an administrator to log in to the device and set the administrator level to 15. <HUAWEI> system-view [HUAWEI] aaa [HUAWEI-aaa] service-scheme svcscheme1 [HUAWEI-aaa-service-svcscheme1] adminuser-priority 15 8.1.2 local-user level Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 136 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 8 Security Compatible Commands Function The local-user level command sets the level of a local user. Format local-user user-name level level Parameters Parameter Description Value user-name Specifies the user name. The value is a string of 1 to 64 case-insensitive characters without spaces. level Specifies the user level. The value is an integer that ranges from 0 to 15. A greater value indicates a higher level of a user. The default user level is 3. After logging in to the device, a user can run only the commands of the same level or lower levels. Views AAA view Default Level 2: Configuration level Usage Guidelines The local-user level command sets the level of a local user. Example # Set the level of local user hello@huawei.net to 6. <HUAWEI> system-view [HUAWEI] aaa [HUAWEI-aaa] local-user hello@huawei.net level 6 8.1.3 local-user password old-password Function The local-user password old-password command changes the password for a local user. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 137 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 8 Security Compatible Commands Format local-user user-name password { cipher | irreversible-cipher } password old-password oldpassword Parameters Parameter Description Value user-name Specifies a user name. If the user name contains a domain name delimiter such as @, the character string before @ is the user name and the character string behind @ is the domain name. If the user name does not contain @, the entire character string is the user name and the domain name is the default one. The value is a string of 1 to 64 case-sensitive characters without spaces. The value is in format user@domain. When querying and modifying user names, you can use the wildcard *, for example, *@isp, user@*, and *@*. cipher password Indicates a password encrypted through the reversible algorithm. The value is a string of casesensitive characters without spaces. The length of a plaintext password ranges from 8 to 16, and the length of a cipher-text password is 32. It is recommended that you set the user password when creating a user. cipher indicates that the password is encrypted through the reversible algorithm. That is, unauthorized users can decrypt the passwords of authorized users. This mode has low security. irreversible-cipher password Indicates a password encrypted through the irreversible algorithm. irreversible-cipher indicates that the password is encrypted through the irreversible algorithm. That is, unauthorized users cannot decrypt the passwords of authorized users. This mode has high security. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. The value is a string of casesensitive characters without spaces. The length of a plaintext password ranges from 8 to 16, and the length of a cipher-text password is 56. 138 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 8 Security Compatible Commands Parameter Description Value old-password old-password Indicates the old password of a local user. The value is a string of casesensitive characters without spaces. The length of a plaintext password ranges from 8 to 16, and the length of a cipher-text password is 32 or 56. Views AAA view Default Level 3: Management level Usage Guidelines It is recommended that you change user passwords in the following situations: l Unauthorized users use the default user name and password to log in to the device. l A password has been used for a long time, so it is prone to disclosing and deciphering. Example # Change the password of the local user user1@vipdomain from admin@12345 to huawei@1234. <HUAWEI> system-view [HUAWEI] aaa [HUAWEI-aaa] local-user user1@vipdomain password cipher huawei@1234 old-password admin@12345 8.1.4 radius-server test-user detect interval Function The radius-server test-user detect interval command sets the interval for automatic user status detection. Format radius-server test-user detect interval interval-time Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 139 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 8 Security Compatible Commands Parameters Parameter Description Value interval-time Specifies the interval for automatic user status detection. The value is an integer that ranges from 5 to 3600, in seconds. Views RADIUS server template view Default Level 2: Configuration level Usage Guidelines You can use this command to set the interval for automatic user status detection. Example # Set the interval for automatic user status detection to 360 seconds. <HUAWEI> system-view [HUAWEI] radius-server template huawei [HUAWEI-radius-huawei] radius-server test-user detect interval 360 8.2 DHCP Snooping Compatible Commands 8.2.1 dhcp option82 format Function The dhcp option82 format command configures the format of the Option 82 field in DHCP messages. Format dhcp option82 [ circuit-id | remote-id ] format userdefined text Parameters Parameter Description Value circuit-id Specifies the format of the circuit-id (CID). - Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 140 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 8 Security Compatible Commands Parameter Description Value remote-id Specifies the format of the remote-id (RID). - userdefined text Indicates the user-defined format of the text is the user-defined character Option 82 field. string of the Option 82 field. Views System view Default Level 2: Configuration level Usage Guidelines You can use the dhcp option82 format command to configure the format of the Option 82 field in DHCP messages. Example # Configure the user-defined string for the CID in the Option 82 field and use the hexadecimal format to encapsulate the CID type (0, indicating the hexadecimal format), length (excluding the length of the CID type and the length keyword itself), outer VLAN ID, slot ID (5 bits), subslot ID (3 bits), and port number (8 bits). <HUAWEI> system-view [HUAWEI] dhcp option82 circuit-id format userdefined 0 %length %svlan %5slot % 3subslot %8port 8.2.2 dhcp snooping bind-table Function The dhcp snooping bind-table command configures a device to automatically back up DHCP snooping binding entries in a specified file. Format dhcp snooping bind-table autosave file-name [ write-delay delay-time ] Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 141 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 8 Security Compatible Commands Parameters Parameter Description Value file-name Specifies the path for storing the file that backs up DHCP snooping binding entries and the file name. You must specify both the path and name of the file supported by the system. The value is a string of 1 to 51 characters. write-delay delay-time Specifies the interval for local automatic backup of the DHCP snooping binding table. The value is an integer that ranges from 60 to 4294967295, in seconds. By default, the system backs up the DHCP snooping binding table every two days. If this parameter is not specified, the backup interval is the default value. Views System view Default Level 2: Configuration level Usage Guidelines You can use the dhcp snooping bind-table command to back up DHCP snooping binding entries in a specified file. Example # Configure a device to automatically back up DHCP snooping binding entries in the file backup.tbl in the flash memory. <HUAWEI> system-view [HUAWEI] dhcp snooping enable [HUAWEI] dhcp snooping bind-table autosave flash:/backup.tbl 8.2.3 dhcp snooping information circuit-id Function The dhcp snooping information circuit-id command configures the Option 82 circuit-id format. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 142 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 8 Security Compatible Commands Format dhcp snooping information circuit-id string string Parameters Parameter Description Value string string Specifies the circuit-id format. The value is a string of 1 to 63 characters. Views System view Default Level 2: Configuration level Usage Guidelines You can use the dhcp snooping information circuit-id command to configure the Option 82 circuit-id format. Example # Configure the Option 82 circuit-id format. <HUAWEI> system-view [HUAWEI] dhcp snooping information circuit-id string teststring 8.2.4 dhcp snooping information remote-id Function The dhcp snooping information remote-id command configures the Option 82 remote-id format. Format dhcp snooping information remote-id { sysname | string string } Parameters Issue 02 (2013-11-06) Parameter Description Value sysname System name. - string string Specifies the remote-id format. The value is a string of 1 to 63 characters. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 143 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 8 Security Compatible Commands Views System view Default Level 2: Configuration level Usage Guidelines You can use the dhcp snooping information remote-id command to configure the Option 82 remote-id format. Example # Configure the Option 82 remote-id format. <HUAWEI> system-view [HUAWEI] dhcp snooping information remote-id string teststring 8.2.5 dhcp snooping information format Function The dhcp snooping information format command configures the Option 82 field format. Format dhcp snooping information format { hex | ascii } Parameters Parameter Description Value hex Sets the Option 82 format to hexadecimal. - ascii Sets the Option 82 format to ASCII. - Views System view Default Level 2: Configuration level Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 144 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 8 Security Compatible Commands Usage Guidelines You can use the dhcp snooping information format command to configure the Option 82 field format. Example # Set the Option 82 format to ASCII. <HUAWEI> system-view [HUAWEI] dhcp snooping information format ascii 8.2.6 dhcp snooping check dhcp-rate enable Function The dhcp snooping check dhcp-rate enable command enables the alarm function for checking the rate of sending DHCP packets to the DHCP stack. Format dhcp snooping check dhcp-rate enable rate rate [ alarm { enable | [ enable ] threshold threshold } | vlan { vlanstart_id [ to vlanend_id ] } &<1-10>] Parameters Parameter Description Value rate rate Specifies the rate of sending DHCP messages to the CPU. The value is an integer that ranges from 1 to 100. The value is an integer that ranges from 1 to 4094. threshold threshold Specifies the alarm threshold for the number of DHCP packets sent to the CPU. After DHCP packet check is enabled, an alarm is generated if the number of discarded DHCP packets reaches the alarm threshold. The value is an integer that ranges from 1 to 1000. Views System view, VLAN view, Ethernet interface view, GE interface view, XGE interface view, Eth-Trunk interface view Default Level 2: Configuration level Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 145 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 8 Security Compatible Commands Usage Guidelines You can use the dhcp snooping check dhcp-rate enable command to enable the alarm function for checking the rate of sending DHCP packets to the DHCP stack. This command can only be used during a configuration restoration. Example # Enable DHCP packet rate check in the system view. <HUAWEI> system-view [HUAWEI] dhcp snooping enable [HUAWEI] dhcp snooping check dhcp-rate enable 8.2.7 dhcp snooping global max-user-number Function The dhcp snooping global max-user-number command sets the maximum number of global DHCP users. By default, the maximum number of global DHCP users is 1024. Format dhcp snooping global max-user-number max-user-number Parameters Parameter Description Value max-user-number Specifies the maximum number of global DHCP users. The value is an integer that ranges from 1 to 1024. Views System view Default Level 2: Configuration level Usage Guidelines The dhcp snooping global max-user-number command takes effect only when DHCP snooping is enabled globally and is valid for only DHCP users. When the number of global DHCP users reaches the threshold set by this command, no more users can access. You can use the dhcp snooping global max-user-number command to set the maximum number of global users. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 146 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 8 Security Compatible Commands Example # Set the maximum number of global DHCP users to 100. <HUAWEI> system-view [HUAWEI] dhcp snooping enable [HUAWEI] dhcp snooping global max-user-number 100 8.2.8 dhcp snooping sticky-mac Function The dhcp snooping sticky-mac command enables the device to generate static MAC address entries based on dynamic DHCP snooping binding entries. The undo dhcp snooping sticky-mac command disables the device from generating static MAC address entries based on dynamic DHCP snooping binding entries. By default, the device is disabled to generate static MAC address entries based on dynamic DHCP snooping binding entries. Format dhcp snooping sticky-mac undo dhcp snooping sticky-mac Parameters None Views Ethernet interface view, GE interface view, XGE interface view, port group view, Eth-trunk view Default Level 2: Configuration level Usage Guidelines Usage Scenario Dynamic MAC address entries are learned and generated by the device, and static MAC address entries are configured by command lines. A MAC address entry consists of the MAC address, VLAN ID, and port number of a DHCP client. The device implements Layer 2 forwarding based on MAC address entries. After the dhcp snooping sticky-mac command is executed on an interface, the device generates static MAC address entries (snooping type) of DHCP users on the interface based on the corresponding dynamic binding entries, clears all the dynamic MAC address entries on the interface, disables the interface to learn dynamic MAC address entries, and enables the device to match the source MAC address based on MAC address entries. Then only the message with Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 147 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 8 Security Compatible Commands the source MAC address matching the static MAC address entry can pass through the interface; otherwise, messages are discarded. Therefore, the administrator needs to manually configure static MAC address entries (the static type) for non-DHCP users on the interface so that messages sent from non-DHCP users can pass through; otherwise, DHCP messages are discarded. This prevents attacks from non-DHCP users. NOTE l If a DHCP snooping binding entry is updated, the corresponding static MAC address entry is automatically updated. l If you run the dhcp snooping sticky-mac command on the interface, DHCPv6 users cannot go online. Run the nd snooping enable command in the system view and interface view to enable ND snooping and the savi enable command in the system view to enable SAVI. Prerequisites DHCP snooping has been enabled on the device using the dhcp snooping enable command. Precautions The dhcp snooping sticky-mac command cannot be used with the following commands on an interface. Command Description dot1x enable Enables 802.1x authentication on an interface. mac-authen Enables MAC address authentication on an interface. mac-address learning disable Enables MAC address learning. mac-limit Sets the maximum number of MAC addresses to be learned. port vlan-mapping vlan map-vlan Enables VLAN mapping. port vlan-mapping vlan inner-vlan port-security enable Enables port security. Example # Enable the device to generate static MAC address entries based on DHCP snooping binding entries on GE0/0/1. <HUAWEI> system-view [HUAWEI] dhcp enable [HUAWEI] dhcp snooping enable [HUAWEI] interface gigabitethernet 0/0/1 [HUAWEI-GigabitEthernet0/0/1] dhcp snooping sticky-mac Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 148 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 8 Security Compatible Commands 8.2.9 dhcp snooping trust Function The dhcp snooping trust command configures an interface as a trusted interface. The undo dhcp snooping trust command configures an interface as an untrusted interface. By default, all interfaces are untrusted interfaces. Format dhcp snooping trust interface interface-type interface-number undo dhcp snooping trust interface interface-type interface-number Parameters Parameter Description Value interface interface-type interfacenumber Specifies the type and number of an interface. - l interface-type specifies the interface type. l interface-number specifies the interface number. Views VLAN view Default Level 2: Configuration level Usage Guidelines To enable DHCP clients to obtain IP addresses from authorized DHCP servers, DHCP snooping supports the trusted interface and untrusted interfaces. The trusted interface forwards DHCP messages while untrusted interfaces discard received DHCP ACK messages and DHCP Offer messages. An interface directly or indirectly connected to the DHCP server trusted by the administrator needs to be configured as the trusted interface, and other interfaces are configured as untrusted interfaces. This ensures that DHCP clients obtain IP addresses from authorized DHCP servers. Example # Configure GE0/0/1 in VLAN 100 as the trusted interface. <HUAWEI> system-view [HUAWEI] vlan 100 [HUAWEI-vlan100] dhcp snooping trust interface gigabitethernet 0/0/1 Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 149 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 8 Security Compatible Commands 8.3 NAC Compatible Commands 8.3.1 mac-authen username fixed password Function The mac-authen username fixed password command configures the fixed user name and password for MAC address authentication. The undo mac-authen username fixed password command deletes the fixed user name and password for MAC address authentication. By default, no fixed user name and password is configured for MAC address authentication. Format mac-authen username fixed username password simple password undo mac-authen username fixed username password simple password Parameters Parameter Description Value fixed username Specifies the fixed user name for MAC The value is a string of 1 to 64 characters. address authentication. simple Indicates the password in plain text. - password Specifies the password for MAC address authentication. The value is a string of 1 to 16 characters. Views System view Default Level 2: Configuration level Usage Guidelines You can use the mac-authen username fixed password command to configure the fixed user name and password for MAC address authentication. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 150 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 8 Security Compatible Commands Example # Configure the fixed user name and password for MAC address authentication. <HUAWEI> system-view [HUAWEI] mac-authen username fixed tester password simple 123456 8.3.2 web-auth-server (system view) Function The web-auth-server command configures a web authentication server in the system view. By default, no web authentication server is configured in the system view. Format web-auth-server server-name ip-address [ port port [ all ] ] [ key password | shared-key { simple password | cipher password } ] [ url url-string ] Parameters Issue 02 (2013-11-06) Parameter Description Value server-name Specifies the name of a web authentication server template. The value is a string of 1 to 31 case-insensitive characters. ip-address Specifies the IP address of a web authentication server. The value is in dotted decimal notation. port port Specifies the port number that the Portal server uses to receive and encapsulate UDP packets from the device. The value is an integer that ranges from 1 to 65535. all Indicates that the device always uses the destination port number specified by port-number to encapsulate UDP packets. - key password Specifies the shared key that the device uses to exchange information with a Portal server. The value is a string of 1 to 16 characters. shared-key Specifies the shared key that the device uses to exchange information with a Portal server. - Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 151 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 8 Security Compatible Commands Parameter Description Value simple password Displays a shared key in plain text. The value is a string of 1 to 16 characters. cipher password Displays a shared key in cipher text. The value is a string of 1 to 256 characters. url url-string Specifies the URL of a portal server. Portal authentication users can visit this URL to access the Portal server. The value is a string of 1 to 200 characters. Views System view Default Level 2: Configuration level Usage Guidelines When an unauthenticated user goes online, a device forces the user to log in to a special website (namely, the Portal website) so that the user can access the service on the Portal for free. To access the Internet, the user must pass the authentication on the Portal. Example # Set the IP address of web authentication server huawei to 10.1.1.1. <HUAWEI> system-view [HUAWEI] web-auth-server huawei 10.1.1.1 8.4 Local Attack Defense Compatible Commands 8.4.1 blacklist Function The blacklist command configures an ACL-based blacklist. By default, no blacklist is configured. Format blacklist acl { acl-number } &<1-4> Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 152 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 8 Security Compatible Commands Parameters Parameter Description acl acl-number Indicates the ACL ID. The ACL referenced by a blacklist on the device can be a basic ACL, an advanced ACL, or a Layer 2 ACL. Value The value is an integer that ranges from 2000 to 4999. Views System view, Attack defense policy view Default Level 2: Configuration level Usage Guidelines A maximum of eight blacklists can be configured on the device. You can set the attributes of a blacklist by defining ACL rules. The packets sent from users in the blacklist are discarded after reaching the device. Example # Reference ACL 2001 in the blacklist. <HUAWEI> system-view [HUAWEI] cpu-defend policy test [HUAWEI-cpu-defend-policy-test] blacklist acl 2001 8.4.2 car Function The car command sets the rate at which packets are sent to the CPU. Format car packet-type bpdu cir cir-value [ cbs cbs-value ] car packet-type ftp-dynamic cir cir-value [ cbs cbs-value ] undo car packet-type bpdu undo car packet-type ftp-dynamic Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 153 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 8 Security Compatible Commands Parameters Parameter Description Value packet-type bpdu Limits the rate of bpdu packets. - packet-type ftp-dynamic Limits the rate of ftp-dynamic packets. - cir cir-value Indicates the committed information rate (CIR). The value is an integer that ranges from 8 to 4294967295, in kbit/s. cbs cbs-value Indicates the committed burst size (CBS). The value is an integer that ranges from 10000 to 4294967295, in bytes. Views Attack defense policy view Default Level 2: Configuration level Usage Guidelines The default CARs for packets of each type range from 64 kbit/s to 512 kbit/s. You can run the display cpu-defend configuration command to query the default CAR. If you run the deny and car commands for the same type of packets sent to the CPU, the command that runs later takes effect. NOTE If packets are sent to the CPU at a high rate and a large CAR value is configured on the device, the CPU usage may be too high. This may degrade the device performance or even cause the stack split. Example # Set the CAR of packets in defense policy test as follows: Set the packet type to bpdu, CIR to 64 kbit/s, and CBS to 33000 bytes. <HUAWEI> system-view [HUAWEI] cpu-defend policy test [HUAWEI-cpu-defend-policy-test] car packet-type bpdu cir 64 cbs 33000 8.4.3 car cpu-port Function The car cpu-port command configures the CIR of all the packets to be sent to the CPU. By default, the CIR value of all the packets to be sent to the CPU is 1024 kbit/s on the device. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 154 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 8 Security Compatible Commands Format car cpu-port cir cir-rate Parameters Parameter Description Value cir cir-rate Sets the CIR of all the packets to be sent to the CPU. The value is an integer that ranges from 64 to 2048, in kbit/s. Views Attack defense policy view Default Level 2: Configuration level Usage Guidelines The car cpu-port command limits the total rate of all protocol packets sent to the CPU. The car packet-type command limits the rate of packets of a specified protocol. However, the total CIR of packets of specified protocols cannot exceed the CIR of all the packets sent to the CPU. When the CIR is exceeded, excess packets including unicast, multicast, and broadcast packets are not sent to the CPU. In addition, the unicast packets are discarded directly. Example # Set the CIR of all the packets to be sent to the CPU to 512 kbit/s on the device. <HUAWEI> system-view [HUAWEI] cpu-defend policy test [HUAWEI-cpu-defend-policy-test] car cpu-port cir 512 8.4.4 cpu-defend linkup-car bgp enable Function The cpu-defend linkup-car bgp enable command enables the BGP protocol association. The undo cpu-defend linkup-car bgp enable command disables the BGP protocol association. By default, the BGP protocol association is disabled. Format cpu-defend linkup-car bgp enable undo cpu-defend linkup-car bgp enable Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 155 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 8 Security Compatible Commands Parameters None Views System view Default Level 2: Configuration level Usage Guidelines This command is provided for compatibility with earlier versions. Example # Enable the BGP protocol association. <HUAWEI> system-view [HUAWEI] cpu-defend linkup-car bgp enable 8.4.5 deny Function The deny command sets the discard action taken for packets sent to the CPU. The undo deny command restores the default action taken for packets sent to the CPU. By default, the device limits the rate of protocol packets and user-defined flows based on the CAR configuration. Format deny packet-type bpdu deny packet-type ftp-dynamic undo deny packet-type bpdu undo deny packet-type ftp-dynamic Parameters Parameter Description Value packet-type bpdu Discards bpdu packets . - packet-type ftp-dynamic Discards ftp-dynamic packets. - Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 156 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 8 Security Compatible Commands Views Attack defense policy view Default Level 2: Configuration level Usage Guidelines If you run the deny and car commands for the same type of packets sent to the CPU, the command that runs later takes effect. The undo deny command restores the default action taken for packets sent to the CPU. After you run this command, the system limits the rate of packets sent to the CPU based on the configured CIR and CBS values. Example # Set the discard action taken for bpdu packets sent to the CPU attack in defense policy test. <HUAWEI> system-view [HUAWEI] cpu-defend policy test [HUAWEI-cpu-defend-policy-test] deny packet-type bpdu 8.5 IP Source Guard Compatible Commands 8.5.1 ip anti-attack source-ip equals destinetion-ip drop Function The ip anti-attack source-ip equals destinetion-ip drop command enables the device to discard IP packets with the same source and destination IP addresses. The undo ip anti-attack source-ip equals destinetion-ip drop command disables the device from discarding IP packets with the same source and destination IP addresses. By default, the device does not discard IP packets with the same source and destination IP addresses. Format ip anti-attack source-ip equals destinetion-ip drop { all | slot slot-id } undo ip anti-attack source-ip equals destinetion-ip drop { all | slot slot-id } Parameters Issue 02 (2013-11-06) Parameter Description Value all All the devices. - Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 157 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 8 Security Compatible Commands Parameter Description Value slot slot-id l The value is 0 if stacking is not configured. Set the value according to the device configuration. l Specifies the stack ID if stacking is configured. Views System view Default Level 2: Configuration level Usage Guidelines Generally, IP packets with the same source and destination IP addresses can be forwarded. When you determine that the IP packets are attack packets, you can use the ip anti-attack source-ip equals destinetion-ip drop command to enable the device to discard the IP packets. Example # Enable the device to discard IP packets with the same source and destination IP addresses. <HUAWEI> system-view [HUAWEI] ip anti-attack source-ip equals destinetion-ip drop all 8.5.2 ip source check Function The ip source check command enables dynamic IP source guard. By default, dynamic IP source guard is disabled on the device. Format ip source check { ip-address | mac-address | interface } * Parameters None Views VLAN view Default Level 2: Configuration level Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 158 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 8 Security Compatible Commands Usage Guidelines After dynamic IP source guard is enabled on a VLAN, the device checks packets according to the entries in the DHCP snooping binding table specified by the ip source check command. Packets that do not match the specified entries in the DHCP snooping binding table are discarded. Therefore, access control is implemented and unauthorized users are not allowed to access the network. Dynamic IP source guard does not generate binding entries. Packets are checked according to the specified entries in the DHCP snooping binding table. Therefore, you must enable the device to check IP and ARP packets before enabling the dynamic IP source guard. Dynamic IP source guard configured independently does not take effect. Example # Enable dynamic IP source guard in VLAN 10 to check the IP address and MAC address of a packet according to the DHCP snooping binding table. View the DHCP snooping binding table. <HUAWEI> system-view [HUAWEI] vlan 10 [HUAWEI-Vlan10] ip source check ip-address mac-address 8.6 URPF Compatible Commands 8.6.1 urpf (interface view) Function The urpf command configures the URPF check mode for interfaces. NOTE The S2350, S5300SI, S5306, and S5300LI do not support this command. Format ip urpf { loose | strict } [ allow-default-route ] Parameters Parameter Description loose Indicates URPF loose check. In this mode, the device forwards a packet as long as the source address of the packet exists in the routing table or ARP table, regardless of whether the matching outbound interface in the routing table or ARP table is the same as the inbound interface of the packet. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. Value 159 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 8 Security Compatible Commands Parameter Description strict Indicates URPF strict check. In this mode, the device forwards a packet only when the source address of the packet exists in the routing table or ARP table, and the matching outbound interface in the routing table or ARP table is the same as the inbound interface of the packet. allow-default-route Allows special process for the default route. Value - Views GE interface view, XGE interface view, Eth-Trunk interface view, port group view Default Level 2: Configuration level Usage Guidelines The URPF check mode configured on an interface is valid only after the URPF is enabled on the LPU. The URPF determines how to process the default route based on whether the allow-defaultroute parameter is specified in the command. l If allow-default-route is set but the source address of a packet does not exist in the routing table or ARP table, the packet is discarded even if the default route is found, regardless of the strict or loose check. If allow-default-route is set and the source address of a packet exists in the routing table or ARP table: – In the strict check mode, the device forwards a packet when the outbound interface in the default route is the same as the inbound interface of the packet. When the outbound interface in the default route is different from the inbound interface of the packet, the packet is discarded. – In the loose check mode, the device forwards a packet regardless of whether the outbound interface in the default route is the same as the inbound interface of the packet. l If allow-default-route is not set, the default route is not processed. Example # Enable the strict URPF check on GE0/0/1 and allow the special process for the default route. <HUAWEI> system-view [HUAWEI] interface gigabitethernet 0/0/1 [HUAWEI-GigabitEthernet0/0/1] ip urpf strict allow-default-route 8.7 Traffic Suppression Compatible Commands Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 160 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 8 Security Compatible Commands 8.7.1 broadcast-suppression Function The broadcast-suppression command sets the maximum traffic rate of broadcast packets that can pass through an interface. The undo broadcast-suppression command restores the default traffic rate of broadcast packets that can pass through an interface. Format broadcast-suppression { broadcast-pct | packets packets-per-second } undo broadcast-suppression Parameters Parameter Description Value broadcast-pct Specifies the maximum percentage of broadcast traffic on an interface. The value ranges from 0 to 100. The default value is 100. By default, broadcast traffic is not suppressed on interfaces. packets packets-per-second Specifies the maximum number of broadcast packets allowed to pass through an interface per second. The value of packets-persecond is an integer. Views Eth-Trunk interface view Default Level 2: Configuration level Usage Guidelines When the traffic rate of broadcast packets exceeds the maximum value, the system discards excess broadcast packets to control the traffic rate and ensure normal operation of network services. Example # Set the maximum percentage of broadcast traffic to 20% of interface bandwidth on Eth-Trunk1. <HUAWEI> system-view [HUAWEI] interface eth-trunk 1 Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 161 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 8 Security Compatible Commands [HUAWEI-Eth-Trunk1] broadcast-suppression 20 8.7.2 multicast-suppression Function The multicast-suppression command sets the maximum traffic rate of multicast packets that can pass through an interface. The undo multicast-suppression command restores the default traffic rate of multicast packets that can pass through an interface. Format multicast-suppression { multicast-pct | packets packets-per-second } undo multicast-suppression Parameters Parameter Description Value multicast-pct Specifies the maximum percentage of multicast traffic on an Ethernet interface. The value ranges from 0 to 100. The default value is 100. By default, multicast traffic is not suppressed on interfaces. packets packets-per-second Specifies the maximum number of multicast packets allowed to pass through an interface per second. The value of packets-persecond is an integer. Views Eth-Trunk interface view Default Level 2: Configuration level Usage Guidelines When the traffic rate of multicast packets exceeds the maximum value, the system discards excess multicast packets to control the traffic rate and ensure normal operation of network services. Example # Set the maximum percentage of multicast traffic to 20% of interface bandwidth on Eth-Trunk1. <HUAWEI> system-view [HUAWEI] interface eth-trunk 1 Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 162 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 8 Security Compatible Commands [HUAWEI-Eth-Trunk1] multicast-suppression 20 8.7.3 unicast-suppression Function The unicast-suppression command sets the maximum traffic rate of unknown unicast packets that can pass through an interface. The undo unicast-suppression command restores the default traffic rate of unknown unicast packets that can pass through an interface. Format unicast-suppression { unicast-pct | packets packets-per-second } undo unicast-suppression Parameters Parameter Description Value unicast-pct Specifies maximum percentage of unknown unicast traffic on an Ethernet interface. The value ranges from 0 to 100. The default value is 100. By default, unknown unicast traffic is not suppressed on interfaces. packets packets-per-second Specifies the maximum number of unknown unicast packets allowed to pass through an interface per second. The value of packets-persecond is an integer. Views Eth-Trunk interface view Default Level 2: Configuration level Usage Guidelines When the traffic rate of unknown unicast packets exceeds the maximum value, the system discards excess unknown unicast packets to control the traffic rate and ensure normal operation of network services. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 163 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 8 Security Compatible Commands Example # Set the maximum percentage of unknown unicast traffic to 20% of interface bandwidth on Eth-Trunk1. <HUAWEI> system-view [HUAWEI] interface eth-trunk1 [HUAWEI-Eth-Trunk1] unicast-suppression 20 8.8 ACL Compatible Commands 8.8.1 acl ipv6 Function The acl ipv6 command creates an ACL6 and enters the ACL6 view. The undo acl ipv6 command deletes an ACL. Format acl ipv6 [ number ] acl6-number [ name acl6-name ] undo acl ipv6 { all | [ number ] acl6-number | name acl6-name } Parameters Parameter Description Value number acl6-number Indicates the ID of an ACL6. The value of acl6-number is an integer that ranges from 2000 to 3999. In these options, l ACL6s numbered from 2000 to 2999 are basic ACL6s. l ACL6s numbered from 3000 to 3999 are advanced ACL6s. name acl6-name Issue 02 (2013-11-06) Specifies a named ACL6. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. The value of acl6-name is a string of 1 to 32 casesensitive characters without spaces. The name starts with a letter (lowercase a to z or uppercase A to Z) and can contain letters, digits, and symbols such as the number sign (#), percentage symbol (%), and hyphen (-). 164 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 8 Security Compatible Commands Parameter Description Value all Deletes all ACL6s. - Views System view Default Level 2: Configuration level Usage Guidelines None Example # Create an ACL6 named test and numbered 3100. <HUAWEI> system-view [HUAWEI] acl ipv6 number 3100 name test [HUAWEI-acl6-adv-test] 8.8.2 acl (system view) Function The acl command creates an ACL and enters the ACL view. The undo acl command deletes a specified ACL. Format acl [ number ] acl-number [ name acl-name ] undo acl { all | [ number ] acl-number | name acl-name } Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 165 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 8 Security Compatible Commands Parameters Parameter Description Value number acl-number Indicates the ID of an ACL. The value of acl-number is an integer that ranges from 2000 to 5999. l ACLs numbered from 2000 to 2999 are basic ACLs. l ACLs numbered from 3000 to 3999 are advanced ACLs. l ACLs numbered from 4000 to 4999 are Layer 2 ACLs. l ACLs numbered from 5000 to 5999 are customized ACLs. name acl-name Specifies a named ACL. The value of acl-name is a string of 1 to 32 casesensitive characters without spaces. The name starts with a letter (lowercase a to z or uppercase A to Z) and can contain letters, digits, and symbols such as the number sign (#), percentage symbol (%), and hyphen (-). all Deletes all ACLs. - Views System view Default Level 2: Configuration level Usage Guidelines An ACL consists of a list of rules. Each rule contains a permit or deny clause. Before creating an ACL rule, you must create an ACL. Example # Create an ACL named test and numbered 3100. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 166 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 8 Security Compatible Commands <HUAWEI> system-view [HUAWEI] acl number 3100 name test [HUAWEI-acl-adv-test] 8.8.3 rule (ACL6) Function The rule command adds or modifies advanced ACL6 rules. The undo rule command deletes IPv6 ACL rules. Format rule [ rule-id ] { deny | permit } ipv6-AH [ destination { destination-ipv6-address prefixlength | destination-ipv6-address/prefix-length | destination-ipv6-address postfix postfixlength | any } | dscp dscp | fragment | logging | precedence precedence | source { source-ipv6address prefix-length | source-ipv6-address/prefix-length | source-ipv6-address postfix postfixlength | any } | time-range time-name | tos tos ] * rule [ rule-id ] { deny | permit } ipv6-ESP [ destination { destination-ipv6-address prefixlength | destination-ipv6-address/prefix-length | destination-ipv6-address postfix postfixlength | any } | dscp dscp | fragment | logging | precedence precedence | source { source-ipv6address prefix-length | source-ipv6-address/prefix-length | source-ipv6-address postfix postfixlength | any } | time-range time-name | tos tos ] * Parameters Parameter Description Value rule-id Indicates the ID of an ACL6 rule. The value ranges from 0 to 2047. l If the ID of a rule is specified and the rule exists, the new rule is added to the rule with this ID, that is, the old rule is modified. l If the rule associated with a rule ID does not exist, a rule can be created with this rule ID and its position in the ACL is determined by the rule ID. l If no rule ID is specified, the device allocates an ID to the new rule. The rule IDs are sorted in ascending order. Issue 02 (2013-11-06) deny Discards packets that do not match ACL rules. - permit Allows packets to pass. - ipv6-AH Indicates the protocol type. - ipv6-ESP Indicates the protocol type. - Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 167 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference Issue 02 (2013-11-06) 8 Security Compatible Commands Parameter Description Value destination { destinationipv6-address prefix-length | destinationipv6-address/ prefix-length | any } Indicates the destination address and prefix of a packet. destination-ipv6-address is expressed in hexadecimal notation. The value of prefixlength is an integer that ranges from 1 to 128. You can also use any to represent any destination address. destination destinationipv6-address postfix postfix-length Indicates the destination address and the length of destination address postfix. destination-ipv6-address indicates the destination address and is expressed in hexadecimal notation. postfix-length is an integer that ranges from 1 to 64. dscp dscpvalue Specifies the value of a Differentiated Services CodePoint (DSCP). The value ranges from 0 to 63. fragment Indicates that the rule is valid for only non-initial fragments. - logging Indicates whether to record logs for packets that meet ACL rules. Log contents include the ACL rule ID, pass or discard of packets, type of the protocol over IP, source or destination address, source or destination port number, and number of packets. precedence Filters packets by priority. The value is a name or a digit that ranges from 0 to 7. source { source-ipv6address prefix-length | source-ipv6address/ prefix-length | any } Indicates the source address and prefix of a packet. source-ipv6-address indicates the source address and is expressed in hexadecimal notation. prefix-length is an integer that ranges from 1 to 128. You can also use any to represent any source address. source source-ipv6address postfix postfix-length Indicates the source address and the length of source address postfix. source-ipv6-address indicates the source address and is expressed in hexadecimal notation. postfix-length is an integer that ranges from 1 to 64. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 168 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 8 Security Compatible Commands Parameter Description Value time-range time-name Specifies the time range only in which ACL6 rules are effective. The value is a string of 1 to 32 characters. time-name indicates the name of the time range. tos tos Filters packets by Type of Service (ToS). The value is a name or a digit that ranges from 0 to 15. Views Advanced ACL6 view Default Level 2: Configuration level Usage Guidelines This command is used in the IPv6 ACL configuration mode. When adding a rule, specify the source IPv6 address in the rule. To delete or modify an existing rule, specify the rule ID. Example # Create an advanced ACL6 with ID 3000 and configure a rule that allows only IPv6 ESP packets with the source IPv6 address 2030:5060::9050 and mask 64 to pass. <HUAWEI> system-view [HUAWEI] acl ipv6 number 3000 [HUAWEI-acl6-adv-3000] rule 0 permit ipv6-esp source 2030:5060::9050/64 Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 169 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 9 9 Reliability Compatible Commands Reliability Compatible Commands About This Chapter 9.1 VRRP Compatible Commands 9.2 Smart Link Compatible Commands 9.3 Ethernet OAM Compatible Commands Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 170 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 9 Reliability Compatible Commands 9.1 VRRP Compatible Commands 9.1.1 clear vrrp-config Function The clear vrrp-config command clears the current configuration of VRRP backup groups. Format clear vrrp-config Parameters None Views Hide view Default Level 3: Management level Usage Guidelines Usage Scenario The clear vrrp-config command clears the current configuration of VRRP backup groups. Configuration Impact After this command is run, all existing VRRP backup groups are deleted. Precautions No prompt information is displayed when this command is run. Nothing is displayed if no VRRP backup groups are available. Example # Clear the current configuration information about VRRP backup groups. <HUAWEI> system-view [HUAWEI] _h [HUAWEI-hidecmd] clear vrrp-config 9.2 Smart Link Compatible Commands Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 171 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 9 Reliability Compatible Commands 9.2.1 load-balance reference-instance Function The load-balance reference-instance command sets the load balancing mode of a Smart Link group. The undo load-balance reference-instance command deletes a load balancing instance of a Smart Link group. Format load-balance reference-instance instance-id slave undo load-balance reference-instance [ slave ] Parameters Parameter Description Value instance-id Specifies the ID of a Smart Link instance. The value is an integer that ranges from 0 to 48. slave Specifies the slave interface for transmitting packets of a Smart Link instance. - Views Smart Link group view Default Level 2: Configuration level Usage Guidelines Before you run the load-balance instance command in a Smart Link group, the Smart Link group must be disabled. After configuring load balancing in a Smart Link group, you can use the display smart-link group command to verify the configuration. When the links of all Smart Link group members are Up, the inactive link transmits the traffic from the VLANs mapping the specified instance. Example # Set the load balancing mode of the Smart Link group whose ID is 3. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 172 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 9 Reliability Compatible Commands <Quidway> system-view [Quidway] smart-link group 3 [Quidway-smlk-group3] load-balance reference-instance 1 slave 9.3 Ethernet OAM Compatible Commands 9.3.1 efm trigger if-net Function The efm trigger if-net command associates EFM with an interface. Format efm trigger if-net Parameters None Views GE interface view, XGE interface view Default Level 2: Configuration level Usage Guidelines Usage Scenario EFM can be associated with interfaces. On a scenario with primary and backup links, if EFM detects a fault on the primary link, it will set the protocol status of the associated interface to ETHOAM Down, speeding up routing convergence. Traffic can be fast switched to the backup link. Prerequisites EFM has been enabled globally and on an interface, and is in detect state. Precautions If EFM is associated with an interface and detects a link fault, the protocol status of the interface becomes ETHOAM Down, and no packet except EFM OAMPDUs can be forwarded by the interface, and all Layer 2 and Layer 3 services are blocked. Therefore, associating EFM with an interface may greatly affect services. When the interface detects link recovery using EFM, the interface can forward all packets and unblocks Layer 2 and Layer 3 services. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 173 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 9 Reliability Compatible Commands Example # Associate EFM with GE0/0/1. <HUAWEI> system-view [HUAWEI] efm enable [HUAWEI] interface gigabitethernet 0/0/1 [HUAWEI-GigabitEthernet0/0/1] efm enable [HUAWEI-GigabitEthernet0/0/1] efm trigger if-net 9.3.2 error-shutdown auto-recovery cause efm-threshold-event Function The error-shutdown auto-recovery cause efm-threshold-event command enables an interface in error-shutdown state to go Up. NOTE An interface enters the error-shutdown state after being shut down due to an error. Format error-shutdown auto-recovery cause efm-threshold-event Parameters Parameter Description Value cause Indicates the cause for an interface in error-down state. efm-threshold-event Indicates that a threshold crossing event occurs. - Views System view Default Level 2: Configuration level Usage Guidelines Usage Scenario When link monitoring is configured for an interface on a link, the link is considered unavailable, if the number of errored frames, errored codes, or errored frame seconds detected by the interface reaches or exceeds the threshold within a period. You can associate an EFM crossing event with an interface. Then the system sets the administrative status of the interface to Down. In this manner, all services on the interface are interrupted. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 174 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 9 Reliability Compatible Commands By default, an interface can only be resumed by a network administrator after being shut down. To configure the interface to restore to the Up state automatically, run the error-down autorecovery command to set an auto recovery. Example # Set the auto recovery after an EFM threshold crossing event is associated with an interface. <HUAWEI> system-view [HUAWEI] error-shutdown auto-recovery cause efm-threshold-event 9.3.3 error-shutdown auto-recovery interval Function The error-shutdown auto-recovery interval command sets the auto recovery delay. NOTE An interface enters the error-shutdown state after being shut down due to an error. Format error-shutdown auto-recovery interval interval-value Parameters Parameter Description Value interval interval-value Specifies the auto recovery delay. The value is an integer that ranges from 30 to 86400, in seconds. l A smaller value indicates a higher frequency at which an interface alternates between Up and Down states. l A larger value indicates longer traffic interruption. Views System view Default Level 2: Configuration level Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 175 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 9 Reliability Compatible Commands Usage Guidelines Usage Scenario By default, an interface can only be resumed by a network administrator after being shut down. To configure the interface to restore to the Up state automatically, run the error-shutdown autorecovery interval command to set an auto recovery delay. After the delay, the interface goes Up automatically. Example # Set the auto recovery delay to 50s. <HUAWEI> system-view [HUAWEI] error-shutdown auto-recovery interval 50 Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 176 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 10 10 Device Management Compatible Commands Device Management Compatible Commands About This Chapter 10.1 vrbd 10.2 _shell 10.3 backup elabel 10.4 cpu-usage threshold 10.5 display autosave config 10.6 display environment 10.7 display elabel unit 10.8 display fault-management 10.9 display fault-management alarm information 10.10 display reboot-info 10.11 fault-management alarm 10.12 reset reboot-info 10.13 display alarm urgent 10.14 reset alarm urgent 10.15 temperature threshold unit 10.16 port-mirroring to observe-port 10.17 poe power 10.18 port-mirroring Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 177 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 10 Device Management Compatible Commands 10.19 reset fault-management Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 178 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 10 Device Management Compatible Commands 10.1 vrbd Function The vrbd command displays the compiling time and version of the system software. Format vrbd Parameters None Views Diagnosis view Default Level 3: Management level Usage Guidelines You can check the compiling time and version of the system software to determine whether the system software needs to be upgraded. Example # Display the compiling time and version of the system software. <HUAWEI> system-view [HUAWEI] diagnose [HUAWEI-diagnose] vrbd S5300 Version V200R003C00SPC300 VRP Software Version F100S100 Copyright (C) 2000-2011 Huawei Technologies Co., Ltd. Compiled Mar 26 2012 17:30:56 By S5300 CMO CPLD Ver 257, Date Aug 8 2013 Board 0 SoftWare Version V200R003C00 SPC300B440 Board 0 SoftWare for user V200R003C00SPC300 10.2 _shell Function The _shell command displays the shell mode. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 179 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 10 Device Management Compatible Commands The _shell show command displays the shell mode status. The _shell slot-id [ kick-out ] command enables you to exit from the shell mode. Format _shell { slot-id [ kick-out ] | show } Parameters Parameter Description Value slot-id Specifies the destination slot ID. The value must be set according to the device configuration. kick-out Indicates that users exit from the shell mode. show Displays the shell mode status. - Views Diagnosis view Default Level 2: Configuration level Usage Guidelines None Example # Display the shell mode status. <HUAWEI> system-view [HUAWEI] diagnose [HUAWEI-diagnose] _shell [HUAWEI-diagnose] _shell show User-ID User-Intf Slot 0 con0 2 Username Unspecified # Enable slot 0 to exit from the shell mode. <HUAWEI> system-view [HUAWEI] diagnose [HUAWEI-diagnose] _shell 0 kick-out Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 180 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 10 Device Management Compatible Commands 10.3 backup elabel Function Using the backup elabel command, you can save the electronic label of the S2350&S5300&S6300 to the File Transfer Protocol (FTP) server or to the Flash memory. Format backup elabel [ ftp ip-address filename username password ] [ unit unit-id ] Parameters Parameter Description Value ip-address Specifies the IP address of the FTP server that stores the electronic label. The value is in dotted decimal notation. filename Specifies the name of the file that stores the electronic label on the FTP server. The value is a string of 1 to 20 case-sensitive characters without spaces. username Specifies user name used to log in to the FTP server. The value is a string of 0 to 20 case-sensitive characters without spaces. password Specifies the password used to log in to the FTP server. The value is a string of 0 to 20 case-sensitive characters without spaces. unit unit-id l Specifies the slot ID if stacking is not configured. The value an integer that is 0 if stacking is not configured; the value ranges from 0 to 8 if stacking is configured. l Specifies the stack ID if stacking is configured. Views User view Default Level 1: Monitoring level Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 181 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 10 Device Management Compatible Commands Usage Guidelines You can use this command to save the electronic label of the S2350&S5300&S6300 to a file in the flash memory or on the FTP server. If the electronic label is saved in the flash memory, the file name is elabel.fls by default. Example # Save the electronic label of the S2350&S5300&S6300 with the stack ID being 0 to the elabel.fls file in the flash memory. <HUAWEI> backup elabel unit 0 Info: Output information to file: flash:/elabel.fls. Please wait for a moment... Info: Put file to flash successfully. 10.4 cpu-usage threshold Function The cpu-usage threshold command sets the upper and lower CPU usage alarm thresholds. The undo cpu-usage threshold command restores the default setting. Format cpu-usage threshold unit unit-id { high | low } threshold-value Parameters Parameter Description Value high Specifies the upper CPU usage alarm threshold. - low Specifies the lower CPU usage alarm threshold. - unit unit-id l Specifies the slot ID if stacking is not The value is 0 if stacking is not configured; the value ranges from 0 to configured. l Specifies the stack ID if stacking is 8 if stacking is configured. configured. Views System view Default Level 2: Configuration level Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 182 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 10 Device Management Compatible Commands Usage Guidelines When the CPU usage is not within the allowed range, a log is recorded. You can conveniently know CPU usage through log information. Example # Set the upper CPU usage alarm threshold of a switch to 85%. <HUAWEI> system-view [HUAWEI] cpu-usage threshold unit 0 high 85 10.5 display autosave config Function The display autosave config command displays the configuration about the autosave function, including the status of the autosave function, time for autosave check, threshold of the CPU usage, and interval during which configurations are not changed. Format display autosave config Parameters None Views All views Default Level 1: Monitoring level Usage Guidelines After the autosave function is configured, you can run the display autosave config command to check whether the configured parameters are correct. You can also run this command to check whether the parameters about the autosave function are properly configured when autosave cannot function normally. If not, run the set save-configuration command to adjust the parameters to restore the normal state of the autosave function. Example # Display the configuration about the autosave function. <HUAWEI> display autosave config Auto save function status: enable Auto save checking interval: 60 minutes The threshold of the CPU usage: 50% The interval of the configuration not changing: 30 minutes Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 183 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 10 Device Management Compatible Commands Table 10-1 Description of the display autosave config command output Item Description Auto save function status Indicates the status of the autosave function: l Enable l Disable Auto save checking interval Indicates the time for autosave check. The threshold of the CPU usage Indicates the threshold of the CPU usage during the autosave operation. The interval of the configuration not changing Indicates the interval during which system configurations are not changed. 10.6 display environment Function Using the display environment command, you can view the temperature of the S2350&S5300&S6300. Format display environment unit unit-id Parameters Parameter Description Value unit unit-id l Specifies the slot ID if stacking is not configured. The value is an integer that is 0 if stacking is not configured; the value ranges from 0 to 8 if stacking is configured. l Specifies the stack ID if stacking is configured. Views All views Default Level 1: Monitoring level Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 184 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 10 Device Management Compatible Commands Usage Guidelines You can set the temperature alarm threshold of the S2350&S5300&S6300 or a temperature sensing board. When the temperature of the S2350&S5300&S6300 exceeds the threshold, check the working environment of the S2350&S5300&S6300 to ensure that the environment is suitable for the S2350&S5300&S6300. Example # Display the temperature of the S2350&S5300&S6300 that unit id is 0. <HUAWEI> display environment unit 0 Environment information: Temperature information: SlotID CurrentTemperature LowLimit HighLimit (deg c ) (deg c) (deg c ) 1 33 0 70 Table 10-2 Description of the display environment command output Item Description SlotID Stack ID of the S2350&S5300&S6300. CurrentTemperature Temperature of the S2350&S5300&S6300. It is expressed in Celsius. LowLimit Lower temperature threshold of the S2350&S5300&S6300. It is expressed in Celsius. HighLimit Upper temperature threshold of the S2350&S5300&S6300. It is expressed in Celsius. 10.7 display elabel unit Function The display elabel unit command displays the electronic label of the device. Format display elabel unit unit-id [ subcard-id ] Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 185 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 10 Device Management Compatible Commands Parameters Parameter Description Value slot slot-id Specifies the stack ID of the device. The value ranges from 0 to 8 if stacking is configured. The value is 0 if stacking is not configured. subcard-id Specifies the subcard ID. This parameter can be specified if any subcard is used on the device. The value is an integer that ranges from 1 to 8. Views All views Default Level 1: Monitoring level Usage Guidelines Electronic labels identify the hardware. You can use the display elabel command to view the electronic label information. Example # Display the electronic label of the device with stack ID 0. <HUAWEI> display elabel slot 0 /$[System Integration Version] /$SystemIntegrationVersion=3.0 [Slot_0] /$[Board Integration Version] /$BoardIntegrationVersion=3.0 [Main_Board] /$[System Integration Version] /$SystemIntegrationVersion=3.0 [Slot_0] /$[Board Integration Version] /$BoardIntegrationVersion=3.0 [Main_Board] /$[ArchivesInfo Version] /$ArchivesInfoVersion=3.0 Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 186 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 10 Device Management Compatible Commands [Board Properties] BoardType=CX22EFGE BarCode=21023516101234567890 Item=02351610 Description=CX22EFGE Manufactured=2009-12-10 VendorName=Huawei IssueNumber= CLEICode= BOM= /$[ArchivesInfo Version] /$ArchivesInfoVersion=3.0 [Board Properties] BoardType=CX7E1FANA BarCode=21023516511091000140 Item=02351651 Description=S23&33&53&CX200D,CX7E1FANA,Fan Assembly Manufactured=2009-01-27 VendorName=Huawei IssueNumber=00 CLEICode= BOM= /$[ArchivesInfo Version] /$ArchivesInfoVersion=3.0 [Board Properties] BoardType=CX7M1PWA BarCode=21023167831091000269 Item=02316783 Description=S5300C,CX7M1PWA,AC Power Module Manufactured=2009-01-29 VendorName=Huawei IssueNumber=00 CLEICode= BOM= /$[ArchivesInfo Version] /$ArchivesInfoVersion=3.0 [Board Properties] BoardType=CX7E1FANA BarCode=210235165110A6000619 Item=02351651 Description=S23&33&53&CX200D,CX7E1FANA,Fan Assembly Manufactured=2010-06-08 VendorName=Huawei IssueNumber=00 CLEICode= BOM= Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 187 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 10 Device Management Compatible Commands /$[ArchivesInfo Version] /$ArchivesInfoVersion=3.0 [Board Properties] BoardType=CX22PW12 BarCode=020LXP0123456789 Item=03020LXP Description=S23&33&53&CX200D ,CX22PW12 ,Power Conversion Board,2*4 Manufactured=2009-10-22 VendorName=Huawei IssueNumber=00 CLEICode= BOM= Table 10-3 Description of the display elabel command output Item Description BoardType Board model of the specified component. BarCode Bar code of the specified component. Item BOM code of the specified component. Description English description of the specified component. Manufactured Production date of the specified component. VendorName Vendor name of the specified component. IssueNumber Issuing number of the specified component. CLEICode CLEI code of the specified component. BOM Sales BOM code of the specified component. 10.8 display fault-management Function The display fault-management command displays the contents of an alarm message, active alarm message, or event. Format display fault-management { alarm | active-alarm | event } [ sequence-number sequencenumber ] Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 188 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 10 Device Management Compatible Commands Parameters Parameter Description Value sequence-number sequence-number Specifies the number of an alarm message, active alarm message, or event. The value is an integer ranging from 0 to 2147483647. When the value is 0, information about all alarm messages, active messages, or events is displayed. Views All views Default Level 1: Monitoring level Usage Guidelines This command helps you obtain the contents of all alarm messages or one alarm message on a device. Example # Display the contents of active alarm messages in the system. <HUAWEI> display fault-management active-alarm A/B/C/D/E/F/G/H/I/J A=Sequence, B=RootKindFlag(Independent|RootCause|nonRootCause) C=Generating time, D=Clearing time E=ID, F=Name, G=Level, H=State I=Description information for locating(Para info, Reason info) J=RootCause alarm sequence(Only for nonRootCause alarm) 1/Independent/2008-10-13 01:49:45+08:00/-/0x41932001/hwLldpEnabled/Warning/Sta rt/OID: 1.3.6.1.4.1.2011.5.25.134.2.1 Global LLDP is enabled. 2/Independent/2008-10-13 01:50:06+08:00/-/0x41932000/lldpRemTablesChange/Warni ng/Start/OID: 1.0.8802.1.1.2.0.0.1 Neighbor information is changed. (LldpStatsRe mTablesInserts=1, LldpStatsRemTablesDeletes=0, LldpStatsRemTablesDrops=0, LldpSt atsRemTablesAgeouts=0) 5/Independent/2008-10-13 02:22:52+08:00/-/0x40c12014/hwPortPhysicalEthHalfDupl exAlarm/Minor/Start/OID 1.3.6.1.4.1.2011.5.25.129.2.5.11 The port works in half duplex mode. (EntityPhysicalIndex=10, BaseTrapSeverity=3, BaseTrapProbableCause= 1024, BaseTrapEventType=8, EntPhysicalName=GigabitEthernet0/0/5, RelativeResourc e=interface GigabitEthernet0/0/5) 10.9 display fault-management alarm information Function The display fault-management alarm information command displays registration information about an alarm message. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 189 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 10 Device Management Compatible Commands Format display fault-management alarm information [ alarm-name ] Parameters Parameter Description Value alarm-name Specifies the name of an alarm message. The value is a case-sensitive string of 1 to 256 characters without spaces. Views All views Default Level 1: Monitoring level Usage Guidelines If alarm-name is not specified, registration information about all alarm messages is displayed. To view registration information about an alarm message, you can run the display faultmanagement alarm information command; to modify registration information about an alarm message, including alarm level, you can run the fault-management alarm command. Example # Check registration information about the alarm message named linkUp. <HUAWEI> display fault-management alarm information linkUp ********************************** AlarmName: linkUp AlarmType: Resume Alarm AlarmLevel: Cleared Suppress Period: NA CauseAlarmName: linkDown Match VB Name: ifIndex ********************************** Table 10-4 Description of the display fault-management alarm information command output Issue 02 (2013-11-06) Item Description AlarmName Name of an alarm message AlarmType Type of an alarm AlarmLevel Level of an alarm Suppress Period Suppress period of an alarm CauseAlarmName Name of the corresponding root alarm Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 190 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 10 Device Management Compatible Commands Item Description Match VB Name Contents of the matching rule set for the alarm messages Related Topics 10.11 fault-management alarm 10.10 display reboot-info Function Using the display reboot-info command, you can view the information of restarting the S2350&S5300&S6300. Format display reboot-info unit unit-id Parameters Parameter Description Value unit unit-id l Specifies the slot ID if stacking is not configured. The value is an integer that is 0 if stacking is not configured; the value ranges from 0 to 8 if stacking is configured. l Specifies the stack ID if stacking is configured. Views All views Default Level 2: Configuration level Usage Guidelines None Example # Display the information about restarting the S2350&S5300&S6300 that unit id is 0. <HUAWEI> display reboot-info unit 0 Slot ID Issue 02 (2013-11-06) Times Reboot Type Reboot Time(DST) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 191 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 10 Device Management Compatible Commands =========================================================================== 0 1 MANUAL 2012/10/13 01:48:28 0 2 MANUAL 2012/10/08 06:43:35 0 3 MANUAL 2012/10/01 01:34:32 0 4 POWER 2012/10/01 00:01:26 0 5 POWER 2012/10/01 00:01:25 0 6 POWER 2012/10/01 00:01:24 0 7 POWER 2012/10/01 00:01:25 0 8 POWER 2012/10/01 00:01:28 0 9 POWER 2012/10/01 00:01:24 0 10 POWER 2012/10/01 00:01:23 0 11 MANUAL 2012/10/03 00:42:32 0 12 POWER 2012/10/01 00:01:21 0 13 MANUAL 2012/10/05 07:12:18 0 14 POWER 2012/10/01 00:01:21 0 15 POWER 2012/10/01 00:01:21 0 16 POWER 2012/10/01 00:01:19 0 17 MANUAL 2012/10/04 07:02:23 0 18 MANUAL 2012/10/03 00:37:50 0 19 MANUAL 2012/10/01 03:21:56 0 20 POWER 2012/10/01 00:01:23 0 21 MANUAL 2012/10/10 02:55:49 0 22 MANUAL 2012/10/10 01:28:13 0 23 POWER 2012/10/01 00:01:19 0 24 MANUAL 2012/10/03 23:49:02 =========================================================================== Total 24 Table 10-5 Description of the display reboot-info command output Item Description Slot ID Specifies the stack ID if the stacking function is enabled or the slot ID if the stacking function is not enabled. Times Indicates the times of restarting the S2350&S5300&S6300. Reboot Type Indicates the types of restarting the S2350&S5300&S6300: l MANUAL l POWERR l SCHEDU l OTHER Reboot Time (DST) Indicates the time of restarting the S2350&S5300&S6300. 10.11 fault-management alarm Function The fault-management alarm command configures the type or level of an alarm message or event. The undo fault-management alarm command cancels the type or level of an alarm message or event. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 192 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 10 Device Management Compatible Commands Format fault-management alarm alarm-name level alarm-level undo fault-management alarm alarm-name [ level ] Parameters Parameter Description alarm alarm-name Specifies the name of an alarm message or event. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. Value The value is a case-sensitive string of 1 to 64 characters without spaces. 193 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 10 Device Management Compatible Commands Parameter Description Value level alarm-level Specifies the level of an alarm The value is a character string. In message or event. Mappings between the X.733 standard, according to alarm levels and severity levels: the severity level and emergency level, alarm messages are 1. Critical: Indicates that a service affecting condition has occurred classified into six levels. The more serious event an alarm and an immediate corrective action is required. Such a severity message indicates, the smaller alarm-level is. Critical indicates can be reported. For example, when a managed object becomes the alarm level 1; whereas totally out of service, its capability Cleared indicates the alarm level 6. must be restored. 2. Major: Indicates that a service affecting condition has developed and an urgent corrective action is required. Such a severity can be reported. For example, when there is a severe degradation in the capability of a managed object, its full capability must be restored. 3. Minor: Indicates the existence of a non-service affecting fault condition and that corrective action should be taken in order to prevent a more serious (for example, service affecting) fault. Such a severity can be reported. For example, when the detected alarm condition is not currently degrading the capacity of the managed object. 4. Warning: Indicates the detection of a potential or impending service affecting fault, before any significant effects have been felt. Action should be taken to further diagnose (if necessary) and correct the problem in order to prevent it from becoming a more serious service affecting fault. 5. Indeterminate: Indicates that the severity level cannot be determined. 6. Cleared: Indicates the clearing of one or more previously reported alarms. This alarm clears all alarms for this managed object that have the same Alarm type, Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 194 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference Parameter 10 Device Management Compatible Commands Description Value Probable cause and Specific problems (if given). Multiple associated notifications may be cleared by using the Correlated notifications parameter. Views System view Default Level 2: Configuration level Usage Guidelines Alarm messages can be classified into root alarm messages and resume-alarm messages. All the alarms are saved on the device. Events can be classified into critical events and events. Critical events are saved on a device and can be obtained by the NMS. Events are not saved on a device. The fault-management alarm command can be used to promote or degrade the level of an alarm message according to the severity level and emergency level of the alarm message. Example # Set the alarm level of the alarm message named hwCfgManEventlog to major respectively. <HUAWEI> system-view [HUAWEI] fault-management alarm hwCfgManEventlog level major 10.12 reset reboot-info Function Using the reset reboot-info command, you can clear the reboot information. Format reset reboot-info unit unit-id Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 195 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 10 Device Management Compatible Commands Parameters Parameter Description Value unit unit-id l Specifies the slot ID if stacking is not configured. The value is an integer that is 0 if stacking is not configured; the value ranges from 0 to 8 if stacking is configured. l Specifies the stack ID if stacking is configured. Views User view Default Level 2: Configuration level Usage Guidelines None. Example # clear the reboot information of device that unit id is 0. <HUAWEI> reset reboot-info unit 0 10.13 display alarm urgent Function Using the display alarm urgent command, you can view alarms on the S2350&S5300&S6300. Format display alarm urgent unit unit-id Parameters Parameter Description Value unit unit-id l Specifies the slot ID if stacking is not configured. The value is an integer thatis 0 if stacking is not configured; the value ranges from 0 to 8 if stacking is configured. l Specifies the stack ID if stacking is configured. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 196 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 10 Device Management Compatible Commands Views All views Default Level 1: Monitoring level Usage Guidelines You can use the command to view alarms, including alarms about the abnormality of the temperature, the fan, and the chip. If no parameter is specified, the command displays all the alarms. Example # Display alarms of the device that unit id is 0. <HUAWEI> display alarm urgent unit 0 Alarm Slot Date Time Location ------------------------------------------------------------------Power abnormal 0 2008/08/01 00:00:46 slot 0 Power plugged out 0 2008/08/01 00:00:46 slot 0 Table 10-6 Description of the display alarm urgent command output Item Description Alarm Details about an alarm. Slot Stack ID of the S2350&S5300&S6300 where alarms are generated. Date Date when alarms are generated. Time Time when alarms are generated. Location Position where alarms are generated. 10.14 reset alarm urgent Function The reset alarm urgent command clears all alarm messages. Format reset alarm urgent unit unit-id Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 197 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 10 Device Management Compatible Commands Parameters Parameter Description Value unit unit-id l Specifies the slot ID if stacking is not configured. The value is an integer that is 0 if stacking is not configured. The value ranges from 0 to 8 if stacking is configured. l Specifies the stack ID if stacking is configured. Views System view Default Level 2: Configuration level Usage Guidelines None Example # Clear all alarm messages of the device that unit id is 0. <HUAWEI> system-view [HUAWEI] reset alarm urgen unit 0 10.15 temperature threshold unit Function The temperature threshold unitcommand sets the temperature thresholds. The undo temperature threshold unitcommand cancels the temperature thresholds. Format temperature threshold unit unit-id lower-limit low-temperature upper-limit high-teperature undo temperature threshold unit unit-id lower-limit low-temperature upper-limit highteperature Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 198 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 10 Device Management Compatible Commands Parameters Parameter Description Value unit-id l Specifies the slot ID if stacking is not configured. l Specifies the stack ID if stacking is configured. The value is an integer that is 0 if stacking is not configured. The value ranges from 0 to 8 if stacking is configured. lower-limit low-temperature Specify the lower temperature alarm threshold. The value is an integer that ranges from 0 to 300. upper-limit high-teperature Specify the upper temperature alarm threshold. The value is an integer that ranges from 0 to 300. Views System view Default Level 2: Configuration level Usage Guidelines This command sets the upper and lower temperature thresholds for a device. If the device temperature is out of the specified range, an alarm is generated. Example # Set the upper temperature alarm threshold of the device with stack ID 3 to 40. <HUAWEI> system-view [HUAWEI] temperature threshold unit 3 lower-limit 0 upper-limit 40 10.16 port-mirroring to observe-port Function The port-mirroring to observe-port command configures a mirroring action on an interface. NOTE Only S5300EI and S5300SI support this command. Format port-mirroring to observe-port index { both | inbound | outbound } remote vlan-id Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 199 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 10 Device Management Compatible Commands Parameters Parameter Description Value index Specifies the index of a global observing port. For the S5300EI series, the value ranges from 1 to 4, whereas for the S5300SI series, the value is 1. both Indicates that port mirroring is configured for both incoming and outgoing packets. - inbound incoming Indicates that port mirroring is configured for incoming packets. - outbound Indicates that port mirroring is configured for outgoing packets. - remote vlan-id Specifies the VLAN ID used in remote mirroring. The value is an integer that ranges from 1 to 4094. Views GE interface view, 10GE interface view, Eth-Trunk interface view Default Level 2: Configuration level Usage Guidelines NOTE The mirrored port cannot be added to the RSPAN VLAN. In the process of port mirroring, the S2350&S5300&S6300 copies the packets passing through an observed port to a specified observing port. To ensure information integrity during port mirroring, it is recommended that the observing port and observed port be of the same type and enjoy the same bandwidth. On the S2350&S5300&S6300, port mirroring is implemented by the Layer 2 switch chip. Ensure that the Layer 2 header, Layer 3 header, and data of each packet copied to the observing port remain unchanged. Port mirroring can be configured for the incoming traffic, outgoing traffic, or both. To configure an Eth-Trunk as a mirrored interface, you must run the interface eth-trunk trunkid command to create the Eth-Trunk first. l Issue 02 (2013-11-06) If an Eth-Trunk is configured as a mirrored interface, its member interfaces cannot be configured as mirrored interfaces. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 200 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference l 10 Device Management Compatible Commands If a member interface of an Eth-Trunk is configured as a mirrored interface, the Eth-Trunk cannot be configured as a mirrored interface. Example # Configure GE 0/0/1 as the observed interface and GE0/0/2 as the observing port with the index as 1. Mirror the incoming traffic of GE0/0/1 to GE0/0/2. <HUAWEI> system-view [HUAWEI] observe-port 1 interface gigabitethernet 0/0/2 [HUAWEI] interface gigabitethernet 0/0/1 [HUAWEI-GigabitEthernet0/0/1] port-mirroring to observe-port 1 inbound remote 10 10.17 poe power Function The poe power command sets the maximum output power of an interface. The undo poe power command restores the default maximum output power of an interface. By default, the maximum output power of an interface is 30000 mW. Format poe power port-max-power undo poe power Parameters Parameter Description Value port-max-power Specifies the maximum output power of an interface. The value is an integer that ranges from 0 to 30000, in mW. Views GE interface view, Ethernet interface view, port group view Default Level 2: Configuration level Usage Guidelines Usage Scenarios Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 201 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 10 Device Management Compatible Commands The PD negotiation power may be different from the power required by some non-standard PDs or PDs that cannot be classified. You can run the poe power command to set the maximum output power of the interface, which prevents power overload for PDs and saves energy. Prerequisites The PoE function has been enabled on the interface using the poe enable command. Example # Set the maximum output power on GigabitEthernet0/0/5 to 20000 mW. <HUAWEI> system-view [HUAWEI] interface gigabitEthernet 0/0/5 [HUAWEI-GigabitEthernet0/0/5] poe power 20000 10.18 port-mirroring Function The port-mirroring command configures a mirroring behavior on an interface. NOTE The S5300SI does not support this command. Format port-mirroring to observe-port index remote vlan-id Parameters Parameter Description Value index Specifies the index of a global observing interface. On an S5300EI, the value ranges from 1 to 4. remote vlan-id Specifies the VLAN ID used in remote mirroring. The value is an integer that ranges from 1 to 4094. Views Traffic behavior view Default Level 2: Configuration level Usage Guidelines During flow mirroring, the device copies the packets of an observed flow and then sends the copy to a specified observing interface. The device implements flow mirroring for the incoming flows on an interface through traffic classification. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 202 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 10 Device Management Compatible Commands On the S-switch, flow mirroring is implemented by the Layer 2 switch chip. Ensure that the Layer 2 header, Layer 3 header, and data of each packet copied to the observing interface remain unchanged. You can only specify an existing VLAN for remote mirroring. This VLAN must be configured as an RSPAN VLAN. Example # Mirror traffic to observing interface with index 1. <HUAWEI> system-view [HUAWEI] traffic behavior b1 [HUAWEI-traffic-behavior-b1] port-mirroring to observe-port 1 remote 1 10.19 reset fault-management Function The reset fault-management command clears all alarm messages. Format reset fault-management { active-alarm | event } [ sequence-number sequence-number ] Parameters Parameter Description Value sequence-number sequence-number Specifies the number of an alarm message. The value is an integer ranging from 0 to 2147483647. If the value is 0, it indicates that all alarm messages are cleared. Views System view Default Level 2: Configuration level Usage Guidelines If sequence-number is not specified, the system clears all the alarm messages on the device. NOTICE After this command is run, all alarm messages on a device are cleared and cannot be restored. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 203 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 10 Device Management Compatible Commands Example # Clear all active alarm messages. <HUAWEI> system-view [HUAWEI] reset fault-management active-alarm Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 204 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 11 11 Network Management Compatible Commands Network Management Compatible Commands About This Chapter 11.1 Ping and Tracert Compatible Commands 11.2 NTP Compatible Commands 11.3 SNMP Compatible Commands Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 205 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 11 Network Management Compatible Commands 11.1 Ping and Tracert Compatible Commands 11.1.1 ping ipv6 Function The ping ipv6 command checks whether a specified IPv6 IP address is reachable and exports corresponding statistics. Format ping ipv6 [ -a source-ipv6-address | -c count | -h ttl-value | -m time | -name | -s packetsize | -t timeout | -tc traffic-class-value | vpn6-instance vpn6-instance-name ] * { destination-ipv6address | host } [ -i interface-type interface-number ] Parameters Parameter Description Value -a source-ipv6-address The value is a 32-digit hexadecimal Specifies a source IPv6 address for sending ICMPv6 number, in the format of X:X:X:X:X:X:X:X. Echo Request messages. If no source IPv6 address is specified, the IPv6 address of the outbound interface is used as the source address for sending ICMPv6 Echo Request messages. -c count Specifies the number of times for sending ICMPv6 Echo Request messages. The value is an integer that ranges from 1 to 4294967295. The default value is 5. You can increase the number of outgoing packets to detect the network quality based on the packet loss rate. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 206 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 11 Network Management Compatible Commands Parameter Description -h ttl-value Specifies the TTL value. -m time Specifies the time to wait before sending the next ICMPv6 Echo Request message. Value The value is an integer that ranges from 1 to 255. The default value is If the TTL field is reduced to 255. 0 during message forwarding, the Layer 3 switch that the message reaches sends an ICMPv6 timeout message to the source host, indicating that the destination host is unreachable. The value is an integer that ranges from 1 to 10000, in milliseconds. The default value is 2000. Each time the source sends an ICMPv6 Echo Request message using the ping ipv6 command, the source waits a period of time (2000 ms by default) before sending the next ICMPv6 Echo Request message. You can set the time to wait before sending the next ICMPv6 Echo Request message using the parameter time. In the case of poor network condition, the value should be equal to or larger than 2000, in milliseconds. -name Displays the name of the destination host. -s packetsize Specifies the length of an The value is an integer that ranges ICMPv6 Echo Request from 20 to 9600, in bytes. The message, excluding the IP default value is 56. header and ICMPv6 header. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. - 207 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 11 Network Management Compatible Commands Parameter Description Value -t timeout Specifies the timeout period The value is an integer that ranges to wait for an ICMPv6 Echo from 0 to 65535, in milliseconds. The default value is 2000. Reply message after an ICMPv6 Echo Request message is sent. After the ping ipv6 command is run, the source sends an ICMPv6 Echo Request message to a destination and waits for an ICMPv6 Echo Reply message. If the destination, after receiving the ICMPv6 Echo Request message, returns an ICMPv6 Echo Reply message to the source within the period specified by the parameter timeout, the destination is reachable. If the destination does not return an ICMPv6 Echo Reply message within the specified period, the source displays that the message times out. Normally, the source receives an ICMPv6 Echo Reply message within 1 to 10 seconds after sending an ICMPv6 Echo Request message. If the transmission speed is low, properly prolong the timeout period. -tc traffic-class-value The value is an integer that ranges Specifies the traffic classification in the ICMPv6 from 0 to 255. The default value is 0. Echo Request message. To configure traffic control for ICMPv6 packets, set the parameter traffic-classvalue. vpn6-instance vpn6instance-name Issue 02 (2013-11-06) Specifies the name of a VPN The value is a string of 1 to 31 instance for the IPv6 address characters without spaces. family. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 208 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 11 Network Management Compatible Commands Parameter Description destination-ipv6-address The value is a 32-digit hexadecimal Specifies the IPv6 address of number, in the format of the destination host. X:X:X:X:X:X:X:X. host Specifies the name of the destination host. -i interface-type interface- Specifies the outbound number interface for sending ICMPv6 Echo Request messages. Value The value is a string of 1 to 46 characters. - Views All views Default Level 1: Monitoring level Usage Guidelines Usage Scenario The ping ipv6 command is a widely used debugging tool for checking network connectivity and host reachability on an IPv6 network by transmitting ICMPv6 messages. It can detect the following items: l Availability of the remote device l Round-trip delay in communication between the local and remote devices l Packet loss rate You can run the ping ipv6 command to check the IPv6 network connectivity or line quality in the following scenarios: l Scenario 1: Check the protocol stack on the local device. You can run the ping ipv6 IPv6loopback-address command to check whether the TCP/IP protocol stack works properly on the local device. l Scenario 2: Check whether the destination IPv6 host is reachable on an IPv6 network. You can run the ping ipv6 host command to send an ICMPv6 Echo Request message to the destination host. If a reply is received, the destination host is reachable. l Scenario 3: Check whether the peer is reachable on a Layer 3 VPN. On a Layer 3 VPN, devices may not have routing information about each other. Therefore, you cannot use the ping ipv6 host command to check whether the peer is reachable. When a VPN instance name is specified, you can run the ping ipv6 vpn6-instance vpn6-instance-name host command to send an ICMPv6 Echo Request message to the peer. If the peer returns an ICMPv6 Echo Reply message, the peer is reachable. l Scenario 4: In the case of an unstable network, you can run the ping ipv6 -c count -t timeout { destination-ipv6-address | host } command to check the quality of the network Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 209 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 11 Network Management Compatible Commands between the local device and the peer. By analyzing the packet loss rate and average delay in the command output, you can evaluate the network quality. If the network is unreliable, set the packet transmission count (-c) and timeout (-t) to the upper limits. This makes the test result accurate. Prerequisites l Before running the ping ipv6 command, ensure that the ICMPv6 module is working properly. l If -vpn6-instance is specified, ensure that the VPN module is working properly. Configuration Impact l When the destination host is unreachable, the system displays "Request time out" indicating that the ICMPv6 Echo Request message times out and displays statistics collected by the IPv6 ping test. Precautions l If an intermediate device is disabled from responding to ICMPv6 messages, detection on this node fails. l If the IPv6 address of the destination host maps the local address, specify the name of the local outbound interface through which the ICMPv6 Echo Request message is sent. Otherwise, reply to the ping ipv6 command times out. l If a fault occurs in the IPv6 ping process, you can press Ctrl+C to terminate the IPv6 ping operation. Example # Check whether the host with the IPv6 address as 2001::1 is reachable. <HUAWEI> ping ipv6 2001::1 PING 2001::1 : 56 data bytes, press CTRL_C to break Reply from 2001::1 bytes=56 Sequence=1 hop limit=64 time=115 ms Reply from 2001::1 bytes=56 Sequence=2 hop limit=64 time=1 ms Reply from 2001::1 bytes=56 Sequence=3 hop limit=64 time=1 ms Reply from 2001::1 bytes=56 Sequence=4 hop limit=64 time=1 ms Reply from 2001::1 bytes=56 Sequence=5 hop limit=64 time=1 ms ---2001::1 ping statistics--5 packet(s) transmitted 5 packet(s) received 0.00% packet loss round-trip min/avg/max=1/23/115 ms Table 11-1 Description of the ping ipv6 command output Issue 02 (2013-11-06) Item Description PING HH:HH::HH:H IPv6 address of the destination host. x data bytes Length of a sent ICMPv6 Echo Request message. press CTRL_C to break The ongoing IPv6 ping test is terminated after you press Ctrl+C. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 210 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 11 Network Management Compatible Commands Item Description Reply from HH:HH::HH:H The destination host responds to the ICMPv6 Echo Request message with an ICMPv6 Echo Reply message that contains the following items: l bytes: indicates the length of the ICMPv6 Echo Reply message. l sequence: indicates the sequence number of the ICMPv6 Echo Reply message. l hop limit: indicates the TTL of the ICMPv6 Echo Reply message. l time: indicates the RTT, in milliseconds. If no ICMPv6 Echo Reply message is received after the timeout period, the system displays "Request time out". HH:HH::HH:H ping statistics Statistics collected after the IPv6 ping test on the destination host. The statistics include the following information: l packet(s) transmitted: indicates the number of sent ICMPv6 Echo Request messages. l packet(s) received: indicates the number of received ICMPv6 Echo Reply messages. l % packet loss: indicates the percentage of unresponded messages to total sent messages. l round-trip min/avg/max: indicates the minimum, average, and maximum RTTs. Related Topics 11.1.2 tracert ipv6 11.1.2 tracert ipv6 Function The tracert ipv6 command checks the path of packets from the source to the destination, checks IPv6 network connectivity, and locates a network fault. Format tracert ipv6 [ -a source-ip-address | -f first-hop-limit | -m max-hop-limit | -name | -p portnumber | -q probes | -s packetsize | -w timeout | vpn6-instance vpn6-instance-name ] * { destination-ipv6-address | host-name } Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 211 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 11 Network Management Compatible Commands Parameters Parameter Description Value -a source-ip-address Specifies the source address of a tracert packet. The value is a 32-digit hexadecimal number, in the format of X:X:X:X:X:X:X:X. If this parameter is not specified, the IP address of the outbound interface is used as the source IP address for sending tracert packets. -f first-hop-limit Specifies the initial hop-limit. The value is an integer that ranges from 1 to 255. The default value is Carried in the IPv6 header, 1. the hop-limit (time to live) indicates the lifetime of IPv6 packets and specifies the maximum number of hops that the IPv6 packets can pass through. The hop-limit field in IPv6 packets is similar to the TTL field in the IPv4 packets. The hop-limit value is set on the source and reduced by 1 each time the packet passes through a Layer 3 device. When the hop-limit value is reduced to 0 on a Layer 3 device, the Layer 3 device discards the packet and sends an ICMPv6 Timeout message to the source. If first-hop-limit is specified and the number of hops is smaller than the specified value, the hop-limit value will be greater than 0 after the packet passes through all the nodes. Therefore, no ICMPv6 Timeout message is sent to the source. If max-hop-limit is specified, the value of first-hop-limit must be smaller than the value of max-hop-limit. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 212 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 11 Network Management Compatible Commands Parameter Description Value -m max-hop-limit Specifies the maximum hop- The value is an integer that ranges limit. from 1 to 255. The default value is 30. Usually, the maximum hoplimit is set to the number of hops that a packet passes through. To change the hoplimit value, you need to use this parameter. If first-hop-limit is specified, the value of max-hop-limit must be greater than the value of first-hop-limit. -name Displays the name of the destination host. -p port-number Specifies the UDP port number of the destination. - The value is an integer that ranges from 1 to 65535. The default value l If no UDP port number is is 33434. specified for the destination, when you run the tracert ipv6 command, a port with the port number greater than 32768 is randomly chosen for the destination to receive tracert packets. l Before specifying the UDP port number for the destination, ensure that the port is not in use; otherwise, the tracert fails. -q probes Specifies the number of The value is an integer that ranges tracert packets sent each time. from 1 to 65535. The default value is 3. In the case of poor network quality, you can set probes to a comparatively large value to ensure that tracert packets can reach the destination. -s packetsize Specifies the length of an ICMPv6 Echo Request message, excluding the IP header and ICMPv6 header. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. The value is an integer that ranges from 20 to 9600, in bytes. The default value is 56. 213 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 11 Network Management Compatible Commands Parameter Description Value -w timeout Sets the timeout period to wait for a reply. The value is an integer that ranges from 1 to 65535, in milliseconds. The default value is 5000. If a tracert packet times out when reaching a gateway, an asterisk (*) is displayed. In the case of poor network quality and a low network transmission rate, you are advised to prolong the timeout period. vpn6-instance vpn6instance-name Specifies the name of a VPN The value is a string of 1 to 31 caseinstance for the IPv6 address sensitive characters. family. destination-ipv6-address The value is a 32-digit Specifies the IPv6 address of hexadecimal number, in the format the destination host. of X:X:X:X:X:X:X:X. host-name Specifies the name of the destination host. The value is a string of 1 to 46 characters. Views All views Default Level 1: Monitoring level Usage Guidelines Usage Scenario When a fault occurs on the network and the peer is an IPv6 device, you can run the ping ipv6 command to check network connectivity based on the reply message, and then run the tracert ipv6 command to locate the fault. You can specify different parameters in the tracert ipv6 command for different scenarios: l To check information about nodes between the source and the IPv6 destination, run the tracert ipv6 host command. l To check information about nodes between the source and the IPv6 destination on a Layer 3 VPN, run the tracert ipv6 vpn6-instance vpn6-instance-name host command. On a Layer 3 VPN, devices may not have routing information about each other. Therefore, you cannot use the tracert ipv6 host command to check whether the peer is reachable. To check information about nodes between the source and the IPv6 destination in a specified VPN instance, run the tracert ipv6 vpn6-instance vpn6-instance-name host command. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 214 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 11 Network Management Compatible Commands l On an unstable network, you can run the tracert ipv6 -q probes -w timeout host command to check information about nodes between the source and the IPv6 destination. If the network is unreliable, set the packet transmission count (-q) and timeout (-w) to the upper limits. This makes the test result accurate. l To check information about nodes along a segment of a path, run the tracert ipv6 -f firsthop-limit -m max-hop-limit host command that has initial hop-limit and maximum hoplimit specified. Prerequisites l The UDP module of each node is working properly; otherwise, the IPv6 tracert operation fails. l The VPN module of each node is working properly if vpn6-instance is specified. l The ICMPv6 module of each node is working properly; otherwise, " * * * " is displayed. Procedure The execution process of the tracert ipv6 command is as follows: l The source sends a packet with the hop-limit being 1. After the hop-limit times out, the first hop sends an ICMPv6 Error message to the source, indicating that the packet cannot be forwarded. l The source sends a packet with the hop-limit being 2. After the hop-limit times out, the second hop sends an ICMPv6 Error message to the source, indicating that the packet cannot be forwarded. l The source sends a packet with the hop-limit being 3. After the hop-limit times out, the third hop sends an ICMPv6 Error message to the source, indicating that the packet cannot be forwarded. l The preceding process proceeds until the packet reaches the destination. When receiving an IPv6 packet, each destination hop cannot find the port specified in the IPv6 packet, and therefore returns an ICMPv6 Port Unreachable message, indicating that the destination port is unreachable and the IPv6 tracert ends. In this manner, the result of each probe is displayed on the source, according to which you can find the path from the source to the destination. Configuration Impact If a fault occurs when you run the tracert ipv6 command, the following information may be displayed: l !H: The host is unreachable. l !N: The network is unreachable. l !: The port is unreachable. l !P: The protocol type is incorrect. l !F: The packet is incorrectly fragmented. l !S: The source route is incorrect. Precautions By default, the ICMPv6 module is automatically enabled after you enable the IPv6 module. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 215 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 11 Network Management Compatible Commands Example # Set the number of packets to be sent to 5 and timeout period to 8000 ms, and tracert the gateways from the source to the destination at 3002::3. <HUAWEI> tracert ipv6 -q 5 -w 8000 3002::3 traceroute to 3002::3 30 hops max,60 bytes packet 1 2002::2 26 ms 23 ms 26 ms 30 ms 29 ms 2 3002::3 3020 ms 3024 ms 4040 ms 6820 ms 5584 ms # Tracert the gateways from the source to the destination at 3002::3 on a specified VPN. <HUAWEI> tracert ipv6 vpn6-instance vsi6 3002::3 traceroute to vsi6 3002::3 30 hops max,60 bytes packet 1 2002::2 26 ms 23 ms 26 ms 2 3002::2 3020 ms !H 3024 ms !H 4040 ms !H Table 11-2 Description of the tracert ipv6 command output Item Description traceroute to HH:HH::HH:H IPv6 address of the destination host. x hops max Maximum hop-limit value. x bytes packet Length of a tracert packet. 1 Sequence number of the received ICMPv6 Echo Reply message. 2 HH:HH::HH:H Address of the IPCMPv6 Echo Reply message. 26 ms 23 ms 26 ms RTT, in milliseconds. Related Topics 11.1.1 ping ipv6 11.2 NTP Compatible Commands 11.2.1 ntp-service authentication-keyid Function The ntp-service authentication-keyid command sets NTP authentication key. The undo ntp-service authentication-keyid command removes NTP authentication key. By default, no authentication key is set. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 216 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 11 Network Management Compatible Commands Format ntp-service authentication-keyid key-id authentication-mode { md5 | hmac-sha256 } { plain password-plain | [ cipher ] password } undo ntp-service authentication-keyid key-id Parameters Parameter Description Value key-id Indicates the key number. Key ID is an integer and ranges from 1 to 4294967295. authentication-mode md5 Indicates MD5 authentication mode. authentication-mode hmacsha256 Indicates HMAC-SHA256 authentication mode. plain password-plain Indicates that the configured The password is a string of 1 password is displayed in plain to 255 case-sensitive text, and specifies the plain- characters without spaces. text password. - NOTICE If plain is selected, the password is saved in the configuration file in plain text. This brings security risks. It is recommended that you select cipher to save the password in cipher text. cipher Indicates that the configured password is displayed in cipher text. - If this parameter is not specified, the configured password is displayed in cipher text. password Specifies the authentication password in plain text or in cipher text. The value is a string of casesensitive characters without spaces. The string length range is: l 1 to 255 characters in plain text. l 20 to 392 characters in cipher text. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 217 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 11 Network Management Compatible Commands Views System view Default Level 2: Configuration level Usage Guidelines Usage Scenario On a network that requires high security, the NTP authentication must be enabled. You can configure password authentication between client and server, which guarantee the client only to synchronize with server successfully authenticated, and improve network security. If the NTP authentication function is enabled, a reliable key should be configured at the same time. Keys configured on the client and the server must be identical. NOTE In NTP symmetric peer mode, the symmetric active peer functions as a client and the symmetric passive peer functions as a server. Select the parameter for displaying the password according to the following rules: l If the parameter plain is specified, the system encrypts the password and stores the password in the database. When the display current-configuration | include ntp command is used to display the current configuration information, the stored password is displayed in plain text. l If the parameter cipher is specified, you can enter a plain-text password or a cipher-text password. – If you enter a cipher-text password, for example, a password copied from the configuration file and pasted as the cipher-text password, the system encrypts the password and stores it in the database. When you check the current configuration information, the stored password is displayed in cipher text and consistent with the entered password. – If you enter a plain-text password, the system encrypts the password and stores it in the database. When you check the current configuration information, the stored password is displayed in cipher text. You can configure the parameter cipher for rolling back, copying and pasting the configuration. – If you do not specify the parameter plain or cipher, the system displays the configured password in cipher text. The process of displaying the configured password in cipher text is the same as that of specifying the parameter cipher, and the parameter cipher is specified in the configuration file. For example, after you configure ntp-service authentication-keyid 10 authentication-mode md5 BetterKey, the system displays the message ntp-service authentication-keyid 10 authentication-mode md5 cipher %$%$U,"!FB;{C 5XW(q%Nr0g,#2)}%$%$ when you check the current configuration. Follow-up Procedure You can configure multiple keys for each device. After the NTP authentication key is configured, you need to set the key to reliable using the ntp-service reliable authentication-keyid command. If you do not set the key to reliable, the NTP key does not take effect. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 218 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 11 Network Management Compatible Commands Precautions You can configure a maximum of 1024 keys for each device. If the NTP authentication key is a reliable key, it automatically becomes unreliable when you delete the key. You do not need to run the undo ntp-service reliable authentication-keyid command. Example # Set the MD5 identity authentication key. The key ID number is 10, and the key is Betterkey. <HUAWEI> system-view [HUAWEI] ntp-service authentication-keyid 10 authentication-mode md5 BetterKey # Set authentication text to abc in MD5 authentication with plain option. <HUAWEI> system-view [HUAWEI] ntp-service authentication-keyid 10 authentication-mode md5 plain abc # Set authentication text to xyz123 in MD5 authentication with cipher option. <HUAWEI> system-view [HUAWEI] ntp-service authentication-keyid 10 authentication-mode md5 cipher xyz123 11.3 SNMP Compatible Commands 11.3.1 snmp-agent usm-user Function The snmp-agent usm-user command adds a user to an SNMP user group. The undo snmp-agent usm-user command deletes a user from an SNMP user group. By default, the SNMP user group has no users added. Format snmp-agent usm-user v3 user-name group-name [ authentication-mode { md5 | sha } password [ privacy-mode { aes128 | des56 } encrypt-password ] ] [ acl acl-number ] undo snmp-agent usm-user v3 user-name group-name [ engineid engineid | local ] Parameters Parameter Description v3 Indicates that the security mode in v3 is adopted. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. Value 219 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 11 Network Management Compatible Commands Parameter Description Value user-name Specifies the name of a user. It is a string of 1 to 32 casesensitive characters without spaces. group-name Specifies the name of the group to It is a string of 1 to 32 casewhich a user belongs. sensitive characters without spaces. authentication-mode Sets the authentication mode. - NOTE Authentication is a process in which the SNMP agent (or the NMS) confirms that the message is received from an authorized NMS (or SNMP agent) and the message is not changed during transmission. RFC 2104 defines Keyed-Hashing for Message Authentication Code (HMAC), an effective tool that uses the security hash function and key to generate the message authentication code. This tool is widely used in the Internet. HMAC used in SNMP includes HWACMD5-96 and HWAC-SHA-96. The hash function of HWAC-MD5-96 is MD5 that uses 128-bit authKey to generate the key. The hash function of HWAC-SHA-96 is SHA-1 that uses 160-bit authKey to generate the key. md5 | sha Indicates the authentication protocol. - l md5: Specifies HMACMD5-96 as the authentication protocol. l sha: Specifies HMAC-SHA-96 as the authentication protocol. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 220 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 11 Network Management Compatible Commands Parameter Description Value password Specifies the password for user authentication. For plain-text password, the value is a string of 6 to 64 characters by default, and the minimum length is 6 characters. If the set password min-length command is run to set the minimum length of passwords to a value greater than 6, the minimum length is the value configured using the set password minlength command. For ciphertext password, the value is a string of 32 to 104 characters. NOTE The password cannot be the same as the user name or reverse of the user name. The password must contain at least two types of characters, including letters, digits, and special characters. The special characters cannot be question mark (?) or space. privacy-mode Specifies the authentication with encryption. - The system adopts the cipher block chaining (CBC) code of the data encryption standard (DES) and uses 128-bit privKey to generate the key. The NMS uses the key to calculate the CBC code and then adds the CBC code to the message while the SNMP agent fetches the authentication code through the same key and then obtains the actual information. Like the identification authentication, the encryption requires the NMS and the SNMP agent to share the same key to encrypt and decrypt the message. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 221 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 11 Network Management Compatible Commands Parameter Description Value des56 encrypt-password Indicates DES–56 as the encryption For plain-text password, the protocol. value is a string of 6 to 64 characters by default, and the minimum length is 6 characters. If the set password min-length command is run to set the minimum length of passwords to a value greater than 6, the minimum length is the value configured using the set password minlength command. For ciphertext password, the value is a string of 32 to 104 characters. NOTE The password cannot be the same as the user name or reverse of the user name. The password must contain at least two types of characters, including letters, digits, and special characters. The special characters cannot be question mark (?) or space. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 222 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference Parameter 11 Network Management Compatible Commands Description aes128 encrypt-password Indicates AES-128 as the encryption protocol. Value For plain-text password, the value is a string of 6 to 64 characters by default, and the minimum length is 6 characters. If the set password min-length command is run to set the minimum length of passwords to a value greater than 6, the minimum length is the value configured using the set password minlength command. For ciphertext password, the value is a string of 32 to 104 characters. NOTE The password cannot be the same as the user name or reverse of the user name. The password must contain at least two types of characters, including letters, digits, and special characters. The special characters cannot be question mark (?) or space. acl acl-number Specifies the ACL number of the access view. The value is an integer that ranges from 2000 to 2999. engineid engineid Specifies the ID of the engine associated with a user. The value is a string of 10 to 64 case-insensitive characters without spaces. local Indicates the local entity user. - Views System view Default Level 2: Configuration level Usage Guidelines Usage Scenario SNMPv1 and SNMPv2c have serious defects in terms of security. The security authentication mechanism used by SNMPv1 and SNMPv2c is based on the community name. In this mechanism, the community name is transmitted in plain text. You are not advised to use SNMPv1 and SNMPv2c on untrusted networks. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 223 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 11 Network Management Compatible Commands By adopting the user-based security model, SNMPv3 eradicates the security defects in SNMPv1 and SNMPv2c and provides two services, authentication and encryption. The user-based security model defines three security authentication levels: noAuthNoPriv, AuthNoPriv, and AuthPriv. NOTE The security authentication level noAuthPriv does not exist. This is because the generation of a key is based on the authentication information and product information. Different from SNMPv1 and SNMPv2c, SNMPv3 can implement access control, identity authentication, and data encryption through the local processing model and user security model. SNMPv3 can provide higher security and confidentiality than SNMPv1 and SNMPv2c. The following table lists the difference between SNMPv1, SNMPv2c, and SNMPv3: Table 11-3 Comparison in the security of SNMP of different versions Protocol version User Checksum Encryption Authentication v1 Adopts the community name. None None v2c Adopts the community name. None None v3 Adopts user namebased encryption/ decryption. Yes Yes The snmp-agent group command can be used to configure the authentication, encryption, and access rights for an SNMP group. The snmp-agent group command can be used to configure the rights for users in a specified SNMP group and bind the SNMP group to a MIB view. The MIB view is created through the snmp-agent mib-view command. For details, see the usage guideline of this command. After an SNMP user group is configured, the MIB-view-based access control is configured for the SNMP user group. Users cannot access objects in the MIB view through the SNMP user group. The purpose of adding SNMP users to an SNMP user group is to ensure that SNMP users in an SNMP user group have the same security level and access control list. When you run the snmp-agent usm-user command to configure a user in an SNMP user group, you configure the MIB-view-based access rights for the user. If an SNMP user group is configured with the AuthPriv access rights, you can configure the authentication mode and encryption mode when configuring SNMP users. Currently, you can set the authentication mode to MD5 or SHA and the privacy mode to AES128 or DES56. When setting the authentication key on the managed object, you can set whether to encrypt packets. Note that the authentication keys and encryption passwords configured on the NMS and the SNMP agent should be the same; otherwise, authentication fails. NOTE AES128 algorithm is recommeded to improve data transmission security. Configuration Impact If an SNMP agent is configured with a remote user, the engine ID is required during the authentication. If the engine ID changes after the remote user is configured, the remote user becomes invalid. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 224 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 11 Network Management Compatible Commands Precautions The user security level must be higher than or equal to the security level of the SNMP user group to which the user is added. The security level of an SNMP user group can be (in descending order): l Level 1: privacy (authentication and encryption) l Level 2: authentication (without encryption) l Level 3: none (neither authentication nor encryption) For example, if the security level of an SNMP user group is level 1, the security level of the user that is added to the group must be level 1; if the security level of an SNMP user group is level 2, the security level of the user that is added to the group can be level 1 or level 2. To add an SNMP user to an SNMP group, ensure that the SNMP user group is valid. If you run the snmp-agent usm-user command multiple times, only the latest configuration takes effect. Keep your user name and plain-text password well when creating the user. The plain-text password is required when the NMS accesses the device. Example # Configure an SNMPv3 user with user name u1, group name g1, authentication mode md5, authentication password 8937561bc, encryption mode aes128, and encryption password 68283asd. <HUAWEI> system-view [HUAWEI] snmp-agent usm-user v3 u1 g1 authentication-mode md5 8937561bc privacymode aes128 68283asd Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 225 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 12 12 MPLS compatible command MPLS compatible command About This Chapter NOTE 12.1 explicit-path 12.2 mpls te bypass-tunnel bandwidth 12.3 snmp-agent trap enable feature-name ldp 12.4 static-cr-lsp ingress bandwidth 12.5 static-cr-lsp transit bandwidth 12.6 bandwidth (LSP attribute view) 12.7 mpls te bandwidth Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 226 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 12 MPLS compatible command 12.1 explicit-path Function Using the explicit-path command, you can configure an explicit path of a tunnel. By default, no explicit path of a tunnel is configured. Format explicit-path path-name { enable | disable } Parameters Parameter Description Value path-name Indicates the name of an explicit path. The value is a string of 1 to 31 characters. enable Enables the explicit path of a tunnel. - disable Disables the explicit path of a tunnel. - Views System view Default Level 2: Configuration level Usage Guidelines You can configure an explicit path only after MPLS TE is enabled. The addresses of the hops along the explicit path cannot overlap or loops cannot occur. If a loop occurs, CSPF detects the loop and fails to calculate the path. When the explicit path is in use, you cannot perform the following operations: l Run the explicit-path path-name disable command to disable the explicit path. l Run the undo explicit-path command to delete the explicit path. Example # Create an explicit path named path1. <HUAWEI> system-view [HUAWEI] mpls [HUAWEI-mpls] mpls te [HUAWEI-mpls] quit [HUAWEI] explicit-path path1 enable [HUAWEI-explicit-path-path1] Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 227 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 12 MPLS compatible command 12.2 mpls te bypass-tunnel bandwidth Function Using the mpls te bypass-tunnel bandwidth command, you can configure the bypass LSP bandwidth. By default, no bypass LSP bandwidth is configured. Format mpls te bypass-tunnel bandwidth { bandwidth | { bc0 | bc1 } { bandwidth | un-limited } } Parameters Parameter Description Value bandwidth Specifies the bandwidth that the bypass tunnel can protect. The value is an integer that ranges from 1 to 32000000, in kbit/s. bc0 Indicates the BC0 bandwidth (global bandwidth) that the bypass tunnel can protect. - bc1 Indicates the BC1 bandwidth (subaddress pool bandwidth) that the bypass tunnel can protect. - un-limited Indicates that there is no limit on the total bandwidth that can be protected. Views Tunnel interface view Default Level 2: Configuration level Usage Guidelines The total bandwidth of LSPs protected by the bypass tunnel is not more than the bandwidth of the primary tunnel. When multiple bypass tunnels exist, the system selects a single bypass tunnel through the best-fit algorithm. The total bandwidth of all the LSPs protected by the bypass tunnel is not greater than the bandwidth of the primary tunnel. When multiple bypass tunnels exist, the system determines the bypass tunnel through the best-fit algorithm. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 228 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 12 MPLS compatible command Example # Configure Tunnel 0/0/1 to protect the LSPs that use the BC0 bandwidth and set no limit on the bandwidth to be protected. <HUAWEI> system-view [HUAWEI] interface tunnel 0/0/1 [HUAWEI-Tunnel0/0/1] tunnel-protocol mpls te [HUAWEI-Tunnel0/0/1] destination 2.2.2.2 [HUAWEI-Tunnel0/0/1] mpls te tunnel-id 100 [HUAWEI-Tunnel0/0/1] mpls te bypass-tunnel bandwidth bc0 un-limited [HUAWEI-Tunnel0/0/1] mpls te commit 12.3 snmp-agent trap enable feature-name ldp Function The snmp-agent trap enable feature-name ldp command enables the trap for the MPLS LDP module. The undo snmp-agent trap enable feature-name ldp command disables the trap for the MPLS LDP module. By default, the trap is disabled for the MPLS LDP module. Format snmp-agent trap enable feature-name ldp trap-name { session-down | session-up } undo snmp-agent trap enable feature-name ldp trap-name { session-down | session-up } Parameters Parameter Description Value trap-name Enables the trap of MPLS LDP events of a specified type. - session-down Enables the trap of the event that an LDP session goes Down in the MIB. session-up - Enables the trap of the event that an LDP session goes Up in the MIB. - Views System view Default Level 2: Configuration level Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 229 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 12 MPLS compatible command Usage Guidelines Run the snmp-agent trap enable feature-name ldp command to enable the LDP session trap. Currently, all traps of the MPLS LDP module are non-excessive trap. The frequent LDP session status changes do not trigger a large number of traps. Example # Enable the trap of the event that an LDP session is reestablished. <HUAWEI> system-view [HUAWEI] snmp-agent trap enable feature-name ldp trap-name session-up 12.4 static-cr-lsp ingress bandwidth Function Using the static-cr-lsp ingress bandwidth command, you can configure a static CR-LSP and specify its bandwidth on the ingress LSR. By default, no static CR-LSP on the ingress LSR is configured. Format static-cr-lsp ingress { tunnel-interface tunnel interface-number | tunnel-name } destination destination-address { nexthop next-hop-address | outgoing-interface interface-type interfacenumber } * out-label out-label bandwidth { bc0 | bc1 } bandwidth Parameters Parameter Description tunnel-interface tunnel interface-number Specifies the tunnel interface of a static CR-LSP. interfacenumber indicates the tunnel interface number. tunnel-name Specifies the name of a CRLSP. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. Value The name is a string of 1 to 19 case-sensitive characters, spaces and abbreviation not supported. If you use the interface Tunnel 0/0/2 command to create a tunnel interface for a static CR-LSP, the tunnel name in the staticcr-lsp ingress command must be formatted as "Tunnel0/0/2", otherwise, the tunnel cannot be created. There is no such a limit for the transit node and egress node. 230 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 12 MPLS compatible command Parameter Description Value destination destinationaddress Specifies the destination IP address of a static CR-LSP. - nexthop next-hop-address Specifies the next-hop IP address of a static CR-LSP. - outgoing-interface interface-type interfacenumber Specifies the type and number of an outgoing interface. This parameter is only applicable to a P2P link. out-label out-label Specifies the value of an outgoing label. bc0 Specifies BC0 bandwidth of a static CR-LSP. bc1 Specifies BC1 bandwidth of a static CR-LSP. bandwidth Specifies the bandwidth required by a CR-LSP. out-label is an integer ranging from 16 to 1048575. The value ranges from 0 to 4000000000, in kbit/s. The default value is 0. Views System view Default Level 2: Configuration level Usage Guidelines Before setting up an MPLS TE tunnel through a static CR-LSP, configure a static route or an IGP to ensure connectivity between LSRs, and enable basic MPLS and MPLS TE functions. Example # Configure the static CR-LSP named Tunnel0/0/1, with the destination IP address being 10.1.3.1, the next-hop address being 10.1.1.2, the outgoing label being 237, and the required bandwidth being 20 kbit/s from BC0 on the ingress. <HUAWEI> system-view [HUAWEI] static-cr-lsp ingress tunnel-interface Tunnel0/0/1 destination 10.1.3.1 nexthop 10.1.1.2 out-label 237 bandwidth bc0 20 12.5 static-cr-lsp transit bandwidth Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 231 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 12 MPLS compatible command Function Using the static-cr-lsp transit bandwidth command, you can configure a static CR-LSP and specify its bandwidth on a transit LSR. By default, no static CR-LSP on a transit LSR is configured. Format static-cr-lsp transit lsp-name incoming-interface interface-type interface-number in-label inlabel { nexthop next-hop-address | outgoing-interface interface-type interface-number } * outlabel out-label bandwidth { bc0 | bc1 } bandwidth [ description description ] Parameters Parameter Description Value lsp-name Specifies the CR-LSP name. The name is a string of 1 to 19 case-sensitive characters, spaces not supported. incoming-interface interface-type interfacenumber Specifies the name of an incoming interface. - in-label in-label Specifies the value of an incoming label. An integer ranging from 16 to 1023 nexthop next-hop-address Specifies the next-hop address. - outgoing-interface interface-type interfacenumber Specifies the name of an outgoing interface. - out-label out-label Specifies the value of an outgoing label. An integer ranging from 16 to 1048575. bc0 Obtains the bandwidth from BC0. - bc1 Obtains the bandwidth from BC1. - Views System view Default Level 2: Configuration level Usage Guidelines Before setting up an MPLS TE tunnel through a static CR-LSP, configure a static route or an IGP to ensure connectivity between LSRs, and enable basic MPLS and MPLS TE functions. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 232 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 12 MPLS compatible command Example # Configure the static CR-LSP named tunnel34, with the incoming interface being VLANIF10, the incoming label being 123, the outgoing interface being VLANIF20, the outgoing label as 253, the required BC0 bandwidth being 20 kbit/s on the transit node. <HUAWEI> system-view [HUAWEI] static-cr-lsp transit tunnel34 incoming-interface vlanif 10 in-label 123 outgoing-interface vlanif 20 out-label 253 bandwidth bc0 20 12.6 bandwidth (LSP attribute view) Function The bandwidth command configures the bandwidth in the CR-LSP attribute template. The undo bandwidth command deletes the bandwidth in the CR-LSP attribute template. By default, no bandwidth in the CR-LSP attribute template is configured. Format bandwidth ct0 ct0-bandwidth ct1 ct1-bandwidth undo bandwidth ct0 ct1 Parameters Parameter Description Value ct0 ct0-bandwidth Specifies the bandwidth of an LSP of CT0. The value is an integer that ranges from 1 to 4000000000, in kbit/s. By default, the bandwidth is 0 kbit/s. ct1 ct1-bandwidth Specifies the bandwidth of an LSP of CT1. The value is an integer that ranges from 1 to 4000000000, in kbit/s. By default, the bandwidth is 0 kbit/s. ct2 ct2-bandwidth Specifies the bandwidth of an LSP of CT2. The value is an integer that ranges from 1 to 4000000000, in kbit/s. By default, the bandwidth is 0 kbit/s. ct3 ct3-bandwidth Specifies the bandwidth of an LSP of CT3. The value is an integer that ranges from 1 to 4000000000, in kbit/s. By default, the bandwidth is 0 kbit/s. ct4 ct4-bandwidth Specifies the bandwidth of an LSP of CT4. The value is an integer that ranges from 1 to 4000000000, in kbit/s. By default, the bandwidth is 0 kbit/s. ct5 ct5-bandwidth Specifies the bandwidth of an LSP of CT5. The value is an integer that ranges from 1 to 4000000000, in kbit/s. By default, the bandwidth is 0 kbit/s. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 233 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference Parameter Description 12 MPLS compatible command Value ct6 ct6-bandwidth Specifies the bandwidth of an LSP of CT6. The value is an integer that ranges from 1 to 4000000000, in kbit/s. By default, the bandwidth is 0 kbit/s. ct7 ct7-bandwidth Specifies the bandwidth of an LSP of CT7. The value is an integer that ranges from 1 to 4000000000, in kbit/s. By default, the bandwidth is 0 kbit/s. Views LSP attribute view Default Level 2: Configuration level Usage Guidelines A static TE tunnel does not support the multi-CT configuration. On a single TE tunnel interface, the multi-CT bandwidth cannot be configured with the following features: l CSPF tie-breaking l Bypass tunnel attributes The preceding constraints do not apply to the single CT configuration for a TE tunnel. NOTE If the bandwidth required for a CR-LSP is more than 67,105 kbit/s, it is recommended that additional one thousandth of the required bandwidth be reserved. Example # Configure the bandwidth of an LSP of CT0 as 20 kbit/s in the CR-LSP attribute template. <HUAWEI> system-view [HUAWEI] lsp-attribute lsp-attribute-name [HUAWEI-lsp-attribute-lsp-attribute-name] bandwidth ct0 20 12.7 mpls te bandwidth Function The mpls te bandwidth command sets the bandwidth of an MPLS TE tunnel. The undo mpls te bandwidth command restores the default settings. The bandwidth of an MPLS TE tunnel is not set by default. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 234 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 12 MPLS compatible command Format mpls te bandwidth ct0 ct0-bw-value ct1 ct1-bw-value undo mpls te bandwidth ct0 ct1 undo mpls te bandwidth ct0 ct0-bw-value ct1 ct1-bw-value Parameters Parameter Description Value ct0 ct0-bw-value Specifies the bandwidth reserved for ct0-bw-value is an integer that ranges a TE tunnel of CT0. from 1 to 4000000000, in kbit/s. ct1 ct1-bw-value Specifies the bandwidth reserved for ct1-bw-value is an integer that ranges a TE tunnel of CT1. from 1 to 4000000000, in kbit/s. Views Tunnel interface view Default Level 2: Configuration level Usage Guidelines A static TE tunnel does not support the multi-CT configuration. On a single TE tunnel interface, the multi-CT bandwidth cannot be configured with the following features: l CSPF tie-breaking l Bypass tunnel attributes NOTE The configured bandwidth takes effect only during tunnel establishment and protocol negotiation, and does not limits the bandwidth for traffic forwarding. Example # Set the bandwidth required by Tunnel1. The bandwidth of CT0 is 2 Mbit/s. <HUAWEI> system-view [HUAWEI] mpls lsr-id 1.1.1.1 [HUAWEI] mpls [HUAWEI-mpls] mpls te [HUAWEI-mpls] quit [HUAWEI] interface tunnel 1 [HUAWEI-Tunnel1] tunnel-protocol mpls te [HUAWEI-Tunnel1] destination 2.2.2.2 [HUAWEI-Tunnel1] mpls te tunnel-id 100 [HUAWEI-Tunnel1] mpls te bandwidth ct0 2000 [HUAWEI-Tunnel1] mpls te commit Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 235 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 13 13 VPN compatible command VPN compatible command About This Chapter 13.1 display bgp vpnv6 brief 13.2 display bgp vpnv6 vpn6-instance brief 13.3 display bgp vpnv6 vpn6-instance routing-table 13.4 display bgp vpnv6 vpn6-instance routing-table statistics 13.5 display ipv6 prefix-limit statistics 13.6 display ipv6 routing-table limit 13.7 display ipv6 routing-table vpn6-instance 13.8 display ipv6 vpn6-instance 13.9 link-alive 13.10 mpls l2vpn traffic-statistics capability enable Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 236 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 13 VPN compatible command 13.1 display bgp vpnv6 brief Function The display bgp vpnv6 brief command displays brief information about IPv6 VPN instances. Format display bgp vpnv6 vpn6-instance vpn-instance-name brief Parameters Parameter Description Value all Displays information about all VPNv6 instances. - vpn6-instance vpn-instance- Specifies the name of a VPNv6 The value is a string of 1 to name instance. 31 case-sensitive characters without spaces. Views All views Default Level 1: Monitoring level Usage Guidelines After the display bgp vpnv6 brief command is used to display information about VPNv6 instances, the VPNv6 instances are displayed and arranged alphabetically by name. Example # Display brief information about VPNv6 and all IPv6 VPN instances. <HUAWEI> display bgp vpnv6 vpn6-instance brief VPN-Instance(IPv6family): VPN-Instance Name Num vpna Issue 02 (2013-11-06) Peer Num 0 Route 0 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 237 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 13 VPN compatible command Table 13-1 Description of the display bgp vpnv6 all brief command output Item Description Peer Num Number of peers. Route Num Number of routes. VPN-Instance Name Name of a VPN instance. 13.2 display bgp vpnv6 vpn6-instance brief Function The display bgp vpnv6 vpn6-instance brief command displays brief information about IPv6 VPN instances. Format display bgp vpnv6 vpn6-instance vpn6-instance-namebrief Parameters Parameter Description Value vpn6-instance-name Specifies the name of a IPv6 VPNv6 The value is a string of 1 to 31 instance. case-sensitive characters without spaces. Views All views Default Level 1: Monitoring level Usage Guidelines After the display bgp vpnv6 vpn6-instance brief command is used to display information about VPNv6 instances, the VPNv6 instances are displayed and arranged alphabetically by name. Example # Display brief information about VPNv6 and all IPv6 VPN instances. <HUAWEI> display bgp vpnv6 vpn6-instance vrf0 brief VPN-Instance(IPv6-family): VPN-Instance Name Peer Num vrf0 1 Issue 02 (2013-11-06) Route Num 2 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 238 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 13 VPN compatible command Table 13-2 Description of the display bgp vpnv6 all brief command output Item Description Peer Num Number of peers. Route Num Number of routes. VPN-Instance Name Name of a VPN instance. 13.3 display bgp vpnv6 vpn6-instance routing-table Function The display bgp vpnv6 vpn6-instance routing-table command displays BGP VPNv6 routes. Format display bgp vpnv6 vpn6-instance vpn6-instance-name routing-table [ ipv6-address [ prefixlength ] ] display bgp vpnv6 vpn6-instance vpn6-instance-name routing-table as-path-filter { as-pathfilter-number | as-path-filter-name } display bgp vpnv6 vpn6-instance vpn6-instance-name routing-table community [ community-number | aa:nn ] &<1-29> [ internet | no-advertise | no-export | no-exportsubconfed ] * [ whole-match ] display bgp vpnv6 vpn6-instance vpn6-instance-name routing-table community-filter { { community-filter-name | basic-community-filter-number } [ whole-match ] | advancedcommunity-filter-number } display bgp vpnv6 vpn6-instance vpn6-instance-name routing-table different-origin-as display bgp vpnv6 vpn6-instance vpn6-instance-name routing-table regular-expression asregular-expression display bgp vpnv6 vpn6-instance vpn6-instance-name routing-table peer ipv6-address { advertised-routes [ ipv6–address [ prefix-length [ longer-prefixes ] ] ] | received-routes [ active ] } Parameters Parameter Description Value vpn6-instance Displays the BGP routes of a specified an IPv6 address family-enabled VPN instance on the local end. The value is a string of 1 to 31 case-sensitive characters without spaces. route-distinguisher routedistinguisher Displays the BGP routes with the specified RD. - Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 239 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 13 VPN compatible command Parameter Description ipv6-address Specifies the IPv6 address of a peer to be displayed. prefix-length Specifies the prefix length of an IPv6 address. - as-path-filter as-path-filternumber Specifies the number of an AS_Path filter. The value of as-path-filternumber is an integer that ranges from 1 to 256. as-path-filter-name Specifies the name of the matching AS-Path filter. The value is case-sensitive. community Displays the routes carrying the specified BGP community attribute in the routing table. community-number Specifies the community number. - aa:nn Specifies the community number. A maximum of 29 community numbers can be set. - internet Displays the BGP routes carrying the Internet community attribute. - no-advertise Displays the BGP routes carrying the No-Advertise community attribute. - no-export Displays the BGP routes carrying the No-Export community attribute. - no-export-subconfed Displays the BGP routes carrying the No-ExportSubconfed community attribute. - whole-match Indicates exact matching. - community-filter Displays the routes that match a specified BGP community filter. community-filter-name Specifies the name of a community filter. basic-community-filternumber Specifies the number of a basic community filter. advanced-community-filternumber Specifies the number of an advanced community filter. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. Value - - 240 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 13 VPN compatible command Parameter Description Value different-origin-as Displays the routes that have the same destination address but different source AS numbers. - regular-expression asregular-expression Specifies the regular expression used to match the AS_Path information. The value is a string of 1 to 80 characters. peer ipv6-address Displays the BGP routes of a specified peer. - advertised-routes Displays the routes advertised to a specified peer. longer-prefixes Matches any route whose prefix mask is longer than the specified length. received-routes Displays the routes received from a specified peer. active Displays the active routes received from a specified peer. - Views All views Default Level 1: Monitoring level Usage Guidelines Information about specified routes can be displayed by specifying different parameters. Example # Display the routes of an IPv6 address family-enabled VPN instance named vpn1 on the local device. <HUAWEI> display bgp vpnv6 vpn6-instance vpn1 routing-table BGP Local router ID is 1.1.1.9 Status codes: * - valid, > - best, d - damped, h - history, i - internal, s - suppressed, S - Stale Origin : i - IGP, e - EGP, ? - incomplete Total Number *>i Network NextHop MED Label Path/Ogn Issue 02 (2013-11-06) of Routes: 2 : 2001:: : 2001::1 : 0 : : 65410 ? Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. PrefixLen : 64 LocPrf : PrefVal : 0 241 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference *>i Network NextHop MED Label Path/Ogn : : : : : 2002:: ::FFFF:3.3.3.9 0 1037/NULL ? 13 VPN compatible command PrefixLen : 64 LocPrf : 100 PrefVal : 0 # Display the BGP routes with a specified destination address of an IPv6 address family-enabled VPN instance. <HUAWEI> display bgp vpnv6 vpn6-instance vrf1 routing-table 2001:: BGP local router ID : 1.1.1.1 Local AS number : 100 Paths: 2 available, 1 best, 1 select BGP routing table entry information of 2001::/64: Imported route. From: :: (0.0.0.0) Route Duration: 1d03h46m24s Direct Out-interface: Vlanif100 Original nexthop: :: AS-path Nil, origin incomplete, MED 0, pref-val 0, valid, local, best, select, pre 0 Advertised to such 1 peers: 2001::1 BGP routing table entry information of 2001::/64: From: 2001::1 (10.10.10.10) Route Duration: 02h39m43s Direct Out-interface: Vlanif100 Original nexthop: 2001::1 AS-path 65410, origin incomplete, MED 0, pref-val 0, external, pre 255 Not advertised to any peer yet # Display all BGP VPNv6 routes whose AS_Path attribute contains 65420. <HUAWEI> display bgp vpnv6 all routing-table as-path-filter 1 BGP Local router ID is 1.1.1.9 Status codes: * - valid, > - best, d - damped, h - history, i - internal, s - suppressed, S - Stale Origin : i - IGP, e - EGP, ? - incomplete Total number of routes from all PE: 1 Route Distinguisher: 100:1 *> Network NextHop MED Label Path/Ogn : : : : : 2001:: 2001::1 0 NULL 65420 ? PrefixLen : 64 LocPrf : PrefVal : 0 VPN-Instance vpn1 : Total Number Network NextHop MED Label Path/Ogn of Routes: 1 : 2001:: : 2001::1 : 0 : : 65420 ? PrefixLen : 64 LocPrf : PrefVal : 0 # Display BGP4+ routes of the VPN instance named vpn1 whose AS path attribute contains 65420. <HUAWEI> display bgp vpnv6 vpn6-instance vpn1 routing-table as-path-filter 1 Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 242 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 13 VPN compatible command BGP Local router ID is 1.1.1.9 Status codes: * - valid, > - best, d - damped, h - history, i - internal, s - suppressed, S - Stale Origin : i - IGP, e - EGP, ? - incomplete VPN-Instance vpn1 : Total Number Network NextHop MED Label Path/Ogn of Routes: 1 : 2001:: : 2001::1 : 0 : : 65420 ? PrefixLen : 64 LocPrf : PrefVal : 0 # Display BGP4+ routes of the VPN instance named vpn1 and matching the BGP community filter 1. <HUAWEI> display bgp vpnv6 vpn6-instance vpn1 routing-table community-filter 1 whole-match BGP Local router ID is 1.1.1.9 Status codes: * - valid, > - best, d - damped, h - history, i - internal, s - suppressed, S - Stale Origin : i - IGP, e - EGP, ? - incomplete VPN-Instance vpn1 : Total Number Network NextHop MED Label *>i Network NextHop MED Label of Routes: 2 : 2001:: : 2001::1 : 0 : : 2002:: : ::FFFF:3.3.3.9 : 0 : 1037/NULL PrefixLen : 64 LocPrf : PrefVal : 0 PrefixLen : 64 LocPrf : 100 PrefVal : 0 # Display all BGP4+ routes of the VPN instance named vpn1 and matching the AS regular expression. <HUAWEI> display bgp vpnv6 vpn6-instance vpn1 routing-table regular-expression ^65420 BGP Local router ID is 1.1.1.9 Status codes: * - valid, > - best, d - damped, h - history, i - internal, s - suppressed, S - Stale Origin : i - IGP, e - EGP, ? - incomplete VPN-Instance Network NextHop MED Label Path/Ogn vpn1 : : 2001:: : 2001::1 : 0 : : 65420 ? PrefixLen : 64 LocPrf : PrefVal : 0 # Display all BGP4+ routes of the VPN instance named vpn1 that are received from the peer at 2001::1. <HUAWEI> display bgp vpnv6 vpn6-instance vpn1 routing-table peer 2001::1 receivedroutes BGP Local router ID is 1.1.1.9 Status codes: * - valid, > - best, d - damped, Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 243 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 13 VPN compatible command h - history, i - internal, s - suppressed, S - Stale Origin : i - IGP, e - EGP, ? - incomplete Total Number Network NextHop MED Label Path/Ogn of Routes: 1 : 2001:: : 2001::1 : 0 : : 65410 ? PrefixLen : 64 LocPrf : PrefVal : 0 # Display BGP4+ routes sent to the peer at 2001::1. <HUAWEI> display bgp vpnv6 vpn6-instance vpn1 routing-table peer 2001::1 advertisedroutes BGP Local router ID is 1.1.1.9 Status codes: * - valid, > - best, d - damped, h - history, i - internal, s - suppressed, S - Stale Origin : i - IGP, e - EGP, ? - incomplete Total Number *>i Network NextHop MED Label Path/Ogn of Routes: 1 : 2002:: : ::FFFF:3.3.3.9 : 0 : 1037/NULL : ? PrefixLen : 64 LocPrf : 100 PrefVal : 0 Table 13-3 Description of the display bgp vpnv6 vpn6-instance routing-table command output Issue 02 (2013-11-06) Item Description BGP Local router ID ID of the local BGP router. The ID is in the same format as an IPv4 address. Total number of routes from all PE Total number of BGP VPNv6 routes received by the switch from its peer PEs. Network Destination network or host address of the route. PrefixLen Prefix length of the destination network or host address of the route. NextHop IPv6 address of the next hop. LocPrf Local preference of the BGP route. The default value is 100. MED MED of the route. The default value is 0. PrefVal Preferred value of the route. Label Label carried by the data packet destined for the destination network or host address of the route. Duration Route duration. Peer IP addresses of the peer. Path/Ogn AS_Path number and Origin attribute of the route. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 244 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 13 VPN compatible command Item Description Local AS Number Local AS number. BGP routing table entry information of Information about a specified BGP routing entry. From IPv6 address of the route originator. Route Duration Route duration. Original nexthop Original next hop. AS-path AS_Path attribute. Nil indicates that the attribute value is null. origin Origin attribute of the BGP route. The value can be IGP (for example, the routes imported into the BGP routing table by using the network (BGP) command), EGP (the routes obtained by EGP), or Incomplete (the routes whose origin cannot be identified, for example, the routes imported into the BGP routing table by using the import-route command). MED MED of a route. The MED is used to identify the optimal route for the traffic entering an AS. The route with the smallest MED is selected as the optimal route if the other attributes of the routes are the same. pref-val Preferred value. valid The BGP route is a valid route. external The BGP route is a external route. best The BGP route is the optimal route. select The BGP route is a preferred route. Pre 255 The preference of the BGP route is 255. Not advertised to any peer yet The BGP route has not been advertised to any peer. 13.4 display bgp vpnv6 vpn6-instance routing-table statistics Function The display bgp vpnv6 vpn6-instance routing-table statistics command displays statistics about BGP VPNv6 routes. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 245 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 13 VPN compatible command Format display bgp vpnv6 vpn6-instance vpn6-instance-name routing-table statistics [ as-pathfilter { as-path-filter-number | as-path-filter-name } | different-origin-as ] display bgp vpnv6 vpn6-instance vpn6-instance-name routing-table statistics regularexpression as-regular-expression display bgp vpnv6 vpn6-instance vpn6-instance-name routing-table statistics community [ community-number | aa:nn ] &<1-29> [ internet | no-advertise | no-export | no-exportsubconfed ] * [ whole-match ] display bgp vpnv6 vpn6-instance vpn6-instance-name routing-table statistics communityfilter { { community-filter-name | basic-community-filter-number } [ whole-match ] | advancedcommunity-filter-number } display bgp vpnv6 vpn6-instance vpn6-instance-name routing-table peer ipv6-address { advertised-routes | received-routes [ active ] } statistics Parameters Parameter Description Value all Displays statistics about all BGP VPNv6 routes. - vpn6-instance-name Displays statistics about the It is a string of 1 to 31 caseBGP routes of a specified VPN sensitive characters without instance. any spaces. as-path-filter Displays the routes that match the specified filter. as-path-filter-number Specifies the number of the matching AS-Path filter. It is an integer that ranges from 1 to 256. as-path-filter-name Specifies the name of the matching AS-Path filter. The name is a string of 1 to 51 characters without any space. It is case-sensitive. community Displays statistics about the routes carrying the specified BGP community attribute in the routing table. - community-number Specifies the community number. It is an integer ranging from 0 to 4294967295. aa:nn Specifies the community number. Both aa and nn are integers ranging from 0 to 65535. internet Displays statistics about the BGP routes carrying the Internet community attribute. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 246 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 13 VPN compatible command Parameter Description Value no-advertise Displays statistics about the BGP routes carrying the NoAdvertise community attribute. - no-export Displays statistics about the BGP routes carrying the NoExport community attribute. - no-export-subconfed Displays statistics about the BGP routes carrying the NoExport-Subconfed community attribute. whole-match Indicates exact matching. - community-filter Displays statistics about the routes that match a specified BGP community filter. - community-filter-name Specifies the name of a community filter. The name is a string of 1 to 51 characters without any space. It is case-sensitive. basic-community-filternumber Specifies the number of a basic It is an integer ranging from 1 community filter. to 99. advanced-community-filternumber Specifies the number of an advanced community filter. different-origin-as Displays statistics about the routes that have the same destination address but different source AS numbers. regular-expression asregular-expression Specifies the regular expression used to match the AS_Path information. active Specifies the number of active routes. peer ipv6-address Displays statistics about the BGP routes of a specified peer. advertised-routes Displays statistics about the routes advertised to a specified peer. received-routes Displays statistics about the routes received from a specified peer. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. It is an integer ranging from 100 to 199. The value is a string of 1 to 80 characters. - 247 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 13 VPN compatible command Views All views Default Level 1: Monitoring level Usage Guidelines None Example # Display statistics about the routes of an IPv6 address family-enabled VPN instance named vpn1 on the local device. <HUAWEI> display bgp vpnv6 vpn6-instance vpn1 routing-table statistics Total Number of Routes: 5 # Display statistics of BGP routes sent by the local device to peer 2000::1 of the IPv6 VPN instance named vpn1. <HUAWEI> display bgp vpnv6 vpn6-instance vpn1 routing-table peer 2000::1 receivedroutes statistics Received routes total: 2 # Display statistics about the IPv6 routes sent by the local device to peer 2000::1 in a VPN instance named vpn1. <HUAWEI> display bgp vpnv6 vpn6-instance vpn1 routing-table peer 2000::1 advertisedroutes statistics Advertised routes total: 2 Default originated : 0 13.5 display ipv6 prefix-limit statistics Function The display ipv6 prefix-limit statistics command displays the statistics of the prefix limits of IPv6 VPN instances. Format display ipv6 prefix-limit { all-vpn6-instance | vpn6-instance vpn-instance-name } statistics Parameters Parameter Description Value all-vpn6-instance Indicates all IPv6 VPN instances. - Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 248 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 13 VPN compatible command Parameter Description Value vpn6-instance vpn-instance-name Specifies the name of an IPv6 VPN instance. - Views All views Default Level 1: Monitoring level Usage Guidelines You can run the display ipv6 prefix-limit statistics command to view the number of times that a protocol re-adds or deletes routes according to the prefix limit of a specified IPv6 VPN instance. Example # Display the statistics of the prefix limits of all IPv6 VPN instances. <HUAWEI> display ipv6 prefix-limit all-vpn6-instance statistics ------------------------------------------------------------------------------IPv6 VPN instance name: vrf1 DenyAdd TryAddInDelState NotifyDelAll NotifyDelFinish NotifyAddRoute DIRECT 0 0 0 0 0 STATIC 0 0 0 0 0 OSPFv3 11 3 1 0 5 IS-IS 106 0 1 0 5 RIPng 98 0 1 1 5 BGP 2 0 1 1 5 -----------------------------------------------------------------------------IPv6 VPN instance name: VPN123 DIRECT STATIC OSPFv3 IS-IS RIPng BGP DenyAdd TryAddInDelState NotifyDelAll NotifyDelFinish NotifyAddRoute 0 0 0 0 0 0 0 0 0 0 11 3 1 0 5 106 0 1 0 5 98 0 1 1 5 2 0 1 1 5 Table 13-4 Description of the display ipv6 prefix-limit statistics command output Issue 02 (2013-11-06) Item Description DenyAdd Number of routes that the protocol fails to add to the RIB because of the prefix limit. TryAddInDelState Number of routes that the protocol fails to add to the RIB because the RIB is in the process of deleting routes. NotifyDelAll Number of times that the RIB notifies the protocol of deleting routes when the prefix limit is decreased. NotifyDelFinish Number of times that the protocol notifies the RIB of completion of deleting routes. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 249 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 13 VPN compatible command Item Description NotifyAddRoute Number of times that the RIB notifies the protocol of readding routes. # Display the statistics of the prefix limit of the IPv6 VPN instance named vrf1. <HUAWEI> display ipv6 prefix-limit vpn6-instance vrf1 statistics ------------------------------------------------------------------------------IPv6 VPN instance name: vrf1 DenyAdd TryAddInDelState NotifyDelAll NotifyDelFinish NotifyAddRoute DIRECT 0 0 0 0 0 STATIC 0 0 0 0 0 OSPFv3 11 3 1 0 5 IS-IS 106 0 1 0 5 RIPng 98 0 1 1 5 BGP 2 0 1 1 5 13.6 display ipv6 routing-table limit Function The display ipv6 routing-table limit command displays limits on the numbers of routes and prefixes of the IPv6 VPN instance. Format display ipv6 routing-table limit { all-vpn6-instance | vpn6-instance vpn-instance-name } Parameters Parameter Description Value all-vpn-instance Indicates all IPv6 VPN instances. - vpn-instance vpn-instance-name Specifies the name of an IPv6 VPN instance. - Views All views Default Level 1: Monitoring level Usage Guidelines None. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 250 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 13 VPN compatible command Example # Display limits on the numbers of routes and prefixes of all IPv6 VPN instances. <HUAWEI> display ipv6 routing-table limit all-vpn-instance Limit-Object Limit-Type Upper-Limit Warning Current Log-Interval ---------------------------------------------------------------------------------IPv6 VPN Instance Name: VPN1 Route Simply-Alert 5000 4223 5 Prefix Alert-Percent 1000 800 760 5 ---------------------------------------------------------------------------------IPv6 VPN Instance Name: VPN1234567890123456789123456789 Route Alert-Percent 2000 1000 823 5 Prefix Default 760 5 Table 13-5 Description of the display ipv6 routing-table limit command output Item Description Limit-Object Indicates the object whose total number is limited: l Prefix l Route Limit-Type Indicates the limit mode for the routes and prefixes in the current routing table: l Simply-Alert: indicates that only alarms are generated after the number of routes or prefixes exceeds the upper limit. l Alert-Percent: indicates the percentage of the alarm threshold of routes. l Default: indicates that the number of routes or prefixes is not limited by default. Upper-Limit Indicates the upper limit of routes or prefixes in the current routing table. Warning Indicates the alarm threshold of routes or prefixes in the current routing table. Current Indicates the number of routes or prefixes in the current routing table. Log-Interval Indicates the frequency of displaying logs when the number of routes or prefixes in the current routing table exceeds the upper limit, in seconds. # Display limits on the numbers of routes and prefixes of the IPv6 VPN instance named vpn1. <HUAWEI> display ipv6 routing-table limit vpn-instance vpn1 IPv6 VPN Instance Name: vpn1 Limit-Object Limit-Type Upper-Limit Warning Current Route Simply-Alert 5000 4223 Prefix Alert-Percent 1000 800 760 Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. Log-Interval 5 5 251 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 13 VPN compatible command 13.7 display ipv6 routing-table vpn6-instance Function The display ipv6 routing-table vpn6-instance command displays the routing table of the VPN instance. Format display ipv6 routing-table vpn6-instance vpn6-instance-name [ verbose ] display ipv6 routing-table vpn6-instance vpn6-instance-name acl { acl6-number | acl6name } [ verbose ] display ipv6 routing-table vpn6-instance vpn6-instance-name ipv6-address [ prefix-length ] [ longer-match ] [ verbose ] display ipv6 routing-table vpn6-instance vpn6-instance-name ipv6-address1 [ prefixlength1 ] ipv6-address2 prefix-length2 [ verbose ] display ipv6 routing-table vpn6-instance vpn6-instance-name ipv6-prefix ipv6-prefix-name [ verbose ] display ipv6 routing-table vpn6-instance vpn6-instance-name statistics display ipv6 routing-table vpn6-instance vpn6-instance-name protocol protocol [ inactive | verbose ] Parameters Parameter Description Value vpn6-instance-name Specifies the name of an VPN instance. The value is a string of 1 to 31 case-sensitive characters without spaces. verbose Displays detailed information about active and inactive routes in the routing table of the current VPN instance. acl Uses ACL6 to filter the command output. If the specified ACL6 does not exist, information about all active routes is displayed. acl6-number Specifies the number of a basic The value is an integer that ACL6. ranges from 2000 to 2999. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 252 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 13 VPN compatible command Parameter Description Value acl6-name Specifies the name of a Named The value is a string of 1 to ACL6. 32 case-sensitive characters without spaces, begin with a~z or A~Z. longer-match Displays only the VPN routes that match the specified network and mask. - ipv6-address Specifies the destination IPv6 address. - prefix-length Specifies the length of the IPv6 The value is an integer that address prefix. ranges from 0 to 128. ipv6-address1 / ipv6address2 Specifies the IPv6 address. ipv6-address1 and ipv6address2 together determine an address range. Only the VPN routes in the address range are displayed. prefix-length1/prefix-length2 Specifies the length of the IPv6 The value is an integer that address prefix. ranges from 0 to 128. ipv6-prefix ipv6-prefix-name Specifies the name of the IPv6 A string of 1 to 19 characters. prefix list. statistics Displays integrated route statistics in the routing table of the VPN instance. protocol Displays the routes of a specified protocol. protocol Displays the routes of a specified protocol. It can be one of the following keywords: - l direct: displays direct IPv6 routes. l static: displays IPv6 static routes. l bgp: displays BGP4+ routes. l isis: displays IS-IS IPv6 routes. l ospfv3: displays OSPFv3 routes. l ripng: displays RIPng routes. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 253 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 13 VPN compatible command Parameter Description Value inactive Displays the summary of inactive routes only. - Views All views Default Level 1: Monitoring level Usage Guidelines Usage Scenario The command output includes the destination address, prefix length, protocol type, preference, cost, next hop, and outbound interface. NOTE An iterated route is counted as one route no matter how many outbound interfaces and next hops the route finds. This command without the parameter verbose displays the currently preferred routes only. When using the display ipv6 routing-table vpn6-instance vpn6-instance-name ipv6-address prefix-length [ longer-match ] [ verbose ] command, you can select parameters in the command as required. l If ipv6-address prefix-length is specified, the VPN routes that accurately match the destination address are displayed. l If ipv6-address prefix-length longer-match is specified, the IPv6 routes with the destination address within the specified address range are displayed. If the prefix length is 0, all routes in the routing table of the VPN instance are displayed. For example, there are four routes in the routing table of the VPN instance named vpna, 2000::20/128, 2000::/100, 2000::/64, and 1000::/64. l If the display ipv6 routing-table vpn6-instance vpna 2000:: 64 command is used, only 2000::/64 is displayed. l If the display ipv6 routing-table vpn6-instance vpna 2000:: command is used, only 2000::/100 is displayed. l If the display ipv6 routing-table vpn6-instance vpna 2000:: 127 longer-match command is used, only 2000::/100 and 2000::/64 are displayed. l If the display ipv6 routing-table vpn6-instance vpna 2000:: 0 longer-match command is used, four routes are displayed. Precautions If the specified ip-prefix ip-prefix-name does not exist, the command displays all of the currently preferred routes. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 254 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 13 VPN compatible command Example # Display the summary of the routing table of the VPN instance named vpn1. <HUAWEI> display ipv6 routing-table vpn6-instance vpn1 Routing Table : vpn1 Destinations : 1 Routes : 1 Destination NextHop Cost RelayNextHop Interface : : : : : 7777:5:344:: 3335::2 0 :: Vlanif10 PrefixLength Preference Protocol TunnelID Flags : : : : : 48 255 BGP 0x0 D Table 13-6 Description of the display ipv6 routing-table vpn6-instance command output Item Description Routing Table : vpn1 VPN routing table named vpn1. Destinations Total number of destination networks or hosts. Destination Address of the destination network or host. Routes Total number of routes. PrefixLength Length of the prefix. NextHop IPv6 address of the adjacent next hop through which the packet reaches the destination. Preference Preference of the route. Cost Route cost. Protocol Routing protocol name. RelayNextHop Iterated next hop. TunnelID Tunnel ID. The value 0x0 indicates that no tunnel is used or the tunnel is not set up. Interface Outbound interface through which the next hop is reachable. Flags Route flags. # Display detailed information about the route 200:0:1:2::1 of the VPN instance after the instance is enabled with VPN FRR. <HUAWEI> display ipv6 routing-table vpn6-instance vrf1 200:0:1:2::1 verbose Routing Table : vrf1 Summary Count : 1 Destination NextHop Neighbour Issue 02 (2013-11-06) : 200:0:1:2::1 : ::FFFF:192.168.100.6 : ::192.168.100.6 PrefixLength : 128 Preference : 255 ProcessID : 0 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 255 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference Label : State : Entry ID : Reference Cnt: Priority : IndirectID : RelayNextHop : Interface : BkNextHop : BkPETunnelID : 13313 Active Adv Relied 14 1 low 0x0 :: NULL0 ::FFFF:192.168.100.7 0x100c 13 VPN compatible command Protocol Cost EntryFlags Tag Age : : : : : BGP 0 0x80024904 0 393sec TunnelID Flags BkLabel : 0x100a : RD : 13313 Table 13-7 Description of the display ipv6 routing-table vpn6-instance verbose command output Item Description Summary Count Total number of route prefixes. Neighbour IP address of the neighbor interface. ProcessID Process ID of the routing protocol. Label Label value carried by the route. State Route status: l Active: indicates active routes. l Invalid: indicates invalid routes. l Inactive: indicates inactive routes. l NoAdv: indicates the routes that cannot be advertised. l Adv: indicates the routes that can be advertised. l Del: indicates the routes to be deleted. l Relied: indicates the route that finds the next hop and outbound interface or the route that finds the tunnel during packet forwarding. l Stale.: indicates the routes with the stale flag. The routes are used in GR. Issue 02 (2013-11-06) Entry ID Keyword of the retrieval index of routes in the routing table. EntryFlags Information about route flags. Refernce Cnt Number of times that the route is referenced. Tag Tag for importing routes. The value is an integer ranging from 0 to 4294967295. Priority Priority of the route. Age Time since the route is generated. IndirectID Indirect ID of the next hop. BkNextHop Backup next hop. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 256 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 13 VPN compatible command Item Description BkLabel Backup label. BkPETunnelID Backup Tunnel ID. # Display the statistics of the routing table of the VPN instance named vpn1. <HUAWEI> display ipv6 routing-table vpn6-instance vpn1 statistics Summary prefixes: 6 Protocol route active added deleted freed DIRECT 4 4 4 0 0 STATIC 2 1 2 0 0 RIPng 0 0 0 0 0 OSPFv3 0 0 0 0 0 IS-IS 0 0 0 0 0 BGP 0 0 0 0 0 UNR 0 0 0 0 0 Total 6 5 6 0 0 Table 13-8 Description of the display ipv6 routing-table statistics command output Item Description Summary prefixes Total number of prefixes in the current routing table. route Indicates the total number of active and inactive routes in the current routing table. active Number of active routes. added Number of active and inactive routes added in the routing table. deleted Number of routes deleted from the routing table. freed Number of released routes that are permanently deleted from the routing table. # Display all the direct routes of the VPN instance named vpn1. <HUAWEI> display ipv6 routing-table vpn6-instance vpn1 protocol direct vpn1 Routing Table : Direct Summary Count : 3 Direct Routing Table's Status : < Active > Summary Count : 3 Issue 02 (2013-11-06) Destination NextHop Cost RelayNextHop Interface : : : : : 3335:: 3335::1 0 :: Vlanif10 Destination NextHop : 3335::1 : ::1 Flags PrefixLength Preference Protocol TunnelID : D : : : : 64 0 Direct 0x0 PrefixLength : 128 Preference : 0 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 257 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference Cost : 0 RelayNextHop : :: Interface : Vlanif10 13 VPN compatible command Flags Destination : FE80:: NextHop : :: Cost : 0 RelayNextHop : :: Interface : NULL0 Direct Routing Table's Status : < Inactive > Summary Count : 0 Protocol TunnelID : D : Direct : 0x0 PrefixLength Preference Protocol TunnelID Flags : : : : : 10 0 Direct 0x0 D Table 13-9 Description of the display ipv6 routing-table vpn6-instance protocol command output Item Description Active Active routes. Inactive Inactive routes. 13.8 display ipv6 vpn6-instance Function The display ipv6 vpn6-instance command displays information about an IPv6 VPN instance. Format display ipv6 vpn6-instance [ brief | verbose ] [ vpn6-instance-name ] Parameters Parameter Description Value brief Displays summary information about an IPv6 VPN instance. - verbose Displays detailed information about the IPv6 VPN instances and their associated interfaces. vpn6-instance-name Specifies the name of an IPv6 VPN The name is a string of 1 to 31 instance. case-sensitive characters. Views All views Default Level 1: Monitoring level Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 258 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 13 VPN compatible command Usage Guidelines If a VPN instance is configured, you can check the configuration of the instance by using the display ipv6 vpn6-instance command. You can also use this command to view the VPN instances configured on the local device. When no parameters are specified, the command displays brief information about all the configured VPN instances. Example # View brief information about all the configured IPv6 VPN instances. <HUAWEI> display ipv6 vpn6-instance Total VPN-Instances configured : 3 Total IPv4 VPN-Instances configured : 2 Total IPv6 VPN-Instances configured : 1 VPN-Instance Name family RD Address- vpn1 vpna IPv4 vpna IPv6 vpnb 100:1 100:3 100:2 IPv4 Table 13-10 Description of the display ip vpn-instance command output Issue 02 (2013-11-06) Item Description Total VPN-Instances configured Total number of VPN instances configured on the local end. Total IPv4 VPN-Instances configured Total number of locally configured VPN instances for which IPv4 address families are enabled. Total IPv6 VPN-Instances configured Total number of locally configured VPN instances for which IPv6 address families are enabled. VPN-Instance Name Name of the VPN instance. RD RD of the VPN instance IPv4 address family or IPv6 address family. Creation Time Time when an IPv4 or IPv6 address family is enabled for the VPN instance. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 259 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 13 VPN compatible command Item Description Address-family Address family enabled for the VPN instance. The address family can be: l Null, if no address family is enabled. l ipv4, if only the IPv4 address family is enabled. l ipv6, if only the IPv6 address family is enabled. <HUAWEI> display ipv6 vpn6-instance brief Total VPN-Instances configured : 3 Total IPv4 VPN-Instances configured : 2 Total IPv6 VPN-Instances configured : 1 VPN-Instance Name family RD Address- vpn1 vpna IPv4 vpna IPv6 vpnb 100:1 100:3 100:2 IPv4 # View detailed information about all IPv6 VPN instances. <HUAWEI> display ipv6 vpn6-instance verbose Total VPN-Instances configured : 1 Total IPv4 VPN-Instances configured : 1 Total IPv6 VPN-Instances configured : 1 VPN-Instance Name and ID : vpna, 6 Description : vpna-1 Service ID : 12 Interfaces : Vlanif10 Address family ipv4 Create date : 2012/12/3 15:36:20 UTC+08:00 Up time : 6 days, 04 hours, 41 minutes and 57 seconds Route Distinguisher : 100:1 Export VPN Targets : 1:1 Import VPN Targets : 1:1 Label Policy : label per instance Per-Instance Label : 1024 IP FRR Route Policy : 20 VPN FRR Route Policy : 12 Import Route Policy : 10 Export Route Policy : 20 Tunnel Policy : bindTE Maximum Routes Limit : 2000 Threshold Routes Limit : 80% Maximum Prefixes Limit : 1024 Threshold Prefixes Limit : 50% Install Mode : route-unchanged Log Interval : 10 Address family ipv6 Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 260 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 13 VPN compatible command Create date : 2012/12/3 15:36:20 UTC+08:00 Up time : 6 days, 04 hours, 41 minutes and 57 seconds Log Interval : 5 Table 13-11 Description of the display ip vpn-instance verbose command output Issue 02 (2013-11-06) Item Description Total VPN-Instances configured Total number of VPN instances configured on the local end. Total IPv4 VPN-Instances configured Total number of locally configured VPN instances for which IPv4 address families are enabled. Total IPv6 VPN-Instances configured Total number of locally configured VPN instances for which IPv6 address families are enabled. VPN-Instance Name and ID Name and ID of the VPN instance. The ID is assigned by the system, which facilitates indexing. Description Description of the VPN instance. This field is displayed in the command output only when the description (VPN instance view) command is used. Service ID Service ID of the VPN instance. This item is displayed only after the service-id (VPN instance view) command is run in the VPN instance view. Interfaces Interfaces bound to the VPN instance. This field is displayed only after the ip binding vpn-instance command is configured on these interfaces. Address family ipv4 Information about the IPv4 address family enabled for the VPN instance. Address family ipv6 Information about the IPv6 address family enabled for the VPN instance. Create date Time when the VPN instance is created. Up time Period during which the VPN instance maintains in the Up state. Route Distinguisher RD of the VPN instance IPv4 address family or IPv6 address family Export VPN Targets Route Target list in the outbound direction. To set the VPN target, run the vpn-target command. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 261 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 13 VPN compatible command Item Description Import VPN Targets Route Target list in the inbound direction. To set the VPN target, run the vpn-target command. Label Policy Label policy: l label per instance: indicates that the same label is allocated to routes of a VPN instance. This field is displayed in the command output only when the applylabel per-instance command is run in the VPN instance view. l label per route: indicates that each route of a VPN instance is assigned a label. Label allocation for routes of a VPN instance is implemented in this mode. Issue 02 (2013-11-06) Per-Instance Label Label value used when all VPN routes of the VPN instance address family share one label. This field is displayed only after the apply-label per-instance command is run in the VPN instance address family view. IP FRR Route Policy IP FRR route policy used for the address family. This item is displayed only after the ip frr command is run in the VPN instance IPv4 address family view. VPN FRR Route Policy VPN FRR route policy used for the address family. This item is displayed only after the vpn frr command is run in the VPN instance IPv4 address family view. Import Route Policy Import Route-Policy applied to the VPN instance. This field is displayed only after the import route-policy command is run in the VPN instance address family view. Export Route Policy Export Route-Policy applied to the VPN instance. This field is displayed only after the export route-policy command is run in the VPN instance address family view. Tunnel Policy Tunnel policy applied to the VPN instance. This field is displayed only after the tnlpolicy command is run in the VPN instance address family view. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 262 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 13 VPN compatible command Item Description Maximum Routes Limit Maximum number of routes supported by the current address family. This field is displayed only after the routing-table limit command is run in the VPN instance address family view. Threshold Routes Limit Percentage of the maximum number of routes specified for the current address family. When the maximum number of routes reaches the percentage threshold, an alarm is generated.This field is displayed only after the routing-table limit command is run in the VPN instance address family view. Maximum Prefixes Limit Maximum number of prefixes supported by the current address family of the VPN instanceThis field is displayed only after the prefix limit command is run in the VPN instance address family view. Threshold Prefixes Limit Percentage of the maximum number of prefixes specified for the current address family of the VPN instance. When the maximum number of prefixes reaches the percentage threshold, an alarm is generated.This field is displayed only after the prefix limit command is run in the VPN instance address family view. Install Mode Method of processing routes. The prefix limit command can be used to specify the route processing method when the threshold is lowered due to the number of route prefixes exceeding the upper threshold. l If route-unchanged is configured, routes in the routing information base (RIB) table remain unchanged. l If route-unchanged is not configured, all routes in the RIB table are deleted and the routes are re-installed in the RIB table. Log Interval Issue 02 (2013-11-06) Interval for displaying log messages when the number of VPN instance routes exceeds the maximum value. The default interval is 5 seconds. The value can be set by the command limit-log-interval. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 263 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 13 VPN compatible command 13.9 link-alive Function The link-alive command enables the link-alive function on a GRE tunnel. The undo link-alive command disables the link-alive function on a GRE tunnel. By default, the link-alive function is disabled on a GRE tunnel. Format link-alive [ period period ] [ retry-times retry-times ] undo link-alive Parameters Parameter Description Value period Specifies the interval for sending link-alive packets. The value is an integer that ranges from 1 to 32767, in seconds. The default value is 5. retry-times retry-times Specifies the tunnel-unreachable counter value. The value is an integer that ranges from 1 to 255. The default value is 3. Views Tunnel interface view Default Level 2: Configuration level Usage Guidelines The link-alive function takes effect on a GRE tunnel immediately after you run the link-alive command on the tunnel interface. After you run the undo link-alive command, the link-alive function immediately becomes invalid. The source end of a GRE tunnel periodically sends linkalive packets. The tunnel-unreachable counter increases by 1 every time a link-alive packet is sent. If the source end does not receive any response packet when the tunnel-unreachable counter value reaches retry-times, the source end considers the remote end unreachable. Example # Enable the link-alive function on a GRE tunnel and retain the default parameter values. <HUAWEI> system-view [HUAWEI] interface tunnel 1 Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 264 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 13 VPN compatible command [HUAWEI-Tunnel1] tunnel-protocol gre [HUAWEI-Tunnel1] link-alive # Disable the link-alive function on a GRE tunnel. <HUAWEI> system-view [HUAWEI] interface tunnel 1 [HUAWEI-Tunnel1] undo link-alive # Enable the link-alive function on a GRE tunnel. Set the interval for sending link-alive packets to 12 seconds and retain the default tunnel-unreachable counter value. <HUAWEI> system-view [HUAWEI] interface tunnel 1 [HUAWEI-Tunnel1] link-alive period 12 # Enable the link-alive function on a GRE tunnel. Set the interval for sending link-alive packets to 12 seconds and the tunnel-unreachable counter to 4. <HUAWEI> system-view [HUAWEI] interface tunnel 1 [HUAWEI-Tunnel1] link-alive period 12 retry-times 4 13.10 mpls l2vpn traffic-statistics capability enable Function The mpls l2vpn traffic-statistics capability enable command enables VLL traffic statistics. The undo mpls l2vpn traffic-statistics capability command disables VLL traffic statistics. By default, VLL traffic statistics function is disabled.. Format mpls l2vpn traffic-statistics capability enable undo mpls l2vpn traffic-statistics capability Parameters None. Views System view Default Level 2: Configuration level Usage Guidelines The traffic statistics function takes effect only on the VLLs created after you run the mpls l2vpn traffic-statistics capability enable or mpls l2vpn traffic-statistics enable command. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 265 S2350&S5300&S6300 Series Ethernet Switches Compatible Commands Reference 13 VPN compatible command After you run the mpls l2vpn traffic-statistics capability enable command to enable VLL traffic statistics, you can run the display traffic-statistics l2vpn interface command to view the traffic statistics result. Example # Enable L2VPN traffic statistics. <HUAWEI>system-view [HUAWEI] mpls l2vpn traffic-statistics capability enable Info: The modification can only take effect for newly created VC. System Response None. Issue 02 (2013-11-06) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 266