Mellanox Onyx User Manual Rev. 3.8.2204 - 03 - 27 - 2021
Mellanox Onyx User Manual Rev. 3.8.2204 - 03 - 27 - 2021
Mellanox Onyx User Manual Rev. 3.8.2204 - 03 - 27 - 2021
2204
Rev. 6.3 / Software Version 3.8.2204
2
Web Interface Overview .......................................................................... 50
Changing Default Password ................................................................... 50
About Web UI ................................................................................... 52
Setup Menu ..................................................................................... 52
System Menu.................................................................................... 54
Security Menu .................................................................................. 54
Ports Menu ...................................................................................... 55
Status Menu ..................................................................................... 55
ETH Mgmt Menu ................................................................................ 56
IP Route Menu .................................................................................. 56
UI Commands ....................................................................................... 57
CLI Session ...................................................................................... 57
Banner ........................................................................................... 64
SSH ............................................................................................... 68
Remote Login ................................................................................... 78
Web Interface .................................................................................. 79
System Management..........................................................................89
Management Interfaces ........................................................................... 89
Configuring Management Interfaces with Static IP Addresses........................... 89
Configuring IPv6 Address on the Management Interface ................................. 89
Dynamic Host Configuration Protocol (DHCP) ............................................. 90
Default Gateway ............................................................................... 90
In-Band Management .......................................................................... 90
Configuring Hostname via DHCP (DHCP Client Option 12) ............................... 91
Management Interface Commands .......................................................... 92
Interface........................................................................................................................92
Hostname Resolution.................................................................................................105
Routing........................................................................................................................109
Network to Media Resolution (ARP & NDP) .............................................................111
DHCP ..........................................................................................................................116
General IPv6 ...............................................................................................................117
IP Diagnostic Tools.....................................................................................................118
Chassis Management..............................................................................121
System Health Monitor ....................................................................... 121
3
Re-Notification on Errors ..........................................................................................121
System Health Monitor Alerts Scenarios ..................................................................121
Power Management ........................................................................... 122
Width Reduction Power Saving..................................................................................122
Monitoring Environmental Conditions...................................................... 123
USB Access ..................................................................................... 124
Unit Identification LED....................................................................... 125
System Reboot................................................................................. 125
Viewing Active Events ........................................................................ 125
Chassis Management Commands............................................................ 127
Chassis Management Commands............................................................ 127
Chassis Management.................................................................................................127
Management Source IP Address .................................................................146
Commands ..................................................................................... 147
Upgrade/Downgrade Process....................................................................157
Important Pre-OS Upgrade Notes ........................................................... 158
Upgrading Operating System Software .................................................... 158
Upgrading HA Groups ......................................................................... 160
Upgrading MLAG-STP Setup.................................................................. 161
Deleting Unused Images ..................................................................... 162
Downgrading OS Software ................................................................... 162
Downloading Image....................................................................................................162
Downgrading Image ...................................................................................................163
Switching to Partition with Older Software Version..................................................164
Upgrading System Firmware ................................................................ 165
After Updating Software.............................................................................................165
Importing Firmware and Changing the Default Firmware.......................................165
Image Maintenance Using Mellanox ONIE ................................................. 166
Software Management Commands ......................................................... 167
Configuration Management......................................................................174
Saving a Configuration File .................................................................. 174
Loading a Configuration File ................................................................ 175
Restoring Factory Default Configuration .................................................. 175
Managing Configuration Files ............................................................... 175
4
BIN Configuration Files..............................................................................................175
Text Configuration Files .............................................................................................176
Configuration Management Commands.................................................... 177
Configuration Management Commands.................................................... 177
File System .................................................................................................................177
Configuration Files .....................................................................................................185
Virtual Machine....................................................................................198
Configuring Virtual Machine ................................................................. 198
Virtual Machine Commands.................................................................. 200
Resource Scale ....................................................................................216
Resource Scale Commands .................................................................. 216
System Synchronization .................................................................... 218
NTP and Clock .....................................................................................218
NTP Authenticate ............................................................................. 218
NTP Authentication Key ...................................................................... 218
Additional Reading and Use Cases.......................................................... 218
NTP Commands................................................................................ 219
Precision Time Protocol (PTP)...................................................................231
PTP Principles ................................................................................. 231
Clock Types and Operation Modes .......................................................... 233
PTP Domains ................................................................................... 233
Boundary Clock ..........................................................................................................233
Configuring PTP .........................................................................................................234
Securing PTP Infrastructure ................................................................. 236
Additional Reading and Use Cases.......................................................... 237
PTP Commands ................................................................................ 237
PTP Commands ................................................................................ 238
PTP Debuggability Logging Examples ......................................................................269
Network Management Interfaces ......................................................... 273
SNMP ................................................................................................273
Standard MIBs.................................................................................. 273
Private MIBs .................................................................................... 273
Proprietary Traps.............................................................................. 274
Configuring SNMP ............................................................................. 275
5
Resetting SNMPv3 Engine ID ................................................................. 275
Configuring an SNMPv3 User................................................................. 276
Configuring SNMP Notifications (Traps or Informs) ...................................... 277
SNMP SET Operations ......................................................................... 278
Enabling SNMP SET ...................................................................................................278
Sending a Test Trap SET Request .............................................................................279
Setting Hostname with SNMP ...................................................................................280
Power Cycle with SNMP.............................................................................................280
Changing Configuration with SNMP..........................................................................280
Upgrading OS Software with SNMP ..........................................................................281
IF-MIB and Interface Information..............................................................................282
Additional Readings and Use Cases......................................................... 282
JSON API............................................................................................282
Authentication ................................................................................ 282
Authentication Example .............................................................................................283
Changing Initial Password Through JSON API .........................................................283
JSON API Logout ........................................................................................................284
Sending the Request.......................................................................... 285
JSON Request Format ........................................................................ 285
JSON Execution Requests .........................................................................................285
JSON Query Requests................................................................................................286
JSON Response Format ....................................................................... 287
Single Command Response Format .........................................................................287
Multiple Command Response Format ......................................................................287
Query Response Format ............................................................................................288
Asynchronous Response Format ..............................................................................288
Supported Commands ........................................................................ 289
JSON Examples ................................................................................ 289
Synchronous Execution Request Example................................................................289
Asynchronous Execution Request Example..............................................................290
Query Request Example.............................................................................................290
Error Response Example...........................................................................................291
JSON Request Using WebUI .................................................................. 292
To Execute a JSON Request ......................................................................................292
6
To Query an Asynchronous JSON Request ...............................................................293
Additional Reading and Use Cases.......................................................... 294
XML API .............................................................................................294
Network Management Interface Commands ..................................................294
Network Management Interface Commands ..................................................295
SNMP ............................................................................................ 295
JSON API........................................................................................ 309
XML API ......................................................................................... 311
Virtualization ................................................................................ 313
Limiting the Container’s Resources ............................................................313
Memory Resources Allocation Protocol .................................................... 313
CPU Resource Allocation Protocol .......................................................... 314
Upgrade Ramifications ...........................................................................314
Changing Docker Storage Driver ............................................................ 314
Additional Reading and Use Cases..............................................................315
Docker Containers Commands ..................................................................315
Telemetry, Monitoring, and Debuggability .............................................. 328
What Just Happened .............................................................................328
Configure What Just Happened (WJH) Using CLI......................................... 328
WJH Commands.........................................................................................................330
Configure WJH Using NEO ................................................................... 334
WJH Streaming and Integration with Telegraf, InfluxDB and Grafana (TIG) Stack.. 334
Logging .............................................................................................334
Monitor ......................................................................................... 334
Remote Logging ............................................................................... 334
Logging Protocol .............................................................................. 335
Logging Commands ........................................................................... 335
Debugging ..........................................................................................356
Additional Reading and Use Cases.......................................................... 356
Debugging Commands ........................................................................ 356
Link Diagnostic Per Port..........................................................................367
Link Diagnostic Commands .................................................................. 367
Signal Degradation Monitoring ..................................................................368
Effective-BER Monitoring .................................................................... 369
7
Configuring Signal Degradation Monitoring ............................................... 369
Signal Degradation Monitoring Commands ................................................ 369
Event Notifications ...............................................................................370
Supported Event Notifications and MIB Mapping ......................................... 371
Terminal Notifications........................................................................ 373
Email Notifications ........................................................................... 374
Command Event Notifications .............................................................. 375
Port Mirroring......................................................................................390
Mirroring Sessions ............................................................................. 391
Source Interface .........................................................................................................392
Destination Interface..................................................................................................392
Header Format ...........................................................................................................393
Congestion Control ....................................................................................................394
Truncation...................................................................................................................394
Configuring Mirroring Sessions .............................................................. 394
Verifying Mirroring Sessions ................................................................. 396
Additional Reading and Use Cases.......................................................... 396
Port Mirroring Commands.................................................................... 397
sFlow................................................................................................402
Flow Samples .................................................................................. 403
Statistical Samples............................................................................ 403
sFlow Datagrams .............................................................................. 404
Sampled Interfaces ........................................................................... 404
Configuring sFlow ............................................................................. 404
Verifying sFlow ................................................................................ 405
Additional Reading and Use Cases.......................................................... 405
sFlow Commands.............................................................................. 406
Buffer Histograms Monitoring ...................................................................412
Additional Reading and Use Cases.......................................................... 412
Buffer Histograms and Thresholds Commands............................................ 413
Statistics and Alarms .............................................................................427
Commands ..................................................................................... 427
Management Information Bases (MIBs) ........................................................445
Automation Tools............................................................................ 449
8
Ansible..............................................................................................449
Installing and Configuring Ansible on CentOS 7 .......................................... 450
Creating Ansible Playbook ................................................................... 450
SALT .................................................................................................451
Installing SaltStack on CentOS 7............................................................ 451
Configuring Salt ............................................................................... 451
Configuring the Salt-minion File............................................................ 452
Configuring the Proxy ........................................................................ 452
Creating the pillar Directory ................................................................ 453
Running Onyx Salt Commands on the Server ............................................. 453
Puppet Agent ......................................................................................454
Setting the Puppet Server ................................................................... 454
Accepting the Switch Request .............................................................. 454
Using CLI Commands ................................................................................................454
Accepting Certificate Requests in Puppet Server Console ......................................455
Installing Modules on the Puppet Server .................................................. 455
Writing Configuration Classes ............................................................... 456
Supported Configuration Capabilities...................................................... 457
Ethernet and Port-Channel .......................................................................................457
Interface Capabilities .................................................................................................457
VLAN Capabilities.......................................................................................................457
Layer 2 Ethernet Interface Capabilities.....................................................................458
LAG Capabilities .........................................................................................................458
Layer 3 Interface Capabilities ....................................................................................458
OSPF Interface Capabilities .......................................................................................459
OSPF Area Capabilities ..............................................................................................459
Router OSPF Capabilities ..........................................................................................459
SNMP, LLDP, IP Routing, and Spanning Tree Capabilities ......................................460
Fetched Image Capabilities .......................................................................................460
Installed Image Capabilities ......................................................................................460
Supported Resources for Each Type ........................................................ 461
Troubleshooting ............................................................................... 461
Switch and Server Clocks are not Synchronized ......................................................461
Outdated or Invalid SSL Certificates Either on the Switch or the Server ................462
9
Communications Issue ..............................................................................................462
Puppet Agent Commands .................................................................... 462
Scheduled Jobs ....................................................................................466
Commands ..................................................................................... 466
User Management, Authentication, & Security......................................... 473
User Management & Security ...................................................................473
User Accounts.................................................................................. 473
Authentication, Authorization and Accounting (AAA) ................................... 473
User Re-authentication ...................................................................... 474
RADIUS .......................................................................................... 474
TACACS+ ........................................................................................ 474
LDAP ............................................................................................ 474
System Secure Mode.......................................................................... 475
User Management and Security Commands ............................................... 476
User Management and Security Commands ............................................... 477
User Accounts ............................................................................................................477
AAA Methods ..............................................................................................................480
RADIUS .......................................................................................................................489
TACACS+.....................................................................................................................492
LDAP ...........................................................................................................................495
System Secure Mode .................................................................................................505
802.1x Protocol................................................................................ 506
802.1x Operating Modes.............................................................................................507
Configuring 802.1x......................................................................................................507
Dot1x Commands .......................................................................................................508
Cryptographic (X.509, IPSec) and Encryption ................................................517
System File Encryption....................................................................... 518
Cryptographic and Encryption Commands ................................................ 519
Quality of Service (QoS) ................................................................... 530
QoS Classification .................................................................................530
Trust Levels .................................................................................... 530
Switch Priority to IEEE Priority Mapping ................................................... 531
Default QoS Configuration ................................................................... 531
QoS Rewrite........................................................................................532
10
Switch-priority to PCP,DEI Re-marking Mapping .......................................... 532
Switch-priority to DSCP Re-marking Mapping............................................. 532
DSCP to Switch-priority in Router .......................................................... 532
Default Configuration ........................................................................ 532
Queuing and Scheduling (ETS) ..................................................................532
Traffic Class.................................................................................... 533
Traffic Shapers ................................................................................ 533
Maximum Shapers .....................................................................................................533
Minimum Shapers ......................................................................................................533
Default Shaper Configuration ............................................................... 534
RED and ECN .......................................................................................534
Additional Reading and Use Cases..............................................................535
QoS Commands ....................................................................................536
QoS Commands ....................................................................................536
QoS Classification ............................................................................. 536
QoS Rewrite.................................................................................... 549
Queuing and Scheduling (ETS) .............................................................. 553
RED & ECN ..................................................................................... 557
Priority Flow Control (PFC) ......................................................................564
Flow Control Threshold Configuration ..................................................... 565
PFC Watchdog ................................................................................. 566
Additional Reading and Use Cases.......................................................... 567
PFC Commands ................................................................................ 567
Shared Buffers.....................................................................................572
Traffic Pool Configuration ................................................................... 572
Lossless Traffic ................................................................................ 573
Priority-flow-control ..................................................................................................573
Flow Control (Global Pause) ......................................................................................573
Advanced Buffer Configuration ............................................................. 574
Packet Buffering Classification .................................................................................574
Buffer Allocation ........................................................................................................575
Pools ...........................................................................................................................575
Usage Counting ..........................................................................................................576
Control Traffic Buffering ............................................................................................576
11
Default Configuration.................................................................................................576
Configuration Example...............................................................................................577
Exceptions to Legal Shared Buffer Configuration ....................................................578
Additional Reading and Use Cases.......................................................... 579
Shared Buffer Commands .................................................................... 579
Shared Buffer Commands .................................................................... 579
Storm Control......................................................................................601
Storm Control Commands.................................................................... 601
Head-of-Queue Lifetime Limit ..................................................................603
HoQ Commands ............................................................................... 604
Store-and-Forward................................................................................604
Additional Reading and Use Cases.......................................................... 605
Store-and-Forward Commands.............................................................. 605
Ethernet Switching ......................................................................... 606
Ethernet Interfaces ...............................................................................606
Break-Out Cables ............................................................................. 606
Break-Out Cables Behavior on SN3800 Switch Systems .........................................607
Changing the Module Type to a Split Mode...............................................................608
Unsplitting a Split Port...............................................................................................608
56GbE Link Speed ............................................................................. 609
Transceiver Information...................................................................... 609
High Power Transceivers ..................................................................... 609
Forward Error Correction .................................................................... 610
Ethernet Interface Commands .............................................................. 610
Ethernet Interface Commands .............................................................. 611
Interface Isolation ................................................................................634
Configuring Isolated Interfaces ............................................................. 635
Interface Isolation Commands .............................................................. 636
Link Aggregation Group (LAG)...................................................................639
Configuring Static LAG ....................................................................... 640
Configuring Link Aggregation Control Protocol (LACP) .................................. 640
Additional Reading and Use Cases.......................................................... 640
LAG Commands................................................................................ 641
Link Layer Discovery Protocol (LLDP) ..........................................................656
12
Configuring LLDP .............................................................................. 656
DCBX ............................................................................................ 656
Additional Reading and Use Cases.......................................................... 657
LLDP Commands............................................................................... 657
VLANs ...............................................................................................668
Configuring Access Mode and Assigning Port VLAN ID (PVID) ........................... 668
Configuring Hybrid Mode and Assigning Port VLAN ID (PVID) ........................... 669
Configuring Trunk Mode VLAN Membership ............................................... 669
Configuring Hybrid Mode VLAN Membership .............................................. 670
Additional Reading and Use Cases.......................................................... 670
VLAN Commands .............................................................................. 670
Voice VLAN .........................................................................................677
Configuring Voice VLAN ...................................................................... 678
Limitations ..................................................................................... 680
Spanning Tree Protocol...........................................................................680
Port Priority and Cost ........................................................................ 681
Port Type ....................................................................................... 681
BPDU Filter..................................................................................... 682
BPDU Guard .................................................................................... 682
Logging Example In Case of a BPDU Guard Event ...................................................682
Loop Guard..................................................................................... 682
Root Guard ..................................................................................... 683
MSTP ............................................................................................ 683
RPVST ........................................................................................... 683
RPVST and VLAN Limitations ....................................................................................684
RPVST and RSTP Interoperability..............................................................................684
STP Commands ................................................................................ 685
MAC Address Table ................................................................................706
Configuring Unicast Static MAC Address ................................................... 706
MAC Learning Considerations ............................................................... 706
MAC Address Table Commands .............................................................. 707
MLAG................................................................................................713
MLAG Keepalive and Failover ............................................................... 716
Unicast and Multicast Sync .................................................................. 716
13
MLAG Port Sync................................................................................ 716
MLAG Virtual System-MAC ................................................................... 716
Upgrading MLAG Pair ......................................................................... 716
Interoperability with MLAG.................................................................. 717
MLAG Interoperability with L2 Protocols ..................................................................717
MLAG Interoperability with L3 Protocols ..................................................................718
Configuring MLAG ............................................................................. 718
Configuring L2 MLAG .................................................................................................719
Verifying MLAG Configuration....................................................................................721
Enabling L3 Forwarding with User VRF ....................................................................722
Additional Reading and Use Cases.......................................................... 722
MLAG Commands.............................................................................. 722
MLAG Commands.............................................................................. 722
Link State Tracking ...............................................................................735
Configuring Link State Tracking............................................................. 735
Link State Tracking Commands ............................................................. 737
QinQ.................................................................................................739
QinQ Operation Modes ....................................................................... 739
Configuring QinQ .............................................................................. 740
QinQ Commands............................................................................... 741
Access Control List (ACL) ........................................................................741
Configuring ACL ............................................................................... 741
ACL Actions .................................................................................... 742
ACL Logging .................................................................................... 742
ACL Capability Summary ..................................................................... 743
Additional Readings and Use Cases......................................................... 746
ACL Commands ................................................................................ 747
ACL Commands ................................................................................ 747
Control Plane Policing............................................................................795
IP Table Filtering .............................................................................. 795
Configuring IP Table Filtering....................................................................................796
Modifying IP Table Filtering .......................................................................................796
Rate-Limit Rule Configuration ..................................................................................797
Control Plane Policing Commands .......................................................... 797
14
User Defined Keys.................................................................................806
Configuring UDK ............................................................................... 806
UDK Commands................................................................................ 807
OpenFlow ..........................................................................................810
Flow Table...................................................................................... 811
OpenFlow 1.3 Workflow...................................................................... 812
ACL Rule Tables (0-249) ............................................................................................813
Router Table (251) ......................................................................................................816
Configuring OpenFlow........................................................................ 817
Configuring Flows Using CLI Commands ................................................... 817
Configuring Secure Connection to OpenFlow ............................................. 818
OpenFlow Commands ........................................................................ 820
VXLAN......................................................................................... 839
Configuring VXLAN ................................................................................839
VMware Network Virtualization and Security Platform (NSX) Configuration.............841
Hardware Topology ........................................................................... 841
Switch Configuration ......................................................................... 842
Adding the Switch to NSX.................................................................... 844
Mapping a Logical Switch to a Physical Switch Port ..................................... 845
Additional Reading and Use Cases..............................................................846
RoCE Over VXLAN .................................................................................846
RoCEv2 Using PFC and ECN .................................................................. 846
RoCEv1 Using PFC ............................................................................. 847
VXLAN Commands.................................................................................848
VXLAN Commands.................................................................................849
Ethernet VPN (EVPN) ....................................................................... 868
Overview ...........................................................................................868
Example of How To Configure EVPN............................................................869
Layer 2 Configuration, MLAG, and VLANs ................................................. 870
Layer 3 Configuration ........................................................................ 870
BGP and EVPN Configuration ................................................................ 872
Spine Configuration........................................................................... 873
Traffic Behavior During Failures ................................................................873
EVPN Troubleshooting ............................................................................875
15
show interface nve 1 ......................................................................... 875
show interface nve 1 detail ................................................................. 875
show ip bgp evpn summary.................................................................. 876
show ip bgp evpn ............................................................................. 876
show ip bgp evpn vni 10060 ................................................................. 876
show mac-address-table ..................................................................... 877
show ip arp .................................................................................... 877
EVPN Data Center Interconnect (DCI) .........................................................878
Layer 2 DCI Connection ...................................................................... 878
Layer 3 Routes WAN .......................................................................... 878
EVPN Logging Examples ..........................................................................879
EVPN MAC Mobility Logs...................................................................... 879
IP Routing .................................................................................... 880
IP Routing Overview ..............................................................................880
IP Interfaces ................................................................................... 880
VLAN Interfaces .........................................................................................................880
Loopback Interfaces...................................................................................................881
Router Port Interfaces ...............................................................................................881
Configuring a VLAN Interface ....................................................................................881
Configuring a Loopback Interface .............................................................................882
Configuring a Router Port Interface..........................................................................882
Equal Cost Multi-Path Routing (ECMP) ..................................................... 883
Hash Functions ..........................................................................................................884
ECMP Consistent Hashing.........................................................................................885
Virtual Routing and Forwarding.................................................................................889
ARP Neighbor Discovery Responder ........................................................ 889
Configuring ARP Responder ......................................................................................890
General IP Routing Commands .............................................................. 890
General IP Routing Commands .............................................................. 890
IP Interface .................................................................................................................897
Interface VLAN ...........................................................................................................898
Loopback Interface.....................................................................................................921
Routing and ECMP .....................................................................................................924
Network to Media Resolution (ARP) ..........................................................................935
16
IP Diagnostic Tools.....................................................................................................938
QoS..............................................................................................................................941
IPv6 ............................................................................................. 942
Features that Support IPv6 ........................................................................................942
Neighbor Discovery Protocol .....................................................................................942
Configuring IPv6 .........................................................................................................943
IPv6 Commands .........................................................................................................945
OSPF ................................................................................................967
Router ID ....................................................................................... 967
ECMP ............................................................................................ 967
Configuring OSPF.............................................................................. 968
Additional Reading and Use Cases.......................................................... 970
OSPF Commands .............................................................................. 971
OSPF Commands .............................................................................. 971
BGP..................................................................................................996
State Machine ................................................................................. 996
Default Address Family....................................................................... 996
Default Route Originate...................................................................... 997
Peer Groups and Update Groups............................................................ 997
Configuring BGP ............................................................................... 997
Verifying BGP .................................................................................. 998
Ethernet Virtual Private Network .......................................................... 999
Additional Reading and Use Cases.......................................................... 999
BGP Commands................................................................................ 999
BGP Commands...............................................................................1000
Config........................................................................................................................1000
Config Router ...........................................................................................................1002
Show .........................................................................................................................1045
IP AS-Path Access-List............................................................................................1064
IP Community-List ...................................................................................................1065
BGP Monitoring Protocol ....................................................................1067
BMP Commands ......................................................................................................1068
Bidirectional Forwarding Detection (BFD) Infrastructure................................. 1071
Session Establishment .......................................................................1071
17
Interaction with Protocols ..................................................................1072
BFD Commands ...............................................................................1072
Policy Rules ...................................................................................... 1077
Route Map .....................................................................................1077
Route Map Commands .......................................................................1078
IP Prefix-List.............................................................................................................1095
IP Prefix-List Commands ........................................................................................1096
VRRP .............................................................................................. 1099
Load Balancing ...............................................................................1099
Configuring VRRP ............................................................................1100
Preconditions ...........................................................................................................1100
Configuring VRRP.....................................................................................................1101
Verifying VRRP..........................................................................................................1102
Additional Reading and Use Cases.........................................................1102
VRRP Commands .............................................................................1103
MAGP.............................................................................................. 1111
Configuring MAGP ............................................................................1111
Prerequisites ............................................................................................................1111
Configuring MAGP....................................................................................................1112
Verifying MAGP .........................................................................................................1112
Useful Reading and Use Cases .............................................................1112
MAGP Commands.............................................................................1113
DHCP Relay....................................................................................... 1118
DHCP-R Virtual Routing and Forwarding (VRF) Auto-Helper ...........................1118
Upstream and Downstream Interfaces....................................................1118
DHCP Relay Commands......................................................................1118
RDMA Over Converged Ethernet (RoCE) ................................................1136
RoCE Overview .................................................................................. 1136
Definitions/Abbreviation ...................................................................1136
Configuring RoCE................................................................................ 1137
RoCE Commands................................................................................. 1138
Further Information .........................................................................1138
RoCE Commands................................................................................. 1139
Multicast (IGMP and PIM) .................................................................1143
18
Basic PIM-SM ..................................................................................... 1143
Source-Specific Multicast (SSM)............................................................... 1144
Bootstrap Router ................................................................................ 1144
Configuring Multicast........................................................................... 1145
Configuring IGMP.............................................................................1145
Verifying IGMP ................................................................................1145
Configuring PIM...............................................................................1146
Additional Reading and Use Cases............................................................ 1147
IGMP and PIM Commands ...................................................................... 1148
IGMP and PIM Commands ...................................................................... 1148
PIM .............................................................................................1148
Multicast ......................................................................................1167
IGMP ...........................................................................................1173
IGMP Snooping ................................................................................... 1181
Configuring IGMP Snooping .................................................................1182
Defining a Multicast Router Port on a VLAN..............................................1182
IGMP Snooping Querier ......................................................................1184
IGMP Snooping Querier Guard..............................................................1184
IGMP Snooping Commands ..................................................................1185
IGMP Snooping Commands ..................................................................1185
Appendixes..................................................................................1199
Appendix: Ethernet Storage Fabric (ESF) ................................................... 1199
ESF Configuration using Ansible............................................................1199
ESF Configuration using CLI ................................................................1200
Switch Configuration................................................................................................1200
IPL Configuration .....................................................................................................1201
MAGP Configuration.................................................................................................1201
MLAG Interface Configuration .................................................................................1202
MLAG VIP Configuration...........................................................................................1204
Server Configuration ................................................................................................1204
ESF Maintenance, Monitoring and Troubleshooting .....................................1205
MLAG Upgrade Procedure.......................................................................................1205
Monitoring and Troubleshooting .............................................................................1205
ESF Setup Examples .........................................................................1212
19
Single Rack with Two Switches Connected in MLAG..............................................1212
Scale-out Common Deployments ...........................................................................1214
Appendix: Enhancing System Security According to NIST SP 800-131A ................. 1214
Overview ......................................................................................1214
Web Certificate ..............................................................................1214
Code Signing ..................................................................................1215
SNMP ...........................................................................................1216
SSH .............................................................................................1216
HTTPS..........................................................................................1217
LDAP ...........................................................................................1218
Appendix: Feature Support per IC and CPU Type .......................................... 1218
Appendix: Splunk Integration with Mellanox Products .................................... 1219
Getting Started with Splunk................................................................1219
Switch Configuration ........................................................................1220
Adding a Task .................................................................................1220
Retrieving Data from TCP and UDP Ports .................................................1221
SNMP Input to Poll Attribute Values and Catch Traps...................................1223
Getting Started .........................................................................................................1224
Configuration ............................................................................................................1224
Appendix: Show Commands Not Supported By JSON API.................................. 1227
Appendix: What Just Happened (WJH) Events ............................................. 1229
Document Revision History ...............................................................1232
20
Welcome to Mellanox Onyx™ documentation!
Mellanox Onyx™ enables the management and configuration of Mellanox Technologies’ Ethernet
switch system platforms.
Mellanox Onyx provides a full suite of management options, including support for SNMPv1, 2, 3, and
web user interface (Web UI). In addition, it incorporates a familiar industry-standard CLI which
enables administrators to easily configure and manage the system.
These pages provide information about the scope, organization, and command line interface of
Mellanox Onyx as well as configuration examples.
Intended Audience
These pages are intended for network administrators who are responsible for configuring and
managing Mellanox Technologies’switch platforms.
Related Documentation
The following table lists the documents referenced in this User Manual.
System Hardware User Manual This document contains hardware descriptions, LED
assignments, and hardware specifications, among other
things
Switch Product Release Notes Please look up the relevant switch system/series Release
Notes file
Mellanox Virtual Modular Switch Reference This reference architecture provides general information
Guide concerning Mellanox L2 and L3 Virtual Modular Switch (VMS)
configuration and design
Mellanox Community Provides Ethernet Switch Solutions
21
Glossary
Term Description
CLI Command Line Interface. A user interface in which you type commands at
the prompt
DCBX Should be Data Center Bridging eXchange—an extension of Link Layer Data
Protocol to discover DCB compliant peers and exchange configuration
information
Gateway A network node that interfaces with another network using a different
network protocol
HA High Availability. A system design protocol that provides redundancy of
system components, thus enables overcoming single or multiple failures
in minimal downtime.
Host A computer platform executing an Operating System which may control
one or more network adapters
LACP Link Aggregation Control Protocol (LACP) provides a method to control the
bundling of several physical ports together to form a single logical
channel. LACP allows a network device to negotiate an automatic
bundling of links by sending LACP packets to the peer (directly connected
device that also implements LACP).
LDAP The Lightweight Directory Access Protocol is an application protocol for
reading and editing directories over an IP network.
LLDP Link Layer Discovery Protocol. A vendor neutral link layer protocol used by
network devices to advertise their identify, capabilities and for neighbor
discovery.
22
Term Description
23
Feature Overview
System Features
Feature Detail
24
Ethernet Features
Feature Detail
25
Layer 3 Feature Set • 64 VRFs
• IPv4 & IPv6 Routing inc Route maps:
• BGP4, OSPFv2
• PIM-SM & PIM-SSM (inc PIM-SM over MLAG)
• BFD (BGP, OSPF, static routes)
• VRRP
• MAGP
• DHCPv4/v6 Relay
• Router Port, int Vlan, NULL Interface for Routing
• ECMP, 64-way
• IGMPv2/v3 Snooping Querier
• 50K ARP entries
26
Security • USA Department of Defense certification—UC APL
• System secure mode—FIPS 140-2 compliance
• Storm Control
• Access Control Lists (ACLs L2-L4 & user defined)
• 802.1X—Port Based Network Access Control
• SSH server strict mode—NIST 800-181A
• CoPP (IP filter)
• Port isolation
27
Getting Started
The procedures described in this page assume that you have already installed and powered on your
switch according to the instructions in the Hardware Installation Guide, which was shipped with the
product.
Due to California Senate Bill No. 327, starting from software version 3.8.2000, the user will
have to type in Admin and Monitor passwords manually—no automatic passwords will be
created by default.
When the reset button is held for 15 seconds, the management module is reset and the
password is deleted. You will then be able to enter without a password and make a new
password for the user admin.
1. Connect the host PC to the console (RJ-45) port of the switch system using the supplied
cable.
DHCP is enabled by default over the MGT port. Therefore, if you have configured
your DHCP server and connected an RJ-45 cable to the MGT port, simply log in using
the designated IP address.
This step may be skipped if the DHCP option is used and an IP is already configured
for the MGT port.
Parameter Setting
28
Mellanox Onyx Boot Menu:
1: <image #1>
2: <image #2>
u: USB menu (if USB device is connected) (password required)
c: Command prompt (password required)
Choice:
The boot menu features a countdown timer. It is recommended to allow the timer to run out
by not selecting any of the options.
4. Login as admin and use admin as password. If the machine is still initializing, you might not
be able to access the CLI until initialization completes. As an indication that initialization is
ongoing, a countdown of the number of remaining modules to be configured is displayed in
the following format: “<no. of modules> Modules are being configured”.
5. Go through the Switch Management configuration wizard.
IP configuration by DHCP:
Step 3: Enable IPv6 [yes] Perform this step to enable IPv6 on management
ports.
If you wish to enable IPv6, type “yes” and press
<Enter>.
If you enter “no” (no IPv6), then you will
automatically be referred to Step 5.
29
Mellanox Wizard Session Display Comments
(Example)
Step 4: Enable IPv6 autoconfig (SLAAC) on Perform this step to enable StateLess address
mgmt0 interface
autoconfig on external management port.
If you wish to enable it, type “yes” and press <Enter>.
If you wish to disable it, enter “no”.
Step 5: Use DHCPv6 on mgmt0 interface? [yes] Perform this step to enable DHCPv6 on the MGMT0
interface.
Step 6: Admin password (Must be typed)? To avoid illegal access to the machine, please type a
<new_password>
password and then press <Enter>.
Starting from the 3.8.2000 release, the user must type
in the admin password upon initial configuration. Due
to Senate Bill No. 327, this stage is required and
cannot be skipped.
Step 7: Confirm admin password? Confirm the password by re-entering it. Note that
<new_password>
password characters are not printed.
Step 8: Monitor password (Must be typed)? To avoid illegal access to the machine, please type a
<new_password>
password and then press <Enter>.
Starting from the 3.8.2000 release, the user must type
in the admin password upon initial configuration. Due
to Senate Bill No. 327, this stage is required and
cannot be skipped.
Step 9: Confirm monitor password? Confirm the password by re-entering it. Note that
<new_password>
password characters are not printed.
You have entered the following information: The wizard displays a summary of your choices and
Hostname: <switch name>
Use DHCP on mgmt0 interface: yes then asks you to confirm the choices or to re-edit
Enable IPv6: yes them.
Enable IPv6 autoconfig (SLAAC) on mgmt0
interface: yes Either press <Enter> to save changes and exit, or
Enable DHCPv6 on mgmt0 interface: no enter the configuration step number that you wish to
Admin password (Enter to leave unchanged): return to.
(CHANGED)
To change an answer, enter the step number To run the command “configuration jump-start” you
to return to.
Otherwise hit <enter> to save changes and must be in Config mode.
exit.
Choice: <Enter>
Configuration changes saved.
To return to the wizard from the CLI, enter
the “configuration jump-start” command
from configuration mode. Launching CLI...
<switch name> [standalone: master] >
Static IP configuration:
30
Mellanox Wizard Session Display (Example)
Do you want to use the wizard for initial configuration? y
Hostname: switch-112126
Use DHCP on mgmt0 interface: no
Use zeroconf on mgmt0 interface: no
Primary IP address: 192.168.10.4
Netmask: 255.255.255.0
Default gateway: 192.168.10.1
Primary DNS server:
Domain name:
Enable IPv6: yes
Enable IPv6 autoconfig (SLAAC) on mgmt0 interface: no
Admin password (Enter to leave unchanged): (unchanged)
Choice:
To return to the wizard from the CLI, enter the “configuration jump-start” command from configure
mode. Launching CLI...
<hostname>[standalone: master] >
IP zeroconf configuration:
31
Mellanox Wizard Session Display (Example)
Mellanox configuration wizard
Hostname: switch-112126
Use DHCP on mgmt0 interface: no
Use zeroconf on mgmt0 interface: yes
Default gateway: 192.168.10.1
Primary DNS server:
Domain name:
Enable IPv6: yes
Enable IPv6 autoconfig (SLAAC) on mgmt0 interface: yes
Admin password (Enter to leave unchanged): (unchanged)
Choice:
To return to the wizard from the CLI, enter the “configuration jump-start”
command from configure mode. Launching CLI...
<hostname> [standalone: master] >
6. Check the mgmt0 interface configuration before attempting a remote (for example, SSH)
connection to the switch. Specifically, verify the existence of an IP address.
32
switch # show interfaces mgmt0
Interface mgmt0 status:
Comment :
Admin up : yes
Link up : yes
DHCP running : yes
IP address : 10.12.67.34
Netmask : 255.255.0.0
IPv6 enabled : yes
Autoconf enabled: no
Autoconf route : yes
Autoconf privacy: no
DHCPv6 running : no
IPv6 addresses : 1
IPv6 address:
fe80::268a:7ff:fe53:3d8e/64
Speed : 1000Mb/s (auto)
Duplex : full (auto)
Interface type : ethernet
Interface source: physical
MTU : 1500
HW address : 00:02:C9:11:A1:B2
Rx:
11700449 bytes
55753 packets
0 mcast packets
0 discards
0 errors
0 overruns
0 frame
Tx:
5139846 bytes
28452 packets
0 discards
0 errors
0 overruns
0 carrier
0 collisions
1000 queue len
33
2. Start a remote secured shell (SSH) to the switch using the command “ssh -l <username>
<switch ip address>”.
WebUI access is enabled by default. To disable web access, run the command “no web
http enable” or “no web https enable” on the CLI.
1. Set up an Ethernet connection between the switch and a local network machine using a
standard RJ-45 connector.
2. Open a web browser that is Firefox 12, Chrome 18, IE 8, Safari 5 or higher.
3. Type the IP address of the switch or its DNS name in the following format: https://
<switch_IP_address>.
4. Log into the switch (default user name is admin, password admin).
34
5. Read and accept the EULA, if prompted.
The prompt will only occur if the switch has never been accessed through the CLI before.
6. The Welcome popup appears. After reading through the content, click OK to continue.
To reach the OS documentation, click on the links under the Documentation heading.
The link under What’s New takes leads to the Changes and New Features section of the switch
OS Release Notes. You may also tick the box to not show this popup again. To see this window
again, click “Product Documents” on the upper right corner of the WebUI.
35
7. A default status summary is displayed.
Zero-touch Provisioning
Zero-Touch Provisioning (ZTP) automates initial configuration of switch systems at boot time. It
helps minimize manual operation and reduce customer initial deployment cost. ZTP allows for
36
automatic upgrade of the switch with a specified OS image, setting up initial configuration
database, and to load and run a container image file.
The initial configuration is applied using a regular text file. The user can create such a configuration
file by editing the output of a “show running-config” command.
The user-defined docker image can be used by customers to run their own applications in a
sandbox on their platform. They can therefore also be used for automating initial
configuration.
Running DHCP-ZTP
There is no explicit command to enable ZTP. It is enabled by default. Disabling it is performed by a
user-initiated configuration save (using the command “configuration write”). The only way to re-
enable ZTP is to run a “reset factory” command, clearing the configuration of the switch and
rebooting the system.
ZTP is based on DHCP. For ZTP to work, the software enables DHCP by default on all its management
interfaces. The switch OS requests option 66 (tftp-server-name) and 67 (bootfile-name) from the
DHCPv4 server or option 58 (bootfile-url) from the DHCPv6 server, and waits for the DHCP responses
containing file URLs. The DHCP server must be configured to send back the URLs for the software
image, configuration file, and docker container image via these two options. Option 66 would
contain the URL prefix to the location of the files, option 67 would contain the name of files, and
option 58 would contain the complete URLs of files. The format of these two options is a string list
separated by commas. The list items are placed in a fixed order:
The item value can be empty, but the comma shall not be omitted.
To have DHCP server discern the proper files based on switch-specific information, the OS must
provide identifying information for the server to classify the switches. In addition, the OS attaches
option 43 (vendor-specific information) and option 60 (vendor class identifier) in DHCPv4 requests
and option 17 (vendor-opts) in DHCPv6. Option 60 is set as string “Mellanox” and options 17 and 43
contain the following Mellanox-specific sub-options:
• System Model
• Chassis Part Number
• Chassis Serial Number
• Management MAC
• System Profile
• Mellanox Onyx™ Release Version
The corresponding subtypes respectively are defined as:
37
DHCP_VENDOR_ENCAPSULATED_SUBOPTION_TLV_TYPE_MODEL 1
DHCP_VENDOR_ENCAPSULATED_SUBOPTION_TLV_TYPE_PARTNUM 2
DHCP_VENDOR_ENCAPSULATED_SUBOPTION_TLV_TYPE_SERIAL 3
DHCP_VENDOR_ENCAPSULATED_SUBOPTION_TLV_TYPE_MAC 4
DHCP_VENDOR_ENCAPSULATED_SUBOPTION_TLV_TYPE_PROFILE 5
DHCP_VENDOR_ENCAPSULATED_SUBOPTION_TLV_TYPE_RELEASE 6
Upon receiving such DHCP requests from a client, the server should be able to map the switch-
specific information to the target file URLs according to predefined rules.
Once the OS receives the URLs from the DHCP server, it executes ZTP as follows:
If the software image URL is not specified, this step is skipped. Otherwise:
a. Perform disk space cleanup if necessary and fetch the image if it does not exist locally
b. Resolve the image version:
c. If it is already installed on active partition, proceed to step 2
d. If it is installed on a standby partition, switch partition and reboot
e. If it is not installed locally, install it and switch to the new image and then reboot
f. If a reboot occurs, ZTP performs step 1 again and no image upgrade will occur
If configuration file URL is not specified, skip this step. Otherwise:
a. Fetch the configuration file
b. Apply the configuration file
Skip these steps if a docker image file URL is not specified. Otherwise:
a. Fetch the docker image file
b. Load the docker image
c. Clean up the docker images with the same name and different tag.
d. Start the container based on the image
e. Remove the downloaded docker image file
While performing file transfer via HTTP, the same information as DHCP option 43 is
expected to be carried in a HTTP GET request. This switch software supports the following
proprietary HTTP headers:
• MlnxSysProfile
• MlnxMgmtMac
• MlnxSerialNumber
• MlnxModelName
• MlnxPartNumber
• MlnxReleaseVersion
If some sort of failure occurs, the switch waits a random number of seconds between 1 and 20 and
reattempts the operation. The switch attempts this up to 10 times.
ZTP progress is printed to terminals including console and active SSH sessions.
38
host master {
hardware ethernet E4:1D:2D:5B:72:80;
fixed-address 3.1.2.13;
option tftp-server-name "scp://<user>:<password>@3.1.3.100/ztp/,scp://
<user>:<password>@3.1.3.100/ztp/,scp://
<user>:<password>@3.1.3.100/ztp/";
option bootfile-name "image-X86_64-3.6.4612.img, switch-1.conf, ubuntu.img.gz";
}
host master {
......
option dhcp6.bootfile-url "scp://<user>:<password>@[2000::1]/ztp/image-X86_64-
3.6.4612.img, scp://<user>:<password>@[2000::1]/ztp/
switch.conf, scp://<user>:<password>@[2000::1]/ztp/
ubuntu.img.gz";
}
ZTP Commands
no zero-touch suppress-write
no zero-touch suppress-write
Disables suppression of configuration write.
Notes When ZTP is active, “configuration write” is suppressed because it may interfere
with ZTP operation. Therefore, after running “no zero-touch suppress-write” if
“configuration write” is performed, then ZTP is disabled as a consequence of the
database save.
39
zero-touch abort
zero-touch abort
Aborts on-going zero-touch process.
Default Enabled
History 3.6.5000
Notes
show zero-touch
show zero-touch
Displays zero-touch status.
Default N/A
History 3.6.5000
Notes
40
User Interfaces
The following pages provide information on the interfaces available for users to manage and
validate the status of their switch system.
• LED Indicators
• Command Line Interface (CLI)
• Secure Shell (SSH)
• Web Interface Overview
• UI Commands
LED Indicators
LED Qty Color Description
.
CLI Modes
The CLI can be in one of following modes, and each mode makes available a certain group (or level)
of commands for execution. The following are some of the CLI configuration modes:
41
Configuration Mode Description
Standard When the CLI is launched, it begins in Standard mode. This is the most restrictive
mode and only has commands to query a restricted set of state information. Users
cannot take any actions that directly affect the system, nor can they change any
configuration.
Enable The "enable" command moves the user to Enable mode. This mode offers commands
to view all state information and take actions like rebooting the system, but it does
not allow any configurations to be changed. Its commands are a superset of those in
Standard mode.
config The "configure terminal" command moves the user from Enable mode to Config
mode. Config mode is allowed only for user accounts in the “admin” role (or
capabilities). This mode has a full unrestricted set of commands to view anything,
take any action, and change any configuration. Its commands are a superset of
those in Enable mode. To return to Enable mode, enter the command "exit" or "no
configure".
Note that moving directly from/to Standard mode to/from Config mode is not
possible.
config interface Configuration mode for management interface mgmt0, mgmt1 and loopback
management
Any command mode Several commands such as “show” can be applied within any context
"no" parameter When the "no" form of the command is used, the command is erased from the
running-config and reverts to either the default or inherited value. Note that if used
on a string (e.g. password), that value is either removed unless it can be inherited.
If used on a boolean value, it is FALSE unless it has either a default or an inherited
value. See example in "Using the “no” Command Form" section.
“disable” parameter When the "disable" form of the command is used, it creates an entry in running-
config that prevents inheritance and reverts to the default system settings. If used
on a string (e.g. password), that value is removed (it cannot be inherited). If used
on a boolean value, the value is set to FALSE (it cannot be inherited).
42
Syntax Conventions
To help you identify the different parts of a CLI command, the following table explains conventions
of presenting the syntax of commands.
< > Angled brackets Indicate a value/variable that must be <1...65535> or <switch interface>
replaced.
Do not use the angled or square brackets, vertical bar, or braces in command lines. This
guide uses these symbols only to show the different entry types.
Getting Help
You may request context-sensitive help at any time by pressing “?” on the command line. This will
show a list of choices for the word you are on, or a list of top-level commands if you have not typed
anything yet.
For example, if you are in Standard mode and you type “?” at the command line, then you will get
the following list of available commands.
switch > ?
cli Configure CLI shell options
enable Enter enable mode
exit Log out of the CLI
help View description of the interactive help system
no Negate or clear certain configuration options
show Display system configuration or statistics
slogin Log into another system securely using ssh
switch Configure switch on system
telnet Log into another system using telnet
terminal Set terminal parameters
traceroute Trace the route packets take to a destination
switch >
If you type a legal string and then press “?” without a space character before it, then you will either
get a description of the command that you have typed so far or the possible command/parameter
43
completions. If you press “?” after a space character and “<cr>” is shown, this means that what you
have entered so far is a complete command, and that you may press Enter (carriage return) to
execute it.
Try the following to get started:
?
show ?
show c?
show clock?
show clock ?
show interfaces ? (from enable mode)
You can also enter “help” to view a description of the interactive help system.
Note also that the CLI supports command and/or parameter tab-completions and their shortened
forms. For example, you can enter “en” instead of the “enable” command, or “cli cl” instead of “cli
clear-history”. In case of ambiguity (more than one completion option is available, that is), then you
can hit double tabs to obtain the disambiguation options. Thus, if you are in Enable mode and wish
to learn which commands start with the letter “c”, type “c” and click twice on the tab key to get
the following:
switch # c<tab>
clear cli configure
switch # c
This signifies that there are three commands that start with the letter “c”: clear, cli and configure.
Commands entered do not print any response and simply show the command prompt after you press
<Enter>.
If an error is encountered in executing a command, the response will begin with “%”, followed by
some text describing the error.
44
2. Disables auto-logout
3. Displays the new CLI session options (auto-logout is disabled)
4. Re-enables auto-logout (after 15 minutes)
5. Displays the final CLI session options (auto-logout is enabled)
Parameter Key
This page provides a key to the meaning and format of all of the angle-bracketed parameters in all
the commands that are listed in this document.
Parameter Description
<log level> A syslog logging severity level. Possible values, from least to most severe, are: “debug”,
“info”, “notice”, “warning”, “error”, “crit”, “alert”, “emerg”.
<GUID> Globally Unique Identifier. A number that uniquely identifies a device or component.
<MAC address> A MAC address. The segments may be 8 bits or 16 bits at a time, and may be delimited by
“:” or “.”. So you could say “11:22:33:44:55:66”, “1122:3344:5566”, “11.22.33.44.55.66”,
or “1122.3344.5566”.
45
Parameter Description
<netmask> A netmask (e.g. “255.255.255.0”) or mask length prefixed with a slash (e.g. “/24”). These
two express the same information in different formats.
<network An IPv4 network prefix specifying a network. Used in conjunction with a netmask to
prefix> determine which bits are significant. e.g. “192.168.0.0”.
<regular An extended regular expression as defined by the “grep” in the man page. (The value you
expression> provide here is passed on to “grep -E”.)
<node id> ID of a node belonging to a cluster. This is a numerical value greater than zero.
<TCP port> A TCP port number in the full allowable range [0...65535].
<URL> A normal URL, using any protocol that wget supports, including http, https, ftp, sftp, and
tftp; or a pseudo-URL specifying an scp file transfer. The scp pseudo-URL format is scp://
username:password@hostname/path/filename.
Note that the path is an absolute path. Paths relative to the user's home directory are not
currently supported. The implementation of ftp does not support authentication, so use scp
or sftp for that.
Note also that if you omit the “:password” part, you may be prompted for the password in a
follow up prompt, where you can type it securely (without the characters being echoed).
This prompt will occur if the “cli default prompt empty-password” setting is true;
otherwise, the CLI will assume you do not want any password. If you include the “:”
character, this will be taken as an explicit declaration that the password is empty, and you
will not be prompted in any case.
switch (config) # <show command> | {include | exclude} <extended regular expression> [<ignore-case>] [next <lines>]
[prev <lines>]
The filtering parameters are separated from the show command they filter by a pipe character (i.e.
“|”). Quotation marks may be used to include or exclude a string including space, and multiple
filters can be used simultaneously. For example:
switch (config) # <show command> | {include <extended regular expression>} [<ignore-case>] [next <lines>] [prev
<lines>] | exclude <extended regular expression> [<ignore-case>] [next <lines>] [prev <lines>]]
Examples:
46
switch (config) # show asic-version | include SX
MGMT SIB 13.1601.3150
switch (config) # show module | exclude PS
======================
Module Status
======================
MGMT ready
FAN1 ready
FAN2 ready
switch (config) # show interfaces | include "Eth|discard pac"
Eth1/1
0 discard packets
0 discard packets
Eth1/2
0 discard packets
0 discard packets
Eth1/3
0 discard packets
0 discard packets
Eth1/4
0 discard packets
0 discard packets
switch (config) # show interfaces | include "Tx" next 5 | exclude broad
Tx
0 packets
0 unicast packets
0 multicast packets
0 bytes
--
Running the command as such displays an output of the show command that gets updated at a time
interval which may be specified using the “interval” parameter (2 seconds by default).
The “diff” parameter highlights the differences between each iteration of the command. For
example running the command “show power | watch diff interval 1” yields something similar to the
following:
-----------------------------------------------------------------------
Module Device Sensor Power Voltage Current Feed Status
[Watts] [Watts] [Amp]
-----------------------------------------------------------------------
PS1 power-mon input 85.00 230.00 0.38 AC OK
PS2 power-mon - - - - - FAIL
Total power used : 85.00 Watts
Total power capacity : 460.00 Watts
Total power available : 375.00 Watts
Maximum consumed power of all turned on modules: 46.00 Watts
With the highlighted black blocks indicating the change that has occurred between one iteration of
the command from one second to the next.
To exit “watch” mode, press Ctrl+C.
The “watch” option may also be used in conjunction with the “include” and “exclude” options as
follows:
switch (config) # <show command> | {include | exclude} <extended regular expression> | watch [diff] [interval <1-10
0 secs>]
For example:
It is possible to count the number of lines in an output of a “show” command by using the following:
47
switch (config) # <show command> | count
For example:
Running the command displays an output of the “show” command in JSON syntax structure instead
of its regular format. For example:
The “json-print” option cannot be used together with filtering (“include” and “exclude”) and/or
monitoring (“watch”).
CLI Shortcuts
The following table presents the available keyboard shortcuts on the Mellanox Onyx™ CLI.
Key Description
Combination
Ctrl-d If cursor is in the middle of the line, delete one character forward
If cursor is at the end of the line, show auto-complete options for current word or word
fragment
If cursor at an empty line, same as Esc
48
Key Description
Combination
Ctrl-l Clear screen and show line at the top of terminal window
49
Adding a Host and Providing an SSH Key
To add entries to the global known-hosts configuration file and its SSH value:
2. Add an entry to the global known-hosts configuration file and its SSH value. Run:
The maximum allowed number of WebUI session is 225. Trying to open new sessions beyond
this limitation is rejected.
50
1. Login as admin.
2. If the following screen appears (this screen will appear if default password was never
changed), type in a new password ("admin" may be reused as the new password).
3. Only after successfully changing the admin password (this must be done first), change the
monitor password. If the password is not changed, all pages (besides the logout page) will be
locked.
4. After successfully changing the monitor password, the home page may be accessed and the
system may be used.
5. Click on the home page link or wait 5 seconds until the countdown reaches 0 and the page is
redirected automatically.
51
Warning: Entering the monitor user before the default password is changed will block the
system (all pages besides the logout page will be blocked).
About Web UI
The web interface makes available the following perspective tabs:
• Setup
• System
• Security
• Ports
• Status
• Ethernet Management
• IP Route
Make sure to save your changes before switching between menus or submenus. Click the
“Save” button to the right of “Save Changes?”.
Setup Menu
The Setup menu makes available the following submenus (listed in order of appearance from top to
bottom):
52
Submenu Title Description
Interfaces Obtains the status of, configures, or disables interfaces to the fabric.
Thus, you can: set or clear the IP address and netmask of an
interface; enable DHCP to dynamically assign the IP address and
netmask; and set interface attributes such as MTU, speed, duplex,
etc.
Routing Configures, removes or displays the default gateway, and the static
and dynamic routes
Login Messages Edits the login messages: Message of the Day (MOTD), Remote Login
message, and Local Login message
Address Resolution Adds static and dynamic ARP entries, and clears the dynamic ARP
cache
SNMP Configures SNMP attributes, SNMP admin user, and trap sinks
Email Alerts Configures the destination of email alerts and the recipients to be
notified
XML gateway Provides an XML request-response protocol to get and set hardware
management information
Logging Sets up system log files, remote log sinks, and log formats
Date and Time Configures the date, time, and time zone of the switch system
53
System Menu
The System menu makes available the following sub-menus (listed in order of appearance from top
to bottom):
Modules Displays a graphic illustration of the system modules. By moving the mouse
over the ports in the front view, a pop-up caption is displayed to indicate
the status of the port. The port state (active/down) is differentiated by a
color scheme (green for active, gray/black for down). By moving the
mouse over the rear view, a pop-up caption is displayed to indicate the
leaf part information.
Inventory Displays a table with the following information about the system modules:
module name, type, serial number, ordering part number and ASIC
firmware version
Power Management Displays a table with the following information about the system power
supplies: power supply name, power, voltage level, current consumption,
and status. A total power summary table is also displayed providing the
power used, the power capacity, and the power available.
OS Upgrade Displays the installed OS images (and the active partition), uploads a new
image, and installs a new image
Reboot Reboots the system. Make sure that you save your configuration prior to
clicking reboot.
Security Menu
The Security menu makes available the following submenus (listed in order of appearance from top
to bottom):
54
Submenu Title Description
Ports Menu
The Ports menu displays the port state and enables some configuration attributes of a selected port.
It also enables modification of the port configuration. A graphical display of traffic over time (last
hour or last day) through the port is also available.
Status Menu
The Status menu makes available the following submenus (listed in order of appearance from top to
bottom):
Summary Displays general information about the switch system and the OS
image, including current date and time, hostname, uptime of
system, system memory, CPU load averages, etc.
Profile and Capabilities Displays general information about the switch system capabilities
such as the enabled profiles (e.g IB/ETH) and their corresponding
values
What Just Happened Displays and configures What Just Happened packet drop reasons
Power Supplies Provides a graphical display of one of the switch’s power supplies
voltage level over time (1 hour)
Fans Provides a graphical display of fan speeds over time (1 hour). The
display is per fan unit within a fan module.
55
Submenu Title Description
CPU Load Provides a graphical display of the management CPU load over time
(1 hour)
Logs Displays the system log messages. It is possible to display either the
currently saved system log or a continuous system log.
Alerts Displays a list of the recent health alerts and enables the user to
configure health settings
MAC Table Configures static mac addresses in the switch, and displays the
MAC address table
Link Aggregation Configures and monitors aggregated Ethernet links (LAG) and
configures LACP
IP Route Menu
The IP Route menu makes available the following sub-menus (listed in order of appearance from top
to bottom):
56
Submenu Title Description
IP Route Configures, removes, and displays the routing table for router
interfaces
Address Resolution Displays the address resolution (ARP) table for router interfaces
UI Commands
CLI Session
This section displays all the relevant commands used to manage CLI session terminal.
cli clear-history
cli clear-history
Clears the command history of the current user.
History 3.1.0000
57
cli default
cli default {auto-logout <minutes> | paging enable | prefix-modes {enable |
show-config} | progress enable | prompt {confirm-reload | confirm-reset |
confirm-unsaved | empty-password}}
no cli default {auto-logout | paging enable | prefix-modes {enable | show-
config} | progress enable prompt {confirm-reload | confirm-reset | confirm-
unsaved | empty-password}
Configures default CLI options for all future sessions.
The no form of the command deletes or disables the default CLI options.
Default N/A
History 3.1.0000
58
cli max-sessions
cli max-sessions <number>
no cli max-sessions
Configures the maximum number of simultaneous CLI sessions
allowed.
The no form of the command resets this value to its default.
Default 30 sessions
History 3.5.0200
cli session
cli session {auto-logout <minutes> | paging enable | prefix-modes enable |
progress enable | terminal {length <size> | resize | type <terminal-type> |
width} | x-display full <display>}
no cli session {auto-logout | paging enable | prefix-modes enable |
progress enable | terminal type | x-display}
Configures CLI options for this session only.
The no form of the command deletes or disables the CLI sessions.
terminal length Sets the number of lines for the current terminal
Range: 5-999
59
terminal resize Resizes the CLI terminal settings (to match the
actual terminal window).
Default N/A
History 3.1.0000
terminal
terminal {length <number of lines> | resize | type <terminal type> |
width <number of characters>}
no terminal type
Configures default CLI options for all future sessions.
The no form of the command clears the terminal type.
Syntax Description length Sets the number of lines for this terminal
Range: 5-999
60
type Sets the terminal type
Possible values: ansi, console, dumb, linux,
screen, vt52, vt100, vt102, vt220, xterm
Default N/A
History 3.1.0000
Default Enabled
History 3.4.3000
61
show cli
show cli
Displays the CLI configuration and status.
Default N/A
History 3.1.0000
62
show cli max-sessions
show cli max-sessions
Displays maximum number of sessions.
Default N/A
History 3.5.0200
Related Commands
Notes
Default N/A
History 3.5.0200
Related Commands
Notes
63
Banner
banner login
banner login <string>
no banner login
Sets the CLI welcome banner message.
The no form of the command resets the system login banner to its default.
Syntax N/A
Description
History 3.5.0200
banner login-local
banner login-local <string>
no banner login-local
Sets system login local banner.
The no form of the command resets the banner to its default value.
Syntax N/A
Description
Default ""
History 3.1.0000
3.5.0200 Added the no form of the command
Example switch (config) # banner login-local Example
64
Related show banner
Commands
Notes • The login-local refers to the serial connection banner
• If more than one word is used (there is a space) quotation marks should be added
(i.e. “xxxx xxxx”)
banner login-remote
banner login-remote <string>
no banner login-remote
Sets system login remote banner.
The no form of the command resets the banner to its default value.
banner logout
banner logout <string>
no banner logout
Sets system logout banner (for both local and remote logins).
The no form of the command resets the banner to its default value.
65
Configuration config
Mode
History 3.1.0000
3.5.0200 Added the no form of the command
Example switch (config) # banner logout Example
banner logout-local
banner logout-local <string>
no banner logout-local
Sets system logout local banner.
The no form of the command resets the banner to its default value.
banner logout-remote
banner logout-remote <string>
no banner logout-remote
Sets system logout remote banner.
The no form of the command resets the banner to its default value.
66
Configuration Mode config
History 3.5.0200
Example switch (config) # banner logout-remote Example
banner motd
banner motd <string>
no banner motd
Configures the message of the day banner.
The no form of the command resets the system Message of the Day banner.
Configuration config
Mode
History 3.1.0000
Example switch (config) # banner motd “My Banner”
show banner
show banner
Sets system logout remote banner.
The no form of the command resets the banner to its default value.
67
Syntax N/A
Description
Default N/A
Configuration config
Mode
History 3.1.0000
3.5.0200 Updated Example
3.6.6000 Updated Example
Example switch (config) # show banner
Banners:
Message of the Day (MOTD):
Mellanox Switch
Login:
Mellanox ONYXMLNX-OS Switch Management
Logout:
Goodbye
Related banner login banner login-local banner login-remote banner logout banner logout-local
Commands banner logout-remote banner motd
Notes
SSH
Syntax N/A
Description
Default SSH server is enabled
Configuration config
Mode
History 3.1.0000
Example switch (config) # ssh server enable
68
ssh server host-key
ssh server host-key {<key-type> {private-key <private-key>| public-key <public-key>} |
generate}
Configures host keys for SSH.
69
interface Adds interface to SSH server access restriction list. Possible interfaces are “lo”,
and “mgmt0”.
Default SSH listen is enabled
Configuration config
Mode
History 3.1.0000
Example switch (config) # ssh server listen enable
interface Adds interface to SSH server access restriction list. Possible interfaces are
“lo”, and “mgmt0”.
Default 6 attempts
Configuration Mode config
History 3.1.0000
3.5.1000 Increased minimum number of
attempts
Example switch (config) # ssh server login attempts 5
70
ssh server login timeout
ssh server login timeout <time>
no ssh server login timeout
Configures login timeout on SSH server.
The no form of the command resets the timeout value to its default.
Default 2
Configuration Mode config
History 3.1.0000
Example switch (config) # ssh server min-version 2
71
ssh server ports
ssh server ports {<port1> [<port2>...]}
Specifies which ports the SSH server listens on.
Default 22
Configuration Mode config
History 3.1.0000
Example switch (config) # ssh server ports 22
Default N/A
Configuration Mode config
History 3.3.5060
3.6.4000
Example switch (config) # ssh server security strict
72
ssh server security strict
ssh server tcp-forwarding enable
Enables TCP port forwarding.
The no form of the command disables TCP port forwarding.
Default N/A
Configuration Mode config
History 3.1.0000
Example switch (config) # ssh server tcp-forwarding enable
Default Disabled
Configuration Mode config
History 3.1.0000
Example switch (config) # ssh server x11-forwarding enable
Related Commands
Notes
73
ssh client global
ssh client global {host-key-check <policy>} | known-host <known-host-entry>}
no ssh client global {host-key-check | known-host localhost}
Configures global SSH client settings.
The no form of the command negates global SSH client settings.
Syntax host-key-check <policy> Sets SSH client configuration to control how host key checking is
Description performed. This parameter may be set in 3 ways.
• If set to “no” it always permits connection, and accepts
any new or changed host keys without checking
• If set to “ask” it prompts user to accept new host keys,
but does not permit a connection if there was already a
known host entry that does not match the one presented
by the host
• If set to “yes” it only permits connection if a matching
host key is already in the known hosts file
known-host Adds an entry to the global known-hosts configuration file
known-host-entry Adds/removes an entry to/from the global known-hosts
configuration file. The entry consist of “<IP> <key-type> <key>”.
Default host-key-check – ask, no keys are configured by default
Configuratio config
n Mode
History 3.1.0000
Example switch (config) # ssh client global host-key-check no
switch (config) # ssh client global known-host "72.30.2.2 ssh-rsa
AAAAB3NzaC1yc2EAAAAB....f2CyXFq4pzaR1jar1Vk="
Syntax username The specified user must be a valid account on the system.
Description Possible values for this parameter are “admin”, “monitor”,
“xmladmin”, and “xmluser”.
74
authorized-key sshv2 <public Adds the specified key to the list of authorized SSHv2 RSA
key> or DSA public keys for this user account. These keys can be
used to log into the user's account.
identity <key type> Sets certain SSH client identity settings for a user, dsa2 or
rsa2
generate Generates SSH client identity keys for specified user
private-key Sets private key SSH client identity settings for the user
public-key Sets public key SSH client identity settings for the user
known-host <known host> Removes host from user's known host file
remove
Default No keys are created by default
Configuration config
Mode
History 3.1.0000
Example switch (config) # ssh client user admin known-host 172.30.1.116 remove
slogin
slogin [<slogin options>] <hostname>
Invokes the SSH client. The user is returned to the CLI when SSH finishes.
Syntax Description slogin usage: slogin [-1246AaCfgkNnqsTtVvXxY] [-b bind_address] [-c cipher_spec] [-D
options port] [-e escape_char] [-F configfile] [-i identity_file] [-L port:host:hostport] [-
l login_name] [-m mac_spec] [-o option] [-p port] [-R port:host:hostport]
[user@]hostname [command]
Default N/A
Configuration Mode config
History 3.1.0000
Example switch (config) # slogin 192.168.10.70
The authenticity of host '192.168.10.70 (192.168.10.70)' can't be established.
RSA key fingerprint is 2e:ad:2d:23:45:4e:47:e0:2c:ae:8c:34:f0:1a:88:cb.
Are you sure you want to continue connecting (yes/no)? yes
Related Commands
Notes
75
show ssh client
show ssh client
Displays the client configuration of the SSH server.
Related Commands
Notes
76
Example switch (config) # show ssh server
SSH server configuration:
SSH server enabled: yes
Server security strict mode: no
Minimum protocol version: 2
TCP forwarding enabled: yes
X11 forwarding enabled: no
SSH login timeout: 120
SSH login max attempts: 6
SSH server ports: 22
Interface listen enabled: yes
Listen Interfaces:
No interface configured.
Host Key Finger Prints and Key Lengths:
RSA v1 host key: SHA256:sMgangJjG9FmSch/9Y9aZ/WJ2wKf3c+SeF8XKgYYdCA (2048)
RSA v2 host key: SHA256:gVu6qLW1ZifEp8wRer2jkvILZMGNl6VCYU3HqC1INC8 (2048)
DSA v2 host key: SHA256:JnldTEla20ZF/c5LdIqo9251DzO742k3hFCQh3Jt4ZA (1024)
Related Commands
Notes
Host Keys:
RSA v1 host key: "kebo-2100-1 2048 65537 21801469875<...>27851"
RSA v2 host key: "kebo-2100-1 ssh-rsa AAAAB3Nza<...>KE5"
DSA v2 host key: "kebo-2100-1 ssh-dss AAAAB3Nza<...>/s="
77
Notes
Remote Login
telnet
telnet
Logs into another system using telnet.
telnet-server enable
telnet-server enable
no telnet-server enable
Enables the telnet server.
The no form of the command disables the telnet server.
Notes
78
show telnet-server
show telnet-server
Displays telnet server settings.
Notes
Web Interface
web auto-logout
web auto-logout <mins>
no web auto-logout <mins>
Configures length of user inactivity before auto-logout of a web session.
The no form of the command disables the web auto-logout (web sessions will never logged
out due to inactivity).
Default 60 minutes
Configuration config
Mode
History 3.1.0000
Example switch (config) # web auto-logout 60
79
web cache-enable
web cache-enable
no web cache-enable
Enables web clients to cache web pages.
The no form of the command disables web clients from caching web pages.
Syntax N/A
Description
Default N/A
Configuration config
Mode
History 3.2.3000
Related
Commands
Notes
80
web client ca-list
web client ca-list {<ca-list-name> | default-ca-list | none}
no web client ca-list
Configures supplemental CA certificates for verification of server
certificates during HTTPS file transfers.
The no form of the command uses no supplemental certificates.
Default default-ca-list
History 3.2.3000
Related Commands
Notes
web enable
web enable
no web enable
Enables the web-based management console.
The no form of the command disables the web-based management
console.
Default enable
History 3.1.0000
81
Related Commands show web
Notes
web http
web http {enable | port <port-number> | redirect}
no web http {enable | port | redirect}
Configures HTTP access to the web-based management console.
The no form of the command negates HTTP settings for the web-based
management console.
History 3.1.0000
web httpd
web httpd listen {enable | interface <ifName>}
no web httpd listen {enable | interface <ifName>}
Enables the listen interface restricted list for HTTP and HTTPS.
The no form of the command disables the HTTP server listen ability.
82
Syntax Description enable Enables Web interface restrictions on access to
this system
History 3.1.0000
web https
web https {certificate {regenerate | name | default-cert} | enable | port
<port number> | ssl ciphers {all | TLS | TLS1.2}}
no web https {enable | port <port number>}
Configures HTTPS access to the web-based management console.
The no form of the command negates HTTPS settings for the web-based
management console.
ssl ciphers {all | TLS | TLS1.2} Sets ciphers to be used for HTTPS
83
Configuration Mode config
History 3.1.0000
History 3.6.8008
Notes
84
web https ssl secure-cookie enable
web https ssl secure-cookie enable
no web https ssl secure-cookie enable
Enables SSL secure-cookie flag in httpd web server.
The no form of the command disables secure-cookie flag in httpd web server.
Default Enabled
History 3.6.8008
Notes
History 3.1.0000
Notes
85
web proxy auth basic
web proxy auth basic {password <password> | username <username>}
no web proxy auth basic {password | username}
Configures HTTP basic authentication settings for proxy.
The no form of the command clears password or username configuration.
Default N/A
History 3.1.0000
Notes
Default N/A
History 3.1.0000
86
Notes
show web
show web
Displays WebUI configuration.
Default N/A
History 3.6.6000
Example switch (config) # show web
Web User Interface:
Web interface enabled: yes
Web caching enabled: no
HTTP enabled: no
HTTP port: 80
HTTP redirect to HTTPS: no
HTTPS enabled: yes
HTTPS port: 443
HTTPS ssl-ciphers: TLS1.2
HTTPS ssl-renegotiation: no
HTTPS ssl-secure-cookie: yes
HTTPS certificate name: default-cert
Listen enabled: yes
Listen Interfaces:
No interface configured.
Inactivity timeout: 1 hr
Session timeout: 2 hr 30 min
Session renewal: 30 min
Web file transfer proxy:
Proxy enabled: no
Web file transfer certificate authority:
HTTPS server cert verify: yes
HTTPS supplemental CA list: default-ca-list
87
Notes
88
System Management
The following pages provide information on configuring general management features on the switch
system.
• Management Interfaces
• Chassis Management
• Management Source IP Address
• Upgrade/Downgrade Process
• Configuration Management
• Virtual Machine
• Resource Scale
Management Interfaces
Management interfaces are used in order to provide access to switch management user interfaces
(e.g. CLI, WebUI). Mellanox switches support out-of-band (OOB) dedicated interfaces (e.g. mgmt0,
mgmt1) and in-band dedicated interfaces. In addition, most Mellanox switches feature a serial port
that provides access to the CLI only.
On switch systems with two OOB management ports, both of them may be configured on the same
VLAN if needed. In this case, ARP replies to the IP of those management interfaces is answered from
either of them.
2. Disable setting IP addresses using the DHCP using the following command:
89
switch (config) # interface mgmt0 ipv6 address autoconfig
For all other systems (and software versions) DHCP is disabled by default.
If a user connects through SSH, runs the wizard and turns off DHCP, the connection is
immediately terminated as the management interface loses its IP address.
Default Gateway
To configure manually the default gateway, use the “ip route” command, with “0.0.0.0” as prefix
and mask. The next-hop address must be within the range of one of the IP interfaces on the system.
In-Band Management
In-band management is a management path passing through the data ports. In-band management
can be created over one of the VLANs in the systems.
The in-band management feature does not require any license. However, it works only for the
system profile Ethernet. It can be enabled with IP Routing.
90
switch (config)# interface vlan 10
switch (config interface vlan 10)#
Getting the hostname through DHCP is enable by default and will change the switch
hostname if the hostname is not set by the user. Therefore, if a switch is part of an HA
cluster the user would need to make sure the HA master has the same HA node names as
the DHCP server.
91
Management Interface Commands
Interface
interface
interface {mgmt0 | mgmt1 | lo | vlan<id>}
Enters a management interface context.
lo Loopback interface
Default N/A
History 3.1.0000
Notes
ip address
ip address <IP address> <netmask>
no ip address
Sets the IP address and netmask of this interface.
The no form of the command clears the IP address and netmask of
this interface.
Default 0.0.0.0/0
92
History 3.1.0000
ip default-gateway
ip default-gateway <next-hop-IP-address> <interface-name>
no default-gateway <next-hop-IP-address> <interface-name>
Configures a default route.
The no form of the command removes the current default route.
History 3.1.0000
Related Commands
Notes
alias
alias <index> ip address < IP address> <netmask>
no alias <index>
Adds an additional IP address to the specified interface. The secondary
address will appear in the output of “show interface” under the data of
the primary interface along with the alias.
The no form of the command removes the secondary address to the
specified interface.
93
Syntax Description index A number that is to be aliased to (associated with)
the secondary IP
Default N/A
History 3.1.0000
mtu
mtu <bytes>
no mtu <bytes>
Sets the Maximum Transmission Unit (MTU) of this interface.
The no form of the command resets the MTU to its default.
Default 1500
History 3.6.3004
Notes
94
duplex
duplex <duplex>
no duplex
Sets the interface duplex.
The no form of the command resets the duplex setting for this interface
to its default value.
Syntax Description duplex Sets the duplex mode of the interface. The
following are the possible values:
• half - half duplex
• full - full duplex
• auto - auto duplex sensing (half or full)
Default auto
History 3.1.0000
Notes • Setting the duplex to “auto” also sets the speed to “auto”
• Setting the duplex to one of the settings “half” or “full” also sets
the speed to a manual setting which is determined by querying
the interface to find out its current auto-detected state
speed
speed <speed>
no speed
Sets the interface speed.
The no form of the command resets the speed setting for this interface
to its default value.
Syntax Description speed Sets the speed of the interface. The following are
the possible values:
• 10 - fixed to 10Mbps
• 100 - fixed to 1000Mbps
• 1000 - fixed to 1000Mbps
• auto - auto speed sensing (10/100/1000Mbps)
Default auto
History 3.1.0000
95
Example switch (config interface mgmt0)# speed auto
Notes • Setting the speed to “auto” also sets the duplex to “auto”
• Setting the speed to one of the manual settings (generally “10”,
“100”, or “1000”) also sets the duplex to a manual setting which
is determined by querying the interface to find out its current
auto-detected state
dhcp
dhcp [renew]
no dhcp
Enables DHCP on the specified interface.
The no form of the command disables DHCP on the specified interface.
History 3.1.0000
Notes • When enabling DHCP, the IP address and netmask are received via
DHCP hence, the static IP address configuration is ignored
• Enabling DHCP disables zeroconf and vice versa
• Setting a static IP address and netmask does not disable DHCP.
DHCP is disabled using the “no” form of this command, or by
enabling zeroconf.
dhcp hostname
dhcp hostname
no dhcp hostname
Enables fetching the hostname from DHCP for this interface.
The no form of the command disables fetching the hostname from DHCP for this
interface.
96
Syntax Description N/A
Default Enabled
History 3.5.1000
shutdown
shutdown
no shutdown
Disables the specified interface.
The no form of the command enables the specified interface.
Default no shutdown
History 3.1.0000
Notes
97
zeroconf
zeroconf
no zeroconf
Enables zeroconf on the specified interface. It randomly chooses a unique link-local
IPv4 address from the 169.254.0.0/16 block. This command is an alternative to DHCP.
The no form of the command disables the use of zeroconf on the specified interface.
Default no zeroconf
History 3.1.0000
comment
comment <comment>
no comment
Adds a comment for an interface.
The no form of the command removes a comment for an interface.
Syntax Description comment A free-form string that has no semantics other than
being displayed when the interface records are
listed.
Default no comment
History 3.1.0000
Related Commands
Notes
98
ipv6 enable
ipv6 enable
no ipv6 enable
Enables all IPv6 addressing for this interface.
The no form of the command disables all IPv6 addressing for this interface.
History 3.1.0000
Notes • The interface identifier is a 64-bit long modified EUI-64, which is based on the
MAC address of the interface
• If IPv6 is enabled on an interface, the system will automatically add a link-local
address to the interface. Link-local addresses can only be used to communicate
with other hosts on the same link, and packets with link-local addresses are
never forwarded by a router.
• A link-local address, which may not be removed, is required for proper IPv6
operation. The link-local addresses start with “fe80::”, and are combined with
the interface identifier to form the complete address.
ipv6 address
ipv6 address {<IPv6 address/netmask> | autoconfig [default | privacy]}
no ipv6 {<IPv6 address/netmask> | autoconfig [default | privacy]}
Configures IPv6 address and netmask to this interface, static or autoconfig
options are possible.
The no form of the command removes the given IPv6 address and netmask or
disables the autoconfig options.
99
autoconfig Enables IPv6 stateless address auto
configuration (SLAAC) for this interface.
An address will be automatically added to
the interface based on an IPv6 prefix
learned from router advertisements,
combined with an interface identifier.
History 3.1.0000
History 3.1.0000
100
Example switch (config)# ipv6 dhcp primary-intf mgmt0
Notes
Default N/A
History 3.1.0000
Notes • This command only gets DNS configuration, not an IPv6 address
• The no form of the command requests all information, including an IPv6
address
101
Configuration Mode config interface management
History 3.7.11xx
Notes
Default N/A
History 3.7.11xx
Notes
Default N/A
102
History 3.1.0000
IPv6 address:
fe80::268a:7ff:fe53:3d8e/64
Rx:
2055054 bytes
28830 packets
0 mcast packets
0 discards
0 errors
0 overruns
0 frame
Tx:
377716 bytes
3200 packets
0 discards
0 errors
0 overruns
0 carrier
0 collisions
0 queue len
Related Commands
Notes
Default N/A
103
Configuration Mode Any command mode
History 3.1.0000
IPv6 address:
fe80::268a:7ff:fe53:3d8e/64
Related Commands
Notes
Default N/A
History 3.1.0000
104
Example switch (config)# show interfaces mgmt0 configured
Related Commands
Notes
Hostname Resolution
hostname
hostname <hostname>
no hostname
Sets a static system hostname.
The no form of the command clears the system hostname.
History 3.1.0000
105
ip name-server
ip name-server <IPv4/IPv6 address>
no ip name-server <IPv4/IPv6 address>
Sets the static name server.
The no form of the command clears the name server.
History 3.1.0000
Notes
ip domain-list
ip domain-list <domain-name>
no ip domain-list <domain-name>
Sets the static domain name.
The no form of the command clears the domain name.
History 3.1.0000
Notes
106
ip/ipv6 host
{ip | ipv6} host <hostname> <ip-address>
no {ip | ipv6} host <hostname> <ip-address>
Configures the static hostname IPv4 or IPv6 address mappings.
The no form of the command clears the static mapping.
History 3.1.0000
Notes
ip/ipv6 map-hostname
{ip |ipv6} map-hostname
no {ip | ipv6} map-hostname
Maps between the currently-configured hostname and the loopback address 127.0.0.1.
The no form of the command clears the mapping.
Syntax N/A
Description
Configuration config
Mode
History 3.1.0000
107
Related show hosts
Commands
Notes • If no mapping is configured, a mapping between the hostname and the IPv4
loopback address 127.0.0.1 will be added
• The no form of the command maps the hostname to the IPv6 loopback address if
there is no statically configured mapping from the hostname to an IPv6 address
(disabled by default)
• Static host mappings are preferred over DNS results. As a result, with this option
set, you will not be able to look up your hostname on your configured DNS server;
but without it set, some problems may arise if your hostname cannot be looked up
in DNS.
show hosts
show hosts
Displays hostname, DNS configuration, and static host mappings.
Syntax N/A
Description
Default N/A
History 3.1.0000
Hostname: switch1
Name servers:
10.7.77.192 dynamic (DHCP on mgmt0)
10.7.77.135 dynamic (DHCP on mgmt0)
10.198.0.169 dynamic (DHCP on mgmt0)
(*) 10.211.0.124 dynamic (DHCP on mgmt0)
Domain names:
mtl.labs.mlnx dynamic (DHCP on mgmt0)
(*) Inactive due to system limits on name servers and domain names.
Related
Commands
108
Notes
Routing
Default N/A
History 3.1.0000
Notes
109
ipv6 default-gateway
ipv6 default-gateway {<ip-address> | <ifname>}
no ipv6 default-gateway
Sets a static default gateway.
The no form of the command deletes the default gateway.
Default N/A
History 3.1.0000
Notes • The configured default gateway will not be used if DHCP is enabled
• In order to configure ipv4 default-gateway use ‘ip route’ command.
Syntax Description static Filters the table with the static route entries
Default N/A
History 3.1.0000
Example
110
switch (config)# show ip route
Destination Mask Gateway Interface Source
default 0.0.0.0 172.30.0.1 mgmt0 DHCP
10.10.10.10 255.255.255.255 0.0.0.0 mgmt0 static
20.10.10.10 255.255.255.255 172.30.0.1 mgmt0 static
20.20.20.0 255.255.255.0 0.0.0.0 mgmt0 static
172.30.0.0 255.255.0.0 0.0.0.0 mgmt0 interface
switch (config)# show ipv6 route
Destination prefix
Gateway Interface Source
-----------------------------------------------------------------------
::/0
:: mgmt0 static
::1/128
:: lo local
2222:2222:2222::/64
:: mgmt1 interface
Notes
Default N/A
History 3.1.0000
Notes The configured IPv4 default gateway will not be used if DHCP is enable
111
ip arp
ip arp <ip-address> <mac-address>
no ip arp <ip-address> <mac-address>
Sets a static ARP entry.
The no form of the command deletes the static ARP.
Default N/A
History 3.2.0500
Notes
ip arp timeout
ip arp [vrf <vrf-name>] time out <timeout-value>
no ip arp [vrf <vrf-name>] timeout
Sets the dynamic ARP cache timeout.
The no form of the command sets the timeout to default.
History 3.2.0230
112
Related Commands ip arp
show ip arp
Notes • This value is used as the default ARP timeout whenever a new IP
interface is created
• The time interval after which each ARP entry becomes stale may
actually vary from 50-150% of the configured value
show ip arp
show ip arp [interface <type> | <ip-address> | count]
Displays ARP table.
Default N/A
History 3.3.3000
Example
switch (config)# show ip arp
Related Commands
Notes
113
ipv6 neighbor
ipv6 neighbor <ipv6-address> <ifname> <mac-address>
no ipv6 neighbor <ipv6-address> <ifname> <mac-address>
Adds a static neighbor entry.
The no form of the command deletes the static entry.
Default N/A
History 3.1.0000
Default N/A
History 3.1.0000
114
3.6.4110 Updated command
Syntax Description static Filters only the table of the static entries.
Default N/A
History 3.1.0000
Example
switch (config)# show ipv6 neighbors
IPv6 Address Age MAC Address State Interf
------------------------------------- ----- ----------------- ---------- ------
2001::2 9428 AA:AA:AA:AA:AA:AA permanent mgmt0
Notes
115
DHCP
ip dhcp
ip dhcp {default-gateway yield-to-static | hostname <hostname>| primary-intf
<ifname> | send-hostname}
no ip dhcp {default-gateway yield-to-static| hostname | | primary-intf | send-
hostname}
Sets global DHCP configuration.
The no form of the command deletes the DHCP configuration.
Syntax Description yield-to-static| Does not allow you to install a default gateway
from DHCP if there is already a statically
configured one
History 3.1.0000
show ip dhcp
show ip dhcp
Displays the DHCP configuration and status.
116
Default N/A
History 3.1.0000
Notes
General IPv6
ipv6 enable
ipv6 enable
no ipv6 enable
Enables IPv6 globally on the management interface.
The no form of the command disables IPv6 globally on the management interface.
History 3.1.0000
117
Related Commands ipv6 default-gateway
ipv6 host
ipv6 map-hostname
ipv6 neighbor
ipv6 route
show ipv6
show ipv6 default-gateway
show ipv6 route
Notes
IP Diagnostic Tools
ping
ping [-LRUbdfnqrvVaA] [-c count] [-i interval] [-w deadline] [-p pattern] [-s packetsize] [-t
ttl] [-I interface or address] [-M mtu discovery hint] [-S sndbuf] [-T timestamp option ] [-
Q tos ] [hop1 ...] destination
Sends ICMP echo requests to a specified host.
Default N/A
Configuration config
Mode
History 3.1.0000
Related traceroutes
Commands
Notes
118
traceroute
traceroute [-46dFITUnrAV] [-f first_ttl] [-g gate,...] [-i device] [-m max_ttl] [-N squeries] [-
p port] [-t tos] [-l flow_label] [-w waittime] [-q nqueries] [-s src_addr] [-z sendwait] host
[packetlen]
Traces the route packets take to a destination.
119
Configuration config
Mode
History 3.1.0000
Example
switch (config)# traceroute 192.168.10.70
traceroute to 192.168.10.70 (192.168.10.70), 30 hops max, 40 byte packets
1 172.30.0.1 (172.30.0.1) 3.632 ms 2.849 ms 3.544 ms
2 10.222.128.46 (10.222.128.46) 3.176 ms 3.289 ms 3.656 ms
3 10.158.128.30 (10.158.128.30) 15.331 ms 15.819 ms 16.388 ms
4 10.158.128.65 (10.158.128.65) 20.468 ms 7.893 ms 12.27 ms
5 10.7.34.115 (10.7.34.115) 16.405 ms 11.985 ms 12.264 ms6 192.168.10.70 (192.168.10.70) 16.377 ms 16.091
ms 20.475 ms
Related ping
Commands
Notes
tcpdump
tcpdump [-aAdDeflLnNOpqRStuUvxX] [-c count] [-C file_size] [-E algo:secret] [-F file] [-i
interface] [-M secret] [-r file] [-s snaplen] [-T type] [-w file] [-W filecount] [-y
datalinktype] [-Z user] [-D list possible interfaces] [expression]
Invokes standard binary, passing command line parameters straight through. Runs in
foreground, printing packets as they arrive, until the user hits Ctrl+C.
Syntax N/A
Description
Default N/A
Configuration config
Mode
History 3.1.0000
120
Related
Commands
Notes
Chassis Management
The chassis manager provides the user access to the following information:
Additionally, it monitors:
• System logs – accessible to the user at any time as they are saved permanently on the system
• Status LEDs – changed by the system health monitor when an error is found in the system and
is resolved
• Email/SNMP traps – notification on any error found in the system and resolved
Re-Notification on Errors
When the system is in an unhealthy state, the system health monitor notifies the user about the
current unresolved issue every X seconds. The user can configure the re-notification gap by running
the “health notif-cntr <counter>” command.
121
Alert Message Scenario Notification Recovery Action Recovery
Indicator Message
<fan_name> speed A chassis fan speed is Email, fan LED and Check the fan and “<fan_name> has
is below minimal below minimal system status LED replace it if required been restored to its
range threshold (15% of set red, log alert, normal state”
maximum speed) SNMP.
<fan_name> is A chassis fan is not Email, fan LED and Check fan “<fan_name> has
unresponsive responsive on the system status LED connectivity and been restored to its
switch system set red, log alert, replace it if required normal state”
SNMP
<fan_name> is not A chassis fan is Email, fan LED and Insert a fan unit “<fan_name> has
present missing system status LED been restored to its
set red, log alert, normal state”
SNMP
Insufficient Insufficient number Email, fan LED and Plug in additional “The system
number of working of working fans in the system status LED fans or change faulty currently has
fans in the system system set red, log alert, fans sufficient number of
SNMP working fans”
Power Supply The power supply Email, power supply Check the power “Power Supply
<ps_number> voltage is out of LED and system connection of the PS <ps_number>
voltage is out of range. status LED set red, voltage is in range”
range log alert, SNMP
Power supply A power supply unit Email, power supply Check chassis fans “Power supply
<ps_number> temperature is higher LED and system connections. On <ps_number>
temperature is too than the maximum status LED set red, switch systems, temperature is back
hot threshold of 70 log alert, SNMP check system fan to normal”
Celsius on the switch connections.
system
Power Supply A power supply is Email, system status Connect power cable “Power supply has
<number> is malfunctioning or and power supply or replace been removed” or
unresponsive disconnected LED set red, log malfunctioning PS “PS has been
alert, SNMP restored to its
normal state”
ASIC temperature An ASIC unit Email, system status Check the fan’s “ASIC temperature
is too hot temperature is higher LED set red, log system is back to normal”
than the maximum alert, SNMP
threshold of 105
Celsius on switch
systems
Power Management
122
a certain connection between Mellanox switch systems to lower the width of a link from 4X
operation to 1X based on the traffic flow.
LWR is relevant only for 40GbE speeds in which the links are operational at a 4X width.
When “show interfaces” is used, a port’s speed appears unchanged even when only one lane
is active.
• Disabled – LWR does not operate and the link remains in 4X under all circumstances.
• Automatic – the link automatically alternates between 4X and 1X based on traffic flow.
• Force – a port is forced to operate in 1X mode lowering the throughput capability of the port.
This mode should be chosen in cases where constant low throughput is expected on the port
for a certain time period – after which the port should be configured to one of the other two
modes, to allow higher throughput to pass through the port.
123
switch (config) # show temperature
---------------------------------------------------------
Module Component Reg CurTemp Status
(Celsius)
---------------------------------------------------------
MGMT SIB T1 33.00 OK
MGMT Board AMB temp T1 24.50 OK
MGMT Ports AMB temp T1 27.00 OK
MGMT CPU package Sensor T1 29.00 OK
MGMT CPU Core Sensor T1 28.00 OK
MGMT CPU Core Sensor T2 24.00 OK
PS1 power-mon T1 22.00 OK
PS2 power-mon T1 23.00 OK
4. Display the voltage current and status of each module in the system. Run:
USB Access
The OS can access USB devices attached to switch systems. USB devices are automatically
recognized and mounted upon insertion. To access a USB device for reading or writing a file, you
need to provide the path to the file on the mounted USB device in the following format:
scp://username:password@hostname/var/mnt/usb1/<file name>
While username and password are the admin username and password and hostname is the IP of the
switch.
Examples:
124
switch (config) # image fetch scp://username:password@hostname/var/mnt/usb1/<image filename>
• To save log file (my-logfile) to a USB device under the name “test_logfile” using the command
“logging files”, run:
• To safely remove the USB and to flush the cache, after writing (log files, for example) to a
USB, use the “usb eject” command:
System Reboot
To reboot your switch system, run:
Ethernet Family
Invalid Mac (SMAC=MC) Source MAC is a multicast address
125
Invalid Mac (SMAC=DMAC) Source MAC is same as destination mac address
Invalid Ethertype Packet has an unknown Ethertype (0x05DC < ethertype <
0x600)
IP Routing Family
Ingress Router interface is disabled Ingress packet has been dropped because incoming L3
interface is admin down
Mismatched IP (UC DIP over MC/BC Mac) Packet MAC is multicast/broadcast but destination IP is
unicast
Egress Router interface is disabled Egress packet has been dropped because outgoing L3
interface is admin/oper is down
Tunnel Family
NVE Decap fragmentation error Fragmentation error during decapsulation
126
Chassis Management Commands
• Chassis Management Commands
Chassis Management
clear counters
clear counters [all | interface <type> <number>]
Clears switch counters.
Default N/A
History 3.2.3000
Related Commands
Notes The command also clears storm-control counters
Default N/A
127
History 3.6.6000
Notes
health
health {max-report-len <length> | re-notif-cntr <counter> | report-clear}
Configures health daemon settings.
Syntax Description max-report-len <length> Sets the length of the health report
(number of line entries)
Range: 10-2048
Default max-report-len: 50
re-notif-cntr:
History 3.1.0000
Notes
led uid
led <module> uid <on | off>
Configures the UID LED.
128
Syntax Description module Specifies the module whose UID LED to
configure
Default N/A
History 3.6.1002
Related Commands
Notes
power enable
power enable <module name>
no power enable <module name>
Powers on the module.
The no form of the command shuts down the module.
History 3.1.0000
129
power-management width
power-management width {auto | force}
no power-management width
Sets the width of the interface to be automatically adjusted.
The no form of the command disables power-saving.
Default Disabled
History 3.3.4000
Notes
system profile
system profile {eth-default | eth-ipv6-max | eth-ipv4-mc-max} [force]
Optimizes switch system profile to preferred mode.
Default eth-default
History 3.6.6000
Example switch (config) # system profile eth-default
130
Notes
usb eject
usb eject
Turns off the USB interface gracefully.
History 3.1.0000
Related Commands
show asic-version
show asic-version
Displays firmware ASIC version.
Default N/A
History 3.1.0000
Related Commands
131
Notes
show bios
show bios
Displays the BIOS version information.
History 3.3.4150
Related Commands
Notes
show cpld
show cpld
Displays status of all CPLDs in the system.
Default N/A
History 3.1.0000
132
Related Commands
Notes
show fan
show fan
Displays fans status.
Default N/A
History 3.1.0000
Related Commands
Notes
show health-report
show health-report
Displays health report.
Default N/A
History 3.1.0000
133
3.3.0000 Output update
Notes
show inventory
show inventory
Displays system inventory.
Syntax N/A
Description
Default N/A
History 3.1.0000
Example
-----------------------------------------------------------------------
Module Part Number Serial Number Asic Rev. HW Rev.
-----------------------------------------------------------------------
CHASSIS MSN2100-CB2F MT1752X06330 N/A B3
MGMT MSN2100-CB2F MT1752X06330 1 B3
Related
Commands
Notes
134
show leds
show leds [<module>]
Displays the LED status of the switch system.
Default N/A
History 3.6.1002
Related Commands
Notes
show memory
show memory
Displays memory status.
Syntax N/A
Description
Default N/A
135
History 3.1.0000
Example
switch (config) # show memory
-----------------------------------------------------------------------
Memory Space Total Used Free Used+B/C Free-B/C
-----------------------------------------------------------------------
Physical 15848 MB 2849 MB 12999 MB 3854 MB 11994 MB
Swap 0 MB 0 MB 0 MB
Related
Commands
Notes
show module
show module
Displays modules status.
Default N/A
History 3.1.0000
136
Example switch (config) # show module
======================
Module Status
======================
MGMT ready
FAN1 ready
FAN2 ready
PS1 ready
PS2 not-present
Related Commands
Notes The Status column may have one of the following values: error, fatal,
not-present, powered-off, powered-on, ready.
show power
show power
Displays power supplies and power usage.
Syntax N/A
Description
Default N/A
History 3.1.0000
Example
switch (config) # show power
----------------------------------------------------------------------------------
Module Device Sensor Power Voltage Current Capacity Feed Status
[Watts] [Volts] [Amp] [Watts]
----------------------------------------------------------------------------------
PS1 power-mon input 32.25 12.11 1.26 800.00 DC OK
PS2 power-mon input 46.56 12.13 2.33 800.00 DC OK
Related
Commands
Notes
137
show power consumers
show power consumers
Displays power consumption information.
Syntax N/A
Description
Default N/A
History 3.1.0000
Example
switch (config) # show power consumers
-------------------------------------------------------------------------
Module Device Sensor Power Voltage Current Status
[Watts] [Volts] [Amp]
-------------------------------------------------------------------------
MGMT CURR_MONITOR 12V 52.96 11.71 4.52 OK
Related
Commands
Notes
show protocols
show protocols
Displays all protocols enabled in the system.
Default N/A
138
Configuration Mode Any command mode
History 3.2.3000
Ethernet enabled
spanning-tree rst
lacp disabled
lldp disabled
igmp-snooping disabled
ets enabled
priority-flow-control disabled
sflow disabled
openflow disabled
mlag disabled
dot1x disabled
isolation-group disabled
IP routing disabled
bgp disabled
pim disabled
vrrp disabled
ospf disabled
magp disabled
dhcp-relay disabled
Related Commands
Notes
show resources
show resources
Displays system resources.
Default N/A
History 3.1.0000
139
Example switch (config) # show resources
Total Used Free
Physical 2027 MB 761 MB 1266 MB
Swap 0 MB 0 MB 0 MB
Number of CPUs: 1
CPU load averages: 0.11 / 0.23 / 0.23
CPU 1
Utilization: 5%
Peak Utilization Last Hour: 19% at 2012/02/15 13:26:19
Avg. Utilization Last Hour: 7%
Related Commands
Notes
Default N/A
History 3.1.0000
Notes
140
show system hardware events
show system hardware events <family-name> [clear-on-read]
Displays all active events.
Syntax Description family-name Displays all active events per event family:
• ethernet
• tunnel
• ip
clear-on-read Clears all active events after displaying them
Default N/A
History 3.6.6000
Tunnel:
Related Commands
Notes
Default N/A
History 3.1.0000
141
Notes
Default N/A
History 3.2.0000
Profile: eth-default
Notes
Default N/A
History 3.6.6000
142
Example switch (config) # show system profile detailed
Profile: eth-default
-----------------------------------------------
Parameter Guaranteed Max Value
-----------------------------------------------
FDB size 102400
IPMC-L2 lists 10240
IPMC-L3 lists 10240
IPv4 MC/IGMP routes 10240
IPv4 neighbors 51200
IPv6 neighbors 8192
IPv4 routes 100000
IPv6 shorts 51200
IPv6 routes 21504
VRF 64
RIF 999
Notes
Syntax N/A
Description
Default N/A
History 3.5.1000
Example
switch (config) # show system type
SN2100
Related
Commands
Notes
143
show temperature
show temperature
Displays system temperature sensors status.
Default N/A
History 3.1.0000
Related Commands
Notes
show version
show version
Displays version information for the currently running system image.
Default N/A
History 3.1.0000
144
Example switch (config) # show version
Product name: Onyx
Product release: 3.6.8008
Build ID: #1-dev
Build date: 2018-07-18 13:46:44
Target arch: x86_64
Target hw: x86_64
Built by: jenkins@c5de6027485e
Version summary: X86_64 3.6.8008 2018-07-18 13:46:44 x86_64
Related Commands
Notes
Default N/A
History 3.1.0000
Related Commands
Notes
show voltage
show voltage
Displays voltage level measurements on different sensors.
145
Syntax N/A
Description
Default N/A
History 3.1.0000
Example
switch (config) # show voltage
============================================================================================
Module Power Meter Reg Expected Actual Status High Low
Voltage Voltage Range Range
============================================================================================
MGMT BOARD_MONITOR USB 5V sensor 5.00 5.15 OK 5.55 4.45
MGMT BOARD_MONITOR Asic I/O sensor 2.27 2.11 OK 2.55 1.99
MGMT BOARD_MONITOR 1.8V sensor 1.80 1.79 OK 2.03 1.57
MGMT BOARD_MONITOR SYS 3.3V sensor 3.30 3.28 OK 3.68 2.92
MGMT BOARD_MONITOR CPU 0.9V sensor 0.90 0.93 OK 1.04 0.76
MGMT BOARD_MONITOR 1.2V sensor 1.20 1.19 OK 1.37 1.03
MGMT CPU_BOARD_MONITOR 12V sensor 12.00 11.67 OK 13.25 10.75
MGMT CPU_BOARD_MONITOR 12V sensor 2.50 2.46 OK 2.80 2.20
MGMT CPU_BOARD_MONITOR 2.5V sensor 3.30 3.26 OK 3.68 2.92
MGMT CPU_BOARD_MONITOR SYS 3.3V sensor 3.30 3.24 OK 3.68 2.92
MGMT CPU_BOARD_MONITOR SYS 3.3V sensor 1.80 1.79 OK 2.03 1.57
MGMT CPU_BOARD_MONITOR 1.8V sensor 1.20 1.24 OK 1.37 1.03
Related
Commands
Notes
• FTP
• TFTP
• NTP
• Syslog
• TACACS
• SSH, SSHD, SCP
• Ping
• Traceroute
• SNMP
146
Commands
Related Commands
Notes
Default N/A
Related Commands
Notes
147
ip ftp source-interface
ip ftp source-interface <interface>
no ip ftp source-interface <interface>
Configures the source interface for ftp protocol.
The no form of the command disables the ftp source interface protocol.
Default N/A
Related Commands
Notes
ip tftp source-interface
ip tftp source-interface <interface>
no ip tftp source-interface <interface>
Configures the source interface for tftp protocol.
The no form of the command disables the tftp source interface
protocol.
Default N/A
Related Commands
Notes
148
ip scp source-interface
ip scp source-interface <interface>
no ip scp source-interface <interface>
Configures the source interface for scp protocol.
The no form of the command disables the scp source interface
protocol.
Default N/A
Related Commands
Notes
ip sftp source-interface
ip sftp source-interface <interface>
no ip sftp source-interface <interface>
Configures the source interface for sftp protocol.
The no form of the command disables the sftp source interface
protocol.
Default N/A
Related Commands
Notes
149
ip traceroute source-interface
ip traceroute source-interface <interface>
no ip traceroute source-interface <interface>
Configures the source interface for traceroute protocol.
The no form of the command disables the traceroute source interface
protocol.
Default N/A
Related Commands
Notes
logging source-interface
logging source-interface <interface>
no logging source-interface <interface>
Configures the source interface for sending the log messages to remote
servers.
The no form of the command disables the logging source interface
protocol.
Default N/A
Related Commands
Notes
150
tacacs source-interface
tacacs source-interface <interface>
no tacacs source-interface <interface>
Configures the source interface for tacacs protocol.
The no form of the command disables the tacacs source interface
protocol.
Default N/A
Related Commands
Notes
ip icmp source-interface
ip icmp source-interface
no ip icmp source-interface
Configures the source interface for icmp protocol (for ping requests).
The no form of the command disables the icmp source interface
protocol.
Default N/A
Related Commands
Notes
151
ntp source-interface
ntp source-interface <interface>
no ntp source-interface <interface>
Configures the source interface for ntp protocol. This interface will be
used for user requested and periodic ntp synchronization.
The no form of the command disables the ntp source interface protocol.
Related Commands
Notes This command sets source IP for NTPD and NTP date
snmp-server source-interface
snmp-server source-interface <interface>
no nmp-server source-interface <interface>
Configures the source interface for sending SNMP traps and informs.
The no form of the command disables the snmp-server source
interface protocol.
Default N/A
152
show ip ftp source-interface
show ip ftp source-interface
Displays the source interface.
Related Commands
Notes
Related Commands
Notes
153
show logging source-interface
show logging source-interface
Displays the source interface.
Related Commands
Notes
Related Commands
Notes
154
show icmp source-interface
show icmp source-interface
Displays the source interface.
Related Commands
Notes
Related Commands
Notes
155
show ssh client source-interface
show ssh client source-interface
Displays the SSH client source interface.
Related Commands
Notes
Related Commands
Notes
156
show ip sftp source-interface
show ip sftp source-interface
Displays the source interface.
Related Commands
Notes
Configured: loopback7
Current : loopback7
IPv4-addr : 5.5.5.5
IPv6-addr : none
Upgrade/Downgrade Process
The following pages provide information on upgrading and downgrading the OS version on your
switch systems.
157
• Important Pre-OS Upgrade Notes
• Upgrading Operating System Software
• Upgrading HA Groups
• Upgrading MLAG-STP Setup
• Deleting Unused Images
• Downgrading OS Software
• Upgrading System Firmware
• Image Maintenance Using Mellanox ONIE
• Software Management Commands
158
switch (config) # show images
Installed images:
Partition 1:
<old_image>
Partition 2:
<old_image>
Last boot partition: 1
Next boot partition: 1
Images available to be installed:
webimage.tbz
<old_image>
Serve image files via HTTP/HTTPS: no
No image install currently in progress.
Boot manager password is set.
Image signing: trusted signature always required
Admin require signed images: yes
Settings for next boot only:
Fallback reboot on configuration failure: yes (default)
3. Delete the image listed under “Images available to be installed” prior to fetching the new
image. Use the command “image delete” for this purpose.
When deleting an image, you delete the file but not the partition. This is
recommended so as to not overload system resources.
5. Display the available images again and verify that the new image now appears under “Images
available to be installed”. Run:
To recover from image corruption (e.g. due to power interruption), there are two
installed images on the system. See the commands “image boot next”, and “image
boot location” for more information.
159
switch (config) # image install <new_image>
Step 1 of 4: Verify Image
100.0% [#############################################################]
Step 2 of 4: Uncompress Image
100.0% [#############################################################]
Step 3 of 4: Create Filesystems
100.0% [#############################################################]
Step 4 of 4: Extract Image
100.0% [#############################################################]
7. Have the new image activate during the next boot. Run:
After software reboot, the software upgrade will also automatically upgrade the
firmware version.
When performing upgrade from the WebUI, make sure that the image you are trying
to upgrade to is not located already in the system (i.e. fetched from the CLI).
Upgrading HA Groups
If fallback is ever necessary in an HA group, all cluster nodes must have the same OS version
installed and they must be immediately reloaded.
160
To upgrade Mellanox Onyx™ version without affecting an HA group:
2. Upgrade standby node in the HA group according to steps 1-10 in "Upgrading Operating
System Software".
3. Wait until all standby nodes have rejoined the group.
In situations of heavy CPU load or noisy network, it is possible that another node
assumes the role of cluster master before all standby nodes have rejoined the group.
If this happens, you may stop waiting and proceed directly to step 4.
When slave upgrade is complete and the master is still in the lower version, MACs are
not learned by the slave switch system (except for traffic flood) until master switch
upgrade is complete.
4. Upgrade the master node in the HA group according to steps 1-10 in "Upgrading Operating
System Software".
Procedure 1
3. Perform the upgrade according to steps 1-10 in "Upgrading Operating System Software".
4. Enable STP – this step may lead to traffic loss while the STP state is converging. Run:
Procedure 2:
3. Upgrade MLAG slave according to steps 1-10 in "Upgrading Operating System Software".
4. Upgrade MLAG master. Run:
161
switch (config) # reload force immediate
When deleting an image, you delete the file but not the partition. This is
recommended so as to not overload system resources.
Downgrading OS Software
Prior to downgrading software, please make sure the following prerequisites are met:
1. Log into your switch via the CLI using the console port.
2. Backup your configuration by following these steps:
a. Disable paging of CLI output. Run:
Downloading Image
1. Log into your system to obtain its product number. Run:
162
switch (config) # show inventory
5. Delete all previous images from the Images available to be installed prior to fetching the new
image.
6. Fetch the desired software image. Run:
Downgrading Image
The procedure described below assumes that booting and running is done from Partition 1
and the downgrade procedure is performed on Partition 2.
163
switch (config) # show images
Images available to be installed:
new_image.img
<downgrade version> 2010-09-19 16:52:50
Installed images:
Partition 1:
<current version> 2010-09-19 03:46:25
Partition 2:
<downgrade version> 2010-09-19 16:52:50
Last boot partition: 1
Next boot partition: 2
No boot manager password is set.
There are two installed images on the system. Therefore, if one of the images gets
corrupted (due to power interruption, for example), in the next reboot the image
will go up from the second partition.
If you are downgrading to an older software version which has never been run yet on
the switch, use the following command sequence as well:
***IMPORTANT***
All configuration changes done with the new software are lost when returning to the older
software version.
There are 2 instances where the backup configuration file does not exist:
• The user has run “reset factory” command, which clears all configuration files in the system
• The user has run “configuration switch-to” to a configuration file with different name then
the backup file
Note that the configuration file becomes empty if the switch is downgraded to a software version
which has never been installed yet.
To allow switching partition to the older software version for the 2 aforementioned cases only,
follow the steps below:
1. Run:
164
switch (config)# no boot next fallback-reboot enable
If a firmware update takes place, then the login process is delayed a few minutes.
To verify that the firmware update was successful, log into your switch and run the command “show
asic-version” (can be run in any mode). This command lists all of the switch modules along with
their firmware versions. Make sure that all the firmware versions are the same and match the
default firmware version. If the firmware update failed for one or more modules, then the following
warning is displayed.
Some subsystems are not updated with a default firmware.
If you detect a mismatch in firmware version for one or more modules of the switch system,
please contact your assigned field application engineer.
165
Default Firmware Change on Standalone Systems
1. Import the firmware image (.mfa file). Run:
Onyx is distributed in way that allows installation on an ONIE environment. Certain Mellanox switch
models come pre-installed with ONIE and Onyx and support changing to a different operating system
(OS).
1. Reboot the switch and wait for it to reach the GRUB menu:
2. Select the ONIE option using the arrow keys. The following message appears:
Due to security constraints, this option will uninstall your current MLNX OS system.
Are you sure ?
4. In order to manually insert an install URL, press Enter and insert the command “install_url
<http> / <tftp> <url> <image name .bin>”. For example:
install_url http://<ip_address>//sx_mlnx_os-3.5.1000-21/X86_64/X86_64-3.5.1000-21-installer.bin
Once you hit Enter, you have about 4 second to insert the command so it is recommended to
prepare the command in advance and simply pasting it in. At this stage, the OS installation
begins.
166
5. Wait for the installation to end and reboot this switch to boot into the OS.
image boot
image boot {location <location-ID> | next}
Specifies the default location where the system should be booted from.
boot next
boot next fallback-reboot enable
no boot next fallback-reboot enable
Sets the default setting for next boot. Normally, if the system fails to apply the
configuration on startup (after attempting upgrades or downgrades, as appropriate), it will
reboot to the other partition as a fallback.
The no form of the command tells the system not to do that, only for the next boot.
Syntax N/A
Description
167
Default N/A
Configuration config
Mode
History 3.2.0506
boot system
boot system {location | next}
no boot system next
Configures which system image to boot by default.
The no form of the command resets the next boot location to the current
active one.
Default N/A
History 3.2.0506
168
Related Commands show images
Notes
image default-chip-fw
image default-chip-fw <filename>
no image default-chip-fw <original-fw-filename>
Sets the default firmware package to be installed.
The no form of the command resets default firmware package.
Notes
image delete
image delete <image-name>
Deletes the specified image file.
Notes
169
image fetch
image fetch <URL> [<filename>]
Downloads an image from the specified URL or via SCP.
Syntax Description URL HTTP, HTTPS, FTP, TFTP, SCP and SFTP are supported
Example: scp://username[:password]@hostname/
path/filename
image install
image install <image-filename> [location <location-ID>] | [progress
<prog-options>]
Installs the specified image file.
170
Syntax Description image-filename Specifies the image name
Notes • The image cannot be installed on the “active” location (the one
which is currently being booted)
• On a two-location system, the location is chosen automatically if
no location is specified
image move
image move <src-image-name> <dest-image-name>
Renames the specified image file.
171
Notes
image options
image options serve all
no image options serve all
Configures options and defaults for image usage.
The no form of the command disables options and defaults for image usage.
Syntax Description serve all Specifies that the image files present on this
appliance should be made available for HTTP and/
or HTTPS download
Default N/A
Configuration Mode config
History 3.1.0000
Example switch (config) # image options serve all
Notes The parameter “serve all” affects not only the files currently present, but
also any files that are later downloaded. It only applies to image files, not
the installed images, which are not themselves in a downloadable format.
After running “serve all” the URLs where the images will be available are:
• http://<HOSTNAME>/system_images/<FILENAME>
• https://<HOSTNAME>/system_images/<FILENAME>
show bootvar
show bootvar
Displays the installed system images and the boot parameters.
172
Example switch (config)# show bootvar
Installed images:
Partition 1:
X86_64 3.6.4110-12 2017-07-26 06:54:12 x86_64
Partition 2:
X86_64 3.6.4006 2017-07-03 16:17:39 x86_64
Last boot partition: 1
Next boot partition: 1
Serve image files via HTTP/HTTPS: no
Boot manager password is set.
Image signing: trusted signature always required
Admin require signed images: yes
Settings for next boot only:
Fallback reboot on configuration failure: yes (default)
Related Commands
Notes
173
show images
show images
Displays information about the system images and boot parameters.
webimage.tbz
X86_64 3.6.4071-12 2017-07-26 06:54:12 x86_64
Notes
Configuration Management
174
• To save the configuration to a user-specified file without making the new file the active
configuration file, run:
• To save the configuration to a user-specified file and make the new file the active
configuration file, run:
• To display the available configuration files and the active file, run:
switch >
switch > enable
switch # configure terminal
switch (config) # configuration switch-to myconfig
switch (config) #
175
A newly created BIN configuration file is always empty and is not created from the running-
config.
Applying a new BIN configuration file changes the whole switch’s configuration and requires
system reboot which can be performed using the command "reload".
A binary configuration file uploaded from the switch is encrypted and has integrity
verification. If the file is modified in any manner, the fetch to the switch fails.
A newly created text configuration file is always created from the running-config.
176
Applying a text-based configuration file to an existing/running data port configuration may
result in unpredictable behavior. It is therefore suggested to first clear the switch’s
configuration by applying a specific configuration file (following the procedure in "BIN
Configuration File") or by resetting the switch back to factory default.
When applying a text-based configuration file, the configuration is appended to the switch’s
existing configuration. Only new or changed configuration is added. Reboot is not required.
File System
177
file debug-dump
file debug-dump {delete {<filename> | all | latest} | email {<filename> |
latest} | upload {<filename> | latest} <URL>}
Manipulates debug dump files.
Default N/A
History 3.1.0000
file debug-dump
file debug-dump {delete {<filename> | latest} | email {<filename> | latest}
| upload {{<filename> | latest} <URL>}}
Manipulates debug dump files.
178
email {<filename> | latest} Emails a debug dump file to pre-
configured recipients for
“informational events”
Default N/A
History 3.1.0000
Notes
file stats
file stats {delete <filename> | move {<source filename> | <destination
filename>} | upload <filename> <URL>}
Manipulates statistics report files.
Default N/A
History 3.1.0000
179
Example switch (config) # file stats move memory-1.csv memory-2.csv
Notes
file tcpdump
file tcpdump {delete <filename> | upload <filename> <URL>}
Manipulates tcpdump output files.
Default N/A
History 3.1.0000
Notes
reload
reload [force immediate | halt [noconfirm] | noconfirm]
Reboots or shuts down the system.
180
nonconfirm Reboots the system without asking about
unsaved changes
Default N/A
History 3.1.0000
Notes
reset factory
reset factory [keep-all-config | keep-basic | keep-virt-vols | keep-docker |
keep-docker clear-label <label name>] | only-config] [halt]
Clears the system and resets it entirely to its factory state.
181
History 3.1.0000
Default N/A
History 3.7.1102
Notes
182
show files debug-dump
show files debug-dump [<filename>]
Displays a list of debug dump files.
Default N/A
History 3.1.0000
==================================================
==================================================
Output of 'uname -a':
==================================================
Notes
Default N/A
History 3.1.0000
183
Example switch (config) # show files stats
memory-201140524-111745.csv
Notes
Default N/A
History 3.1.0000
Related Commands
Notes
History 3.1.0000
Related Commands
184
Notes
Configuration Files
configuration audit
configuration audit max-changes <number>
Chooses settings related to configuration change auditing.
History 3.1.0000
Notes
configuration copy
configuration copy <source-name> <dest-name>
Copies a configuration file.
Default N/A
History 3.1.0000
Related Commands
185
Notes • This command does not affect the current running
configuration
• The active configuration file may not be the target of a copy.
However, it may be the source of a copy in which case the
original remains active.
configuration delete
configuration delete <filename>
Deletes a configuration file.
Default N/A
History 3.1.0000
configuration fetch
configuration fetch <URL> [<name>]
Downloads a configuration file from a remote host.
Syntax Description URL Supported formats: HTTP, HTTPS, FTP, TFTP, SCP and
SFTP
Example: scp://username[:password]@hostname/
path/filename
name The name of the configuration file
Default N/A
History 3.1.0000
186
Example switch (config) # configuration fetch scp://
root:[email protected]/tmp/conf1
configuration jump-start
configuration jump-start
Runs the initial-configuration wizard.
Syntax N/A
Description
Default N/A
Configuration config
Mode
History 3.1.0000
Notes • The wizard is automatically invoked whenever the CLI is launched when the active
configuration file is fresh (i.e. not modified from its initial contents)
• This command invokes the wizard on demand (see “Configuring the Switch for the
First Time”)
187
configuration merge
configuration merge <filename>
Merges the “shared configuration” from one configuration file into the
running configuration.
Default N/A
History 3.1.0000
Related Commands
configuration move
configuration move <source-name> <dest-name>
Renames a configuration file.
History 3.1.0000
188
configuration new
configuration new <filename> [factory [keep-basic] [keep-connect]]
Creates a new configuration file under the specified name. The
parameters specify what configuration, if any, to carry forward from
the current running configuration.
History 3.1.0000
Notes • This command does not affect the current running configuration
• The active configuration file may not be the target of a move
configuration switch-to
configuration switch-to <filename> [no-reboot]
Loads the configuration from the specified file and makes it the active
configuration file.
Default N/A
History 3.1.0000
189
3.6.1002 Added “no-reboot” option
Example switch (config) # show configuration files
initial (active)
newcon
initial.prev
initial.bak
switch (config) # configuration switch-to newcon no-reboot
switch (config) # show configuration files
initial
newcon (active)
initial.prev
initial.bak
Syntax Description apply Applies the file to the running configuration (i.e.
executes the commands in it). This option has the
following parameters:
• discard – does not keep downloaded
configuration text file after applying it to the
system
• fail-continue – if applying commands,
continues execution even if one of them fails
• overwrite – if saving the file and the filename
already exists, replaces the old file
• verbose – displays all commands being
executed and their output instead of just
those that get errors
filename Specifies filename for saving downloaded text file
overwrite Downloads the file and saves it using the same name
it had on the server. This option has the following
parameters:
• apply – applies the downloaded configuration
to the running system
• filename – specifies filename for saving
downloaded text file
Default N/A
190
Configuration Mode config
History 3.2.1000
Related Commands
Notes
Default N/A
History 3.1.0000
191
Notes
Default N/A
History 3.1.0000
configuration upload
configuration upload {active | <name>} <URL or scp or sftp://
username:password@hostname[:port]/path/filename>
Uploads a configuration file to a remote host.
192
Default N/A
History 3.1.0000
configuration write
configuration write [local | to <filename> [no-switch]]
Saves the running configuration to the active configuration file.
Default N/A
History 3.1.0000
write
write {memory [local] | terminal}
Saves or displays the running configuration.
193
Syntax Description memory Saves running configuration to the active
configuration file. It is the same as “configuration
write”.
Default N/A
History 3.1.0000
Notes
show configuration
show configuration [audit | files [<filename>] | running | text files]
Displays a list of CLI commands that will bring the state of a fresh system
up to match the current persistent state of this system.
194
files [<filename>] Displays a list of configuration files in persistent
storage if no filename is specified.
If a filename is specified, it displays the
commands to recreate the configuration in that
file. In the latter case, only non-default
commands are shown, as for the normal “show
configuration” command.
Default N/A
History 3.1.0000
Related Commands
Notes
show running-config
show running-config [expanded | protocol <protocol>| diff | diff <config_file_name>]
Displays commands to recreate current running configuration.
195
protocol Only displays commands relating to the specified protocol
diff Displays delta between saved config file (active by default) and
running-config
config_file_name Displays delta between the specified saved config file and
running-config
Default N/A
Configuration config
Mode
History 3.1.0000
Related
Commands
Notes + <string> : <string> exists only in running-config, but not in the saved filename (or active
config file if no <filename> is specified)
- <string> : <string> does not exist in running-config, but exists in the saved filename (or
active config file if no <filename> is specified)
! <string> : <string> exists in both running-config and the saved filename, but it is out of
order. This should not impact the user, but may impact scripts or applications that are
parsing the output of the command.
196
show running-config interface
show running-config interface [mgmt0 | mgmt1 | lo <loopback_id> | ethernet <slot>/
<port>[/<subport>] | port-channel <lag-id> | mlag-port-channel <mlag-id> | nve <nve-
id> | vlan <vlan-id>]
Displays running-config filtered with the specific interfaces.
History 3.8.1000
Related Commands
Notes
197
Virtual Machine
A virtual machine (VM) on a switch is added to allow additional OS to run on top of the switch. The
VM OS can connect through mgmt0 interface to the switch system’s management interface. In
addition, the VM is also connected to the out-of-band network. This allows it to communicate
through the network and to control the switch management software.
The number of VMs that may run on a system is user-configurable and also relies on resource
availability.
• Memory
• Processing power which is not policed (the user may determine the core to be used)
• MACs which are required for each vNIC (user configurable)
The example below installs Ubuntu 14 and defines 3GB storage with 512MB memory
(default) using the first core of the switch system (default) through mgmt0 interface
(default) with an auto-generated MAC (default).
switch (config virtual-machine host my-vm) # storage create disk size-max 3000
100.0% [#################################################################]
Created empty virtual disk volume 'vdisk001.img' in pool 'default'
Device attached to drive number 1.
switch (config virtual-machine host my-vm) #
198
switch (config) # virtual-machine volume fetch url scp://root@<ip>/.../ubuntu-14.04-server-amd64.iso
Password (if required): *************
100.0% [#################################################################]
7. Switch to a different terminal, and run the following command to connect VNC viewer to the
VM:
USB stick with supported VM image should be supplied to the user by Mellanox.
1. Insert the USB stick (supplied by Mellanox) to the USB port of your switch system.
2. Decide on a name for the VM (e.g. “my_vm”).
3. Decide on the network configuration of the VM.
• Use DHCP or alternately use static IP definitions
• Assign a MAC address or alternately use the default MAC address
4. Launch the full installation of the VM with the network definitions of your choice.
199
Virtual Machine Commands
virtual-machine enable
virtual-machine enable
no virtual-machine enable
Enables VM feature on the switch.
The no form of the command disables VM feature on the switch.
History 3.4.0000
Related Commands
Notes
virtual-machine host
virtual-machine host <vm-name>
no virtual-machine host <vm-name>
Creates a VM, or enters its configuration context if it already exists.
The no form of the command removes the VM with the specified
name.
Default N/A
History 3.4.0000
Related Commands
Notes
200
arch
arch {i386 | x86_64}
Configures VM CPU architecture.
Default x86_64
History 3.4.0000
comment
comment <string>
no comment
Configures a comment describing the VM.
The no form of the command deletes the configured comment.
Default N/A
History 3.4.0000
Example switch (config virtual-machine host my-vm)# comment “example
VM”
201
Notes To configure a multi-word string, the string must be placed
within quotation marks
console
console {connect [graphics | text [force]] | graphics vnc | text tty}
no console {graphics vnc | text tty}
Configures or connects to a text or graphical console.
The no form of the command clears console settings.
History 3.4.0000
Related virtual-machine
Commands ssh server x11-forwarding enable
202
install
install {cancel |cdrom [pool <pool-name>] {file <volume-name>
[connect-console <console-type> | disk-overwrite | timeout
{<minutes> | none}]}}
Installs an operating system onto this VM (temporarily attach a CD and
boot from it).
Default N/A
History 3.4.0000
Example switch (config virtual-machine host my-vm)# install cdrom pool usb
file <image>
203
install-from-usb
install-from-usb [ip-address <ip-address> <mask> default-gateway <gw-ip> [mac <mac-
address>] | mac <mac-address>]
Installs a VM including resource allocation and network configurations from a VM image file
located on a USB stick.
default-gateway The IP address of the default gateway to configure for the installed VM
Default N/A
History 3.6.2002
Related virtual-machine
Commands
Notes USB stick supplied by Mellanox must be inserted into the USB port of the switch system
prior to running this command
interface
interface <id> {bridge <bridge> | macaddr <mac> | model <model> |
name <name>}
Configures virtual interfaces.
204
bridge <bridge> Configures bridge for this interface (i.e. mgmt0
or mgmt1)
Default N/A
History 3.4.0000
memory
memory <MB>
Configures memory allowance.
Default 512MB
History 3.4.0000
205
power
power {cycle [force | connect-console {graphics | text}] | off [force] |
on [connect-console {graphics | text}]}
Turns the VM on or off, or other related options.
on Powers on VM
Default N/A
History 3.4.0000
storage create
storage create disk [drive-number <number> | file <filename> | mode
{read-only | read-write} | pool <pool-name> | size-max <MB>]
Creates a new storage device for the VM, with an automatically assigned
name.
Syntax Description create disk Creates a new virtual disk image for this VM
206
file <filename> Specifies filename for new volume to be
created
Default N/A
History 3.4.0000
Example switch (config virtual-machine host my-vm)# storage create disk size-max
2000
storage device
storage device [bus ide] drive-number <number> [mode {read-only |
read-write}] source {[pool <pool-name>] file <filename>}
no storage device [bus ide] drive-number <id>
Modifies existing storage device, or create a new one with a specific
name.
The no form of the command removes a storage device from the VM.
207
pool <pool-name> Specifies the storage pool for this volume
file <filename>
Default N/A
History 3.4.0000
Example switch (config virtual-machine host my-vm)# storage create disk bus ide
vcpus
vcpus {count <count> | vcpu <vcpu> pin <cpu-list> [<cpu-list>]}
no vcpus {pin | vcpu <vcpu> pin}
Specifies virtual CPUs.
The no form of the command removes certain CPU configuration.
Default N/A
History 3.4.0000
Related Commands
Notes
208
virtual-machine volume fetch url
virt volume fetch url <download-url> [filename <filename> | pool <pool-
name> filename <filename>]
Fetches volume image from a remote host.
Default N/A
History 3.4.0000
Related Commands
Notes
209
pool <pool-name> Specifies a storage pool for the copy
new-name
<filename>
upload <upload- Uploads this volume file to a remote host
url> Supported format: ftp, tftp, scp and sftp are
supported (e.g. scp://
username[:password]@hostname/path/filename)
Default N/A
Configuration Mode config virtual machine host
History 3.4.0000
Example switch (config) # virt volume file my-vm_file create cdrom extract
cdrom1
Related Commands
Notes
Default N/A
History 3.4.0000
Related Commands
Notes
210
show virtual-machine host
show virtual-machine host [<vm-name>]
Displays status for this VM.
Default N/A
History 3.4.0000
Related
Commands
Notes If the command is run in the middle of an installation, the following banner appears:
Default N/A
History 3.4.0000
211
Example
switch (config) # show virtual-machine host my-vm configured detail
VM 'my-vm'
UUID: 0a177a99-f780-5951-877a-bd660e12e5db
Text console: enabled
Graphics console: enabled
Auto-power: last
Boot order: hd, cdrom
Architecture: x86_64
Memory size: 512 MB
Features: ACPI, APIC
Number of VCPUs: 1
(No VCPUs pinned)
Storage:
IDE bus, drive 1
Source pool: default
Source file: vdisk001.img (3000 MB capacity)
Mode: read-write
Interfaces:
Interface 1
Name: vif1
MAC address: 52:54:00:2F:89:69
Model: realtek-8139
Bound to: bridge 'mgmt0'
Related
Commands
Notes
Default N/A
History 3.4.0000
Example
212
switch (config) # show virtual-machine host my-vm detail
VM 'my-vm'
Status: shut off
UUID: 0a177a99-f780-5951-877a-bd660e12e5db
Text console: enabled
Device: N/A
Graphics console: enabled
VNC display num: N/A
Storage:
IDE bus, drive 1
Source pool: default
Source file: vdisk001.img (3000 MB capacity)
Mode: read-write
Device type: disk
Read requests: N/A
Read bytes: N/A
Write requests: N/A
Write bytes: N/A
Interfaces:
Interface 1
Name: vif1
MAC address: 52:54:00:2F:89:69
Model: realtek-8139
Bound to: bridge 'mgmt0'
IP address:
RX bytes: 0 TX bytes: 0
RX packets: 0 TX packets: 0
RX errors: 0 TX errors: 0
RX drop: 0 TX drop: 0
Related
Commands
Notes
Default N/A
213
Configuration Any command mode
Mode
History 3.4.0000
Previous install:
Completed : 2018/09/12 14:08:45.041
Install status: FAILED
Failure reason: canceled by user
Related
Commands
Notes
Default N/A
History 3.4.0000
Example
214
switch (config) # show virtual-machine host my-vm interface
Interface 1
Name: vif1
MAC address: 52:54:00:2F:89:69
Model: realtek-8139
Bound to: bridge 'mgmt0'
IP address:
Counters:
RX bytes: 0 TX bytes: 0
RX packets: 0 TX packets: 0
RX errors: 0 TX errors: 0
RX drop: 0 TX drop: 0
Related
Commands
Notes
Related
Commands
Notes
215
Resource Scale
Mellanox Onyx allows dynamic allocation of internal resources so that different internal subsystems
could use as much resources as are available until resource exhaustion is reached.
Internal subsystems (e.g. ACL, OF, IP router) may use internal resources according to configured
allocation policy mode which, in the case of Spectrum-based switch systems is loose. Loose mode is
a configuration that supports flexible user experience while providing protection to assure some
protection against flooding of ARP.
The following table presents the number of resources available for a Mellanox Spectrum®-based
node in loose mode.
Default N/A
History 3.5.1000
216
Example switch (config) # show system resource table
--------------------------------------
Table-Id In-Use
--------------------------------------
acl 0
ipv4-uc 1
ipv4-mc 0
ipv4-neigh 0
ipv6-uc 0
ipv6-mc 0
ipv6-neigh 0
Related Commands
Notes
217
System Synchronization
The following pages provide information on NTP and PTP functionalities.
NTP Authenticate
When authentication of incoming NTP packets is enabled, the switch ensures that they come from
an authenticated time source before using them for time synchronization on the switch.
Authentication keys are created and added to the trusted list.
1. It should be shared with the NTP server/peer sending the NTP packet.
2. It should be added to the trusted list.
3. NTP authenticate should be enabled on the switch.
218
• HowTo Enable NTP on Mellanox Switches
NTP Commands
clock set
clock set <hh:mm:ss> [<yyyy/mm/dd>]
Sets the time and date.
clock timezone
clock timezone [<zone-word> [<zone-word> [<zone-word>] [<zone-word>]]]
no clock timezone
Sets the system time zone. The time zone may be specified in one of three ways:
• A nearby city whose time zone rules to follow. The system has a large list of cities
which can be displayed by the help and completion system. They are organized
hierarchically because there are too many of them to display in a flat list. A given
city may be required to be specified in two, three, or four words, depending on
the city.
• An offset from UTC. This will be in the form UTC-offset UTC, UTC-offset
UTC+<0-14>, UTC-offset UTC-<1-12>.
• UTC (Universal Time, which is almost identical to GMT), and this is the default
time zone
The no form of the command resets time zone to its default (GMT).
Syntax Description zone-word Possible forms this could take include: continent, city, continent,
country, city, continent, region, country, city, ocean, and/or island.
Default GMT
Configuration config
Mode
History 3.1.0000
219
Example switch (config) # clock timezone America North United_States Other New_York
ntp
ntp {disable | enable | {peer | server} <IP address> [version <number> | disable]}
no ntp {disable | enable | {peer | server} <IP address> [version <number> | disable]}
Configures NTP.
The no form of the command negates NTP options.
Related Commands
Notes
ntpdate
ntpdate <ip-address>
Configures the system clock using the specified SNTP server.
220
Default N/A
Related Commands
Notes This is a one-time operation and does not cause the clock to be kept in
sync on an ongoing basis. It will generate an error if SNTP is enabled
since the socket it requires will already be in use.
ntp authenticate
ntp authenticate
no ntp authenticate
Enables NTP authentication.
The no form of the command disables NTP authentication.
Default Disabled
Related Commands
Notes
ntp authentication-key
ntp authentication-key <key-id> <encrypt-type> [<password>]
no ntp authentication-key <key-id>
Enables NTP authentication.
The no form of the command disables NTP authentication.
Syntax Description key-id Specifies a key ID, whether existing or a new one
to be added
Range: 1-65534
221
encrypt-type Specifies encryption type to use (md5, or sha1)
password Password string
Default Disabled
Related Commands
Notes If a password is not entered, a prompt appears requiring that a password
is introduced.
Default Disabled
Related Commands
Notes • IP addresses must be in IPv4 format (e.g., '192.168.0.1') or IPv6
format with scope zone ID for IPv6 link-local addresses (e.g.
'2001:db8:701f::8f9' or 'fe80::21c:23f:ec1:4fb%7'.)
• The length of a hostname is limited to 255 characters. Each label
(node delimited by a dot in the hostname) is limited to 63
characters and may contain letters, numbers and hyphens ('-'), but
may not begin with a hyphen.
222
ntp peer keyID
ntp peer <ip-address> keyID <key-id>
no ntp peer <ip-address> keyID <key-id>
Specifies the KeyID of the NTP peer.
The no form of the command removes key ID configuration from the NTP
peer.
Related Commands
Notes • IP addresses must be in IPv4 format (e.g., '192.168.0.1') or IPv6
format with scope zone ID for IPv6 link-local addresses (e.g.
'2001:db8:701f::8f9' or 'fe80::21c:23f:ec1:4fb%7'.)
• The length of a hostname is limited to 255 characters. Each label
(node delimited by a dot in the hostname) is limited to 63
characters and may contain letters, numbers and hyphens ('-'), but
may not begin with a hyphen.
Default 4
223
Configuration Mode config
History 3.5.0200
3.6.4000 Added hostname as option for ip-address,
and added note
Example switch (config) # ntp peer 10.10.10.10 version 4
Related Commands
Notes • IP addresses must be in IPv4 format (e.g., '192.168.0.1') or IPv6
format with scope zone ID for IPv6 link-local addresses (e.g.
'2001:db8:701f::8f9' or 'fe80::21c:23f:ec1:4fb%7'.)
• The length of a hostname is limited to 255 characters. Each label
(node delimited by a dot in the hostname) is limited to 63
characters and may contain letters, numbers and hyphens ('-'), but
may not begin with a hyphen.
Default Disabled
Related Commands
Notes • IP addresses must be in IPv4 format (e.g., '192.168.0.1') or IPv6
format with scope zone ID for IPv6 link-local addresses (e.g.
'2001:db8:701f::8f9' or 'fe80::21c:23f:ec1:4fb%7'.)
• The length of a hostname is limited to 255 characters. Each label
(node delimited by a dot in the hostname) is limited to 63
characters and may contain letters, numbers and hyphens ('-'), but
may not begin with a hyphen.
224
ntp server keyID
ntp server <ip-address> keyID <key-id>
no ntp server <ip-address> keyID <key-id>
Specifies the KeyID of the NTP server.
The no form of the command removes key ID configuration from the NTP
server.
Related Commands
Notes • IP addresses must be in IPv4 format (e.g., '192.168.0.1') or IPv6
format with scope zone ID for IPv6 link-local addresses (e.g.
'2001:db8:701f::8f9' or 'fe80::21c:23f:ec1:4fb%7'.)
• The length of a hostname is limited to 255 characters. Each label
(node delimited by a dot in the hostname) is limited to 63
characters and may contain letters, numbers and hyphens ('-'), but
may not begin with a hyphen.
Syntax N/A
Descriptio
n
Default N/A
225
Example switch (config) # ntp server-role disable
Default N/A
Related Commands
Notes • IP addresses must be in IPv4 format (e.g., '192.168.0.1') or IPv6
format with scope zone ID for IPv6 link-local addresses (e.g.
'2001:db8:701f::8f9' or 'fe80::21c:23f:ec1:4fb%7'.)
• The length of a hostname is limited to 255 characters. Each label
(node delimited by a dot in the hostname) is limited to 63
characters and may contain letters, numbers and hyphens ('-'), but
may not begin with a hyphen.
• NTP trusted servers can be used as a mitigation for Sybil attacks
which is a vulnerability caused by NTP peers sharing the same NTP
key base. This mitigation adds the concept of trusted servers
which if enabled in conjunction with NTP authentication ensures
that time information will only be obtained from trusted servers.
226
ntp server version
ntp server <ip-address> version <ver-num>
no ntp server <ip-address> version <ver-num>
Specifies the NTP version number of this server.
The no form of the command defaults NTP to version 4.
Default 4
Related Commands
Notes • IP addresses must be in IPv4 format (e.g., '192.168.0.1') or IPv6
format with scope zone ID for IPv6 link-local addresses (e.g.
'2001:db8:701f::8f9' or 'fe80::21c:23f:ec1:4fb%7'.)
• The length of a hostname is limited to 255 characters. Each label
(node delimited by a dot in the hostname) is limited to 63
characters and may contain letters, numbers and hyphens ('-'), but
may not begin with a hyphen.
ntp trusted-key
ntp trusted-key <key(s)>
no ntp trusted-key <key(s)>
Adds one or more keys to the trusted key list.
The no form of the command removes keys from the trusted key
list.
Default Disabled
227
Example switch (config) # ntp trusted-key 1,3,5
switch (config) # ntp trusted-key 1-5
Related Commands
Notes Keys may be separated with commas without any space, or they
may be set as a range using a hyphen.
show clock
show clock
Displays the current system time, date and time zone.
Default N/A
Related Commands
Notes
228
show ntp
show ntp
Displays the current NTP settings.
Default N/A
Related Commands
Notes
Syntax N/A
Description
Default N/A
229
Configuration Any command mode
Mode
History 3.1.0000
Related
Commands
Notes
Default N/A
230
History 3.5.0200
Related Commands
Notes
Synchronizing network applications require their wall clock time to be aligned precisely with a
reference time source (to the order of micro seconds or less). To achieve such accuracy, the
application needs the support of networking HW (switch and adapter card), to provide the means to
stamp time-sensitive packets. It also requires a time synchronization protocol which would make use
of the HW time stamping to adjust its wall clock time to an accurate clock in the network.
PTP Principles
The basic principle of PTP is as follows: Slave time = master time + propagation delay + offset.
The purpose of the protocol is to align the slave and the master time so that the gap between them
is the propagation delay of the packet. Or in other words, the purpose of the protocol is to use the
offset to correct the slave time so the offset between the master sending the packet and the slave
receiving the packet is the propagation delay.
Master time is sent periodically by a reliable clock source named Master Clock (MC). In a PTP
network, one single reference source is elected called Grand Master Clock (GMC). Propagation delay
is calculated between each node and the MC by one of the two methods provided by the standard
and further explained below.
To reach sub-microsecond resolutions, all the time stamps which record when a packet is sent and
received should be done in the HW. This may impose interaction between SW and HW to query the
HW time and send follow-up messages. This issue is further explained below in 2 step section.
Assuming that the propagation delay in the network is symmetric, the propagation time is the
average time that took the sync and delay req messages to be switched.
231
T1 represents the time that the packet left the master which is actually the master time.
The following figure provides an example of the stages required by a slave clock to align its time to
the master clock:
Sync 0 Event
Follow-up 8 General
Delay_Req 1 Event
Delay_Resp 9 General
Pdelay_Req 2 Event
Pdelay_Resp 3 Event
Announce B General
Signaling C General
Management D General
232
Clock Types and Operation Modes
The types of clocks available are as follows:
• Grand Master Clock (GMC) – the reference time source derived from an accurate clock such as
a GNSS driven clock (i.e. GPS, GLONASS, GALILEO)
• Boundary Clock (BC) – a network device that acts as slave to its master and as master to its
slaves. (Mellanox Onyx implements only this)
• Ordinary Clock (OC) – a clock that operates either as a Master or a Slave. In the case of a
slave, the end point whose clock is been synced (normally a host/server).
• Master Clock (MC) – a clock which operates as a Master and derives its timing capabilities
from the clock chain up to the GMC. It typically serves as a port on a BC connected to a host
running as a slave.
• Transparent Clock (TC) – a PTP aware switch capable of measuring the PTP packet switching
delay (transient time) and updating the data in the packet. In peer-to-peer (P2P) delay
calculation mechanism, a TC device is also required to calculate its delay from the next hop
toward the MC and add the value to the switching delay.
Two modes of delay calculations are defined:
• End-to-End (E2E) – each slave calculates its delay from the MC by running Delay request/
delay response sequence (Mellanox Onyx implements only this)
• Peer-to-Peer – propagation delay (Pdelay) is calculated periodically on each link between the
slave and the MC independently. The time synchronization packet sent from the MC to all the
slaves in the network is updated by each of the downstream nodes with both switching delay
(the time that the packet traversed the switch) and upstream hop Pdelay.
PTP Domains
A domain consists of one or more PTP devices communicating with each other. PTP domain defines
the scope of PTP message communication, state, operations, data sets, and timescale.
Boundary Clock
In a full E2E PTP deployment, the GMC needs to respond to each slave’s delay request message. A
normal profile of PTP may require a few delay calculations per second. An average GMC is capable
of addressing few thousands of messages per second. This imposes that direct slave/GMC
communication limits the number of overall OCs to ~8K. To scale beyond that, there is a need for a
hierarchy between the GMC and the slave. This is achieved by implementing BC, either in the TOR
switches or on all the switches in the DC.
The following figure shows the master/slave role that a boundary clock implements between the MC
and the Slave (OC).
233
Each BC acts as a slave towards the GMC and as GMC to its local slaves. Although adding a BC device
introduces accuracy degradation as explained above, it becomes mandatory when the number of
slaves on a single MC exceeds few thousand devices.
Another use of BC is to bridge between networks. When running PTP over native Ethernet packets,
to create larger PTP domains, there is a need to bridge between the broadcast domains. This is
done by BC switches.
Configuring PTP
IEEE 1588 Precision Time Protocol (PTP) may be configured either on router or switch interfaces.
To enable PTP on a router interface you could simply enable it on the selected interface.
The process of configuring PTP on a switch interface is slightly different, however. PTP should be
enabled on the interface itself as well as on the respective VLAN interface(s).
All PTP configuration for switch interfaces is taken from those defined on the VLAN interface.
234
switch (config) # protocol ptp
235
The interface must be a member of the PTP enabled VLAN(s).
The AMT is a whitelist of up to 8 clock identities that are admissible to take part as valid
GrandMasters in the Best Master Clock Algorithm (BMCA).
The Forced Master is enabled on a per-port basis to prevent processing announce messages from a
PTP endpoint connected to it, in order for it to always stay in a Master state.
To configure Forced Master on a switch interface, you must enable it on the interface itself as well
as on the respective VLAN interface(s).
Clock Identities:
E4:1D:2D:FF:FE:44:23:B7
E4:1D:2D:FF:FE:46:13:88
236
switch (config) # show ptp
PTP mode : Boundary Clock
Message format : Mixed
Acceptable Master Table : Enabled
Domain : 127
Clock identity : 7C:FE:90:FF:FE:FA:21:88
GMC identity : 7C:FE:90:FF:FE:FA:21:88
Number of master ports : 1
Slave port interface : N/A
Forced Master is indicated as “yes” only if enabled on the interface and the corresponding
VLAN interface.
PTP Commands
• PTP Commands
237
PTP Commands
protocol ptp
protocol ptp
Enables PTP on the switch.
Default N/A
History 3.6.4110
Related Commands
Notes
ptp amt
ptp amt <clock-id>
no ptp amt <clock-id>
Adds an acceptable master table entry.
The no form of the command removes an acceptable master entry.
Default N/A
History 3.6.8100
Notes
238
ptp announce interval
ptp announce interval <interval>
Configures PTP announce interval.
Default N/A
History 3.6.4110
Notes
Default N/A
239
History 3.6.4110
Notes
Default N/A
History 3.6.4110
Notes
240
ptp domain
ptp domain <domain number>
Inserts the number of ptp domain.
Default 127
History 3.6.4110
Notes
ptp enable
ptp enable
no ptp enable
Enables PTP per interface.
The no form of the command disables PTP per interface.
History 3.6.4110
241
Example switch (config interface ethernet 1/1) # ptp enable
...
switch (config interface ethernet 1/1) #
Notes
History 3.6.8100
Notes
242
ptp enable ipv6
ptp enable [forced-master] [ipv6 [mcast-scope link-local]]
no ptp enable [forced-master] [ipv6 [mcast-scope link-local]]
Configures PTP on the ethernet interface and enables the forced-master and support of
IPv6 with a specified scope.
The no form of the command removes the support from the interface.
Syntax Description mcast-scope link-local Sets the IPv6 multicast scope to link-local.
History 3.8.2000
Example switch (config interface ethernet 1/1) # ptp enable ipv6 mcast-scope link-local
Notes When configuring PTP IPv6, the "global" multicast scope is the default.
ptp mean-path-delay
ptp mean-path-delay <value>
no ptp mean-path-delay <value>
Enables logging of the mean path delay value if it exceeds the specified threshold.
Disables logging of the mean path delay value if it exceeds the specified threshold.
Default Enabled
Configura config
tion Mode
History 3.8.2100
243
Logging Example of ptp mean-path-delay 10:
Examples
Nov 11 16:18:04 arc-switch142 ptp4l: [3083.530] PTP [Debuggability]: PTP Grandmaster clock has
changed from ec0d9a.fffe.603848 to 248a07.fffe.9e9adc
Nov 11 16:18:04 arc-switch142 ptp4l: [3083.530] port 1: Interface Eth1/10 state changed from
MASTER to UNCALIBRATED on RS_SLAVE
Nov 11 16:18:05 arc-switch142 ptp4l: [3084.404] PTP slave port Eth1/10 High offset from Master
-58705983752 (ns)
Nov 11 16:18:06 arc-switch142 ptp4l: [3084.904] PTP slave port Eth1/10 High offset from Master
-58705990066 (ns)
Nov 11 16:18:06 arc-switch142 ptp4l: [3085.062] PTP slave port Eth1/10 High Mean Path Delay 56
(ns)
Nov 11 16:18:06 arc-switch142 ptp4l: [3085.225] PTP slave port Eth1/10 High Mean Path Delay
313 (ns)
Nov 11 16:18:06 arc-switch142 ptp4l: [3085.318] PTP slave port Eth1/10 High Mean Path Delay
709 (ns)
Nov 11 16:18:06 arc-switch142 ptp4l: [3085.404] PTP slave port Eth1/10 High offset from Master
-58705997158 (ns)
Nov 11 16:18:07 arc-switch142 ptp4l: [3085.904] port 1: Interface Eth1/10 state changed from
UNCALIBRATED to SLAVE on MASTER_CLOCK_SELECTED
Nov 11 16:18:07 arc-switch142 ptp4l: [3085.966] PTP slave port Eth1/10 High Mean Path Delay
709 (ns)
Nov 11 16:18:07 arc-switch142 ptp4l: [3086.192] PTP slave port Eth1/10 High Mean Path Delay
709 (ns)
Nov 11 16:18:07 arc-switch142 ptp4l: [3086.215] PTP slave port Eth1/10 High Mean Path Delay
709 (ns)
Nov 11 16:18:07 arc-switch142 ptp4l: [3086.240] PTP slave port Eth1/10 High Mean Path Delay
709 (ns)
Nov 11 16:18:07 arc-switch142 ptp4l: [3086.244] PTP slave port Eth1/10 High Mean Path Delay
246 (ns)
Nov 11 16:18:07 arc-switch142 ptp4l: [3086.404] port 1: Interface Eth1/10 state changed from
SLAVE to UNCALIBRATED on SYNCHRONIZATION_FAULT
Nov 11 16:18:09 arc-switch142 ptp4l: [3087.904] port 1: Interface Eth1/10 state changed from
UNCALIBRATED to SLAVE on MASTER_CLOCK_SELECTED
Nov 11 16:19:10 arc-switch142 ptp4l: [3090.711] PTP slave port Eth1/10 High Mean Path Delay 15
(ns)
Nov 11 16:19:10 arc-switch142 ptp4l: [3090.740] PTP slave port Eth1/10 High Mean Path Delay 15
(ns)
Nov 11 16:19:10 arc-switch142 ptp4l: [3090.831] PTP slave port Eth1/10 High Mean Path Delay 23
(ns)
Nov 11 16:19:10 arc-switch142 ptp4l: [3090.879] PTP slave port Eth1/10 High Mean Path Delay 23
(ns)
Nov 11 16:19:10 arc-switch142 ptp4l: [3091.025] PTP slave port Eth1/10 High Mean Path Delay 23
(ns)
Nov 11 16:19:11 arc-switch142 ptp4l: [3091.128] PTP slave port Eth1/10 High Mean Path Delay 21
(ns)
Nov 11 16:19:11 arc-switch142 ptp4l: [3091.292] PTP slave port Eth1/10 High Mean Path Delay 20
(ns)
Nov 11 16:19:11 arc-switch142 ptp4l: [3091.406] PTP slave port Eth1/10 High Mean Path Delay 20
(ns)
Nov 11 16:19:11 arc-switch142 ptp4l: [3091.621] PTP slave port Eth1/10 High Mean Path Delay 20
(ns)
Nov 11 16:19:11 arc-switch142 ptp4l: [3091.625] PTP slave port Eth1/10 High Mean Path Delay 20
(ns)
244
Notes If the mean path delay exceeds the threshold, the following ptp4l log message will appear: “Oct
11 19:04:41 arc-switch142 ptp4l: [242.721] PTP slave port Eth1/10 High Mean Path Delay 65536
(ns)”
ptp message-format
ptp message-format {mixed | multicast}
Configures PTP delay request messages format.
Default mixed
Configuration config
Mode
History 3.6.8008
Related
Commands
Notes
ptp offset-from-master
ptp offset-from-master <value> <value>
Enables logging of the offset from master value if it exceeds the specified threshold.
Syntax values [-1000000000; -10] [10; 1000000000]. Default [-100000; -10] [10; 100000]
Descripti
on
Default Enabled
Configur config
ation
Mode
245
History 3.8.2100
246
Related show log
Comman show ptp clock
ds show ptp status
Notes If the mean path delay exceeds the threshold, the following ptp4l log message will appear: “Oct
11 19:04:41 arc-switch142 ptp4l: [242.721] PTP slave port Eth1/10 High offset from Master
36766720739 (ns)”
ptp priority
ptp priority{1 | 2} <priority>
Configures PTP primary priority.
Default 128
Configuration config
Mode
History 3.6.4110
Default N/A
247
Configuration config interface port-channel
Mode config interface ethernet
config interface vlan
History 3.6.4110
Notes
Syntax N/A
Description
Default N/A
History 3.6.8100
Notes
248
clear ptp forced-master log
clear ptp forced-master log
Clears log of received clock IDs on forced master interface.
Syntax N/A
Description
Default N/A
History 3.6.8100
Notes
Default N/A
History 3.6.8008
249
clear ptp vrf counters
clear ptp vrf <vrf-name> counters
Clears the PTP VRF counters.
Default N/A
History 3.7.1000
Syntax N/A
Description
Default N/A
History 3.7.1000
250
Related show ptp
Commands show ptp vrf
show ptp forced-master
show ptp vrf counters
clear ptp vrf counters
ptp vrf announce interval
ptp vrf announce timeout
ptp vrf delay-req interval
ptp vrf sync interval
Related PTP needs to be enabled on interfaces in VRF as well.
Commands
show ptp
show ptp
Displays PTP configuration and operation data.
Syntax N/A
Description
Default N/A
History 3.6.4110
Related
Commands
Notes
251
show ptp vrf
show ptp vrf <vrf_name>
Displays interfaces in VRF PTP related data.
Default N/A
History 3.7.1000
252
Example switch (config) # show ptp vrf
Interface name: Eth1/1
Channel group ID: N/A
VRF: cust1
IP Address: 1.1.1.1
Port Clock identity: E4:1D:2D:FF:FE:44:65:C8
PTP Port number: 1
PTP operational state: UP
PTP interface state: MASTER
Forced Master: no
Delay request interval(log mean): 0
Announce receipt time out: 3
Announce interval(log mean): -2
Sync interval(log mean): -3
Delay Mechanism: End to End
Transport protocol: UDP IPv4
IPv6 Multicast scope ID: N/A
Interface name: Eth1/2
Channel group ID: N/A
VRF: default
IP Address: 2.2.2.2
Port Clock identity: E4:1D:2D:FF:FE:44:65:C8
PTP Port number: 1
PTP interface state: SLAVE
PTP operational state: UP
Forced Master: no
Delay request interval(log mean): 0
Announce receipt time out: 3
Announce interval(log mean): -2
Sync interval(log mean): -3
Delay Mechanism: End to End
Transport protocol: UDP IPv4
IPv6 Multicast scope ID: N/A
Interface name: Eth1/1
Channel group ID: N/A
VRF: cust1
IP Address: 1.1.1.1
Port Clock identity E4:1D:2D:FF:FE:44:65:C8
PTP Port number: 1
PTP interface state: MASTER
Forced Master: no
Delay request interval(log mean): 0
Announce receipt time out: 3
Announce interval(log mean): -2
Sync interval(log mean): -3
Delay Mechanism: End to End
Transport protocol: UDP IPv4
IPv6 Multicast scope ID: N/A
Related
Commands
Notes Displays ptp state of all PTP-enabled interfaces in all PTP-enabled VRFs.
253
Default N/A
History 3.7.1000
Eth1/1
RX
0 Sync message count
0 Delay request message count
0 PDelay request message count
0 PDelay response message count
0 Follow Up message count
0 Delay response message count
0 PDelay response follow Up message count
0 Announce message count
0 Signalling message count
0 Management message count
TX
0 Sync message count
0 Delay request message count
0 PDelay request message count
0 PDelay response message count
0 Follow Up message count
0 Delay response message count
0 PDelay response follow Up message count
0 Announce message count
0 Signalling message count
0 Management message count
0 Forwarded Management message count
Eth1/2
RX
0 Sync message count
0 Delay request message count
0 PDelay request message count
0 PDelay response message count
0 Follow Up message count
0 Delay response message count
0 PDelay response follow Up message count
0 Announce message count
0 Signalling message count
0 Management message count
TX
0 Sync message count
0 Delay request message count
0 PDelay request message count
0 PDelay response message count
0 Follow Up message count
0 Delay response message count
0 PDelay response follow Up message count
0 Announce message count
0 Signalling message count
0 Management message count
0 Forwarded Management message count
Related
Commands
Notes Display ptp counters of all PTP enabled interfaces in specific PTP enabled VRF.
254
show ptp amt
show ptp amt
Displays acceptable master table.
Syntax N/A
Description
Default N/A
History 3.6.8100
Example switch (config) # show ptp amt
Clock Identities:
00:11:22:FF:FE:44:55:66
66:55:44:FF:FE:22:11:00
Notes
Default N/A
History 3.7.1000
255
Example switch (config) # show ptp interface port-channel 3
Interface name: Eth1/10
Channel group ID: 3
VRF: default
IP Address: 1111:0:0:0:0:0:0:0/64
Port Clock identity: EC:0D:9A:FF:FE:60:37:C8
PTP Port number: 1
PTP interface state: MASTER
PTP operational state: UP
Forced Master: no
Delay request interval(log mean): 0
Announce receipt time out: 3
Announce interval(log mean): -2
Sync interval(log mean): -5
Delay Mechanism: End to End
Transport protocol: UDP IPv6
IPv6 Multicast scope ID: Global (0xE)
Related Commands
Notes
Default N/A
History 3.7.1000
256
Example switch (config) # show ptp interface port-channel 3 counters
Eth1/10
RX
0 Sync message count
0 Delay request message count
0 PDelay request message count
0 PDelay response message count
0 Follow Up message count
0 Delay response message count
0 PDelay response follow Up message count
0 Announce message count
0 Signalling message count
0 Management message count
TX
0 Sync message count
0 Delay request message count
0 PDelay request message count
0 PDelay response message count
0 Follow Up message count
0 Delay response message count
0 PDelay response follow Up message count
0 Announce message count
0 Signalling message count
1 Management message count
0 Forwarded Management message count
Eth1/11 (Po 3)
RX
0 Sync message count
0 Delay request message count
0 PDelay request message count
0 PDelay response message count
0 Follow Up message count
0 Delay response message count
0 PDelay response follow Up message count
0 Announce message count
0 Signalling message count
0 Management message count
TX
0 Sync message count
0 Delay request message count
0 PDelay request message count
0 PDelay response message count
0 Follow Up message count
0 Delay response message count
0 PDelay response follow Up message count
0 Announce message count
0 Signalling message count
2 Management message count
0 Forwarded Management message count
Related
Commands
Notes
257
Syntax N/A
Description
Default N/A
History 3.6.8100
Example
switch (config) # show ptp amt log
-------------------------------------------------------------------------------
Clock Identity Interface VLAN IP Address Last Occurrence
-------------------------------------------------------------------------------
04:1D:2D:FF:FE:A5:F3:94 Eth1/2 N/A 192.168.66.7 2018/07/17 19:44:09
03:1D:2D:FF:FE:A5:F3:94 Eth1/2 N/A 192.168.66.7 2018/07/17 19:44:09
Notes
Default N/A
History 3.6.4110
...
Related Commands
258
Notes
Default N/A
History 3.6.4110
GMC
GMC Identity: EC:46:70:FF:FE:0C:E4:82
Related Commands
Notes
259
Default N/A
History 3.6.8100
Notes
show ptp
show ptp <slot>/<port>[/<subport>]
Displays PTP configuration and operation data per Ethernet port.
Default N/A
History 3.6.4110
Related
Commands
260
Notes
Syntax N/A
Description
Default N/A
Configuration config
Mode
History 3.8.2100
Notes
Default N/A
261
History 3.6.4110
TX
74188 Sync message count
17 Delay request message count
0 PDelay request message count
0 PDelay response message count
74188 Follow Up message count
0 Delay response message count
0 PDelay response follow Up message count
37117 Announce message count
0 Signaling message count
57 Management message count
...
Related Commands
Notes
Default N/A
History 3.8.2000
262
Example switch (config) # show ptp interface
Interface name: Eth1/4
Channel group ID: N/A
VRF: default
IP Address: 4.4.4.4/24
Port Clock identity: 7C:FE:90:FF:FE:FA:22:08
PTP Port number: 1
PTP interface state: MASTER
PTP operational state: UP
Forced Master: no
Delay request interval(log mean): 0
Announce receipt time out: 3
Announce interval(log mean): -2
Sync interval(log mean): -3
Delay Mechanism: End to End
Transport protocol: UDP IPv4
IPv6 Multicast scope ID: N/A
Notes
Default N/A
History 3.8.2000
263
Example switch (config) # show ptp interface ethernet 1/12
Interface name: Eth1/12 (VLAN 12)
Channel group ID: 12
VRF: default
IP Address: 12.8.8.8/24
Port Clock identity: 7C:FE:90:FF:FE:FA:22:08
PTP Port number: 2
PTP interface state: SLAVE
PTP operational state: UP
Forced Master: no
Delay request interval(log mean): 0
Announce receipt time out: 3
Announce interval(log mean): -2
Sync interval(log mean): -3
Delay Mechanism: End to End
Transport protocol: UDP IPv4
IPv6 Multicast scope ID: N/A
Related Commands
Notes
Default N/A
History 3.6.8008
Related Commands
264
Notes
Default N/A
History 3.6.8008
Related Commands
Notes
Default N/A
265
Configuration Mode Any command mode
History 3.6.8008
TX
19851 Sync message count
0 Delay request message count
0 PDelay request message count
0 PDelay response message count
19851 Follow Up message count
0 Delay response message count
0 PDelay response follow Up message count
9928 Announce message count
0 Signalling message count
2 Management message count
0 Forwarded Management message count
Related Commands
Notes
Default N/A
History 3.6.8008
266
Example switch (config) # show ptp interface vlan 1 ethernet
1/15/1 counters
Eth1/15/1 (VLAN 1)
RX
0 Sync message count
0 Delay request message count
0 PDelay request message count
0 PDelay response message count
0 Follow Up message count
0 Delay response message count
0 PDelay response follow Up message count
0 Announce message count
0 Signaling message count
0 Management message count
TX
0 Sync message count
0 Delay request message count
0 PDelay request message count
0 PDelay response message count
0 Follow Up message count
0 Delay response message count
0 PDelay response follow Up message count
0 Announce message count
0 Signaling message count
0 Management message count
Related Commands
Notes
Default N/A
History 3.8.2100
Related Commands
Notes
267
show ptp status
show ptp status
Displays the last 100 entries for Offset from Master and Mean Path Delay values.
Default N/A
History 3.8.2100
Example switch (config) # show ptp status
PTP mode : Boundary Clock
PTP Offset Threshold (ns) : -100000, 100000
PTP Mean Path Delay Threshold (ns): 1000000000
--------------------------------------------------------------------------------------
Interface Time Offset from Master (ns) Mean Path Delay (ns)
--------------------------------------------------------------------------------------
Eth1/15 2019/11/13 16:32:00.774 -21 424
Eth1/15 2019/11/13 16:32:00.649 -28 424
Eth1/15 2019/11/13 16:32:00.524 18 424
Eth1/15 2019/11/13 16:32:00.399 6 424
Eth1/15 2019/11/13 16:32:00.274 28 423
Eth1/15 2019/11/13 16:32:00.149 -16 424
Eth1/15 2019/11/13 16:32:00.025 -7 425
Eth1/15 2019/11/13 16:31:59.899 17 425
Eth1/15 2019/11/13 16:31:59.775 9 422
Eth1/15 2019/11/13 16:31:59.650 -3 420
Eth1/15 2019/11/13 16:31:59.525 -16 425
Eth1/15 2019/11/13 16:31:59.400 -23 422
Eth1/15 2019/11/13 16:31:59.275 17 422
Related Commands
Notes
268
PTP Debuggability Logging Examples
269
Change of Grandmaster Clock
Nov 11 15:33:09 arc-switch142 ptp4l: [351.341] PTP [Debuggability]: PTP Grandmaster clock has changed
from 000000.0000.000000 to ec0d9a.fffe.603848
Nov 11 15:33:09 arc-switch142 ptp4l: [351.341] port 0: hybrid_e2e only works with E2E
Nov 11 15:33:09 arc-switch142 ptp4l: [351.342] port 1: Interface Eth1/10 state changed from INITIALIZING to
LISTENING on INIT_COMPLETE
Nov 11 15:33:09 arc-switch142 ptp4l: [351.342] port 0: Interface state changed from INITIALIZING to
LISTENING on INIT_COMPLETE
Nov 11 15:33:09 arc-switch142 ptp4l: [351.342] port 1: link down
Nov 11 15:33:09 arc-switch142 ptp4l: [351.342] port 1: Interface Eth1/10 state changed from LISTENING to
FAULTY on FAULT_DETECTED (FT_UNSPECIFIED)
Nov 11 15:33:09 arc-switch142 ptp4l: [351.343] selected local clock ec0d9a.fffe.603848 as best master
Nov 11 15:33:09 arc-switch142 ptp4l: [351.343] assuming the grand master role
Nov 11 15:33:09 arc-switch142 ptp4l: [351.343] PTP [Debuggability]: PTP Grandmaster clock has changed
from ec0d9a.fffe.603848 to ec0d9a.fffe.603848
Nov 11 15:33:09 arc-switch142 pm[4868]: [pm.NOTICE]: Launched phc2sys (PTP phc2sys daemon) with pid
7870
Nov 11 15:33:09 arc-switch142 ptp4l: [351.455] port 1: link up
Nov 11 15:33:09 arc-switch142 ptp4l: [351.456] port 1: Interface Eth1/10 state changed from FAULTY to
LISTENING on INIT_COMPLETE
Nov 11 15:33:10 arc-switch142 ptp4l: [352.295] PTP [Debuggability]: Matched Announce interval on Eth1/10.
Configured -2, Received -2
Nov 11 15:33:10 arc-switch142 ptp4l: [352.295] port 1: new foreign master ec0d9a.fffe.6037c8-1
Nov 11 15:33:10 arc-switch142 ptp4l: [352.402] port 1: Interface Eth1/10 state changed from LISTENING to
MASTER on ANNOUNCE_RECEIPT_TIMEOUT_EXPIRES
Nov 11 15:33:10 arc-switch142 ptp4l: [352.402] selected local clock ec0d9a.fffe.603848 as best master
Nov 11 15:33:10 arc-switch142 ptp4l: [352.402] assuming the grand master role
Nov 11 15:33:10 arc-switch142 ptp4l: [352.402] PTP [Debuggability]: PTP Grandmaster clock has changed
from ec0d9a.fffe.603848 to ec0d9a.fffe.603848
Nov 11 15:33:10 arc-switch142 ptp4l: [352.419] PTP [Debuggability]: Matched Sync interval on Eth1/10.
Configured -3, Received -3
Nov 11 15:33:11 arc-switch142 ptp4l: [352.795] selected best master clock ec0d9a.fffe.6037c8
Nov 11 15:33:11 arc-switch142 ptp4l: [352.795] PTP [Debuggability]: PTP Grandmaster clock has changed
from ec0d9a.fffe.603848 to ec0d9a.fffe.6037c8
Nov 11 15:33:11 arc-switch142 ptp4l: [352.795] port 1: Interface Eth1/10 state changed from MASTER to
UNCALIBRATED on RS_SLAVE
Nov 11 15:33:11 arc-switch142 ptp4l: [353.044] PTP slave port Eth1/10 High offset from Master 635155 (ns)
Nov 11 15:33:11 arc-switch142 ptp4l: [353.169] PTP slave port Eth1/10 High offset from Master 635353 (ns)
Nov 11 15:33:11 arc-switch142 ptp4l: [353.294] port 1: Interface Eth1/10 state changed from UNCALIBRATED
to SLAVE on MASTER_CLOCK_SELECTED
270
Nov 11 15:41:10 arc-switch142 ptp4l: [869.220] PTP [Debuggability]: PTP Grandmaster clock has changed
from 000000.0000.000000 to ec0d9a.fffe.603848
Nov 11 15:41:10 arc-switch142 ptp4l: [869.221] port 0: hybrid_e2e only works with E2E
Nov 11 15:41:10 arc-switch142 ptp4l: [869.221] port 1: Interface Eth1/10 state changed from INITIALIZING to
LISTENING on INIT_COMPLETE
Nov 11 15:41:10 arc-switch142 ptp4l: [869.221] port 0: Interface state changed from INITIALIZING to
LISTENING on INIT_COMPLETE
Nov 11 15:41:10 arc-switch142 pm[4868]: [pm.NOTICE]: Launched phc2sys (PTP phc2sys daemon) with pid
8918
Nov 11 15:41:10 arc-switch142 ptp4l: [869.284] PTP [Debuggability]: Matched Sync interval on Eth1/10.
Configured -3, Received -3
Nov 11 15:41:10 arc-switch142 ptp4l: [869.284] PTP [Debuggability]: Mismatch Announce interval on Eth1/10.
Configured -1, Received -3
Nov 11 15:41:10 arc-switch142 ptp4l: [869.284] port 1: new foreign master ec0d9a.fffe.6037c8-1
Nov 11 15:41:10 arc-switch142 ptp4l: [869.534] selected best master clock ec0d9a.fffe.6037c8
Nov 11 15:41:10 arc-switch142 ptp4l: [869.534] PTP [Debuggability]: PTP Grandmaster clock has changed
from ec0d9a.fffe.603848 to ec0d9a.fffe.6037c8
Nov 11 15:41:10 arc-switch142 ptp4l: [869.534] port 1: Interface Eth1/10 state changed from LISTENING to
UNCALIBRATED on RS_SLAVE
Nov 11 15:41:11 arc-switch142 ptp4l: [869.909] port 1: Interface Eth1/10 state changed from UNCALIBRATED
to SLAVE on MASTER_CLOCK_SELECTED
Nov 11 15:42:34 arc-switch142 ptp4l: [953.018] PTP [Debuggability]: Matched Announce interval on Eth1/10.
Configured -1, Received -1
271
Nov 11 16:05:34 arc-switch142 ptp4l: [2332.929] PTP [Debuggability]: PTP Grandmaster clock has changed
from ec0d9a.fffe.603848 to ec0d9a.fffe.6037c8
Nov 11 16:05:34 arc-switch142 ptp4l: [2332.929] port 1: Interface Eth1/10 state changed from MASTER to
UNCALIBRATED on RS_SLAVE
Nov 11 16:05:34 arc-switch142 ptp4l: [2333.053] PTP [Debuggability]: Mismatch Sync interval on Eth1/10.
Configured -3, Received -2
Nov 11 16:05:34 arc-switch142 ptp4l: [2333.303] port 1: Interface Eth1/10 state changed from UNCALIBRATED
to SLAVE on MASTER_CLOCK_SELECTED
Nov 11 16:06:14 arc-switch142 ptp4l: [2372.799] port 1: Interface Eth1/10 state changed from SLAVE to
MASTER on ANNOUNCE_RECEIPT_TIMEOUT_EXPIRES
Nov 11 16:06:14 arc-switch142 ptp4l: [2372.799] selected local clock ec0d9a.fffe.603848 as best master
Nov 11 16:06:14 arc-switch142 ptp4l: [2372.799] assuming the grand master role
Nov 11 16:06:14 arc-switch142 ptp4l: [2372.799] PTP [Debuggability]: PTP Grandmaster clock has changed
from ec0d9a.fffe.6037c8 to ec0d9a.fffe.603848
Nov 11 16:06:14 arc-switch142 ptp4l: [2372.943] selected best master clock ec0d9a.fffe.6037c8
Nov 11 16:06:14 arc-switch142 ptp4l: [2372.943] PTP [Debuggability]: PTP Grandmaster clock has changed
from ec0d9a.fffe.603848 to ec0d9a.fffe.6037c8
Nov 11 16:06:14 arc-switch142 ptp4l: [2372.943] port 1: Interface Eth1/10 state changed from MASTER to
UNCALIBRATED on RS_SLAVE
Nov 11 16:06:14 arc-switch142 ptp4l: [2373.317] PTP [Debuggability]: Mismatch Sync interval on Eth1/10.
Configured -3, Received -1
Nov 11 16:06:15 arc-switch142 ptp4l: [2373.817] port 1: Interface Eth1/10 state changed from UNCALIBRATED
to SLAVE on MASTER_CLOCK_SELECTED
Nov 11 16:06:33 arc-switch142 ptp4l: [2392.739] port 1: Interface Eth1/10 state changed from SLAVE to
MASTER on ANNOUNCE_RECEIPT_TIMEOUT_EXPIRES
Nov 11 16:06:33 arc-switch142 ptp4l: [2392.739] selected local clock ec0d9a.fffe.603848 as best master
Nov 11 16:06:33 arc-switch142 ptp4l: [2392.739] assuming the grand master role
Nov 11 16:06:33 arc-switch142 ptp4l: [2392.739] PTP [Debuggability]: PTP Grandmaster clock has changed
from ec0d9a.fffe.6037c8 to ec0d9a.fffe.603848
Nov 11 16:06:34 arc-switch142 ptp4l: [2392.978] PTP [Debuggability]: Matched Sync interval on Eth1/10.
Configured -3, Received -3
Nov 11 16:06:34 arc-switch142 ptp4l: [2392.979] selected best master clock ec0d9a.fffe.6037c8
Nov 11 16:06:34 arc-switch142 ptp4l: [2392.979] PTP [Debuggability]: PTP Grandmaster clock has changed
from ec0d9a.fffe.603848 to ec0d9a.fffe.6037c8
272
Network Management Interfaces
SNMP
Simple Network Management Protocol (SNMP), is a network protocol for the management of a
network and the monitoring of network devices and their functions. SNMP supports asynchronous
event (trap) notifications and queries.
Mellanox Onyx™ supports:
Standard MIBs
The following table presents the supported textual conventions and conformance MIBs:
MIB Standard
INET-ADDRESS-MIB RFC-4001
SNMPV2-CONF
IANAifType-MIB
IANA-ADDRESS-FAMILY-NUMBERS-MIB
The following table presents the supported chassis and switch MIBs:
Private MIBs
MIB Description
273
MIB Description
Proprietary Traps
The following private traps are supported by the Mellanox Onyx™ MELLANOX-EFM-MIB:
internalBusError N/A
cpuUtilHigh N/A
274
Trap Action Required
diskSpaceLow Clean images and sysDump files using the commands “image
delete” and “file debug-dump delete”.
lowPowerRecover N/A
insufficientFansRecover N/A
insufficientPowerRecover N/A
For event-to-MIB mapping, please refer to “Supported Event Notifications and MIB
Mapping”.
Configuring SNMP
Activate the SNMP server on your switch by running:
Upgrading the OS version to 3.6.6102 or higher does not automatically change the current engine ID.
That can be done through one of the following methods after performing the software upgrade:
275
• Running “reset factory”
• Using the command “snmp-server engineID reset” (for more details, please see the procedure
below)
To reset SNMP engine ID using “snmp-server engineID reset”:
Prerequisites:
If any of the following SNMP configurations exist, please delete/disable them and re-enable/
reconfigure them only after SNMP engine ID reset is performed:
Procedure:
switch (config) # snmp-server user [role] v3 prompt auth <hash type> priv <privacy type>
Where:
• user role – admin
• auth type – md5 or sha or sha224 or sha256 or sha384 or sha512
• priv type – des or aes-128 or 3des or aes-192 or aes-256 or aes-192-cfb or aes-256-cfb
2. Enter authentication password and its confirmation.
3. Enter privacy password and its confirmation:
276
switch (config) # snmp-server user admin v3 prompt auth md5 priv des
Auth password: ********
Confirm: ********
Privacy password: ********
Confirm: ********
snmpwalk -v3 -l authPriv -a MD5 -u admin -A “<Authentication password>” -x DES -X “<privacy password>”
<system ip> SNMPv2-MIB::system
2. Configure SNMP host with the desired arguments (IP Address, SNMP version, authentication
methods). More than one host can be configured. Each host may have different attributes.
Run:
switch (config) # snmp-server host 10.134.47.3 traps version 3 user my-username auth sha my-password
5. Verify the list of traps and informs being sent to out of the system. Run:
277
switch (config) # show snmp events
Events for which traps will be sent:
asic-chip-down: ASIC (Chip) Down
cpu-util-high: CPU utilization has risen too high
disk-space-low: Filesystem free space has fallen too low
health-module-status: Health module Status
insufficient-fans: Insufficient amount of fans in system
insufficient-fans-recover: Insufficient amount of fans in system recovered
insufficient-power: Insufficient power supply
interface-down: An interface's link state has changed to down
interface-up: An interface's link state has changed to up
internal-bus-error: Internal bus (I2C) Error
liveness-failure: A process in the system was detected as hung
low-power: Low power supply
low-power-recover: Low power supply Recover
new_root: local bridge became a root bridge
paging-high: Paging activity has risen too high
power-redundancy-mismatch: Power redundancy mismatch
process-crash: A process in the system has crashed
process-exit: A process in the system unexpectedly exited
snmp-authtrap: An SNMP v3 request has failed authentication
topology_change: local bridge triggered a topology change
unexpected-shutdown: Unexpected system shutdown
3. Make sure SNMP communities are enabled (they are enabled by default). Make sure
“(DISABLED)” does not appear beside “Read-only communities” / “Read-write communities”.
Run:
278
1. Create an SNMPv3 user. Run:
switch (config) # snmp-server user myuser v3 auth sha <password1> priv aes-128 <password2>
It is possible to use other configuration options not specified in the example above.
Please refer to the command “snmp-server user” for more information.
2. Make sure the username is enabled for SET access and has admin capability level. Run:
The OS supports the OIDs for SET operation listed in the following table which are expanded upon in
the following subsections.
279
Prerequisites:
The restrictions on setting a hostname via CLI also apply to setting a hostname through SNMP. Refer
to the command “hostname” for more information.
Power cycle command is issued via the OID mellanoxPowerCycleCmdExecute. The following options
are available:
It is possible to set the parameters and execute the commands on the same SNMP request or
separate them to several SET operations. Upon executing a command, the values of its arguments
remain and can be read using GET commands.
• Immediate: This error results in a failure of the SNMP request. This means a critical error in
the SNMP request has occurred or that a previous SET request is being executed
• Delayed: The SET request has been accepted by the switch but an error occurred during its
execution.
For example, when performing a fetch (download) operation, an immediate error can occur when
the given URL is invalid. A delayed error can occur if the download process fails due to network
connectivity issues.
280
• Command URI – URI to fetch the configuration file from or upload the file to (for supported
URI format please refer to the CLI command “configuration fetch” for more details)
• Config file name – filename to save the configuration file to or to upload to remote location
The following commands are supported:
• BinarySwitchTo – replaces the configuration file with a new binary configuration file. This
option fetches the configuration file from the URI provided in the mellanoxConfigDBCmdUri
and switches to that configuration file. This command should be preceded by a reload
command in order for the new configuration to apply.
• TextApply – fetches a configuration file in human-readable format and applies its
configuration upon the current configuration.
• BinaryUpload – uploads a binary format configuration file of the current running configuration
or an existing configuration file on the switch to the URI in the mellanoxConfigDBCmdUri
command. The filename parameter indicates what configuration file on the switch to upload.
• TextUpload – uploads a human-readable configuration file of the current running
configuration of an existing configuration file on the switch to the URI in the
mellanoxConfigDBCmdUri command. The filename parameter indicates what configuration
file on the switch to upload (same as the CLI command configuration text generate file
<filename> upload).
• ConfigWrite – saves active configuration to a filename on the switch as given in the filename
parameter. In case filename is “active”, active configuration is saved to the current saved
configuration (same as the CLI command configuration write).
• BinaryDelete – deletes a binary based configuration file
• TextDelete – deletes a text based configuration file
The software upgrade command is issued via the OID mellanoxSWUpdateCmdExecute. The following
options are available:
• Update – fetches the image from a specified URI (equivalent to the command “image fetch”
followed by “image install”)
The image to update from is defined by the OID mellanoxSWUpdateCmdUri. The restrictions
on the URI are identical to what is supported in the CLI command “image fetch”.
• Set-Next – changes the image for the next boot equivalent to the CLI command “image boot”)
The partition from which to boot is defined by the OID mellanoxSWUpdateCmdSetNext. The
parameters for this OID are as follows:
• 0 – no change
• 1 – partition 1
• 2 – partition 2
• 3 – next partition (default)
Using the OIDs mellanoxSWUpdateCmdStatus and mellanoxSWUpdateCmdStatusString, you may view
the status of the latest operation performed from the aforementioned in either integer values, or
human-readable forms, respectively. The integer values presented may be as follows:
• 0 – no operation
• 1-100 – progress in percentage
• 101 – success
• 200 – failure
281
IF-MIB and Interface Information
The OS supports displaying information of switch ports, LAG ports, MLAG ports and VLAN interfaces
on all systems via SNMP interface. This feature is enabled by default. The interface information is
available in the ifTables, ifXTable and mellanoxIfVPITable. Additionally, traps for interface up/down,
and internal link suboptimal speed are enabled. The user has the ability to enable one or both of
these traps.
Interface up/down traps are sent whenever there is a change in the interface’s operational state.
These traps are suppressed for internal links when the internal link’s speed does not match the
configured speed of the link (mismatch condition).
JSON API
JavaScript Object Notation (JSON) is a machine-to-machine data-interchange format which is
supported in Mellanox Onyx™ CLI.
The JSON API allows executing CLI commands and receiving outputs in JSON format which can be
easily parsed by the calling software.
Authentication
The JSON API protocol runs over HTTP/HTTPS and uses the existing web authentication mechanism.
In order to access the system via HTTP/HTTPS, an HTTP/HTTPS client is needed to send POST
requests to the system.
HTTPS access to the web-based management console needs to be enabled using the
command “web https enable” to allow POST requests.
The HTTPS client must first be authenticated by sending a POST request to the following URL:
https://<ip-address>/admin/launch?script=rh&template=json-request&action=json-login
The POST request content should contain the following data (may also be saved as a file) in a JSON
format:
{
"username": "<user name>",
"password": "<user password>"
}
After a successful login, a session ID (cookie) is returned to be used for other HTTPS requests in the
system.
282
Authentication Example
Before sending JSON HTTPS request, the user must first authenticate.
Create a JSON format file that contains the relevant login credentials. For example, add this
content to a file called "post.json":
{
"username": "admin",
"password": "admin"
}
Run the following from your server’s shell to create a login session ID in the file: cookiejar.
Upon a successful login, you will receive a reply similar to the following:
{
"status": "OK",
"status_message": "Successfully logged-in"
}
The session ID can now be used in all other JSON HTTPS requests to the system.
{
"status": "ERROR",
"status_message": "<Invalid username or password | Please provide username and password>"
}
You may also log in and execute commands in the same JSON request. In this case, the JSON file
must be in the following format:
{
"username": "<user name>",
"password": "<user password>",
"commands | cmd": ["<cli command 1>", "<cli command 2>"] | "<cli command>",
"execution_type": "sync | async"
}
For example:
{
"username": "admin",
"password": "admin",
"cmd": "show fan"
}
If login is successful, the JSON API response appears. Otherwise, login failure response is presented.
Expected Input
283
{
"username": "admin",
"password": "admin",
"initial_admin_password": "admin",
"initial_monitor_password": "monitor"
}
Expected Outputs
• Admin and Monitor passwords cannot be changed because they have already been changed:
{
"status": "ERROR",
"status_message": " ‘admin’ password was already set & ‘monitor’ password was already set"
}
{
"status_message": " <‘admin’ password was updated successfully> & <‘monitor’ password was updated
successfully> "
}
{
"status": "OK",
"status_message": "’admin’ password was updated successfully & ‘monitor’ password was updated successfully"
}
• One of the passwords of either Admin or Monitor was changed, while the other remained the
same:
{
"status": "<ERROR|OK>",
"status_message": " < Initial password for the ‘admin’ password was already set | ‘admin’ password was
updated successfully> "
}
• When the payload does not have initial passwords, check change-password nodes to see if
there is no updated password return in this JSON payload:
{
"status": "ERROR",
"status_message": “Please set the default password for ‘admin’ account by using initial password
parameters”
}
When there is no issue with the login, flow will proceed without needing this step.
1. Performs a POST operation on URL (the request should contain the session cookie):
[switch_ip]/script=rh&template=json-request&action=json-logout
284
2. The switch will remove the session and return the following JSON in the response text (in
case of error, content will be relevant to the error):
{
"status": "OK",
"status_message": "Successfully logged-out"
}
3. Make sure there is no cookie. A request with an invalid cookie will respond that the cookie is
invalid.
Logout Example
After the request is handled in the system the HTTPS client receives a JSON response with an
indication of the request execution result. If there is data resulting from the request, it is returned
as part of the response.
JSON requests may also be sent using the WebUI. For more information on using the WebUI with
JSON, please refer to “JSON Request Using WebUI”.
{
"cmd": "<CLI command to execute>"
}
Example:
{
"cmd": "show interface ethernet 1/1"
}
285
{
"commands":["<CLI cmd 1>", "<CLI cmd 2>", … , <CLI cmd n>]
}
Example:
{
"commands":
[
"show interface ethernet 1/1",
"show interface ethernet 1/2"
]
}
In case of a multiple command request, the execution of the commands is done in the order they
appear in the execution list. Note that the execution of a multiple command request will be
stopped upon first failure. That is, in case the execution of one of the commands fails, none of the
remaining commands will be executed.
Execution Types
Execution requests can be either synchronous (default) or asynchronous.
Synchronous requests will wait for a JSON response from the system. The synchronous request has a
defined wait time after which the user will receive a timeout response. The timeout for a
synchronous request is configurable by the user and is 30 seconds by default (see the CLI
command “json-gw synchronous-request-timeout”).
Asynchronous requests will return immediately after sending the request with a reply containing a
“job_id” key. The user can use the given job ID to later query for request status and execution
results. Queries for asynchronous request results are guaranteed to be accessible up to 60 seconds
after the request has been completed. After the result has been successfully queried it will be
deleted and will no longer be accessible (even if the result is not 60 seconds old).
To specify the execution type, the user needs to add the following key to the JSON execution
request:
"execution_type":"<async|sync>"
Example:
{
"execution_type":"async",
"cmd": "show interface ethernet 1/1"
}
job_id=<job number>
Example:
https://<switch-ip-address>/admin/launch?script=json&job_id=<job number>
286
JSON Response Format
Set commands normally do not return any data or output. If a set command does return an
output, it will be displayed in the “status_message” field.
{
"executed_command": "<CLI command that was executed>",
"status" = "<OK|ERROR>",
"status_message" = "<information on the status received>",
"data" = {the information that was asked for in the request}
}
{
“executed_command”: “show interface ethernet 1/1
"status": "OK",
"status_message": "",
"data":
{
"speed": "40GbE",
"admin_state": "up"
}
}
However, the status field can contain in this case an additional value, “ABORTED”, in case a
previous command failed. This status value indicates that the command has not been executed at
all in the system.
287
{
"results": [
{
"executed_command": "<…>",
"status": "<OK|ERROR|ABORTED>",
"status_message": "<…>",
"data": {…}
},
{
"executed_command": "<…>",
"status": "<OK|ERROR|ABORTED>",
"status_message": "<…>",
"data": {…}
},
…
{
"executed_command": "<…>",
"status": "<OK|ERROR|ABORTED>",
"status_message": "<…>",
"data": {…}
}
]
}
Example:
{
"results": [
{
"executed_command": "show interface ethernet 1/1",
"status": "OK",
"status_message": ""
"data": {"speed":"40GbE", "admin_state":"up"}
},
{
"executed_command": "show interface ethernet 1/100",
"status": "ERROR",
"status_message": "wrong interface name",
"data": ""
},
{
"executed_command": "show interface ethernet 1/2",
"status": "ABORTED",
"status_message": "",
"data": ""
}
]
}
Example:
{
"executed_command": "show interface ethernet 1/1",
"status": "PENDING",
"status_message": "",
"data":""
}
288
Example:
{
"executed_command": ""
"status": "OK"
"status_message": ""
"data": ""
"job_id": "2754930426"
}
Supported Commands
• Show commands
• Set commands – all non-interactive CLI set commands are supported
JSON Examples
The following examples use curl (a common tool in Linux systems) to send HTTPS POST requests to
the system.
Single Command
This example sends a request to query the system profile.
When the system finishes processing the request, the user will receive a response similar to the
following:
{
"status": "OK",
"executed_command": "show system profile",
"status_message": "",
"data": {
"Profile": "eth",
"Adaptive Routing": "yes",
"Number of SWIDs": "1"
}
}
Multiple Commands
This example sends a request to change an interface description and then queries for its status.
289
{"commands": ["interface eth 1/1 description test description",
"show interfaces eth 1/1 status"]}
When the system finishes processing the request, the user will receive a response similar to the
following:
{
"results": [
{
"status": "OK",
"executed_command": "interface eth 1/1 description test description",
"status_message": "",
"data": ""
},
{
"status": "OK",
"executed_command": "show interfaces eth 1/1 status",
"status_message": "",
"data": {
"ETH1/1": [
{
"Negotiation": "Auto",
"Operational state" : "Down"
"Speed": "Unknown",
}
]
}
}
]
}
{"execution_type":"async",
"commands": ["interface eth 1/1 description test description",
"show interfaces eth 1/1 status"]}
{
"executed_command": "",
"status": "OK",
"status_message": "",
"data": "",
"job_id": "91329386"
}
The request is a an HTTPS GET operation to the JSON URL with the “job_id” parameter.
290
curl -b /tmp/cookie -X GET "https://10.10.10.10/admin/launch?script=json&job_id=91329386"
If the system is still processing the request, the user receives a response similar to the following:
{
"executed_command": " interface eth 1/1 description test description ",
"status": "PENDING",
"status_message": "",
"data": ""
}
If the system is done processing the request, the user receives a response similar to the following:
{
"results": [
{
"status": "OK",
"executed_command": "interface eth 1/1 description test description",
"status_message": "",
"data": ""
},
{
"status": "OK",
"executed_command": "show interfaces eth 1/1 status",
"status_message": "",
"data": {
"ETH1/1": [
{
"Negotiation": "Auto",
"Operational state" : "Down"
"Speed": "Unknown",
}
]
}
}
]
}
General Error
This example sends a request with an illegal JSON structure.
Error response:
{
"status": "ERROR",
"executed_command": "",
"status_message": "Handle request failed. Reason:\nIllegal JSON structure found in given JSON data.
\nExpecting , delimiter: line 1 column 95 (char 94)",
"data": ""
}
291
{
"execution_type": "sync",
"commands": [ "interface eth 1/1 speed 25.0 Gbps",
"interface eth 1/200 speed 25.0 Gbps",
"interface eth 1/3 speed 25.0 Gbps"]
}
Error response:
{
"results": [
{
"status": "OK",
"executed_command": "interface eth 1/1 speed 25.0 Gbps ",
"status_message": "",
"data": ""
},
{
"status": "ERROR",
"executed_command": "interface eth 1/200 speed 25.0 Gbps",
"status_message": "% 1st Interface does not exist",
"data": ""
},
{
"status": "ABORTED",
"executed_command": "interface eth 1/3 speed 25.0 Gbps",
"status_message": "",
"data": ""
}
]
}
Log into the WebUI, go to the “Setup” tab, and select “JSON API” from the left side menu.
This section is displayed only if JSON API is enabled using the command “json-gw enable”.
The HTTPS method (HTTPS POST in this instance) and the URL used to send the request will be
displayed next to the “HTTPS Method” and “URL” field respectively.
292
To Query an Asynchronous JSON Request
1. Choose “Query asynchronous job status”.
2. Type the job ID in the “Job ID” text box.
3. Press “Query Status”.
The JSON response is then shown in the “JSON Response” box below.
The HTTPS method (HTTPS GET in this instance) and the URL used to send the request will be
displayed next to the “HTTPS Method” and “URL” field respectively.
293
Additional Reading and Use Cases
For more information about this feature and its potential applications, please refer to the following
Mellanox Community post:
XML API
The XML API is deprecated as of release 3.8.2000.
294
Network Management Interface Commands
SNMP
snmp-server auto-refresh
snmp-server auto-refresh {enable | interval <time>}
no snmp-server auto-refresh enable
Configures SNMPD refresh settings.
The no form of the command disables SNMPD refresh mechanism.
Default Enabled
Interval – 60 seconds
History 3.2.3000
295
Syntax Description N/A
Default Enabled
History 3.7.0000
snmp-server community
snmp-server community <community> [ro | rw]
no snmp-server community <community>
Sets a community name for either read-only or read-write SNMP
requests.
The no form of the command sets the community string to default.
296
snmp-server contact
snmp-server contact <contact-name>
no snmp-server contact
Sets a value for the sysContact variable in MIB-II.
The no form of the command resets the parameter to its default
value.
snmp-server enable
snmp-server enable
no snmp-server enable
Enables SNMP-related functionality (SNMP engine, and traps).
The no form of the command disables the SNMP server.
History 3.1.0000
Notes
297
snmp-server engineID reset
snmp-server engineID reset
Resets the SNMPv3 engine ID to be node unique.
Syntax N/A
Description
Configuration config
Mode
History 3.6.6102
Notes Changing system profile or performing “reset factory...” causes the engine ID to change to the
new node-unique one.
History 3.1.0000
Notes
298
snmp-server enable notify
snmp-server enable notify
no snmp-server enable notify
Enables sending of SNMP traps and informs from this system.
The no form of the command disables sending of SNMP traps and informs from this system.
Syntax N/A
Description
Configuration config
Mode
History 3.1.0000
Notes SNMP traps are only sent if there are trap sinks configured with the “snmp-server host...”
command, and if these trap sinks are themselves enabled.
Default SNMP MIBs are all given permission for SET requests by default
History 3.6.3004
Notes
299
snmp-server host disable
snmp-server host <ip-address> disable
no snmp-server host <ip-address> [disable]
Temporarily disables sending of all notifications to this host.
The no form of the commands resumes sending of all notifications to
this host.
Default N/A
History 3.1.0000
Notes
300
user Specifies username for this inform sink
hash-type • MD5
• SHA
auth-password Plaintext password to use for
authentication
If “priv” is not specified the default
privacy algorithm is used with the
same privacy password as that
specified for authentication
History 3.2.1050
Notes
301
snmp-server host traps
snmp-server host <ip-address> traps [<community> | port <port> |
version {1 | 2c} | version 3 {user <name> {auth <hash-type> <auth-
password> [priv <privacy-type> [<priv-password>]] | encrypted auth ...
| prompt auth ...}}]
no snmp-server host <ip-address> traps port
Send SNMP v2c traps to this host with the default trap community.
The no form of the commands removes a host from which SNMP traps
should be sent.
hash-type • MD5
• SHA
auth-password Plaintext password to use for
authentication
If “priv” is not specified the default
privacy algorithm is used with the
same privacy password as that
specified for authentication
302
prompt Configure SNMPv3 security
parameters, specifying passwords
securely in follow-up prompts, rather
than on the command line
History 3.1.0000
Notes
snmp-server listen
snmp-server listen {enable | interface <ifName>}
no snmp-server listen {enable | interface <ifName>}
Configures SNMP server interface access restrictions.
The no form of the command disables the listen interface restricted list
for SNMP server.
Default N/A
History 3.1.0000
Notes If enabled, and if at least one of the interfaces listed is eligible to be a
listen interface, then SNMP requests will only be accepted on those
interfaces. Otherwise, SNMP requests are accepted on any interface.
303
snmp-server notify
snmp-server notify {community <community> | event <event name> | port
<port> | send-test}
no snmp-server notify {community | event <event name> | port}
Configures SNMP notifications (traps and informs).
The no form of the commands negate the SNMP notifications.
Syntax Description community Sets the default community for traps sent to hosts
which do not have a custom community string set
History 3.1.0000
Notes • This setting is only meaningful if traps are enabled, though the list
of hosts may still be edited if traps are disabled
• Refer to Mellanox MIB file for the list of supported traps
snmp-server port
snmp-server port <port>
no snmp-server port
Sets the UDP listening port for the SNMP agent.
The no form of the command resets the parameter to its
default value.
304
Default 161
History 3.1.0000
Notes
snmp-server user
snmp-server user {admin | <username>} v3 {[encrypted] auth <hash-type> <password> [priv
<privacy-type> [<password>]] | capability <cap> | enable <sets> | prompt auth <hash-
type> [priv <privacy-type>] | require-privacy}
no snmp-server user {admin | <username> } v3 {[encrypted] auth <hash-type> <password>
[priv <privacy-type> [<password>]] | capability <cap> | enable <sets> | prompt auth <hash-
type> [priv <privacy-type>]}
Specifies an existing username, or a new one to be added.
The no form of the command disables access via SNMP v3 for the specified user.
Configuration config
Mode
305
History 3.1.0000
3.7.0000
3.8.1000 Syntax updated
Example switch (config) # snmp-server user admin v3 enable
Notes • The username chosen here may be anything that is valid as a local UNIX username
(alphanumeric, plus '-', '_', and '.'), but these usernames are unrelated to, and
independent of, local user accounts. That is, they need not have the same
capability level as a local user account of the same name. Note that these
usernames should not be longer than 31 characters, or they will not work.
• The hash algorithm specified is used both to create digests of the authentication
and privacy passwords for storage in configuration, and also in HMAC form for the
authentication protocol itself
• There are three variants of the command, which branch out after the “v3”
keyword. If “auth” is used next, the passwords are specified in plaintext on the
command line. If “encrypted” is used next, the passwords are specified encrypted
(hashed) on the command line. If “prompt-pass” is used, the passwords are not
specified on the command line the user is prompted for them when the command is
executing. If “priv” is not specified, only the auth password is prompted for. If
“priv” is specified, the privacy password is prompted for; entering an empty string
for this prompt will result in using the same password specified for authentication.
• AES privacy type encryption using the newest algorithm, which means we use aes-
blumenthal. For more information see http://www.snmp.com/eso/
esoConsortiumMIB.txt.
• No more than 30 SNMPv3 users are allowed in the database
show snmp
show snmp [events | host]
Displays SNMP-server configuration and status.
Default N/A
History 3.1.0000
306
Example switch (config) # show snmp
SNMP enabled : no
SNMP port : 161
System contact : Test
System location: Boston
Read-only communities:
public
Read-write communities:
good
Listen Interfaces:
Interface: mgmt0
Notes
Default N/A
History 3.1.0000
Auto-Refreshed tables:
ifTable
ifXTable
mellanoxIfVPITable
Notes
307
show snmp engineID
show snmp engineID
Displays SNMPv3 engine ID key.
Default N/A
History 3.6.6102
Notes
Default N/A
History 3.6.3004
Notes
308
show snmp user
show snmp user
Displays SNMP user information.
Default N/A
History 3.1.0000
Notes
JSON API
json-gw enable
json-gw enable
no json-gw enable
Enables the JSON API.
The no form of the command disables the JSON API.
309
Configuration Mode config
History 3.6.3004
Notes
json-gw synchronous-request-timeout
json-gw synchronous-request-timeout <timeout-value>
no json-gw synchronous-request-timeout
Defines a timeout value for synchronous JSON requests (in seconds).
The no form of the command returns the timeout value to its default.
History 3.6.3004
Notes
show json-gw
show json-gw
Displays the JSON API setting.
Default N/A
310
Configuration Mode Any command mode
History 3.6.3004
XML API
xml-gw enable
xml-gw enable
no xml-gw enable
Enables the XML gateway.
The no form of the command disables the XML gateway.
History 3.1.0000
Notes
show xml-gw
show xml-gw
Displays the XML gateway setting.
311
Syntax Description N/A
Default N/A
History 3.1.0000
Notes
312
Virtualization
Mellanox Onyx™ allows the user to run their own applications on a Linux docker image embedded in
the switch software. The container is a pure application sandbox with resource isolation of both
memory and compute from the system code/NOS.
Docker container implementation in the OS enhances its VM support to provide a new set of
capabilities:
The container implementation does not limit the container developer from calling
the SDK to set parameters. However this is strongly discouraged as it may cause
unexpected system behavior where the OS and the container application manage the
same resources.
• Query the Linux tables provisioned by OS such as neighbor cache, routing tables, L3
interfaces attributes etc.
To set the amount of memory allocated to the container, run the following command:
switch (config) # docker start imagename latestver containername init memory 25 label newlabel privileged sdk
network docker usb-mount
313
CPU Resource Allocation Protocol
Containers have unrestricted access to the host machine’s CPU cycles but it is possible to set a
number of constraints to limit the containers’ access.
To set up limitations or regulate the containers access to CPU resources, run the following
command:
docker start imagename latestver containername init cpus 0.2 label new_label privileged sdk network
Upgrade Ramifications
• The containers and docker images become inaccessible to the user (the docker process will
not run)
• The user can reach their old containers after a rollback procedure
• The “no docker” command erases all containers and images, including those that were
reachable after rollback. Rollbacking after running the “no docker” command may result in
failure to create configured containers from unknown images.
• The user is advised to execute the “no docker” command at some point in order to clear
unused disk space
• It is possible to reload the Docker images after upgrade with the command: docker load
<image_name>_<image_version>.img.gz
• The images are presented with tab-tab after “docker load “ (in cli)
• It is also possible to load the images after rollback after "no docker” was execute. That
means that containers can be restarted after upgrade/rollback if their images are loaded
(with “docker load”).
It is possible to move containers from the current version to the updated one by executing the
following steps:
Before upgrade:
1. Save the container as an image – run the command: “docker commit <container_name>
<new_image_name> <new_image_version>”. For example: docker commit my_name
my_image my_version. You can see the new image by running: “show docker images”.
2. Save the image – run the command: “docker save <image_name> <image_version>
<file_name-optional>”. For example: docker save my_image my_version.
3. Upload the image – save the image to a local repository by running: “image upload
<image_file_name> <destination_path>”. For example: image upload
my_image_my_version.img.gz scp://username:password@fit150/auto/my_dir. The
<image_file_name> is presented after clicking tab-tab.
After upgrade:
314
3. Load the image – run the “docker load <image_file_name>” command. For example: docker
load my_image_my_version.img.gz
4. Start a container with the defined image – now that the image with all the content from the
container is available in the new environment, start a container with this image. Run the
command: “docker start <image_name> <image version> <docker_name> <starting_point>|
privileged | label | memory | cpus | usb-mount”. For example: docker start my_image
my_version new_container now
After an upgrade operation there is a need to rerun copy-sdk command (in case in use).
• HowTo Deploy Docker Container with DHCP Service over Mellanox Onyx on Mellanox Spectrum
Switches
docker
docker
no docker
Enables dockers then enters docker configuration context.
The no form of the command disables dockers, removes configuration, and deletes all
containers and docker images.
Syntax N/A
Description
Default N/A
Configuration config
Mode
History 3.6.2940
Related
Commands
Notes
315
commit
commit <container-name> <image-name> <image-version>
Creates a new image from a running container.
Default N/A
History 3.6.2940
Example switch (config docker) # commit mycontainer test latest
Related Commands
Notes
copy-sdk
copy-sdk
The command provides access to the switch SDK APIs giving applications running on
docker access to the switch hardware.
Default N/A
History 3.6.4110
316
Related Commands
remove image
remove image <image-name> <image-version>
Removes an image from the Linux docker service.
Default N/A
History 3.6.3520
3.6.2940
Example switch (config docker) # remove image test latest
Notes
exec
exec <container-name> <program-executable>
Executes a program within a running container.
Default N/A
317
History 3.6.3520
3.6.2940
Notes
label
label <label name>
no label <label name>
Creates a label which can be used as a shared storage between containers.
The no form of the command removes the label.
Default N/A
History 3.6.4110
Related Commands
Notes
load
load <image-name>
Loads an image from a TAR archive.
Default N/A
318
History 3.6.2940
Notes
pull
pull <image-name>[:<version>]
Pulls a docker image from a docker repository.
Default N/A
History 3.6.2940
Notes
save
save <image-name> <image-version> <filename>
Saves an image to a TAR archive.
319
image-version Image version
Default N/A
History 3.6.2940
Notes After the file is created, the filename gets appended a *.gz suffix.
shutdown
shutdown
no shutdown
Stops all docker containers, and deletes all non-auto containers.
The no form of the command enables the docker Linux service and runs all configured auto-
start containers
Syntax N/A
Description
Default N/A
History 3.6.2940
Related docker
Commands
Notes
320
start
start <image-name> <image-version> <container-name> <starting-point>
[privileged {network | sdk}] [cpus <max-cpu-resources>] [memory <max-
memory>] [usb-mount]
no start <container-name>
Starts a new container from an image.
The no form of the command stops a running docker container.
321
usb-mount Enables USB mount to the docker
container
Default N/A
History 3.6.2940
image upload
image upload <filename> <upload_url>
Uploads an image file to a remote host.
Default N/A
History 3.6.2940
322
Example switch (config) # image upload centos.img.gz scp://
username:[email protected]/var/www/html/
<image_name>
Related Commands
Notes
Default N/A
History 3.6.2940
Related Commands
Notes
Syntax N/A
Description
323
Default N/A
History 3.6.8008
cont_example:
image : busybox
version : latest
status : running
start point : data-path-ready
cpu limit : 0.2
memory limit: 10m
labels : -
privileges : network, sdk
usb mount : enabled
another_container:
image : busybox
version : latest
status : -
start point : init
cpu limit : 0.2
memory limit: 10m
labels : my_label
privileges : network, sdk
usb mount : disabled
cont_example:
image : busybox
version : latest
status : running
start point : data-path-ready
cpu limit : 0.2
memory limit: 10m
labels : -
privileges : network, sdk
usb mount : enabled
Related
Commands
Notes • If a container is already started, the status field displays its current status
• If a container is configured to run on the next boot, the start point field displays
when it will start
• If there is a mismatch between the configuration of a running container and its
next-boot configuration, two entries for the container are shown with both of the
configurations
324
Syntax N/A
Description
Default N/A
History 3.6.3520
Related
Commands
Notes
show docker ps
show docker ps
Display docker containers.
Syntax N/A
Description
Default N/A
History 3.6.3520
Example
325
switch (config) # show docker ps
---------------------------------------------------------------------------------
Container Image:Version Created Status
---------------------------------------------------------------------------------
my_ubuntu_app ubuntu:latest 56 seconds ago Up 50 seconds
Related
Commands
Notes This command is available only after Linux dockers are enabled (“no dockers shutdown”)
Default N/A
History 3.6.4110
Related Commands
Notes
326
Syntax Description name Docker whose stats to display
Default N/A
History 3.6.8008
Example
Related Commands
Notes This command is available only after Linux dockers are enabled
(“no dockers shutdown”)
327
Telemetry, Monitoring, and Debuggability
• What Just Happened
• Logging
• Debugging
• Link Diagnostic Per Port
• Signal Degradation Monitoring
• Event Notifications
• Port Mirroring
• sFlow
• Buffer Histograms Monitoring
• Statistics and Alarms
• Management Information Bases (MIBs)
Retrieving WJH information is done by specifically requesting the last N (up to max 1024 packets per
drop reason group) last dropped packets & their respective drop reasons. The information is
displayed with important Ethernet, IP, and L4 headers. For complete packets, a pcap file is
available.
• Mellanox Onyx CLI
• Mellanox Onyx Web UI
• NEO
• TIG Stack
The following chapters will explain how to use WJH in each of the above modes.
WJH is only supported through CLI, WebUI, or using NEO, but not in parallel.
To disable WJH via CLI use the “no” form of the command:
To display the WJH buffer of dropped packets use the "show what-just-happened" with/without
options (detailed in the commands section).
328
switch (config) # clear what-just-happened <all | acl | forwarding>
It is possible to generate WJH messages into the switch log and automatically generate a PCAP file
as a result of discards.
To see WJH messages in the switch log file, run the following command:
The output will show WJH information including the dropped packets count, ingress interface, drop
reason and the patch to the created Pcap file:
Jan 8 14:15:24 switch statsd[4404]: [statsd.NOTICE]: (StatsLog) Interface Eth1/9: 398 0598 packets dropped due to
Rx invalid tag discards packets
Jan 8 14:15:24 switch statsd[4404]: [statsd.NOTICE]: (StatsLog) Interface Eth1/9: 398 0599 packets dropped due to
Rx discard packets by vlan filter
Jan 8 14:42:44 switch statsd[4404]: [statsd.NOTICE]: (StatsLog) cpu-rate-limiter DISCARD_LAYERS_2_3: 7767087
packets dropped by CPU rate-limiter
Jan 8 14:42:44 switch sdkd[4524]: TID 140220102330112; [sdkd.NOTICE]: WJH: What-Just-Happened - created event pcap
file: /var/opt/tms/tcpdumps/wjh_event_2019_01_08_14_42_45.pcap
To automatically generate a WJH PCAP file as a result of discards the following configuration is
required:
Jan 4 12:02:24 hostname01 statsd[3138]: [statsd.NOTICE]: (StatsLog) Interface Eth1/2: 10 packets dropped due to Rx
discard packets by vlan filter
...
Jan 4 12:02:24 hostname01 sdkd[3368]: TID 140203194615552: [sdkd.NOTICE]: WJH: What-Just-Happened - created event
pcap file: /var/opt/tms/tcpdumps/wjh_auto_export_2019_01_04_12_02_24.pcap
WJH Wireshark dissector enables Wireshark users to analyze WJH pcap files. It displays the
packets' added metadata. You may log into the WebUI and click the "Download Wireshark
Plugin" button in the Status → What Just Happened page in order to download the
Wireshark plugin file. After downloading the file, place it in the Wireshark application in
Windows under %APPDATA%\Wireshark\plugins.
Whenever there is a packet loss, or a critical system failure, the system will auto-generate
a .pcap file under /var/opt/tms/tcpdumps. Once this is performed, WJH is enabled by
default.
329
WJH Commands
what-just-happened
what-just-happened <all | acl | forwarding> enable
no what-just-happened <all | acl | forwarding> enable
Enables showing dropped packet information.
The no form of the command disables showing dropped packet
information.
History 3.7.1000
Related Commands
Notes
what-just-happened auto-export
what-just-happened auto-export <all | acl | forwarding> enable
no what-just-happened auto-export <all | acl | forwarding> enable
Enables auto-generated pcap files.
The no form of the command disables the auto-generation of pcap files.
History 3.8.1000
330
3.8.2000 Added ACL option
Example switch (config) # what-just-happened auto-export forwarding enable
Notes
clear what-just-happened
clear what-just-happened <all | acl | forwarding>
Flushes data from cache DB.
Default N/A
History 3.7.1000
Related Commands
Notes
331
Configuration Mode config
History 3.8.2000
Role Admin
Example switch (config) # clear what-just-happened pcap-files user
show what-just-happened
show what-just-happened [all | acl | forwarding | max-packets <1-1024> | no-pcap | no-
metadata | export <file-name>]
Displays dropped packets information.
332
switch (config) # show what-just-happened all max-packets 1 no-pcap
----------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------
----------------------------------
PktID Timestamp sPort dPort VLAN sMAC dMAC EthType Src IP
Dst IP L4 sPort L4 dPort Drop Group Severity Drop Reason - Proposed Action
----------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------
----------------------------------
1 2019/10/17 06:26:06.073 Eth1/3 N/A N/A BA:1B:25:11:22:31 24:8A:07:CA:CD:C8 IPv4 10.10.10.0
10.10.20.1 N/A N/A Forwarding Warning Blackhole route -
destination IP
Example (acl)
switch (config) # show what-just-happened acl
Pcap file path : /var/opt/tms/tcpdumps/wjh_user_acl_2019_10_17_06_28_39.pcap
----------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------
----------------------------------
PktID Timestamp sPort dPort VLAN sMAC dMAC EthType Src IP Dst IP
L4 sPort L4 dPort Drop Group Severity Drop Reason-Proposed Action
----------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------
---------------------------------
1 2019/10/17 06:25:45.770 Eth1/3 N/A N/A BA:1B:25:11:22:33 BA:1B:25:0B:0B:0B LPBK N/A N/A
N/A N/A Access-list N/A Openflow Table 0 - N/A
2 2019/10/17 06:25:28.939 Eth1/3 N/A N/A BA:1B:25:0A:0A:0A BA:1B:25:0B:0B:0B LPBK N/A N/A
N/A N/A Access-list N/A mac-acl -
Related
Commands
Notes By default, Pcap file names will be automatically created with “wjh_user_[date].pcap”, if a
user-defined name is entered, it will appear as “[user defined name]_[date].pcap”
Default N/A
Configuration Mode N/A
History 3.8.2000
Role Admin
333
Example switch (config) # show what-just-happened status
What-just-happened is enable
-------------------------------------------------------------
Drop group Status Auto-export status
-------------------------------------------------------------
Forwarding Enable Disable
Related Commands
Notes
Logging
Monitor
To print logging events to the terminal, set the modules or events you wish to print to the terminal.
For example, run: o–
These commands print system events in severity “notice”, and “sx-sdk” module notifications in
severity “warning” to the screen. For example, in case of interface-down event, the following gets
printed to the screen:
switch (config) #
Wed Jul 10 11:30:42 2013: Interface IB1/17 changed state to DOWN
Wed Jul 10 11:30:43 2013: Interface IB1/18 changed state to DOWN
To see a list of the events, refer to “Supported Event Notifications and MIB Mapping”.
Remote Logging
To configure remote syslog to send syslog messages to a remote syslog server:
334
2. (Optional) Set the destination port of the remote host. Run:
switch (config) # logging <IP address/hostname> trap override class <class name> priority <level>
Logging Protocol
A feature that provides the ability to choose the protocol to use for sending syslog messages to a
remote host: UDP (default) or TCP. See "logging protocol" command.
Logging Commands
logging
logging <IP address\hostname>
Sends log messages to the remote host specified by its IP or hostname
The no form of the command stops sending log messages to the remote host specified by its IP
or hostname.
Syntax N/A
Description
Default N/A
Configuratio config
n Mode
History 3.1.1000
Role admin
Example switch (config) # logging 1.1.1.1
switch (config) # no logging 1.1.1.1
Related
Commands
335
Notes This command is configurable. If “configuration write” is executed, the remote host will still
receive messages after reload.
logging port
logging <syslog IPv4 address/IPv6 address/hostname> port
<destination-port>
no logging <syslog IPv4 address/IPv6 address/hostname> port
Configures remote server destination port for log messages.
The no form of the command resets the remote log port to its default
value.
History 3.6.2002
Notes
logging trap
logging <syslog IPv4 address/IPv6 address/hostname> [trap {<log-level> | override class
<class> priority <log-level>}]
no logging <syslog IPv4 address/IPv6 address/hostname> [trap {<log-level> | override class
<class> priority <log-level>}]
Enables (by setting the syslog IPv4 address/IPv6 address/hostname) sending logging
messages, with ability to filter the logging messages according to their classes.
The no form of the command stops sending messages to the remote syslog server.
336
Syntax syslog IPv4 syslog IPv4 address/IPv6 address/hostname of the remote syslog server
Description address/IPv6 Hostname is limited to 64 characters
address/
hostname
Configuration config
Mode
History 3.1.0000
Notes
337
logging debug-files
logging debug-files {delete {current | oldest} | rotation {criteria | force | max-num} |
update {<number> | current} | upload <log-file> <upload URL>}
Configures settings for debug log files.
upload URL Supported formats: HTTP, HTTPS, FTP, TFTP, SCP and SFTP
(e.g.: scp://username[:password]@hostname/path/
filename)
Default N/A
Configuration config
Mode
History 3.3.4150
Related
Commands
Notes
338
logging event enable
logging events {cpu-rate-limiters | interfaces | protocols} enable
no logging events {cpu-rate-limiters | interfaces | protocols} enable
Activate event tracking for a certain group.
The no form of the command deactivates event tracking for a certain group.
Default N/A
History 3.6.6000
Related Commands
Notes
Syntax Description cpu-rate-limiters Sets threshold for CPU rate limiter related
events
339
Default cpu-rate-limiters - 1 event
interfaces - 10 events
protocols - 2 events
History 3.6.6000
Related Commands
Notes
History 3.6.6000
Related Commands
Notes
340
logging event rate-limit
logging events [cpu-rate-limiters | interfaces | protocols] rate-limit {short | medium |
long} [count | window]
no logging events [cpu-rate-limiters | interfaces | protocols] rate-limit [short | medium |
long] [count <number> | window <seconds>]
Configures the number of allowed events per time window, and that window’s duration.
The no form of the command resets these parameters to their default values.
Configuration config
Mode
History 3.6.6000
Related
Commands
Notes The goal of this command is to restrict the number of events in the log. To achieve this
end, it is possible to specify the allowed number (parameter “count”) of messages per
period of time (parameter “window”).
341
logging fields
logging fields seconds {enable | fractional-digits <f-digit> | whole-digits
<w-digit>}
no logging fields seconds {enable | fractional-digits <f-digit> | whole-digits
<w-digit>}
Specifies whether to include an additional field in each log message that
shows the number of seconds since the Epoch or not.
The no form of the command disallows including an additional field in each
log message that shows the number of seconds since the Epoch.
Default Disabled
History 3.1.0000
Notes This is independent of the standard syslog date and time at the beginning
of each message in the format of “July 15 18:00:00”. Aside from indicating
the year at full precision, its main purpose is to provide subsecond
precision.
342
oldest Deletes oldest log file
Default CLI commands and audit message are set to notice logging level
History 3.1.0000
Notes
Syntax freq Sets rotation criteria according to time. Possible options are:
Description
• Daily
• Weekly
• Monthly
size-mb Sets rotation criteria according to size in megabytes
Range: 1-9999
force Forces an immediate rotation of the log files. This does not affect the
schedule of auto-rotation if it was done based on time: the next automatic
rotation will still occur at the same time for which it was previously
scheduled. Naturally, if the auto-rotation was based on size, this will delay
it somewhat as it reduces the size of the active log file to zero.
number-of- The number of log files will be kept. If the number of log files ever
files exceeds this number (either at rotation time, or when this setting is
lowered), the system will delete as many files as necessary to bring it
down to this number, starting with the oldest.
Default 10 files are kept by default with rotation criteria of 5% of the log partition size
Configuration config
Mode
343
History 3.1.0000
Notes
Syntax Description current The current log file. The current log file will have the
name “messages” if you do not specify a new name for
it in the upload URL.
file-number An archived log file. The archived log file will have the
name “messages<n>.gz” (while “n” is the file number)
if you do not specify a new name for it in the upload
URL. The file will be compressed with gzip.
Default 10 files are kept by default with rotation criteria of 5% of the log partition
size
History 3.1.0000
Notes
344
logging filter include
logging <IP address\hostname> filter include <regex>
Sends only log messages that match the input regex to a remote host specified by its IP or
hostname.
Syntax N/A
Description
Default N/A
Configurati config
on Mode
History 3.8.2000
Role admin
Example switch (config) # logging 1.1.1.1 filter include ERROR
Related loggin
Commands
no logging
Notes This command is configurable. If “configuration write” is executed, the remote host will still
receive filtered messages after reload.
Syntax N/A
Description
Default N/A
Configurati config
on Mode
History 3.8.2000
Role admin
Example switch (config) # logging 1.1.1.1 filter exclude ERROR
345
Related loggin
Commands
no logging
Notes This command is configurable. If “configuration write” is executed, the remote host will still
receive filtered messages after reload.
no logging filter
no logging <IP address\hostname> filter
Sends unfiltered log messages to the configured remote host.
Syntax N/A
Description
Default N/A
Configuratio config
n Mode
History 3.8.2000
Role admin
Example switch (config) # no logging 1.1.1.1 filter
Related loggin
Commands
no logging
Notes This command is configurable. If “configuration write” is executed, the remote host will still
receive filtered messages after reload.
logging format
logging format {standard | welf [fw-name <hostname>]}
no logging format {standard | welf [fw-name <hostname>]}
Sets the format of the logging messages.
The no form of the command resets the format to its default.
346
hostname Specifies the firewall hostname that
should be associated with each
message logged in WELF format. If no
firewall name is set, the hostname is
used by default. Hostname is limited
to 64 characters.
Default standard
History 3.1.0000
Notes
logging level
logging level {cli commands <log-level> | audit mgmt <log-level>}
Sets the severity level at which CLI commands or the management audit message that the
user executes are logged. This includes auditing of both configuration changes and actions.
Syntax cli commands Sets the severity level at which CLI commands which the user executes
Description are logged
audit mgmt Sets the severity level at which all network management audit messages
are logged
Configuration config
Mode
History 3.1.0000
347
Related show logging
Commands
Notes
Configuration config
Mode
History 3.1.0000
348
Example switch (config) # logging local override class mgmt-front priority warning
Notes
logging monitor
logging monitor <facility> <priority-level>
no logging monitor <facility> <priority-level>
Sets monitor log facility and level to print to the terminal.
The no form of the command disables printing logs of facilities to the terminal.
History 3.3.4000
Related Commands
Notes
349
logging protocol
logging <IP address\hostname> protocol [tcp|udp]
no logging <IP address\hostname> protocol
Sends log messages to specified host with the chosen protocol (TCP or UDP).
The no form of the command sets the protocol for sending log messages to a remote host
to the default (UDP).
Default UDP
History 3.8.2100
Role Admin
Example switch (config) # logging 1.1.1.1 protocol tcp
switch (config) # no logging 1.1.1.1 protocol
Related Commands
Notes This command is configurable, so if “configuration write” is executed then after reboot
the remote host will still receive messages with the configured protocol.
logging receive
logging receive
no logging receive
Enables receiving logging messages from a remote host.
The no form of the command disables the option of receiving logging messages from a
remote host.
Syntax N/A
Description
Configuration config
Mode
History 3.1.0000
350
Related show logging
Commands logging local
logging local override
show log
show log [continuous | files [<file-number>]] [[not] matching <reg-exp>]
Displays the log file with optional filter criteria.
Syntax continues Displays the last few lines of the current log file and then
Description continues to display new lines as they come in until the user
hits Ctrl+C, similar to LINUX “tail” utility
<file-number> Displays an archived log file, where the number may range from
1 up to the number of archived log files available
[not] matching <reg-exp> The file is piped through a LINUX “grep” utility to only include
lines either matching, or not matching, the provided regular
expression
Default N/A
History 3.1.0000
Example
switch (config) # show log matching "Executing|Action"
Jul 31 16:11:23 M2100-aj cli[26502]: [cli.NOTICE]: user : Executing command: enable
Jul 31 16:11:24 M2100-aj cli[26507]: [cli.NOTICE]: user : Executing command: enable
Jul 31 16:11:29 M2100-aj cli[26514]: [cli.NOTICE]: user : Executing command: enable
Jul 31 16:11:29 M2100-aj cli[26514]: [cli.NOTICE]: user : Executing command: show license
Jul 31 16:11:41 M2100-aj cli[26548]: [cli.NOTICE]: user : Executing command: enable
Jul 31 16:11:42 M2100-aj cli[26553]: [cli.NOTICE]: user : Executing command: enable
Jul 31 16:11:42 M2100-aj cli[26553]: [cli.NOTICE]: user : Executing command: conf termina
351
Related logging fields
Commands logging files rotation
logging level
logging local
logging receive
show logging
Notes • When using a regular expression containing | (OR), the expression should be
surrounded by quotes (“<expression>”), otherwise it is parsed as filter (PIPE)
command
• The command’s output has many of the options as the Linux “less” command. These
options allow navigating the log file and perform searches. To see help for different
option press “h” after running the “show log” command.
show logging
show logging
Displays the logging configurations.
Syntax N/A
Description
Default N/A
History 3.1.0000
352
Example switch (config) # show logging
Local logging level : notice
Override for class debug-module : notice
Default remote logging level : notice
Allow receiving of messages from remote hosts: no
Number of archived log files to keep : 10
Log rotation size threshold : 19.07 megabytes
Log rotation (debug) size threshold : 19.07 megabytes
Log format : standard
Subsecond timestamp field : disabled
1.2.2.3:
log level : notice
Remote port: 33
Notes
353
Example switch (config) # show logging events
cpu-rate-limiters:
Admin mode : yes
Interval : 10 seconds
Error threshold: 1
interfaces:
Admin mode : no
Interval : 5 minutes
Error threshold: 10
protocols:
Admin mode : no
Interval : 1 minute
Error threshold: 2
Related Commands
Notes
354
Default N/A
History 3.6.6000
interfaces:
Counters: Rx discard packets, Rx error packets, Rx fcs errors, Rx undersize packets,
Rx oversize packets, Rx unknown control opcode, Rx symbol errors, Rx discard packets by
Storm Control, Tx discard packets, Tx error packets, Tx hoq discard packets
Default N/A
History 3.1.0000
Notes
355
Debugging
To use the debugging logs feature:
Debugging Commands
Default N/A
History 3.3.4150
Notes
356
debug ethernet dcbx
debug ethernet dcbx {all | management | fail-all | control-
panel | tlv}
Configures the trace level for DCBX.
The no form of the command disables the configured DCBX
debug traces.
Default N/A
History 3.3.4150
Notes
357
group-info Group information messages
Default N/A
History 3.3.4150
Notes
358
error Trace error messages
Default N/A
History 3.3.4150
Notes
Default N/A
359
Configuration Mode config
History 3.3.4150
Notes
360
tlv TLV related trace configuration
Default N/A
History 3.3.4150
Notes
Default N/A
History 3.3.4150
Notes
361
debug ethernet qos
debug ethernet qos {all | all-resource | control-panel | fail-all
| filters | init-shut | management | memory | packet}
no debug ethernet qos {all | all-resource | control-panel | fail-
all | filters | init-shut | management | memory | packet}
Configures the trace level for QoS.
The no form of the command disables the configured QoS
debug traces.
Default N/A
History 3.3.4150
Notes
362
debug ethernet spanning-tree
debug ethernet spanning-tree {all | error | event | filters |
init-shut | management | memory | packet | port-info-state-
machine | port-receive-state-machine | port-role-selection-
state-machine | port-transit-state-machine | port-transmit-
state-machine | protocol-migration-state-machine | timers}
no debug ethernet spanning-tree {all | error | event | filters |
init-shut | management | memory | packet | port-info-state-
machine | port-receive-state-machine | port-role-selection-
state-machine | port-transit-state-machine | port-transmit-
state-machine | protocol-migration-state-machine | timers}
Configures the trace level for spanning-tree.
The no form of the command disables the configured spanning-
tree debug traces.
Default N/A
363
Configuration Mode config
History 3.3.4150
Notes
fwd Forward
priority Priority
Default N/A
History 3.3.4150
Notes
364
show debug ethernet
show debug ethernet {dcbx | ip {arp | dhcp-relay | igmp-snooping |
interface | ospf} | lacp | lldp | port | qos | spanning-tree | vlan}
Displays debug level configuration on a specific switch.
Syntax Description dcbx Displays the trace level for spanning tree
Default N/A
History 3.3.4150
Notes
365
show log debug
show log debug [continuous | files | matching | not]
Displays current event debug-log file in a scrollable pager.
matching Displays event debug logs that match a given regular expression
not Displays event debug logs that do not meet certain criteria
Default N/A
History 3.3.4150
Example
switch (config) # show log debug
Jun 15 16:20:47 switch-627e4c last message repeated 7 times
Jun 15 16:20:47 switch-627e4c issd[6509]: TID 1274844336: [issd.DEBUG]: NPAPI: >>QoSHwQueueDelete
i4IfIndex[137]
Jun 15 16:20:47 switch-627e4c last message repeated 7 times
Jun 15 16:20:47 switch-627e4c issd[6509]: TID 1274844336: [issd.DEBUG]: NPAPI: >>QoSHwQueueDelete
i4IfIndex[141]
Jun 15 16:20:47 switch-627e4c last message repeated 7 times
Jun 15 16:20:48 switch-627e4c issd[6509]: TID 1274844336: [issd.DEBUG]: NPAPI: ==FsHwSetSpeed
sx_api_port_speed_admin_set = 0
Jun 15 16:20:48 switch-627e4c issd[6509]: TID 1274844336: [issd.DEBUG]: NPAPI: ==FsHwGetSpeed
sx_api_port_speed_oper_get = 0
Jun 15 16:20:49 switch-627e4c issd[6509]: TID 1274844336: [issd.DEBUG]: NPAPI: >>CfaGddConfigPort NS
u4IfIndex[89], u1ConfigOption[6]
Jun 15 16:20:49 switch-627e4c issd[6509]: TID 1274844336: [issd.DEBUG]: NPAPI: >>CfaGddConfigPort NS
u4IfIndex[33], u1ConfigOption[6]
Jun 15 16:20:49 switch-627e4c issd[6509]: TID 1274844336: [issd.DEBUG]: NPAPI: >>CfaGddConfigPort NS
u4IfIndex[73], u1ConfigOption[6]
Jun 15 16:20:49 switch-627e4c issd[6509]: TID 1274844336: [issd.DEBUG]: NPAPI: >>CfaGddConfigPort NS
u4IfIndex[121], u1ConfigOption[6]
Jun 15 16:20:49 switch-627e4c issd[6509]: TID 1274844336: [issd.DEBUG]: NPAPI: >>CfaGddConfigPort NS
u4IfIndex[133], u1ConfigOption[6]
Jun 15 16:20:49 switch-627e4c issd[6509]: TID 1274844336: [issd.DEBUG]: NPAPI: >>CfaGddConfigPort NS
u4IfIndex[13], u1ConfigOption[6]
Jun 15 16:20:49 switch-627e4c issd[6509]: TID 1274844336: [issd.DEBUG]: NPAPI: >>CfaGddConfigPort NS
u4IfIndex[81], u1ConfigOption[6]
Jun 15 16:20:49 switch-627e4c issd[6509]: TID 1274844336: [issd.DEBUG]: NPAPI: >>CfaGddConfigPort NS
u4IfIndex[117], u1ConfigOption[6]
Jun 15 16:20:49 switch-627e4c issd[6509]: TID 1274844336: [issd.DEBUG]: NPAPI: >>CfaGddConfigPort NS
u4IfIndex[65], u1ConfigOption[6]
.
.
.
Related
Commands
Notes
366
Link Diagnostic Per Port
When debugging a system, it is important to be able to quickly identify the root of a problem. The
Diagnostic commands enables an insight into the physical layer components where the user is able
to see information such as a cable status (plugged/unplugged) or if Auto-Negotiation has failed.
Default N/A
History 3.6.4006
367
Example switch (config) # show interfaces ethernet link-diagnostics
-----------------------------------------------------------
Interface Code Status
-----------------------------------------------------------
Eth1/1 1024 Cable is unplugged
Eth1/2 1024 Cable is unplugged
Eth1/3 1024 Cable is unplugged
Eth1/4 1024 Cable is unplugged
Eth1/5 1024 Cable is unplugged
Eth1/6 1024 Cable is unplugged
Eth1/7 1024 Cable is unplugged
Eth1/8 1024 Cable is unplugged
Eth1/9 1024 Cable is unplugged
Eth1/10 1024 Cable is unplugged
Eth1/11 1024 Cable is unplugged
Eth1/12 1024 Cable is unplugged
Eth1/13 1024 Cable is unplugged
Eth1/14 1024 Cable is unplugged
Eth1/15 1024 Cable is unplugged
Eth1/16 1024 Cable is unplugged
Eth1/17 1024 Cable is unplugged
Eth1/18 1024 Cable is unplugged
Eth1/19 1024 Cable is unplugged
Eth1/20 1024 Cable is unplugged
Eth1/21 1024 Cable is unplugged
Eth1/22 1024 Cable is unplugged
Eth1/23 1024 Cable is unplugged
Eth1/24 1024 Cable is unplugged
Eth1/25 1024 Cable is unplugged
Eth1/26 1024 Cable is unplugged
Eth1/27 1024 Cable is unplugged
Eth1/28 1024 Cable is unplugged
Eth1/29 1024 Cable is unplugged
Eth1/30 1024 Cable is unplugged
Eth1/31 0 No issue was observed
Eth1/32 0 No issue was observed
Related Commands
Notes
The system continuously monitors the link BER and compares it to BER limits, when limits are
crossed the system can generate an event indicating that link quality is degraded to the network
operator that can take preemptive actions or even disable the low quality link.
When Forward Error Correction (FEC) is enabled a network operator can choose to monitor an
amount of corrected errors by using the pre-FEC mode, or the amount of errors which the FEC failed
to correct (uncorrectable errors) by using the post-FEC mode, when FEC is used then every error
detected by the PHY will be monitored.
When link is disabled the system will keep it in shutdown state until the port is explicitly enabled
(Explicitly running “shutdown” and then “no shutdown” commands for that port).
368
Effective-BER Monitoring
Effective-BER is the BER that the MACLRH/Application layer observe. Errors monitored by the
Effective-BER may directly result in a packet drop. For links with no error correction, the Effective
BER is the BER received by port, and it is monitored based on the received Phy symbols. For links
with FEC, the Effective BER represents the rate of errors that the FEC decoder did not manage to
correct and were passed to the MACLRH layer. The Effective BER for FEC links is monitored using the
FEC decoder uncorrectable codewords data.
Signal degradation snmp event comes only when there is an alarm alert of BER limit cross
that is being sent only once. There is no SNMP alarm in case of cross down back to normal
threshold, nor in the second time in a row the BER is crossed above again. In order to get
another alarm on BER limit cross, it is needed to shutdown the interface and enable it again.
Please refer to “Email Notifications” for a general explanation on how to enable email
notifications for specific events.
signal-degrade
signal-degrade [no-shutdown]
no signal-degrade [no-shutdown]
Enables signal degradation operation per interface.
The no form of the command disables signal degradation operation per interface.
369
Default Disabled
History 3.6.4110
Notes
Default N/A
History 3.6.4110
Example
switch (config) # show interfaces ethernet signal-degrade
------------------------------------------------------------------------------------------
Interface Admin state Monitoring Action FEC type
------------------------------------------------------------------------------------------
Eth1/1 Enabled Disabled Shutdown no-fec/post-fec
Eth1/2 Enabled Disabled Shutdown no-fec/post-fec
Eth1/3 Enabled Disabled Shutdown no-fec/post-fec
Eth1/4 Enabled Disabled Shutdown no-fec/post-fec
Eth1/5 Enabled Disabled Shutdown no-fec/post-fec
...
Related Commands
Notes
Event Notifications
The OS features a variety of supported events. Events are printed in the system log file and can,
optionally, be sent to the system administrator via email, SNMP trap or directly prompted to the
terminal.
370
Supported Event Notifications and MIB Mapping
The following table presents the supported events and maps them to their relevant MIB OID.
371
Event Name Event Description MIB OID Comments
interface-down An interface’s link state RFC1213: linkdown Supported for Ethernet and
has changed to DOWN (SNMPv1) management interfaces for 1U
and blade systems
interface-up An interface’s link state RFC1213: linkup Supported for Ethernet and
has changed to UP (SNMPv1) management interfaces for 1U
and blade systems
372
Event Name Event Description MIB OID Comments
send-test Send a test notification testTrap Run the CLI command “snmp-
server notify send-test”
Terminal Notifications
To print events to the terminal, set the events you wish to print to the terminal. Run:
This command prints system events in the severity “notice” to the screen. For example, in case of
interface-down event, the following gets printed to the screen.
373
switch (config) #
Wed Jul 10 11:30:42 2013: Interface IB1/17 changed state to DOWN
Wed Jul 10 11:30:43 2013: Interface IB1/18 changed state to DOWN
switch (config) #
Email Notifications
To configure the OS to send you emails for all configured events and failures:
1. Set your mailhub to the IP address to be your mail client’s server – for example, Microsoft
Outlook exchange server.
374
Command Event Notifications
Default N/A
History 3.2.3000
Related Commands
Notes
375
Syntax Description event • process-crash – a process has crashed
• process-exit – a process unexpectedly
exited
• liveness-failure – a process iss detected as
hung
• cpu-util-high – CPU utilization has risen too
high
• cpu-util-ok – CPU utilization has fallen back
to normal levels
• paging-high – paging activity has risen too
high
• paging-ok – paging activity has fallen back
to normal levels
• disk-space-low – filesystem free space has
fallen too low
• disk-space-ok – filesystem free space is
back in the normal range
• memusage-high – memory usage has risen
too high
• memusage-ok – memory usage has fallen
back to acceptable levels
• netusage-high – network utilization has
risen too high
• netusage-ok – network utilization has fallen
back to acceptable levels
• disk-io-high – disk I/O per second has risen
too high
• disk-io-ok – disk I/O per second has fallen
back to acceptable levels
• unexpected-cluster-join – node has
unexpectedly joined the cluster
• unexpected-cluster-leave – node has
unexpectedly left the cluster
• unexpected-cluster-size – the number of
nodes in the cluster is unexpected
• unexpected-shutdown – unexpected system
shutdown
• interface-up – an interface’s link state has
changed to up
• interface-down – an interface's link state
has changed to down
• user-login – a user has logged into the
system
• user-logout – a user has logged out of the
system
• health-module-status – health module
status
• temperature-too-high – temperature has
risen too high
• low-power – low power supply
• low-power-recover – low power supply
recover
• insufficient-power – insufficient power
supply
• power-redundancy-mismatch – power
redundancy mismatch
• insufficient-fans – insufficient amount of
fans in system
• insufficient-fans-recover – insufficient
amount of fans in system recovered
• asic-chip-down – ASIC (chip) down
376
• internal-bus-error – internal bus (I2C) error
• internal-link-speed-mismatch – internal
links speed mismatch
Default N/A
Configuration Mode config
History 3.2.3000
Example switch (config) # email autosupport event process-crash
Related Commands
Notes
Syntax Description none Does not use TLS to secure auto-support email.
Default tls-none
History 3.2.3000
Related Commands
Notes
377
email autosupport ssl cert-verify
email autosupport ssl cert-verify
no email autosupport ssl cert-verify
Verifies server certificates.
The no form of the command does not verify server certificates.
Default N/A
History 3.2.3000
Related Commands
Notes
Default default_ca_list
History 3.2.3000
Related Commands
Notes
378
email dead-letter
email dead-letter {cleanup max-age <duration> | enable}
no email dead-letter
Configures settings for saving undeliverable emails.
The no form of the command disables sending of emails to vendor auto-
support upon certain failures.
History 3.1.0000
email domain
email domain <hostname-or-ip-address>
no email domain
Sets the domain name from which the emails appear to come (provided that
the return address is not already fully-qualified). This is used in conjunction
with the system hostname to form the full name of the host from which the
email appears to come.
The no form of the command clears email domain override.
History 3.1.0000
379
Example switch (config) # email domain my_domain
email mailhub
email mailhub <hostname-or-ip-address>
no email mailhub
Sets the mail relay to be used to send notification emails.
The no form of the command clears the mail relay to be used to send
notification emails.
Default N/A
History 3.1.0000
Default N/A
History 3.7.1000
380
Example switch (config) # email autosupport mailhub 10.10.10.1
Default N/A
History 3.7.1000
email mailhub-port
email mailhub-port <hostname-or-ip-address>
no email mailhub-port
Sets the mail relay port to be used to send notification emails.
The no form of the command resets the port to its default.
Default 25
History 3.1.0000
381
Related Commands show email
Notes
382
Syntax Description event Available event names:
• process-crash – a process has crashed
• process-exit – a process unexpectedly
exited
• liveness-failure – a process iss detected as
hung
• cpu-util-high – CPU utilization has risen too
high
• cpu-util-ok – CPU utilization has fallen back
to normal levels
• paging-high – paging activity has risen too
high
• paging-ok – paging activity has fallen back
to normal levels
• disk-space-low – filesystem free space has
fallen too low
• disk-space-ok – filesystem free space is
back in the normal range
• memusage-high – memory usage has risen
too high
• memusage-ok – memory usage has fallen
back to acceptable levels
• netusage-high – network utilization has
risen too high
• netusage-ok – network utilization has fallen
back to acceptable levels
• disk-io-high – disk I/O per second has risen
too high
• disk-io-ok – disk I/O per second has fallen
back to acceptable levels
• unexpected-cluster-join – node has
unexpectedly joined the cluster
• unexpected-cluster-leave – node has
unexpectedly left the cluster
• unexpected-cluster-size – the number of
nodes in the cluster is unexpected
• unexpected-shutdown – unexpected system
shutdown
• interface-up – an interface’s link state has
changed to up
• interface-down – an interface's link state
has changed to down
• user-login – a user has logged into the
system
• user-logout – a user has logged out of the
system
• health-module-status – health module
status
• temperature-too-high – temperature has
risen too high
• low-power – low power supply
• low-power-recover – low power supply
recover
• insufficient-power – insufficient power
supply
• power-redundancy-mismatch – power
redundancy mismatch
• insufficient-fans – insufficient amount of
fans in system
383
• insufficient-fans-recover – insufficient
amount of fans in system recovered
• asic-chip-down – ASIC (chip) down
• internal-bus-error – internal bus (I2C) error
• internal-link-speed-mismatch – internal
links speed mismatch
Default No events are enabled
History 3.1.0000
History 3.1.0000
384
Notes
email return-addr
email return-addr <username>
no email domain
Sets the username or fully-qualified return address from which
email notifications are sent.
• If the string provided contains an “@” character, it is
considered to be fully-qualified and used as-is.
• Otherwise, it is considered to be just the username, and
we append “@<hostname>.<domain>”. The default is
“do-not-reply”, but this can be changed to “admin” or
whatnot in case something along the line does not like
fictitious addresses.
The no form of the command resets this attribute to its default.
Default N/A
History 3.1.0000
email return-host
email return-host
no email return-host
Includes the hostname in the return address for emails.
The no form of the command does not include the hostname in the return address for
emails.
Syntax N/A
Description
Default No return host
385
Configuration config
Mode
History 3.1.0000
email send-test
email send-test
Sends test-email to all configured event and failure recipients.
History 3.1.0000
386
tls-none Attempts to use TLS on the regular mailhub port,
with STARTTLS. If this fails, it falls back on
plaintext.
Default default-cert
History 3.2.3000
Notes
Syntax N/A
Description
Default N/A
Configuration config
Mode
History 3.2.3000
387
email ssl ca-list
email ssl ca-list {<ca-list-name> | default-ca-list | none}
no email ssl ca-list
Specifies the list of supplemental certificates of authority (CA) from the
certificate configuration database that is to be used for verification of
server certificates when sending email using TLS, if any.
The no form of the command uses no list of supplemental certificates.
Default default-ca-list
History 3.2.3000
Notes This command has no impact unless TLS is used, and certificate
verification is enabled.
show email
show email
Displays email configuration or events for which email should be sent upon.
Default N/A
History 3.1.0000
388
Example switch (config) # show email
Mail hub: 10.0.8.70
Mail hub port: 25
Domain override:
Return address: do-not-reply
Include hostname in return address: yes
Autosupport emails
Enabled: no
Recipient:
Mail hub:
Security mode: tls-none
Verify server cert: yes
Supplemental CA list: default-ca-list
Related Commands
Notes
History 3.1.0000
389
Example switch (config) # show email events
Failure events for which emails will be sent:
expected-shutdown: Expected system shutdown
process-crash: A process in the system has crashed
unexpected-shutdown: Unexpected system shutdown
Related Commands
Notes
Port Mirroring
Port mirroring enables data plane monitoring functionality which allows the user to send an entire
traffic stream for testing. Port mirroring sends a copy of packets of a port’s traffic stream, called
“mirrored port”, into an analyzer port. Port mirroring is used for network monitoring. It can be used
for intrusion detection, security breaches, latency analysis, capacity and performance matters, and
protocol analysis.
390
There is no limitation on the number of mirroring sources and more than a single source can be
mapped to a single analyzer destination.
Mirroring Sessions
Port mirroring is performed by configuring mirroring sessions. A session is an association of a mirror
port (or more) and an analyzer port.
A mirroring session is a monitoring configuration mode that has the following parameters:
391
Parameter Description Access
Source Interface
The source interface (mirror port) refers to the interface from which the traffic is monitored. Port
mirroring does not affect the switching of the original traffic. The traffic is simply duplicated and
sent to the analyzer port. Traffic in any direction (either ingress, egress or both) can be mirrored.
There is no limitation on the number of the source interfaces mapped to a mirroring session.
Ingress and egress traffic flows of a specific source interface can be mapped to two
different sessions.
LAG
The source interface can be a physical interface or a LAG.
Port mirroring can be configured on a LAG interface but not on a LAG member. When a port is added
to a mirrored LAG it inherits the LAG’s mirror configuration. However, if port mirroring configuration
is set on a port, that configuration must be removed prior to adding the port to a LAG interface.
When a port is removed from a LAG, the mirror property is switched off for that port.
Control Protocols
All control protocols captured on the mirror port are forwarded to the analyzer port in addition to
their normal treatment. For example LACP, STP, and LLDP are forwarded to the analyzer port in
addition to their normal treatment by the CPU.
Exceptions to the behavior above are the packets that are being handled by the MAC layer, such as
pause frames.
Destination Interface
The destination interface is an analyzer port to which mirrored traffic is directed. The mirrored
packets are duplicated, optionally modified, and sent to the analyzer port. Spectrum platforms
392
support up to only 3 analyzer ports, where any mirror port can be mapped to any analyzer port and
more than a single mirror port can be mapped to a single analyzer port.
Packets can be forwarded to any destination using the command "destination interface".
The analyzer port supports status and statistics as any other port.
LAG
The destination interface cannot be a member of LAG when the header format is local.
Control Protocols
The destination interface may also operate in part as a standard port, receiving and sending out
non-mirrored traffic. When the header format is configured as a local port, ingress control protocol
packets that are received by the local analyzer port get discarded.
When the analyzer port sends encapsulated traffic, the analyzer traffic has additional headers and
therefore longer frame. The MTU must be configured to support the additional length, otherwise,
the packet is truncated to the configured MTU.
The system on the receiving end of the analyzer port must be set to handle the egress traffic. If it is
not, it might discard it and indicate this in its statistics (packet too long).
Header Format
Ingress traffic from the source interface can be manipulated in several ways depending on the
network layout using the command header-format.
If the analyzer system is directly connected to the destination interface, then the only parameters
that can be configured on the port are the MTU, speed and port based flow control. Priority flow
control is not supported is this case. However, if the analyzer system is indirectly connected to the
destination interface, there are two options for switching the mirrored data to the analyzer system:
• A VLAN tag may be added to the Ethernet header of the mirrored traffic
• An Ethernet header can be added with include a new destination address and VLAN tag
It must be taken into account that adding headers increases packet size.
393
Congestion Control
The destination ports might receive pause frames that lead to congestion in the switch port. In
addition, too much traffic directed to the analyzer port (for example 40GbE mirror port is directed
into 10GbE analyzer port) might also lead to congestion.
In case of congestion:
• When best effort mode is enabled on the analyzer port, Spectrum drops excessive traffic
headed to the analyzer port using tail drop mechanism, however, the regular data (mirrored
data heading to its original port) does not suffer from a delay or drops due to the analyzer
port congestion.
• When the best effort mode on the analyzer port is disabled, the Spectrum does not drop the
excessive traffic. This might lead to buffer exhaustion and data path packet loss.
The default behavior in congestion situations is to drop any excessive frames that may clog the
system.
Truncation
When enabled, the system can truncate the mirrored packets into smaller 64-byte packets (default)
which is enough to capture the packets’ L2 and L3 headers.
394
To configure a mirroring session:
switch (config monitor session 1) # add source interface ethernet 1/1 direction both
395
The default for this command is to drop excessive frames. The “pause-excessive-
frames” parameter uses flow control to regulate the traffic from the source
interfaces.
396
Port Mirroring Commands
monitor session
monitor session <session-id>
no monitor session <session-id>
Creates session and enters monitor session configuration mode upon
using this command for the first time.
The no form of the command deletes the session.
Default N/A
Configuration Mode config
History 3.3.3500
3.8.1000 Updated syntax
Example switch (config)# monitor session 1
switch (config monitor session 1)#
Related Commands
Notes
destination interface
destination interface <type> <number> [force]
no destination interface
Sets the egress interface number.
The no form of the command deletes the destination interface.
Syntax Description interface Sets the interface type and number (e.g.
ethernet 1/2)
History 3.3.3500
397
3.6.4006 Added note
Related Commands
shutdown
shutdown
no shutdown
Disables the session.
The no form of the command enables the session.
Syntax Description interface Sets the interface type and number (e.g.
ethernet 1/2)
Default Disabled
History 3.3.3500
Related Commands
Notes
398
add source interface direction
add source interface <type> <number> direction <d-type>
no source interface <type> <number>
Adds a source interface to the mirrored session.
The no form of the command deletes the source interface.
Syntax Description interface Sets the interface type and number (e.g.
ethernet 1/2)
History 3.3.3500
Example switch (config monitor session 1) # add source interface ethernet 1/1
direction ingress
Related Commands
header-format
header-format {local [switch-priority <sp>] | add-vlan <vlan-id> [priority
<prio>] [switch-priority <sp>] | add-ethernet-header destination-mac
<mac-address> [add-vlan <vlan-id> [priority <prio>]] [switch-priority
<sp>]}
no header-format
Sets the header format of the mirrored traffic.
The no form of the command resets the parameter values back to
default.
399
switch-priority Changes the egress switch priority of the
frame
Range: 0-7
add-vlan An 802.1q VLAN tag is added to the frame
priority The priority to be added to the Ethernet
header
Range: 0-7
add-ethernet-header Adds an Ethernet header to the mirrored
frame
destination-mac The destination MAC address of the added
Ethernet frame
Default no-change
vlan 1
priority 0
traffic-class 0
Configuration Mode config monitor session
History 3.3.3500
Related Commands
Notes If add-ethernet-header is used, the source MAC address is the one of the
outgoing Ethernet port.
truncate
truncate
no truncate
Truncates the mirrored frames to 64-byte packets.
The no form of the command disables truncation.
History 3.3.3500
400
Related Commands
Notes This command applies for all sessions on the same analyzer port
congestion
congestion [drop-excessive-frames | pause-excessive-frames]
no congestion
Sets the system’s behavior when congested.
The no form of the command disables truncation.
History 3.3.3500
Related Commands
Notes This command applies for all sessions on the same analyzer port
401
Example switch (config) # show monitor session 1
Session 1:
Admin: Disable
Status: Down
Truncate: Disable
Destination interface: N/A
Congestion type: drop-excessive-frames
Header format: local
-switch priority: 0
Source interfaces
--------------------
Interface Direction
--------------------
eth1/1 both
Related Commands
Notes
Related
Commands
Notes
sFlow
sFlow (ver. 5) is a procedure for statistical monitoring of traffic in networks.Mellanox Onyx supports
an sFlow sampling mechanism (agent), which includes collecting traffic samples and data from
counters. The sFlow datagrams are then sent to a central collector.
402
The sampling mechanism must ensure that any packet going into the system has an equal chance of
being sampled, irrespective of the flow to which it belongs. The sampling mechanism provides the
collector with periodical information on the amount (and load) of traffic per interface by loading
the counter samples into sFlow datagrams.
The sFlow packets are encapsulated and sent in UDP over IP. The UDP port number that is used is the
standard 6343 by default.
Flow Samples
The sFlow agent samples the data path based on packets.
Truncation and sampling rate are the two parameters that influence the flow samples. In case of
congestion the flow samples can be truncated to a predefined size before it is assigned to the CPU.
The truncation can be set to any value between 64 to 256 bytes with the default being 128 bytes.
The sampling rate can be adjusted by setting an average rate. The system assures that a random
number of packets is sampled, however, the sample rate on average converges to the configured
rate. Valid values range between 4000 to 16777215 packets.
Statistical Samples
The sFlow agent samples interface counters time based. Polling interval is configurable to any value
between 5-3600 seconds with the default being 20 seconds.
Counter Description
Number of flow samples The number of packets that are captured by the sampling
mechanism
403
Counter Description
sFlow Datagrams
The sFlow datagrams contain flow samples and statistical samples.
The sFlow mechanism uses IP protocol, therefore if the packet length is more than the interface
MTU, it becomes fragmented by the IP stack. The MTU may also be set manually to anything in the
range of 200-9216 bytes. The default is 1400 bytes.
Sampled Interfaces
sFlow must be enabled on physical or LAG interfaces that require sampling. When adding a port to a
LAG, sFlow must be disabled on the port. If a port with enabled sFlow is configured to be added to a
LAG, the configuration is rejected. Removing a port from a LAG disables sFlow on the port
regardless of the LAG’s sFlow status.
Configuring sFlow
1. Unlock the sFlow commands. Run:
404
This means that one every 16000 packet gets collected for sampling.
7. (Optional) Set the maximum size of the data path sample. Run:
9. (Optional) Set the maximum size of the datagrams sent to the central collector. Run:
Verifying sFlow
To verify the attributes of the sFlow agent:
405
sFlow Commands
protocol sflow
protocol sflow
no protocol sflow
Unhides the sFlow commands.
The no form of the command deletes sFlow configuration and hides the sFlow commands.
Related
Commands
Notes
Related Commands
Notes
406
sflow
sflow
Enters sFlow configuration mode.
Related Commands
Notes
sampling-rate
sampling-rate <rate>
no sampling-rate
Configures sFlow sampling ratio.
The no form of the command resets this parameter to its default value.
Related Commands
Notes
407
max-sample-size
max-sample-size <packet-size>
no max-sample-size
Configures the maximum size of sampled packets by sFlow.
The no form of the command resets the parameter to its default value.
Related Commands
Notes Sampled payload beyond the configured size is discarded
counter-poll-interval
counter-poll-interval <seconds>
no counter-poll-interval
Configures the sFlow statistics polling interval.
The no form of the command resets the parameter to its default value.
Default 20 seconds
Configuration Mode config
History 3.3.3500
Example switch (config sflow) # counter-poll-interval 30
Related Commands
Notes
408
max-datagram-size
max-datagram-size <packet-size>
no max-datagram-size
Configures the maximum sFlow packet size to be sent to the collector.
The no form of the command resets the parameter to its default value.
Syntax Description packet-size The packet size of the packet being sent to
the collector
Range: 200-9216 bytes
Related Commands
Notes This packet contains the data sample as well as the statistical counter data
collector-ip
collector-ip <ip-address> [udp-port <udp-port-number>]
no collector-ip [<ip-address> udp-port]
Configures the collector’s IP.
The no form of the command resets the parameters to their default
values.
Related Commands
Notes
409
agent-ip
agent-ip {<ip-address> | interface [ethernet <slot/port> | port-channel
<channel-group>] | <if-name> | loopback <number> | vlan <id>}
no agent-ip
Configures the IP address associated with this agent.
The no form of the command resets the parameters to their default
values.
Related Commands
Notes The IP address here is used in the sFlow header
clear counters
clear counters
Clears sFlow counters.
Default N/A
Related Commands
410
Notes
Default disable
no view-port-channel member
Related Commands
Notes
show sflow
show sflow
Displays sFlow configuration and counters.
411
Example switch (config)# show sflow
sflow protocol: enabled
sflow: enabled
sampling-rate: 16000
max-sample-size: 128
counter-poll-interval: 20
max-datagram-size: 1400
ip-agent: 0.0.0.0
ingress ports:
Interfaces:
Ethernet eth1/2 eth1/1
Statistics:
Total Samples: 0
Number of flow samples: 0
Estimated Number of flow discarded: 0
Number of flow statistics samples: 0
Number of datagrams: 0
Related Commands
Notes
As it is becoming increasingly complex to manage networks, and network administrators need more
tools to understand network behavior, it is necessary to provide basic information about network
performance, identify network bottlenecks, and provide information for the purposes of network
optimization and future planning.
Therefore, network administrators are required to constantly review network port behavior, record
port buffer consumption, and identify shortage in buffer resources and record flows which lead to
the excessive buffer consumption. Mellanox Onyx™ provides the following mechanisms to perform
these tasks:
• Sampling (histograms) – a network administrator can enable a sampling of the port buffer
occupancy, record occupancy changes over time, and provide information for different levels
of buffer occupancy, and amount of time the buffer has been occupied during the observation
period.
• Thresholds – thresholds may be enabled per port to record the network time when port buffer
occupancy crosses the defined threshold and when buffer occupancy drops below it.
• Flow recording – a record of the most active flows which cause an excessive usage of the port
buffers may be kept. Once enabled, the system may identify flow patterns and present a user
with a list of flows, based on which a network administrator can rearrange distribution of the
data flows in the network and minimize data loss.
412
Buffer Histograms and Thresholds Commands
protocol telemetry
protocol telemetry no protocol telemetry
Unhides telemetry config CLIs. The no form of the command hides telemetry config CLIs.
Related Commands
Notes
telemetry shutdown
telemetry shutdown
no telemetry shutdown
Disables the telemetry protocol, threshold detection, and histogram fetching for all sampling
enabled interfaces without changing any internal configuration.
The no form of the command enables telemetry protocol.
Syntax N/A
Descriptio
n
Default Disabled
Configurat config
ion Mode
History 3.6.3004
Notes
413
History 3.6.3004
Notes
telemetry sampling tc
telemetry sampling tc <0-7> [mcast | ucast]
no telemetry sampling tc <0-7> [mcast | ucast]
Enables multicast sampling (histogram fetching) on a traffic class
for a particular Ethernet interface.
The no form of the command disables multicast sampling on a TC
for a particular Ethernet interface.
Default N/A
History 3.6.3004
Related Commands
414
Notes
telemetry threshold
telemetry threshold tc <0-7> [ucast | mcast]
no telemetry threshold tc <0-7> [ucast | mcast]
Enables threshold in hardware for a particular traffic class.
The no form of the command disables threshold in hardware for
a particular traffic class.
Default Disabled
History 3.6.5000
Related Commands
Notes
Default 69984
415
Configuration Mode config interface ethernet
config interface port-channel
config interface mlag-port-channel
History 3.6.5000
Related Commands
Notes
Default Disabled
History 3.6.4006
Related Commands
Notes
416
Syntax Description time Max rate per hour
Range: 1-3600
Default 100
History 3.6.4006
Related Commands
Notes
clear telemetry
clear telemetry {threshold | sampling} [interface <type> <port-id>] [tc
<0-7> [ucast | mcast]]
Clears telemetry data.
tc Traffic class
Default N/A
Related Commands
Notes
417
clear telemetry threshold
clear telemetry threshold [interface <type> <if>]
Clears threshold and top talker data.
Default N/A
History 3.6.6105
Related Commands
Notes
Default N/A
History 3.6.3004
Related Commands
Notes
418
file stats telemetry delete
file stats telemetry delete <filename>
Deletes the given .csv file created by “stats export” command to user directory.
Default N/A
History 3.6.3004
Example switch (config) # file stats telemetry delete telemetry-20171006-102158.csv
Related Commands
Notes
Default N/A
History 3.8.1000
Notes
419
file stats telemetry delete all
file stats telemetry delete all
Deletes all stats telemetry files from machine.
Default N/A
History 3.8.1000
Notes
Syntax N/A
Description
Default N/A
Configuratio config
n Mode
History 3.6.3004
Related
Commands
Notes
420
file stats telemetry upload latest
file stats telemetry upload latest <upload-url>
Upload the latest stats telemetry file to a remote host.
Default N/A
History 3.8.1000
Notes
Default N/A
History 3.8.1000
Notes
421
show telemetry
show telemetry
Displays the global configuration of telemetry properties.
Default N/A
History 3.6.4000
Example
switch (config) # show telemetry
Telemetry Status : Enabled
H/W Sampling Interval(nsec) : 512
S/W Sampling Interval(ms) : 1000
Threshold Logging : Disabled
Threshold Logging(rate per hour) : 100
--------------------------------------------------------------------------------------------
Interface Sampling Threshold Record Level (bytes)
--------------------------------------------------------------------------------------------
Eth1/1 Disabled Enabled Enabled 100 (96)
Eth1/2 Disabled Enabled Enabled 100 (96)
Eth1/3 Disabled Disabled Disabled N/A
Eth1/4 Disabled Disabled Disabled N/A
Eth1/5 Disabled Disabled Disabled N/A
Eth1/6 Disabled Disabled Disabled N/A
Eth1/7 Disabled Disabled Disabled N/A
...
Eth1/36 Disabled Disabled Disabled N/A
Related Commands
Notes
Default N/A
422
History 3.6.3004
Example
Related Commands
Notes
Default N/A
History 3.6.3004
Example
423
switch (config) # show telemetry sampling 1/2 tc 3 mcast last 4
----------------------------------------------------------------------------------------------------------
--------------------------------------------
Telemetry histogram: Eth1/2 traffic-class 3 - mcast
Time Bin sizes (nsec buffer was occupied in bytes
range)
----------------------------------------------------------------------------------------------------------
--------------------------------------------
01/16/17 2976< 27552 52128 76704 101280 125856
150432 175008 199584 199584>
04:23:38.28864 1000000000 0 0 0 0 0 0
0 0 0
04:23:39.28977 1000000000 0 0 0 0 0 0
0 0 0
04:23:40.29111 1000000000 0 0 0 0 0 0
0 0 0
04:23:41.29259 1000000000 0 0 0 0 0 0
0 0 0
Related Commands
Notes If the requested entries are more than what the DB contains, it prints
the amount in the table.
Default N/A
History 3.6.3004
Example
424
switch (config) # show telemetry sampling 1/2 tc 6 ucast
----------------------------------------------------------------------------------------------------------
--------------------------------------------
Telemetry histogram: Eth1/2 traffic-class 6 - ucast
Time Bin sizes (nsec buffer was occupied in bytes
range)
----------------------------------------------------------------------------------------------------------
--------------------------------------------
01/13/17 2976< 27552 52128 76704 101280 125856
150432 175008 199584 199584>
08:18:09.67745 1000000000 0 0 0 0 0 0
0 0 0
08:18:10.67850 1000000000 0 0 0 0 0 0
0 0 0
08:18:11.67953 1000000000 0 0 0 0 0 0
0 0 0
Related Commands
Notes
Default N/A
History 3.6.3004
Example
Related Commands
Notes If the requested entries are more than what the DB contains, it prints
the amount in the table.
425
show telemetry threshold
show telemetry threshold [interface <type> <port-id>] [tc <0-7> [ucast | mcast]]
Displays threshold data for either all interfaces or single interface or per interface per traffic
class.
Default N/A
History 3.6.5000
Example
switch (config) # show telemetry threshold 1/10-1/13
------------------------------------------------------------------------------------------------
Event-id Date Time Port TC Level Duration(100 usec) Repeated
------------------------------------------------------------------------------------------------
1 09/21/17 10:11:48 Eth 1/10 0 100 102497.61 1
2 09/21/17 10:12:06 Eth 1/10 3 100 85714.76 1
Related
Commands
Notes The command supports displaying up to 1000 threshold events. As a result, if more than 1000
thresholds configured in total, some interfaces may not be displayed. Therefore, to query
thresholds for a specific interface, please use the command “show telemetry threshold
interface <type> <id>”.
426
show files stats telemetry
show files stats telemetry [filename]
Displays all files created by the command “stats export csv telemetry”.
Default N/A
History 3.6.3004
Notes
Commands
427
Syntax Description alarm ID Alarms supported by the system, for example:
• cpu_util_indiv – average CPU utilization
too high: percent utilization
• disk_io – operating System Disk I/O per
second too high: kilobytes per second
• fs_mnt – free filesystem space too low:
percent of disk space free
• intf_util – network utilization too high:
bytes per second
• memory_pct_used – too much memory in
use: percent of physical memory used
• paging – paging activity too high: page
faults
• temperature – temperature is too high:
degrees
Default N/A
History 3.1.0000
428
Default The default is different per alarm-id
History 3.1.0000
Example switch (config) # stats alarm cpu_util_indiv enable
Default single
History 3.1.0000
429
stats alarm {rising | falling}
stats alarm <alarm ID> {rising | falling} {clear-threshold | error-threshold}
<threshold-value>
Configure alarms thresholds.
History 3.1.0000
430
stats alarm rate-limit
stats alarm <alarm ID> rate-limit {count <count-type> <count> | reset |
window <window-type> <duration>}
Configures alarms rate limit.
History 3.1.0000
Example switch (config) # stats alarm paging rate-limit window long 2000
431
Syntax Description CHD ID CHD supported by the system, for example:
• cpu_util – CPU utilization: percentage of time
spent
• cpu_util_ave – CPU utilization average:
percentage of time spent
• cpu_util_day – CPU utilization average:
percentage of time spent
• disk_device_io_hour – storage device I/O read/
write statistics for the last hour: bytes
• disk_io – operating system aggregate disk I/O
average (KB/sec)
• fs_mnt_day – filesystem system usage average:
bytes
• fs_mnt_month – filesystem system usage
average: bytes
• fs_mnt_week – filesystem system usage
average: bytes
• intf_day – network interface statistics
aggregation: bytes
• intf_hour – network interface statistics (same
as “interface” sample)
• intf_util – aggregate network utilization across
all interfaces
• memory_day – average physical memory
usage: bytes
• memory_pct – average physical memory usage
• paging – paging activity: page faults
• paging_day – paging activity: page faults
• eth_day
• eth_hour
• eth_ip_day
• eth_ip_hour
Default N/A
History 3.1.0000
432
stats chd enable
stats chd <chd-id> enable
no stats chd <chd-id> enable
Enables the CHD.
The no form of the command disables the CHD.
Default Enabled
History 3.1.0000
433
stats chd compute time
stats chd <CHD ID> compute time {interval | range} <number of seconds>
Sets parameters for when this CHD is computed.
History 3.1.0000
Example switch (config) # stats chd memory_day compute time interval 120
434
stats export
stats export <format> <sample-id>
Exports collected information to a file. Can export extended "interface-
ethernet", "interface-port-channel", "interface-mlag-port-channel"&
"power" samples.
Syntax Description sample-id Sample name for which report file should be
generated.
• congested
• cpu_util – CPU utilization: milliseconds of
time spent
• disk_device_io – storage device I/O
statistics
• disk_io – operating system aggregate disk
I/O: KB/sec
• fan – fan speed
• fs_mnt_bytes – filesystem usage: bytes
• fs_mnt_inodes – filesystem usage: inodes
• interface – network interface statistics
• intf_util – network interface utilization:
bytes
• memory – system memory utilization:
bytes
• paging – paging activity: page faults
• power – power supply usage
• power-consumption
• temperature – modules temperature
• interface-ethernet – Ethernet counters
statistics: counter units
• interface-mlag-port-channel – MLAG
counters statistics: counter units
• interface-port-channel – LAG counters
statistics: counter units
• eth
History 3.7.1102
435
stats sample clear
stats sample <sample ID> clear
Clears sample history.
Default N/A
History 3.1.0000
436
stats sample enable
stats sample <sample-id> enable
no states sample <sample-id> enable
Enables the sample.
The no form of the command disables the sample.
Default Enabled
History 3.1.0000
437
stats sample interval
stats sample <sample-id> interval [<interval>]
no stats sample <sample-id> interval [<interval>]
Sets the sampling interval between taking of sample records.
The no form of the command sets interval to default value.
Syntax Description sample-id Sample name for which report file should be
generated.
• congested
• cpu_util – CPU utilization: milliseconds of
time spent
• disk_device_io – storage device I/O
statistics
• disk_io – operating system aggregate disk
I/O: KB/sec
• fan – fan speed
• fs_mnt_bytes – filesystem usage: bytes
• fs_mnt_inodes – filesystem usage: inodes
• interface – network interface statistics
• intf_util – network interface utilization:
bytes
• memory – system memory utilization:
bytes
• paging – paging activity: page faults
• power – power supply usage
• power-consumption
• temperature – modules temperature
• interface-ethernet – Ethernet counters
statistics: counter units
• interface-mlag-port-channel – MLAG
counters statistics: counter units
• interface-port-channel – LAG counters
statistics: counter units
• eth
History 3.7.1102
438
stats sample max-entries
stats sample <sample-id> max-entries [<max-entries>]
no stats sample <sample-id> max-entries [<max-entries>]
Sets number of records to be kept in memory for the counter.
The no form of the command resets the value to its default.
Syntax Description sample-id Sample name for which report file should be
generated.
• congested
• cpu_util – CPU utilization: milliseconds of
time spent
• disk_device_io – storage device I/O
statistics
• disk_io – operating system aggregate disk
I/O: KB/sec
• fan – fan speed
• fs_mnt_bytes – filesystem usage: bytes
• fs_mnt_inodes – filesystem usage: inodes
• interface – network interface statistics
• intf_util – network interface utilization:
bytes
• memory – system memory utilization:
bytes
• paging – paging activity: page faults
• power – power supply usage
• power-consumption
• temperature – modules temperature
• interface-ethernet – Ethernet counters
statistics: counter units
• interface-mlag-port-channel – MLAG
counters statistics: counter units
• interface-port-channel – LAG counters
statistics: counter units
• eth
History 3.7.1102
439
stats clear-all
stats clear-all
Clears data for all samples, CHDs, and status for all alarms.
Default N/A
History 3.1.0000
History 3.1.0000
440
Example switch (config) # show stats alarm
Alarm cpu_util_indiv (Average CPU utilization too high): ok
Alarm disk_io (Operating System Disk I/O per second too high):
(disabled)
Alarm fs_mnt (Free filesystem space too low): ok
Alarm intf_util (Network utilization too high): (disabled)
Alarm memory_pct_used (Too much memory in use): (disabled)
Alarm paging (Paging activity too high): ok
Alarm temperature (Temperature is too high): ok
History 3.1.0000
441
show stats cpu
show stats cpu
Displays some basic stats about CPU utilization:
• the current level
• the peak over the past hour
• the average over the past hour
Syntax Description N/A
Default N/A
History 3.1.0000
CPU 0
Utilization: 6%
Peak Utilization Last Hour: 16% at 2012/02/28 08:47:32
Avg. Utilization Last Hour: 8%
Related Commands
Notes
442
Syntax Description sample-id Sample name for which report file should be
generated.
• congested
• cpu_util – CPU utilization: milliseconds of
time spent
• disk_device_io – storage device I/O statistics
• disk_io – operating system aggregate disk I/
O: KB/sec
• fan – fan speed
• fs_mnt_bytes – filesystem usage: bytes
• fs_mnt_inodes – filesystem usage: inodes
• interface – network interface statistics
• intf_util – network interface utilization:
bytes
• memory – system memory utilization: bytes
• paging – paging activity: page faults
• power – power supply usage
• power-consumption
• temperature – modules temperature
• interface-ethernet – Ethernet counters
statistics: counter units
• interface-mlag-port-channel – MLAG counters
statistics: counter units
• interface-port-channel – LAG counters
statistics: counter units
• eth
Default N/A
History 3.1.0000
Related Commands
Notes
443
Syntax sample-id Sample name for which report file should be generated.
Description
• congested
• cpu_util – CPU utilization: milliseconds of time spent
• disk_device_io – storage device I/O statistics
• disk_io – operating system aggregate disk I/O: KB/sec
• fan – fan speed
• fs_mnt_bytes – filesystem usage: bytes
• fs_mnt_inodes – filesystem usage: inodes
• interface – network interface statistics
• intf_util – network interface utilization: bytes
• memory – system memory utilization: bytes
• paging – paging activity: page faults
• power – power supply usage
• power-consumption
• temperature – modules temperature
• interface-ethernet – Ethernet counters statistics: counter units
• interface-mlag-port-channel – MLAG counters statistics: counter units
• interface-port-channel – LAG counters statistics: counter units
• eth
History 3.7.1102
444
switch (config) # show stats sample interface-ethernet data interface ethernet 1/1 max-samples 1
Sampling data for Interface ethernet counters:
Eth1/1:
------------------------------------------------------------------
Name Timestamp Value
------------------------------------------------------------------
Rx_packets 2000/12/25 10:27:53 0
Rx_unicast_packets 2000/12/25 10:27:53 0
Rx_multicast_packets 2000/12/25 10:27:53 0
Rx_broadcast_packets 2000/12/25 10:27:53 0
Rx_bytes 2000/12/25 10:27:53 0
Rx_discard_packets 2000/12/25 10:27:53 0
Rx_error_packets 2000/12/25 10:27:53 0
Rx_fcs_errors 2000/12/25 10:27:53 0
Rx_undersize_packets 2000/12/25 10:27:53 0
Rx_oversize_packets 2000/12/25 10:27:53 0
Rx_pause_packets 2000/12/25 10:27:53 0
Rx_unknown_control_opcode 2000/12/25 10:27:53 0
Rx_symbol_errors 2000/12/25 10:27:53 0
Rx_packets_of_64_bytes 2000/12/25 10:27:53 0
Rx_packets_of_65-127_bytes 2000/12/25 10:27:53 0
Rx_packets_of_128-255_bytes 2000/12/25 10:27:53 0
Rx_packets_of_256-511_bytes 2000/12/25 10:27:53 0
Rx_packets_of_512-1023_bytes 2000/12/25 10:27:53 0
Rx_packets_of_1024-1518_bytes 2000/12/25 10:27:53 0
Rx_packets_Jumbo 2000/12/25 10:27:53 0
Tx_packets 2000/12/25 10:27:53 0
Tx_unicast_packets 2000/12/25 10:27:53 0
Tx_multicast_packets 2000/12/25 10:27:53 0
Tx_broadcast_packets 2000/12/25 10:27:53 0
Tx_bytes 2000/12/25 10:27:53 0
Tx_discard_packets 2000/12/25 10:27:53 0
Tx_error_packets 2000/12/25 10:27:53 0
Tx_hoq_discard_packets 2000/12/25 10:27:53 0
Tx_pause_packets 2000/12/25 10:27:53 0
Tx_pause_duration 2000/12/25 10:27:53 0
...
Related
Commands
Notes • When there are more records in history than displayed, the output for a group ends
with “...” (ellipses).
• Filtering keyword depends on chosen <sample-id>. For convenience, “interface”
samples such as “interface-ethernet”, “interface-port-channel” and “interface-
mlag-port-channel” have interface related keywords for choosing a counters group.
• Notice that this is a history of counters. Autocompletion and output can contain
information for groups (interfaces) that is not present anymore in the system, and
vice versa. If counters are not sampled, they will not appear in the output.
• Output of collected information is implemented only for the following samples:
• interface-port-channel
• interface-ethernet
• interface-mlag-port-channel
• memory
• paging
• power
1. Module layer which includes modules located on system (e.g. cables, fan, power supply,
etc.). See the module type breakdown table for more details.
2. Device layer which includes system devices (e.g. switch devices, sensor aggregators, etc.).
See the device type breakdown table for more details.
445
3. Sensor layer which includes system sensors (e.g. fan, and temperature sensors) located in the
devices. See the sensor type breakdown table for more details.
Each layer is assigned a fixed position in the index number to represent it.
Each position indicates different types of components according to the following tables.
Number Description
1 Chassis
2 Management
3 Spine
4 Leaf
5 Fan
6 Power supply
7 BBU
8 x86 CPU
9 Port module
Number Description
01 PS
02 FAN
03 BOARD_MONITOR
04 CPU_BOARD_MONITOR
05 SX
06 SIB
07 CPU_MEZZ_TEMP
08 CPU Package Sensor
09 CPU Core Sensor
446
Number Description
10 SX_AMBIENT_TEMP
11 SX_MONITOR
12 AUX_IN_TMP_SNSR
13 AUX_OUT_TMP_SNSR
14 MAIN_IN_TMP_SNSR
15 MAIN_OUT_TMP_SNSR
16 CPU_MEZZ_TEMP
17 Controller
18 QSFP_TEMP
19 QSFP-ASIC
20 Board AMB temp
21 Ports AMB temp
22 Power monitor
23 PS_MONITOR
24 SWB AMB temp
25 pcie-switch-temp
26 SPC
Number Description
1 t – temperature sensor
2 f – fan sensor
For example:
• 401191311
The first layer is “401” where:
447
• 501020021
• “5”, according to the module type breakdown table, indicates a fan
• “01 indicates index #1 (Fan #1)
The second layer is 0200 where:
448
Automation Tools
Deploying, provisioning, operating and configuring data center networks is still a largely manual and
time-consuming process that is susceptible to human error. Its automation greatly enhances agility,
accelerates deployment, increases reliability and improves the performance of critical business
applications, and at the bottom line it saves on operational expenditure.
The datacenter is an ecosystem composed of computer servers and storage and networking
equipment, while each of these components is managed by a separate team using separate tools.
Nowadays it is possible to increase efficiency by allowing IT departments to break down barriers,
automate processes and better divide resources across the entire datacenter. Network automation
enables IT departments to be more responsive to various, real-time business requirements, and
more service-centric in their approach to delivering value.
Additionally, it enables a more efficient method to easily change server configuration and apply it to
all affected elements of the infrastructure (e.g. when a new virtual machine is spun up, its
corresponding VLAN should be configured automatically).
The transition to automated operation is vital to the data center in each of the following aspects:
Ansible
Ansible works by configuring client machines from a computer with Ansible components installed
and configured. It communicates over normal SSH channels to retrieve information from remote
machines, issue commands, and copy files. Therefore, an Ansible system does not require any
additional software to be installed on the client computers. Any server that has an SSH port exposed
can be brought under Ansible's configuration umbrella, regardless of what stage it is at in its life
cycle.
Ansible takes on a modular approach, making it easy to extend to use the functionalities of the main
system to deal with specific scenarios. Modules can be written in any language and communicate in
standard JSON. Configuration files are mainly written in the YAML data serialization format due to
its expressive nature and its similarity to popular markup languages. Ansible can interact with
clients through either command line tools or through its configuration scripts called Playbooks.
449
For a list of Ansible’s supported modules, please refer toMellanoxOnyx modules page on Ansible.com
and the modules location themselves.
2. Install Ansible:
When using persistent connections with Paramiko, the connection runs in a background process. If
the host doesn’t already have a valid SSH key, by default Ansible will prompt to add the host key.
This will cause connections running in the background processes to fail. Uncomment this line to
have Paramiko automatically add host keys.
#host_key_auto_add = TRUE
vi /etc/ansible/hosts
Keep output file for future more complex Ansible configuration scenarios.
d. Add switch information to the following configuration file, based on the following
examples:
i. EX1: switch132; ansible_host=10.209.37.249; ansible_user=admin;
ansible_ssh_pass=admin
ii. EX2: switch131; ansible_host=l-csi-2700-l05; ansible_user=admin;
ansible_ssh_pass=admin
touch <file_name>.yml
Playbook example:
hosts: switch132
gather_facts: no
connection: network_cli
become: yes
become_method: enable
vars:
ansible_network_os: onyx
tasks:
onyx_vlan:
vlan_id: 20
name: test-vlan
where:
hosts List of switches required for running this yml file on
450
onyx_vlan Desired module name
ansible-playbook <path_of_yml file> -i /etc/ansible/host -vvvvv –check
Full module variables explanation, and examples of playbooks can be created for each
module of Onyx modules supported by Ansible.
All Onyx-supported modules in Ansible are available in the following link: https://
docs.ansible.com/ansible/devel/modules/list_of_network_modules.html#onyx.
The Onyx modules are available in the following path: lib/ansible/modules/network/onyx,
where any module can be run in order to see the structure of the playbook.
SALT
Salt is a different approach to infrastructure management, founded on the idea that high-speed
communication with large numbers of systems can open new capabilities. This approach makes Salt
a powerful multitasking system that can solve many specific problems in an infrastructure.
The backbone of Salt is the remote execution engine, which creates a high-speed, secure and bi-
directional communication net for groups of systems. On top of this communication system, Salt
provides an extremely fast, flexible, and easy-to-use configuration management system called Salt
States.
For a list of Salt’s Napalm supported modules, please refer to the NAPALM-Onyx github repository.
Configuring Salt
1. Open the /etc/salt/master file.
2. Replace #interface: 0.0.0.0 with interface: <machine_ip>.
3. Replace #hash_type: md5 with hash_type: sha256.
451
4. Find file_roots and pillar_rootsand and add the following lines below them:
452
Creating the pillar Directory
1. Create a pillar directory under /etc/salt.
mkdir -r /etc/salt/pillar
proxy:
proxytype: napalm
driver: [DRIVER]
host: [HOSTNAME]
username: [USERNAME]
passwd: [PASSWORD]
Example:
proxy:
proxytype: napalm
driver: onyx_ssh
host: 10.209.37.247
username: admin
passwd: admin
propt_name: switch20
ssh_args:‘-0 PubkeyAuthentication=no’
1. Check if the switch is connected to the server running the Salt master:
2. Run any command on the switch using net.cli (example: using “show version”):
453
4. Get the switch arp table:
Puppet Agent
Puppet is a software that allows network administrators to automate repetitive tasks. Mellanox
Onyx™ includes a built-in agent for the open-source “Puppet” configuration change management
system. The Puppet agent enables configuring Mellanox switches in accordance with the standard
“puppet-netdev-stdlib” type library and with the “Mellanox-netdev-stdlib-mlnxos” and “Mellanox-
netdev-ospf-stdlib” type libraries provided by Mellanox Technologies to the Puppet community.
For more information, please refer to the CLI commands, to the NetDev documentation and to
Mellanox’s Puppet modules GitHub page.
1. Define the Puppet server (the name has to be a DNS and not IP). Run:
3. (Optional) Verify there are no errors in the Puppet agent log. Run:
454
# puppet cert list
"<switch>"
(F4:B4:20:3B:2B:11:76:37:14:34:D0:D1:03:ED:3D:B5)
2. Sign the certificate request if the cert_name parameter (e.g. switch1.domain) is in the list.
Run:
3. Verify the request is removed from the Puppet certification list. Run:
To install those modules, run the following commands in the Puppet server:
If a module is already installed, please use the command “puppet module upgrade
<module_name>” or “puppet module install <module_name> --force” instead of “puppet
module install <module_name>” to reinstall the modules.
For more information please refer to the Network Automation Tools page in the Mellanox
community.
455
Writing Configuration Classes
1. Assign configuration classes to a node.
Configuration files can be written and changed in the puppet server machine in the directory
“/etc/puppetlabs/puppet/manifests/” (or “/etc/puppet/manifests” in case of an open
source puppet server).
The file “/etc/puppetlabs/puppet/manifests/site.pp” is the main file for Puppet-classes-to-
nodes association. To associate a configuration to a Puppet agent node, just append
association lines as below:
import "netdev_vlan_example"
import "netdev_l2_vlan_example"
import "netdev_lag_example"
node 'switch-6375dc.mtr.labs.mlnx'{
netdev_device { $hostname: }
include vlan_example # Asserts a class vlan_example in one of the files
include l2_interface_example
include lag_example
}
If you have a puppet console, you may assign classes of configuration in the following
way:
• Add the relevant classes (using the console add class button on the “nodes” page).
• Assign the classes to the relevant nodes/groups in the puppet server console (in the
console node/group page -> edit -> Classes).
2. Update VLAN.
Manifest example (located in “/etc/puppetlabs/puppet/manifests/
netdev_vlan_example.pp”).
class vlan_example{
$vlans = {
'Vlan244' => {vlan_id => 244, ensure => present},
'Vlan245' => {vlan_id => 245, ensure => present},
}
create_resources( netdev_vlan, $vlans )
}
class vlans_ensure_example{
$vlans = {
'Vlan347' => {vlan_id => 347, ensure => present},
'Vlan348' => {vlan_id => 348, ensure => present},
'Vlan349' => {vlan_id => 349, ensure => present},
}
create_resources( netdev_vlan, $vlans )
}
class l2_interface_example{
include vlans_ensure_example #class to Ensure VLANs before assigning
$l2_interfaces = {
'ethernet 1/3' => {ensure => absent, vlan_tagging => disable}, #default
'ethernet 1/4' => {ensure => present, vlan_tagging => enable,
tagged_vlans => [Vlan348,Vlan347], untagged_vlan => Vlan349} #hybrid
}
create_resources( netdev_l2_interface, $l2_interfaces )
}
456
4. Update LAG.
Manifest example (located in “/etc/puppetlabs/puppet/manifests/
netdev_lag_example.pp”).
class lag_example{
$lags = {
'port-channel 101' => {ensure => present,
links => ['ethernet 1/12', 'ethernet 1/13'], lacp => active},
'port-channel 102' => {ensure => present,
links => ['ethernet 1/6','ethernet 1/5'], lacp => disabled},
}
create_resources( netdev_lag, $lags )
}
You may add classes to ensure that all assigned links are with the same layer 1 and
layer 2 configurations (similarly to the way we did in update l2_interface section
with vlans_ensure_example class).
Interface Capabilities
Field Description Values Example
ensure Sets the given values or restores absent, present ensure => present
the interface to default
VLAN Capabilities
Field Description Values Example
ensure Creates or destroys the VLAN given absent, present ensure => present
as a resource ID
457
Field Description Values Example
ensure Sets the given values or restores absent, present ensure => present
the Layer 2 interface to default.
LAG Capabilities
Field Description Values Example
ensure creates or destroys the port- absent, present ensure => present
channel given as a resource ID
lacp The LACP mode of the LAG passive | active | on lacp => on
links List of ports assigned to the LAG List of link names links => ['ethernet
1/6','ethernet 1/5']
netmask Sets netmask for the IP address. A valid netmask (of the form netmask =>
X.1X2.X3.X4), which creates a ‘255.255.255.0’
valid combination with the given
IP address
458
Field Description Values Example
ensure Creates or destroys the OSPF present, absent ensure => present
interface of the associated interface
of the VLAN specified in the resource
ID
ensure Creates or destroys the OSPF area specified in the present, ensure => present
resource ID absent
router_id The OSPF area associated router ID (currently default router_id => 'default'
supports only default router)
ospf_area_m The OSPF area mode normal, stub, ospf_area_mode => 'stub'
ode nssa
459
SNMP, LLDP, IP Routing, and Spanning Tree Capabilities
Field Description Values Example
protocol Specifies the protocol for fetch http, https, ftp, tftp, scp, protocol => scp
method sftp
host The host where the filename DNS/IP host => my_DNS
located
user The username for fetching the Username user => my_username
image
password The password for fetching the Password password => my_pass
image
location The location of the file name in the Directory full path location => '/tmp'
host file system
force_delete Remove all the images or only the yes, no force_delete => no
ones which are not installed on any
partition, before fetching
ensure Specifies if the image version present, absent ensure => present
given in as resource ID is ensured
to be installed or not
is_next_boot Ensures that the installed image is yes, no is_next_boot => yes
the next boot partition
460
Supported Resources for Each Type
Resource Type Puppet Type Name Supported Resource IDS Example
OSPF area netdev_ospf_area Valid area ID (representing netdev_ospf _area{ '10': ensure
an IP) => present,
ospf_area_mode=>'stub'}
Troubleshooting
This section presents common issues that may prevent the switch from connecting to the puppet
server.
461
Outdated or Invalid SSL Certificates Either on the Switch or the
Server
This can be fixed on the switch using the CLI command “puppet-agent clear-certificates” (requires
“puppet-agent restart” to take effect).
On the server it can be fixed by running “puppet cert clean <switch_fqdn>” (FQDN is the Fully
Qualified Domain Name which consists of a hostname and a domain suffix).
Communications Issue
Make sure it is possible to ping the puppet server hostname from the switch (using the command
“ping”).
If the hostname is not reachable (e.g. no DNS server) it can be statically added to the switch local
hosts lookup (using the command “ip host”).
Make sure that port 8140 is open (using the command “tracepath {<hostname> | <ip>}/8140”).
puppet-agent
puppet-agent
Enters puppet agent configuration mode.
Related Commands
Notes
462
master-hostname
master-hostname <hostname>
no master-hostname
Sets the puppet server hostname.
The no form of the command resets the parameter to its default.
Related Commands
Notes
enable
enable
no enable
Enables the puppet server on the switch.
The no form of the command disables the puppet server.
Related Commands
Notes
463
run-interval
run-interval <time>
Configures the time interval in which the puppet agent reports to the
puppet server.
restart
puppet-agent restart
Restarts the puppet agent.
Related Commands
Notes
show puppet-agent
show puppet-agent
Displays Puppet agent status and configuration.
464
Syntax Description N/A
Default N/A
Configuration Mode Any command mode
History 3.3.4200
3.3.4302 Updated Example
3.7.0000 Updated Example
Example switch (config puppet-agent) # show puppet-agent
Puppet agent: disabled
Puppet master hostname: puppet
Run interval: 30m
Related Commands
Notes
Default N/A
History 3.3.4200
Example
465
switch (config puppet-agent) # show puppet-agent log
Mon Nov 04 11:52:42 +0000 2013 Puppet (notice): Starting Puppet client version 3.2.3
Mon Nov 04 11:52:44 +0000 2013 Puppet (warning): Unable to fetch my node definition, but the agent run
will continue:
Mon Nov 04 11:52:44 +0000 2013 Puppet (warning): Could not intern from pson: source '"#<Puppet::Node:0x7f'
not in PSON!
Mon Nov 04 11:53:21 +0000 2013 /Netdev_vlan[Vlan104]/ensure (notice): created
Mon Nov 04 11:53:22 +0000 2013 /Netdev_vlan[Vlan101]/ensure (notice): created
Mon Nov 04 11:53:23 +0000 2013 /Netdev_vlan[Vlan102]/ensure (notice): created
Mon Nov 04 11:53:24 +0000 2013 /Netdev_vlan[Vlan103]/ensure (notice): created
Mon Nov 04 11:53:40 +0000 2013 /Netdev_l2_interface[ethernet 1/6]/untagged_vlan (notice): untagged_vlan
changed 'default' to 'Vlan103'
Mon Nov 04 11:53:43 +0000 2013 /Netdev_l2_interface[ethernet 1/7]/untagged_vlan (notice): untagged_vlan
changed 'default' to 'Vlan103'
Mon Nov 04 11:53:48 +0000 2013 /Netdev_vlan[Vlan100]/ensure (notice): created
Mon Nov 04 11:53:48 +0000 2013 /Netdev_l2_interface[ethernet 1/5]/vlan_tagging (notice): vlan_tagging
changed 'enable' to 'disable'
Mon Nov 04 11:53:48 +0000 2013 /Netdev_l2_interface[ethernet 1/5]/tagged_vlans (notice): tagged_vlans
changed '[]' to '[Vlan100,Vlan101,Vlan102]'
Mon Nov 04 11:53:51 +0000 2013 /Netdev_l2_interface[ethernet 1/1]/tagged_vlans (notice): tagged_vlans
changed '[]' to '[Vlan101,Vlan104]'
Mon Nov 04 11:53:51 +0000 2013 /Netdev_l2_interface[ethernet 1/1]/untagged_vlan (notice): untagged_vlan
changed 'default' to 'Vlan100'
Mon Nov 04 11:53:54 +0000 2013 /Netdev_l2_interface[ethernet 1/3]/tagged_vlans (notice): tagged_vlans
changed '[]' to '[Vlan101,Vlan104]'
Mon Nov 04 11:53:54 +0000 2013 /Netdev_l2_interface[ethernet 1/3]/untagged_vlan (notice): untagged_vlan
changed 'default' to 'Vlan100'
Mon Nov 04 11:53:58 +0000 2013 /Netdev_l2_interface[ethernet 1/4]/vlan_tagging (notice): vlan_tagging
changed 'enable' to 'disable'
Mon Nov 04 11:53:58 +0000 2013 /Netdev_l2_interface[ethernet 1/4]/tagged_vlans (notice): tagged_vlans
changed '[]' to '[Vlan100,Vlan101,Vlan102]'
Mon Nov 04 11:54:03 +0000 2013 /Netdev_l2_interface[ethernet 1/2]/tagged_vlans (notice): tagged_vlans
changed '[]' to '[Vlan101,Vlan104]'
Mon Nov 04 11:54:03 +0000 2013 /Netdev_l2_interface[ethernet 1/2]/untagged_vlan (notice): untagged_vlan
changed 'default' to 'Vlan100'
Mon Nov 04 11:54:06 +0000 2013 Puppet (notice): Finished catalog run in 47.90 seconds
Related Commands
Notes
Scheduled Jobs
The commands in this page may be used to manage and schedule the execution of jobs.
Commands
job
job <job ID>
no job <job ID>
Creates a job.
The no form of the command deletes the job.
Default N/A
466
History 3.1.0000
command
command <sequence #> | <command>
no command <sequence #>
Adds a CLI command to the job.
The no form of the command deletes the command from the job.
Syntax Description sequence # An integer that controls the order the command is
executed relative to other commands in this job.
The commands are executed in an ascending order.
command A CLI command
Default N/A
Configuration Mode config job
History 3.1.0000
Example switch (config job 100) # command 10 “show power”
comment
comment <comment>
no comment
Adds a comment to the job.
The no form of the command deletes the comment.
467
Default “”
Configuration Mode config job
History 3.1.0000
Example switch (config job 100) # comment Job_for_example
enable
enable
no enable
Enables the specified job.
The no form of the command disables the specified job.
Syntax N/A
Description
Default N/A
Configuration config job
Mode
History 3.1.0000
Example switch (config job 100) # enable
execute
execute
Forces an immediate execution of the job.
Syntax N/A
Description
Default N/A
468
Configurati config job
on Mode
History 3.1.0000
Example switch (config job 100) # execute
fail-continue
fail-continue
no fail-continue
Continues the job execution regardless of any job failures.
The no form of the command returns fail-continue to its default.
Default A job will halt execution as soon as any of its commands fails
History 3.1.0000
Notes
name
name <job name>
no name
Configures a name for this job.
The no form of the command resets the name to its default.
469
Default “”
History 3.1.0000
Notes
schedule type
schedule type <recurrence type>
no schedule type
Sets the type of schedule the job will automatically execute on.
The no form of the command resets the schedule type to its default.
History 3.1.0000
Notes A schedule type is essentially a structure for specifying one or more future
dates and times for a job to execute.
470
schedule <recurrence type>
schedule <recurrence type> <interval and date>
no schedule
Sets the type of schedule the job will automatically execute on.
The no form of the command resets the schedule type to its default.
Default once
History 3.1.0000
Notes A schedule type is essentially a structure for specifying one or more future
dates and times for a job to execute.
show jobs
show jobs [<job-id>]
Displays configuration and state (including results of last execution, if any exist) of
existing jobs.
471
History 3.1.0000
Example switch (config) # show jobs 10
Job 10:
Status: inactive
Enabled: yes
Continue on failure: no
Schedule Type: once
Time and date: 1970/01/01 00:00:00 +0000
Last Exec Time: Thu 2012/04/05 13:11:42 +0000
Next Exec Time: N/A
Commands:
Command 10: show power
Last Output:
=====================
Module Status
=====================
PS1 OK
PS2 NOT PRESENT
Related
Commands
Notes
472
User Management, Authentication, &
Security
• User Management & Security
• Cryptographic (X.509, IPSec) and Encryption
User Accounts
There are two general user account types: admin and monitor. As admin, the user is privileged to
execute all the available operations. As monitor, the user can execute operations that display
system configuration and status, or set terminal settings.
admin admin
monitor monitor
473
usage information, and is used for authorization control, billing, trend analysis, resource
utilization, and capacity planning activities.
Authentication, authorization, and accounting services are often provided by a dedicated AAA
server, a program that performs these functions. Network access servers interface with AAA servers
using the Remote Authentication Dial-In User Service (RADIUS) protocol.
User Re-authentication
Re-authentication prevents users from accessing resources or perform tasks for which they do not
have authorization. If credential information (e.g. AAA server information like IP address, key, port
number etc.) that has been previously used to authenticate a user is modified, that user gets
immediately logged out of the switch and asked to re-authenticate.
RADIUS
RADIUS (Remote Authentication Dial-In User Service), widely used in network environments, is a
client/server protocol and software that enables remote access servers to communicate with a
central server to authenticate dial-in users and authorize their access to the requested system or
service. It is commonly used for embedded network devices such as routers, modem servers,
switches and so on. RADIUS is currently the de-facto standard for remote authentication. It is
prevalent in both new and legacy systems.
TACACS+
TACACS (Terminal Access Controller Access Control System), widely used in network environments, is
a client/server protocol that enables remote access servers to communicate with a central server to
authenticate dial-in users and authorize their access to the requested system or service. It is
commonly used for providing NAS (Network Access Security). NAS ensures secure access from
remotely connected users. TACACS implements the TACACS Client and provides the AAA
(Authentication, Authorization and Accounting) functionalities.
LDAP
LDAP (Lightweight Directory Access Protocol) is an authentication protocol that allows a remote
access server to forward a user's log-on password to an authentication server to determine whether
access can be allowed to a given system. LDAP is based on a client/server model. The switch acts as
a client to the LDAP server. A remote user (the remote administrator) interacts only with the switch,
not the back-end server and database.
474
LDAP authentication consists of the following components:
uid=John,ou=people,dc=domain,dc=com
In this mode the system supports Federal Information Processing Standards (FIPS) 140-2, Security
Requirements for Cryptographic Modules, which is a NIST (National Institute of Standards and
Technology) publication that specifies the requirement for system cypher functionality.
When this mode is activated, all the modules which are used by the system are verified to work in
compliance with the secure mode.
Note that if system fails to load in secure mode it is loaded in non-secure mode.
Prerequisites:
switch (config) # snmp-server user <username> v3 auth sha <password1> priv aes-128 <password2>
switch (config) # snmp-server host <ip-address> informs version 3 user <username> auth sha <password1> priv
aes-128 <password2>
475
switch (config) # web https ssl ciphers TLS1.2
If a necessary prerequisite is not fulfilled the system does not activate secure mode
and issues an advisory message accordingly.
476
User Management and Security Commands
User Accounts
username
username <username> [capability <cap> | disable [login | password] |
disconnect | full-name <name> | nopassword | password [0 | 7] <password>]
no username <username> [capability | disable [login | password] | full-
name]
Creates a user and sets its capabilities, password and name.
The no form of the command deletes the user configuration.
nopassword The next login of the user will not require password.
477
Default The following usernames are available by default:
• admin
• monitor
Configuration Mode config
History 3.1.0000
Notes • To enable a user account, just set a password on it (or use the
command “username <user> nopassword” to enable it with no
password required for login)
• Removing a user account does not terminate any current sessions
that user has open; it just prevents new sessions from being
established
• Encrypted password is useful for the command “show configuration”,
since the cleartext password cannot be recovered after it is set
show usernames
show usernames
Displays list of users and their capabilities.
Default N/A
History 3.1.0000
478
switch (config) # show usernames
USERNAME FULL NAME CAPABILITY ACCOUNT STATUS
USERID System Administrator admin Local password login disabled
admin System Administrator admin No password required for login
monitor System Monitor monitor Password set (SHA512)
root Root User admin No password required for login
Notes
show users
show users [history]
Displays logged in users and related information such as idle time and what host they have
connected from.
Default N/A
History 3.1.0000
Example
switch (config) # show users
USERNAME FULL NAME LINE HOST IDLE
admin System Administrator pts/0 172.22.237.174 0d0h34m4s
admin System Administrator pts/1 172.30.0.127 1d3h30m49s
admin System Administrator pts/3 172.22.237.34 0d0h0m0s
switch (config) #s how users history
admin pts/3 172.22.237.34 Wed Feb 1 11:56 still logged in
admin pts/3 172.22.237.34 Wed Feb 1 11:42 - 11:46 (00:04)
wtmp begins Wed Feb 1 11:38:10 2012
Related username
Commands show usernames
Notes
479
show whoami
show whoami
Displays username and capabilities of user currently logged in.
Default N/A
History 3.1.0000
Notes
AAA Methods
aaa accounting
aaa accounting changes default stop-only tacacs+
no aaa accounting changes default stop-only tacacs+
Enables logging of system changes to an AAA accounting server.
The no form of the command disables the accounting.
Syntax N/A
Description
Default N/A
Configuration config
Mode
History 3.1.0000
480
Notes • TACACS+ is presently the only accounting service method supported
• Change accounting covers both configuration changes and system actions that are
visible under audit logging, however this feature operates independently of audit
logging, so it is unaffected by the commands “logging level audit mgmt” or
“configuration audit”
• Configured TACACS+ servers are contacted in the order in which they appear in
the configuration until one accepts the accounting data, or the server list is
exhausted
• Despite the name of the “stop-only” keyword, which indicates that this feature
logs a TACACS+ accounting “stop” message, and in contrast to configuration
change accounting, which happens after configuration database changes, system
actions are logged when the action is started, not when the action has completed
History 3.1.0000
Notes The order in which the methods are specified is the order in
which the authentication is attempted. It is recommended that
“local” is one of the methods selected.
481
aaa authentication attempts fail-delay
aaa authentication attempts fail-delay <time>
no aaa authentication attempts fail-delay
Configures delay for a specific period of time after every
authentication failure.
The no form of the command resets the fail-delay to its default
value.
Default 0
History 3.5.0200
Related Commands
Notes
Syntax downcase Does not convert all usernames to lowercase (for authentication
Description failure tracking purposes only)
Default N/A
Configuration config
Mode
History 3.2.3000
Related
Commands
482
Notes • This is required for the lockout functionality described below, but can also be used
on its own for informational purposes.
• Disabling tracking does not clear any records of past authentication failures, or the
locks in the database. However, it does prevent any updates to this database from
being made: no new failures are recorded. It also disables lockout, preventing new
lockouts from being recorded and existing lockouts from being enforced.
Syntax enable Enables locking out of user accounts based on authentication failures.
Description This both suspends enforcement of any existing lockouts, and prevents any
new lockouts from being recorded. If lockouts are later re-enabled, any
lockouts that had been recorded previously resume being enforced; but
accounts which have passed the max-fail limit in the meantime are NOT
automatically locked at this time. They would be permitted one more
attempt, and then locked, because of how the locking is done: lockouts are
applied after an authentication failure, if the user has surpassed the threshold
at that time.
Lockouts only work if tracking is enabled. Enabling lockouts automatically
enables tracking. Disabling tracking automatically disables lockouts.
483
unlock- Enables the auto-unlock of an account after a specified number of seconds if a
time user account is locked due to authentication failures, counting from the last
valid login attempt.
Unlike the “max-fail” setting, this does take effect immediately for all
accounts.
If both unlock-time and lock-time are set, the unlock-time must be greater
than the lock-time.
Careful with disabling the unlock-time, particularly if you have max-fail set to
something, and have not overridden the behavior for the admin (i.e. they are
subject to lockouts also). If the admin account gets locked out, and there are
no other administrators who can aid, the user may be forced to boot single-
user and use the pam_tallybyname command-line utility to unlock your
account manually. Even if one is careful not to incur this many authentication
failures, it makes the system more subject to DOS attacks.
Default N/A
Configuration config
Mode
History 3.2.3000
Related
Commands
Notes
Syntax admin Overrides the global settings for tracking and lockouts for the admin account.
Description This applies only to the single account with the username “admin”. It does
not apply to any other users with administrative privileges.
no-lockout Prevents the admin user from being locked out though authentication failure
history is still tracked (if tracking is enabled overall)
484
unknown Overrides the global settings for tracking and lockouts for unknown accounts.
The “unknown” class here contains the following categories:
• Real remote usernames which simply failed authentication
• Mis-typed remote usernames
• Passwords accidentally entered as usernames
• Bogus usernames made up as part of an attack on the system
hash- Applies a hash function to the username and stores the hashed result in lieu
username of the original
no-track Does not track authentication for such users (which of course also implies no-
lockout)
Default N/A
Configuration config
Mode
History 3.2.3000
Related
Commands
Notes
Default N/A
History 3.2.3000
485
Example switch (config) # aaa authentication attempts reset user admin
all
Related Commands
Notes
Default N/A
History 3.2.3000
Related Commands
Notes
aaa authorization
aaa authorization map [default-user <username> | order <policy> | fallback]
no aaa authorization map [default-user | order | fallback]
Sets the mapping permissions of a user in case a remote authentication is done.
The no form of the command resets the attributes to default.
486
Syntax username Specifies what local account the authenticated user will be logged on as
Description when a user is authenticated (via RADIUS or TACACS+ or LDAP) and does not
have a local account. If the username is local, this mapping is ignored.
order Sets the user mapping behavior when authenticating users via RADIUS or
<policy> TACACS+ or LDAP to one of three choices. The order determines how the
remote user mapping behaves. If the authenticated username is valid
locally, no mapping is performed. The setting has the following three
possible behaviors:
• local-only – maps all remote users to the user specified by the
command “aaa authorization map default-user <user name>”. Any
vendor attributes received by an authentication server are ignored.
• remote-first – if a local-user mapping attribute is returned and it is a
valid local username, it maps the authenticated user to the local
user specified in the attribute. Otherwise, it uses the user specified
by the default-user command.
• remote-only – maps a remote authenticated user if the
authentication server sends a local-user mapping attribute. If the
attribute does not specify a valid local user, no further mapping is
tried.
fallback Sets the authenticating fallback behavior via RADIUS or TACACS+ or LDAP.
This option attempts to authenticate username through the next
authentication method listed in case of an error.
• server-err – performs fallback if an error occurs while connecting to
remote AAA server (e.g. server is down, not responding, etc)
Default Default user – admin
Map order – remote-first
Order fallback – server-err
Configuration config
Mode
History 3.1.0000
Notes • If, for example, the user is locally defined to have admin permission, but in a remote
server such as RADIUS the user is authenticated as monitor and the order is remote-
first, then the user is given monitor permissions.
• If AAA authorization order policy is configured to remote-only, then when upgrading to
3.4.3000 or later from an olderMellanox Onyxversion, this policy is changed to remote-
first.
• The user must be careful when disabling AAA authorization map fallback server-err,
because if the remote server stops working then the user may lock themselves out.
487
show aaa
show aaa
Displays the AAA configuration.
Default N/A
History 3.1.0000
Notes
488
configured Displays configuration of authentication failure tracking.
status user Displays status of authentication failure tracking and lockouts for
specific user.
Default N/A
History 3.2.1000
Example
switch (config) # show aaa authentication attempts
Configuration for authentication failure tracking and locking:
Track authentication failures: yes
Lock accounts based on authentication failures: yes
Override treatment of 'admin' user: (none)
Override treatment of unknown usernames: hash-usernames
Convert usernames to lowercase for tracking: no
Delay after each auth failure (fail delay): none
Username Known Locked Failures Last fail time Last fail from
-------- ----- ------ -------- -------------- --------------
0Q72B43EHBKT8CB5AF5PGRX3U3B3TUL4CYJP93N(*) no no 1 2012/08/20 14:29:19 ttyS0
Related
Commands
Notes
RADIUS
radius-server
radius-server {key <secret>| retransmit <retries> | timeout <seconds>}
no radius-server {key | retransmit | timeout}
Sets global RADIUS server attributes.
The no form of the command resets the attributes to their default values.
Syntax Description secret Sets a secret key (shared hidden text string), known
to the system and to the RADIUS server.
489
seconds Timeout in seconds between each retry (1-60).
History 3.1.0000
Notes Each RADIUS server can override those global parameters using the
command “radius-server host”.
radius-server host
radius-server host <IP address> [enable | auth-port <port> | key
<secret> | prompt-key | retransmit <retries> | timeout <seconds>|
cipher <none | eap-peap> ]
no radius-server host <IP address> [auth-port | enable | cipher]
Configures RADIUS server attributes.
The no form of the command resets the attributes to their default
values and deletes the RADIUS server.
490
seconds Timeout in seconds between each retry
(1-60)
History 3.1.0000
Notes • RADIUS servers are tried in the order they are configured
• If you do not specify a parameter for this configured RADIUS
server, the configuration will be taken from the global RADIUS
server configuration. Refer to the command “radius-server”.
show radius
show radius
Displays RADIUS configurations.
Default N/A
History 3.1.0000
491
Example switch (config) # show radius
RADIUS defaults:
Key : ********
Timeout : 3
Retransmit: 1
RADIUS servers:
1.1.1.1:1812:
Enabled : yes
Key : ********
Timeout : 3 (default)
Retransmit: 1 (default)
Cipher: none
40.40.40.40:1812:
Enabled : yes
Key : ********
Timeout : 3 (default)
Retransmit: 1 (default)
Notes
TACACS+
tacacs-server
tacacs-server {key <secret>| retransmit <retries> | timeout <seconds>}
no tacacs-server {key | retransmit | timeout}
Sets global TACACS+ server attributes.
The no form of the command resets the attributes to default values.
Syntax Description secret Set a secret key (shared hidden text string), known
to the system and to the TACACS+ server
History 3.1.0000
492
Notes Each TACACS+ server can override those global parameters using the
command “tacacs-server host”.
tacacs-server host
tacacs-server host <IP address> {enable | auth-port <port> | auth-type
<type> | key <secret> | prompt-key | retransmit <retries> | timeout
<seconds>}
no tacacs-server host <IP address> {enable | auth-port}
Configures TACACS+ server attributes.
The no form of the command resets the attributes to their default
values and deletes the TACACS+ server.
493
seconds Timeout in seconds between each retry
(1-60)
History 3.1.0000
Notes • TACACS+ servers are tried in the order they are configured
• A PAP auth-type similar to an ASCII login, except that the
username and password arrive at the network access server in a
PAP protocol packet instead of being typed in by the user, so the
user is not prompted
• If the user does not specify a parameter for this configured
TACACS+ server, the configuration will be taken from the global
TACACS+ server configuration. Refer to the command “tacacs-
server”.
show tacacs
show tacacs
Displays TACACS+ configurations.
Default N/A
History 3.1.0000
TACACS+ servers:
1.1.1.1:49:
Enabled : yes
Auth Type : pap
Key : ********
Timeout : 3 (default)
Retransmit: 1 (default)
494
Related Commands aaa authorization
tacacs-server
tacacs-server host
Notes
LDAP
ldap base-dn
ldap base-dn <string>
no ldap base-dn
Sets the base distinguished name (location) of the user information in the
schema of the LDAP server.
The no form of the command resets the attribute to its default values.
History 3.1.0000
Notes
495
ldap bind-dn/bind-password
ldap {bind-dn | bind-password} <string>
no ldap {bind-dn | bind-password}
Gives the distinguished name or password to bind to on the LDAP server.
This can be left empty for anonymous login (the default).
The no form of the command resets the attribute to its default values.
Default “”
History 3.1.0000
Notes For anonymous login, bind-dn and bind-password should be empty strings
“”.
ldap group-attribute/group-dn
ldap {group-attribute {<group-att> |member | uniqueMember} | group-
dn <group-dn>}
no ldap {group-attribute | group-dn}
Sets the distinguished name or attribute name of a group on the LDAP
server.
The no form of the command resets the attribute to its default values.
496
Configuration Mode config
History 3.1.0000
Notes • The user’s distinguished name must be listed as one of the values
of this attribute, or the user will not be authorized to log in
• After login authentication, if the group-dn is set, a user must be
a member of this group or the user will not be authorized to log
in. If the group is not set (“” – the default) no authorization
checks are done.
ldap host
ldap host <ip-address> [order <number> last]
no ldap host <ip-address>
Adds an LDAP server to the set of servers used for authentication.
The no form of the command deletes the LDAP host.
History 3.1.0000
Notes • The system will select the LDAP host to try according to its
order
• New servers are by default added at the end of the list of
servers
497
ldap hostname-check enable
ldap hostname-check enable
no ldap hostname-check enable
Enables LDAP hostname check.
The no form of the command disables LDAP hostname check.
History 3.6.8008
Notes
ldap login-attribute
ldap login-attribute {<string> | uid | sAMAccountName}
no ldap login-attribute
Sets the attribute name which contains the login name of the user.
The no form of the command resets this attribute to its default.
Default sAMAccountName
History 3.1.0000
498
Related Commands show aaa
show ldap
Notes
ldap port
ldap port <port>
no ldap port
Sets the TCP port on the LDAP server to connect to for
authentication.
The no form of the command resets this attribute to its default
value.
Default 389
History 3.1.0000
Notes
ldap referrals
ldap referrals
no ldap referrals
Enables LDAP referrals.
The no form of the command disables LDAP referrals.
499
History 3.1.0000
ldap scope
ldap scope <scope>
no ldap scope
Specifies the extent of the search in the LDAP hierarchy that the server
should make when it receives an authorization request.
The no form of the command resets the attribute to its default value.
History 3.1.0000
Notes
500
ldap ssl
ldap ssl {ca-list <options> | cert-verify | ciphers {all | TLS1.2} | crl-check
{enable | file fetch <path>} | mode <mode> | port <port-number>}
no ldap ssl {cert-verify | ciphers | crl-check enable | mode | port}
Sets SSL parameter for LDAP.
The no form of the command resets the attribute to its default value.
crl-check file fetch Fetches CRL from remote server. CRL must be a valid
PEM file unless a proper message shown. Supported
formats: SCP, HTTP, HTTPS, FTP, and FTPS.
501
Default cert-verify – enabled
mode – none (LDAP SSL is not activated)
port-number – 636
ciphers – all
History 3.1.0000
Example switch (config) # ldap ssl crl-check file fetch scp://root:[email protected]/etc/
pki/crl.pem
100.0%
[#####################################################################]
ldap timeout
ldap {timeout-bind | timeout-search} <seconds>
no ldap {timeout-bind | timeout-search}
Sets a global communication timeout in seconds for all LDAP servers to
specify the extent of the search in the LDAP hierarchy that the server
should make when it receives an authorization request.
The no form of the command resets the attribute to its default value.
Syntax Description timeout-bind Sets the global LDAP bind timeout for all
LDAP servers
Default 5 seconds
History 3.1.0000
502
3.4.0000 Updated Example
Notes
ldap version
ldap version <version>
no ldap version
Sets the LDAP version.
The no form of the command resets the attribute to its default value.
Default 3
History 3.1.0000
Notes
show ldap
show ldap
Displays LDAP configurations.
Default N/A
503
Configuration Mode Any command mode
History 3.1.0000
Notes
Default N/A
History 3.6.8008
Notes
504
System Secure Mode
Default Disabled
Configuration config
Mode
History 3.5.0200
Notes Before enabling secure mode, the command performs the following configuration checks:
• NTP Key ID cannot be MD5 when secure mode is enabled
• SSH min-version cannot be 1 when enabling secure mode
• SSH security must be set to strict security
• SNMPv3 user auth cannot be md5 when enabling secure mode
• SNMPv3 user priv cannot be des when enabling secure mode
• SNMPv3 trap auth cannot be md5 when enabling secure mode
• SNMPv3 trap priv cannot be des when enabling secure mode
• Router BGP neighbor password cannot be set when enabling secure mode
• Router BGP peer-group password cannot be set when enabling with secure mode
• User password hash cannot be MD5 when secure mode is enabled
Only if the check passes, secure mode is enabled on the switch system.
505
show system secure-mode
show system secure-mode
Displays the security mode of the switch system.
Default N/A
History 3.4.2300
802.1x Protocol
The 802.1x (dot1x) standard describes a way to authenticate hosts (or supplicants) and to allow
connection only to a list of allowed hosts pre-configured on an authentication server. The
authentication is performed by the switch (authenticator) which negotiates the authentication with
a RADIUS server (authentication server). This allows to block traffic from non-authenticated
sources.
• Supplicant – the host. It provides the authentication credentials to the authenticator and
awaits approval.
• Authenticator – the device that connects the supplicant to the network, and checks the
authentication with the authentication server. The authenticator is also in charge of blocking
and isolating of new client till authenticated and allowing communication once the client has
passed the authentication. The switch acts as an authenticator.
• Authentication server – a RADIUS server which can authenticate the user.
The 802.1x is available only on access physical ports. It is not available on LAG and MLAG
ports.
506
802.1x cannot run on a port configured to switchport trunk or hybrid.
• Single host – only one supplicant can communicate through the port.Once authentication of
the supplicant is accepted by the authentication server, the switch allows it access. If the
supplicant logs off or the port state is changed, the port becomes unauthenticated. And if a
different supplicant tries to access through this port, its bidirectional traffic is discarded
(including authentication traffic).
An exception to this is multicast and broadcast traffic which do get transmitted over
the interface once authenticated and are exposed to an unauthorized supplicant if it
exists.
• Multi-host mode – allows connection of multiple hosts over a single port. Only the first
supplicant is authenticated. Subsequent hosts have network access without the need to
authenticate.
Configuring 802.1x
1. Enable 802.1x protocol. Run:
switch (config) # dot1x radius-server host 10.10.10.10 key my4uth3nt1c4t10nk3y retransmit 2 timeout 3
507
switch (config interface ethernet 1/1) # show dot1x interfaces ethernet 1/1
Eth1/1
PAE Status: Enabled
Configured host mode: Multi-host
Configured port-control: Auto
Authentication status: Unauthorized
Re-Authentication: Disabled
Re-Authentication period (sec): -
Tx wait period (sec): 30
Quiet period (sec): 60
Max request retry: 2
Last EAPOL RX source MAC: 00:00:00:00:00:00
Dot1x Commands
protocol dot1x
protocol dot1x
no protocol dot1x
Enables 802.1x EAPOL protocol.
The no form of the command disables 802.1x EAPOL protocol.
Related Commands
Notes
dot1x clear-statistics
dot1x clear-statistics
Resets the 802.1x counters on all or a specific port.
Default N/A
History 3.4.2008
Related Commands
508
Notes
Default Disabled
History 3.4.2008
Related Commands
Notes
dot1x host-mode
dot1x host-mode [multi-host | single-host]
no dot1x host-mode
Configures the authentication mode to either multi-host or single-host.
The no form of the command resets the parameter to its default.
Default single-host
History 3.4.2008
509
3.4.2300 Added “single-host” option
Related Commands
Notes
dot1x port-control
dot1x port-control [auto | force-authorized | force-unauthorized]
no dot1x port-control
Configures 802.1x port access entity (PAE) port-control.
The no form of the command resets the parameter to its default.
Default Force-authorized
History 3.4.2008
Related Commands
Notes
510
Syntax Description auth-port Sets 802.1x RADIUS port to use with this
server
Range: 1-65535
History 3.4.2008
Related Commands
dot1x reauthenticate
dot1x reauthenticate
no dot1x reauthenticate
Enables supplicant re-authentication according to the configuration of command “dot1x
timeout reauthentication”.
The no form of the command disables supplicant re-authentication.
Syntax N/A
Description
511
Default Disabled
History 3.4.2008
Related
Commands
Notes
dot1x system-auth-control
dot1x system-auth-control
no dot1x system-auth-control
Enables the system as authenticator.
The no form of the command disables the system as authenticator.
Default Disabled
History 3.4.2008
Related Commands
Notes
512
Syntax Description period Time in second
Range: 1-65535
History 3.4.2008
Related Commands
Notes
Default 60 seconds
History 3.4.2008
Related Commands
Notes
513
dot1x timeout tx-period
dot1x timeout tx-period <period>
no dot1x timeout tx-period
Configures the maximum number of seconds that the
authenticator waits for supplicant response of EAP-request/
identify frame before retransmitting the request.
The no form of the command resets the parameter to its default.
Default 30 seconds
History 3.4.2008
Related Commands
Notes
dot1x max-req
dot1x max-req <retries>
no dot1x max-req
Configures the maximum amount of retries for the authenticator to
communicate with the supplicant over EAP.
The no form of the command resets the parameter to its default.
Default 2
History 3.4.2008
Related Commands
Notes
514
show dot1x
show dot1x
Displays 802.1x information on all interfaces.
Syntax N/A
Description
Default N/A
History 3.4.2008
Example
switch (config)# show dot1x
---------------------------------------------------------------------
Port Pae Host-mode Port-control Status
---------------------------------------------------------------------
Eth1/1 Enabled multi-host auto unauthorized
Eth1/2 Disabled multi-host force-authorized down
Eth1/3 Disabled multi-host force-authorized down
Eth1/4 Disabled multi-host force-authorized down
Eth1/5 Disabled multi-host force-authorized down
Eth1/6 Disabled multi-host force-authorized down
Eth1/7 Disabled multi-host force-authorized down
Eth1/8 Disabled multi-host force-authorized down
Eth1/9 Disabled multi-host force-authorized down
...
Related
Commands
Notes
515
show dot1x interfaces ethernet
show dot1x interfaces ethernet <slot>/<port>
Displays 802.1x interface information.
Default N/A
History 3.4.2008
Eth1/2
PAE Status: Enabled
Configured host mode: Multi-host
Configured port-control: Auto
Authentication status: Unauthorized
Re-Authentication: Enabled
Re-Authentication period (sec): 3600
Tx wait period (sec): 30
Quiet period (sec): 60
Max request retry: 2
Last EAPOL RX source MAC: 00:00:00:00:00:00
Related
Commands
Notes
Default N/A
History 3.4.2008
Example
516
switch (config)# show dot1x interfaces ethernet 1/2 statistics
Eth1/2
EAPOL frames received: 3
EAPOL frames transmitted: 2
EAPOL Start frames received: 1
EAPOL Logoff frames received: 0
EAP Response-ID frames received: 2
EAP Response frames received: 0
EAP Request-ID frames transmitted: 2
EAP Request frames transmitted: 0
Invalid EAPOL frames received: 0
EAP length error frames received: 0
Last EAPOL frame version: 1
Last EAPOL frame source: 00:1A:A0:02:E9:8E
Related
Commands
Notes
Default N/A
History 3.4.2008
Related Commands
Notes
517
Crypto commands also cover IPSec configuration commands used for establishing a secure
connection between hosts over IP layer which is useful for transferring sensitive information.
1. Enable encryption and configure key location as USB (if you are using a USB device). Run:
***IMPORTANT***
Encryption and decryption perform “reset factory keep-config” on the switch system
once configured. This means that sysdumps, logs, and images are deleted.
The key may be saved locally as well by using the parameter “local” instead of “usb”
but that configuration is less secure.
Once encryption is enabled, reverting back to an older version while encrypted is not
possible. The command “no crypto encrypt-data” must be run before attempting to
downgrade to an older OS version.
518
Cryptographic and Encryption Commands
crypto encrypt-data
crypto encrypt-data key-location <local | usb> key <password>
no crypto encrypt-data
Enables and configures system file encryption.
The no form of the command decrypts sensitive information on the system.
Default N/A
Configuration config
Mode
History 3.6.1002
Example
Notes • It is recommended to store the encryption password on a USB device rather than
locally
• Enabling encryption may slightly slow system performance
• If the key is stored on the USB, it must be plugged into the switch in order for the
switch to boot. After the switch has booted, the USB key is no longer required and,
for security purposes, it is recommended to remove it after running “usb eject”.
The USB key may be needed again if the switch is rebooted or if the switch needs
to be decrypted.
519
Syntax Description clear Clears IKE (ISAKMP) peering state
Default N/A
History 3.2.3000
Notes
520
ike Configures IPSec peering using IKE ISAKMP to manage SA keys. The following
optional parameters are available:
• auth—configures the authentication algorithm for IPSec peering
• dh-group—configures the phase1 Diffie-Hellman group proposed for
secure IKE key exchange
• disable—configures this IPSec peering administratively disabled
• encrypt—configures the encryption algorithm for IPSec peering
• exchange-mode—configures the IKE key exchange mode to propose
for peering
• lifetime—configures the SA lifetime to propose for this IPSec peering
• local-identity—configures the ISAKMP payload identification value to
send as local endpoint's identity
• mode—configures the peering mode for this IPSec peering
• peer-identity—configures the identification value to match against
the peer's ISAKMP payload identification
• pfs-group—configures the phase2 PFS (Perfect Forwarding Secrecy)
group to propose for Diffie-Hellman exchange for this IPSec peering
• preshared-key—configures the IKE pre-shared key for the IPSec
peering
• prompt-preshared-key—prompts for the pre-shared key, rather than
entering it on the command line
• transform-set—configures transform proposal parameters
keying Configures key management for this IPSec peering.
• auth—configures the authentication algorithm for this IPSec peering
• disable—configures this IPSec peering administratively disabled
• encrypt—configures the encryption algorithm for this IPSec peering
• local-spi—configures the local SPI for this manual IPSec peering
• mode—configures the peering mode for this IPSec peering
• remote-spi—configures the remote SPI for this manual IPSec peering
manual Configures IPSec peering using manual keys.
Default N/A
Configuration config
Mode
History 3.2.3000
Example switch (config)# crypto ipsec peer 10.10.10.10 local 10.7.34.139 enable
Notes
521
crypto certificate ca-list
crypto certificate ca-list [default-ca-list name {<cert-name> | system-
self-signed}]
no crypto certificate ca-list [default-ca-list name {<cert-name> |
system-self-signed}]
Adds the specified CA certificate to the default CA certificate list.
The no form of the command removes the certificate from the default
CA certificate list.
Default N/A
History 3.2.3000
Notes • Two certificates with the same subject and issuer fields cannot
both be placed onto the CA list
• The no form of the command does not delete the certificate
from the certificate database
• Unless specified otherwise, applications that use CA certificates
will still consult the well-known certificate bundle before
looking at the default-ca-list
Default N/A
History 3.2.3000
522
Example switch (config) # crypto certificate default-cert name test
523
History 3.2.1000
Notes
524
generate self-signed Generates certificates. This option has the following
parameters which may be entered sequentially in any order:
• comment—specifies a certificate comment (free
string)
• common-name—specifies the common name of the
issuer and subject (e.g. a domain name)
• country-code—specifies the country codwo-
alphanumeric-character country code, or “--” for
none)
• days-valid—specifies the number of days the
certificate is valid
• email-addr—specifies the email address
• hash-algorithm—specifies the hashing function used for
signature algorithm.
Default value is SHA256.
• key-size-bits—specifies the size of the private key in
bits (private key length in bits - at least 1024 but 2048
is strongly recommended)
• locality—specifies the locality name
• org-unit—specifies the organizational unit name
• organization—specifies the organization name
• serial-num—specifies the serial number for the
certificate (a lower-case hexadecimal serial number
prefixed with “0x”)
• state-or-prov—specifies the state or province name
• ca-valid—Specifies certificate CA Basic Constraints flag
set to TRUE/FALSE
private-key pem Specifies certificate contents in PEM format
Default N/A
Configuration config
Mode
History 3.2.3000
525
Notes
History 3.2.1000
Notes
Syntax Description ca-list Displays the list of supplemental certificates configured for the global
default system CA certificate role
526
default-ca-list Displays information about the currently configured default
certificates of the CA list
Default N/A
Configuration config
Mode
History 3.2.1000
Validity:
Starts: 2012/12/02 13:45:05
Expires: 2013/12/02 13:45:05
Subject:
Common Name: IBM-DEV-Bay4
Country: IS
State or Province:
Locality:
Organization:
Organizational Unit:
E-mail Address:
Issuer:
Common Name: IBM-DEV-Bay4
Country: IS
State or Province:
Locality:
Organization:
Organizational Unit:
E-mail Address:
X509 Extensions:
Basic Constraints:
CA: TRUE
Related Commands
Notes
527
show crypto encrypt-data
show encrypt-data
Displays sensitive data encryption information.
Default N/A
Configuration config
Mode
History 3.6.1002
Related Commands
Notes
Default N/A
Configuration config
Mode
History 3.2.1000
528
Example switch (config)# show crypto ipsec
IPSec Summary
-------------
Crypto IKE is using pluto (Openswan) daemon.
Daemon process state is stopped.
Related Commands
Notes
529
Quality of Service (QoS)
QoS Classification
QoS classification assigns a QoS class to the packet. The QoS class of the packet is indicated
internally in the switch using the switch-priority parameter (8 possible values).
Switch-priority affects the packet buffering and transmission scheduling. There are 8 possible values
for switch-priority. The classification is based on the PCP and DEI fields in the VLAN tag, the DSCP
field in the IP header. In addition, the default value can be configured for the incoming port. And
the switch-priority of the packet also can be reconfigured by the ACL.
The switch-priority of the packet is used for priority fields re-marking at the egress.
Trust Levels
QoS classification depends on the port configuration for QoS trust level which determines which
packet header fields derive the switch-priority. The following trust states are supported:
• Trust port
• Based on port default settings
• Trust L2 (PCP,DEI)
• Based on packet PCP,DEI fields for VLAN tagged packets
• Else, based on the port default setting for VLAN un-tagged packets
• Trust L3 (DSCP)
• Based on packet DSCP field for IP packets
• Else, based on port default setting for non-IP
• Trust both
• Based on packet DSCP for IP packets
• Else, based on packet PCP,DEI for VLAN tagged packets
• Else, based on the port default setting
The following table and figure summarize the packet classification rules.
non-IP/MPLS Untagged Port Default Port Default Port Default Port Default
530
Switch Priority to IEEE Priority Mapping
IEEE defines priority value for a packet which is used in the switch for the pause flow control.
The device maps the switch-priority into IEEE priority value using device global switch priority to
IEEE priority table.
531
QoS Rewrite
Mellanox Spectrum® enables rewriting QoS identifier values (DSCP, PCP, DEI) of incoming packets.
The configuration for preserving the values or rewriting them is set per ingress port. The
configuration of the new values is set per egress port and is based on the mapping from the switch-
priority.
In addition, the packets that pass the router module in the switch can be configured to change the
“rewrite enable” configuration as well as the switch-priority.
The reason for the mapping is to enable changing interpretation between two administrative
domains in the network, or when a source of data is not fully trusted. This mapping will take affect
after deriving switch-priority from the DSCP field.
Default Configuration
• By default no ingress rewrite configuration is set
• By default PCP rewrite configuration in router is set
• The default mapping is as following:
• Switch-priority=i to PCP,DEI=i,0, i=0-7
• Switch-priority=i to DSCP=8i, i=0-7
532
of transmission from the queues relies on various configurations such as ETS weight, flow control,
rate shaping etc.
Traffic Class
The switch-priority of the packet assigns it to a specific traffic class (TClass). The TClass of the
packet determines the packet path in the queuing structure. There are 8 TCs supported by the
system.
Traffic Shapers
Maximum Shapers
TCs can be configured for rate shaping as described in the following:
Minimum Shapers
TC queues can be configured for minimal rate shaping. The minimum shaper configuration overrides
all other scheduling configurations. So that if ETS or WRR scheduling allocates to a TC queue lower
rate than the configured minimum, that queue receives strictly higher priority over the others. If
several queues receive a rate below the configured minimum, the arbitration between them can be
configured as a WRR, or as strict according to the queue index.
533
Default Shaper Configuration
Parameter Range Configuration
Switch-priority to TC 0 0
Switch-priority to TC 1 1
Switch-priority to TC 2 2
Switch-priority to TC 3 3
Switch-priority to TC 4 4
Switch-priority to TC 5 5
Switch-priority to TC 6 6
Switch-priority to TC 7 7
Shaping All ports No max/min shaping configured
Relative RED/ECN is supported on TC queues. This allows the thresholds of the drop/mark actions to
behave relatively to the dynamic thresholds configured for the shared buffer.
RED/ECN drop profiles are defined according to 2 parameters as shown in the following figure:
534
• Minimum – a threshold that defines the average queue length below which the packets are
not dropped/marked
• Maximum – a threshold that defines the average queue length above which the packets are
always dropped/marked
It is possible to configure the minimum and maximum thresholds to have the same value which
would represent a step function from “drop none” to “drop all”.
535
QoS Commands
• QoS Commands
• Priority Flow Control (PFC)
• Shared Buffers
• Storm Control
• Head-of-Queue Lifetime Limit
• Store-and-Forward
QoS Commands
QoS Classification
Default 0
History 3.6.1002
Related Commands
Notes
536
vlan default dei
vlan default dei [<dei>]
no vlan default dei [<dei>]
Configures default DEI for packets arrived without VLAN tag.
The no form of the command resets the value to its default.
Default 0
History 3.6.1002
Related Commands
Notes
qos trust
qos trust [port | L2 | L3 | both]
no qos trust
Configures QoS trust mode for the interface.
The no form of the command resets the value to its default.
Syntax N/A
Description
Default L2
History 3.6.1002
Related
Commands
537
Notes Please see the table presenting packet classification rules for more information
Default 0
History 3.6.1002
Notes
Syntax N/A
Description
538
Default PCP to switch-priority mapping:
0→0
1→1
2→2
3→3
4→4
5→5
6→6
7→7
History 3.6.1002
Notes
539
Configuration Mode config interface ethernet
config interface port-channel
config interface mlag-port-channel
History 3.6.1002
Notes
Related Commands
Notes
540
Syntax Description slot/port Number of Ethernet interface in form of slot/
port
priority Valid priority values: 0-7 or all
Default N/A
Configuration Mode Any command mode
History 3.6.3004
Example switch (config) # show interfaces ethernet 1/1 counters pfc prio 1
PFC 1
Rx
0 pause packets
0 pause duration
Tx
0 pause packets
0 pause duration
Related Commands
Notes
show qos
show qos
Displays QoS information.
Syntax N/A
Description
Default N/A
History 3.6.1002
Example
541
switch (config) # show qos
Eth1/1:
Trust mode : L2
Default switch-priority: 0
Default PCP : 0
Default DEI : 0
PCP,DEI rewrite : disabled
IP PCP;DEI rewrite : enable
DSCP rewrite : disabled
-----------------------------------------
switch-priority PCP(DEI) DSCP TC
-----------------------------------------
0 0(0) 0 0
1 1(0) 8 1
2 2(0) 16 2
3 3(0) 24 3
4 4(0) 32 4
5 5(0) 40 5
6 6(0) 48 6
7 7(0) 56 7
...
Related
Commands
Notes
Syntax N/A
Description
Default N/A
542
Configuration Any command mode
Mode
History 3.6.5000
Example
switch (config)# show qos interface ethernet 1/1
Eth1/1:
Trust mode : L2
Default switch-priority: 0
Default PCP : 0
Default DEI : 0
PCP,DEI rewrite : disabled
IP PCP;DEI rewrite : enable
DSCP rewrite : disabled
-----------------------------------------
switch-priority PCP(DEI) DSCP TC
-----------------------------------------
0 0(0) 0 0
1 1(0) 8 1
2 2(0) 16 2
3 3(0) 24 3
4 4(0) 32 4
5 5(0) 40 5
6 6(0) 48 6
7 7(0) 56 7
Related
Commands
Notes
543
Syntax N/A
Description
Default N/A
History 3.6.5000
Example
switch (config)# show qos interface mlag-port-channel 1
Mpo1
Trust mode: L2
Default switch-priority: 0
Default PCP: 0
Default DEI: 0
PCP,DEI rewrite: disabled
IP PCP;DEI rewrite: enable
DSCP rewrite: disabled
Related
Commands
Notes
544
show qos interface port-channel
show qos interface port-channel <port-id>
Display QoS information for port-channel interface.
Syntax N/A
Description
Default N/A
History 3.6.5000
Example
switch (config)# show qos interface port-channel 1
Po1:
Trust mode : L2
Default switch-priority: 0
Default PCP : 0
Default DEI : 0
PCP,DEI rewrite : disabled
IP PCP;DEI rewrite : enable
DSCP rewrite : disabled
-----------------------------------------
switch-priority PCP(DEI) DSCP TC
-----------------------------------------
0 0(0) 0 0
1 1(0) 8 1
2 2(0) 16 2
3 3(0) 24 3
4 4(0) 32 4
5 5(0) 40 5
6 6(0) 48 6
7 7(0) 56 7
Related
Commands
Notes
545
show qos interface l2-mapping
show qos interface <type> <port-id> l2-mapping
Displays the PCP, DEI to switch priority table.
Default N/A
History 3.6.5000
Related Commands
Notes
Default N/A
546
History 3.6.5000
Related Commands
Notes
Default N/A
History 3.6.5000
547
Related Commands
Notes
Default N/A
History 3.6.5000
Related Commands
Notes
Default N/A
548
Configuration Any command mode
Mode
History 3.6.5000
-----------------------------------------
switch-priority PCP(DEI) DSCP TC
-----------------------------------------
0 0(0) 0 0
1 1(0) 8 1
2 2(0) 16 2
3 3(0) 24 3
4 4(0) 32 4
5 5(0) 40 5
6 6(0) 48 6
7 7(0) 56 7
Related
Commands
Notes
QoS Rewrite
Syntax N/A
Description
549
Default Disabled
History 3.6.1002
Related
Commands
Notes
Default Disabled
History 3.6.1002
Related Commands
Notes
550
qos rewrite map switch-priority pcp dei
qos rewrite map switch-priority <switch-priority> pcp <pcp> dei <dei>
no qos rewrite map switch-priority <switch-priority> pcp <pcp> dei <dei>
Configures switch-priority to PCP,DEI mapping on the interface.
The no form of the command resets the value to their defaults.
dei Value: 0
History 3.6.1002
switch (config interface ethernet 1/14) # no qos rewrite map switch-priority 7 pcp
Related
Commands
Notes
551
Syntax Description N/A
History 3.6.1002
Example switch (config interface ethernet 1/1) # qos rewrite map switch-priority 5 dscp 40
Related Commands
Notes
Default Enable
History 3.6.1002
Related Commands
552
Notes
Default N/A
History 3.6.6000
Notes
bind switch-priority
bind switch-priority [<priority_1> [<priority_2] .. <priority_n>]]
no bind switch-priority [<priority>]
Configures binding of switch-priority to traffic class.
The no form of the command:
• When run in the interface configuration mode: Resets to default the binding of all
switch-priorities from all traffic classes
• When run in the interface’s traffic class: Negates the binding of a specific switch-priority
from a specific traffic class
Syntax N/A
Description
553
Default Switch priority to traffic class mapping:
0→0
1→1
2→2
3→3
4→4
5→5
6→6
7→7
History 3.6.1002
Related
Commands
bandwidth guaranteed
bandwidth guaranteed [<rate>]
no bandwidth guaranteed [<rate>]
Configures the minimum bandwidth for outbound traffic.
The no form of the command resets this parameter to its default.
Default 0
History 3.6.1002
Related Commands
554
Notes • Context is egress interface traffic class
• Bandwidth guaranteed rate determines the bandwidth
guaranteed by the switch for outbound traffic assigned to
this traffic class on this interface
• Bandwidth is in granularity of 0.2G
bandwidth shape
bandwidth shape [<shape>]
no bandwidth shape [<shape>]
Configures the bandwidth shaper for outbound traffic.
The no form of the command resets this parameter to its default.
History 3.6.1002
Related Commands
dcb ets
dcb ets [strict | wrr <weight>]
no dcb ets [strict | wrr <weight>]
Configures ETS mode to strict or WRR.
The no form of the command resets this parameter to its defaults.
555
Default Default is WRR with the following default weights
History 3.6.1002
Example switch (config interface ethernet 1/1 traffic-class 1) # dcb ets wrr 50
Related Commands
Syntax N/A
Description
Default N/A
History 3.6.1002
556
Example switch (config)# show dcb ets interface ethernet 1/1
Eth1/1:
Interface Bandwidth Shape [Mbps]: N/A
Multicast unaware mapping: disabled
Flags:
S.Mode: Scheduling Mode [Strict/WRR]
D: -
W: Weight
Bw.Sh: Bandwidth Shaper
Bw.Gr: Bandwidth Guaranteed
Related
Commands
Notes
traffic-class congestion-control
traffic-class <tc> congestion-control [red | ecn | both] [minimum- absolute <min>
maximum-absolute <max> | minimum-relative <min> maximum-relative <max>]
no traffic-class <tc> congestion-control
Enables RED/ECN marking for traffic class queue.
The no form of the command disables RED/ECN marking for traffic class queue.
both Enables both RED and ECN marking for traffic class queue
557
maximum-relative Set maximum-relative value (in percentage) for marking
traffic-class queue
Default Disabled
History 3.5.1000
Example switch (config interface ethernet 1/1)# traffic-class 0 congestion-control both minimum-
relative 50 maximum-relative 80
Related
Commands
Notes
Default N/A
History 3.5.1000
Example
Related Commands
Notes
558
bind switch-priority
bind switch-priority [<priority_1> [<priority_2] .. <priority_n>]]
no bind switch-priority [<priority>]
Configures binding of switch-priority to traffic class.
The no form of the command:
• When run in the interface configuration mode: Resets to default the binding of all
switch-priorities from all traffic classes
• When run in the interface’s traffic class: Negates the binding of a specific switch-priority
from a specific traffic class
Syntax N/A
Description
History 3.6.1002
Related
Commands
bandwidth guaranteed
bandwidth guaranteed [<rate>]
no bandwidth guaranteed [<rate>]
Configures the minimum bandwidth for outbound traffic.
The no form of the command resets this parameter to its default
value.
559
Syntax Description rate Rate in GbE
Range: 0 - max speed supported
Default 0
History 3.6.1002
Related Commands
bandwidth shape
bandwidth shape [<rate>]
no bandwidth shape [<rate>]
Configures the bandwidth shaper for outbound traffic.
The no form of the command resets this parameter to its default
value.
History 3.6.1002
Related Commands
560
dcb ets
dcb ets [strict | wrr <weight>]
no dcb ets [strict | wrr <weight>]
Configures ETS mode to strict or WRR.
The no form of the command resets this parameter to its default
value.
History 3.6.1002
Related Commands
traffic-class congestion-control
traffic-class <tc> congestion-control [red | ecn | both]
[minimum- absolute <min> maximum-absolute <max> |
minimum-relative <min> maximum-relative <max>]
no traffic-class <tc> congestion-control
Enables RED/ECN marking for traffic class queue.
The no form of the command disables RED/ECN marking
for traffic class queue.
561
Syntax Description tc Traffic class
Range: 0-7
Default Disabled
History 3.5.1000
Related Commands
Notes
Syntax N/A
Description
Default N/A
562
History 3.6.1002
Example
switch (config)# show dcb ets interface ethernet 1/1
Eth1/1:
Interface Bandwidth Shape [Mbps]: N/A
Multicast unaware mapping: disabled
Flags:
S.Mode: Scheduling Mode [Strict/WRR]
D: -
W: Weight
Bw.Sh: Bandwidth Shaper
Bw.Gr: Bandwidth Guaranteed
Related
Commands
Notes
Default N/A
History 3.5.1000
563
Example switch (config)# show interface ethernet 1/1 congestion-control
Interface ethernet: 1/1
Related Commands
Notes
564
• Provides trace logs for execution upon error conditions and for any event notifications from
the hardware or data-path. These trace logs are a useful aid in troubleshooting.
• Allows the administrator to configure the minimum and maximum threshold values for flow
control. These configurations are applied globally on all ports and priorities.
Priority Based Flow Control (PFC) provides an enhancement to the existing pause flow control
mechanism as described in 802.1x.
When working with lossless traffic, the receiving side sends a pause frame (Xoff) to the transmitting
side before the buffer is filled. When the buffer empties, the receiving side sends an un-pause
frame (Xon) to the transmitting side.
565
When working with global flow control mode only, a single PG shall be used and Xoff and
Xon shall be set on this PG. When working with priority flow control, Xoff and Xon shall be
set on each lossless PG.
See the “Shared Buffers” page for more information on flow control.
PFC Watchdog
Lossless networks with PFC enabled provide strong packet delivery guarantees. However, lossless
networks introduce a new fault scenario where a queue of an end-port (e.g. the port of a host
connected to the network) may not be able to receive any traffic from the network and keeps
sending pause frames towards the switch. Since lossless switch paths do not drop packets but
decline receiving more packets when their buffers fill up, if the end-port queue is stuck for a long
time, the buffers fill up not only for the target switch, but also on all switches with problematic
port queues in the traffic forwarding path. This leads to endless PFC pause frames, also called a PFC
storm, being observed on all switch ports along the path to the traffic source.
PFC watchdog prevents congestion from spreading in such a case. When switches detect this
situation on any TC queue, all the packets in the queue are flushed and new packets destined to the
same queue are dropped as well until PFC storming is relieved.
For lossless networks with global flow control configured, we will face the same issue of global
pause storm. To resolve this, global-flow-control-watchdog mode is supported.
566
Additional Reading and Use Cases
For more information about this feature and its potential applications, please refer to the following
Mellanox Community post:
PFC Commands
Default PFC is generally disabled. See “RoCE Parameters” for specific RoCE
modes in which the default is enabled
History 3.1.0000
567
Related Commands show dcb priority-flow-control
dcb priority-flow-control mode
Notes This command asks the user to approve traffic loss because some
interfaces with DCB mode activated might get shut down.
History 3.1.0000
Notes
Syntax Description force Configures the PFC admin mode as on or auto with
no confirmation needed if the port is admin enabled
568
mode The interface PFC mode. Possible values:
• on – enables PFC per interface
• off – disables PFC per interface
• auto – set PFC mode for the interface to be
controlled with traffic pool configuration
Default auto – PFC mode is established by traffic pool configuration (not a directly
configurable mode)
History 3.1.0000
Notes • For the “force” parameter, the no form of the command disables
priority-flow-control without the preceding confirmation prompt
• For mode value “auto”, if a lossless traffic pool is configured, PFC is
enabled for this port. Otherwise, PFC is disabled.
pfc-wd
pfc-wd
no pfc-wd
Enables PFC watchdog on interface.
The no form of the command disables PFC watchdog on interface.
Syntax N/A
Description
Default Disabled
History 3.6.6000
569
Related show interface pfc-wd
Commands
Notes When a user enables both "flowcontrol receive on" and "pfc-wd" on specific port, global-flow-
control-watchdog
mode is activated. If only "pfc-wd" is enabled, then the PFC-watchdog mode is activated.
Default N/A
History 3.1.0000
PFC enabled
Priority Enabled List : 0
Priority Disabled List : 1 2 3 4 5 6 7
TC Lossless
--- ----------
0 N
1 Y
2 Y
3 N
Related Commands
Notes
570
show dcb priority-flow-control interface mlag-port-
channel
show dcb priority-flow-control interface mlag-port-channel <inf>
[detail]
Displays DCB priority flow control configuration and status for MPO
interfaces.
Default N/A
History 3.1.0000
PFC: disabled
Priority Enabled List:
Priority Disabled List: 0 1 2 3 4 5 6 7
Related Commands
Notes
571
Default N/A
History 3.6.6000
Related pfc-wd
Commands
Notes When PFC-watchdog mode is activated, display "per-priority" in "PFC-WD mode". While
global flow control watchdog activated, display "global". Otherwise, display "n/a".
Shared Buffers
All successfully received packets by a switch are stored on internal memory from the time they are
received until the time they are transmitted. The packet buffer is fully shared between all physical
ports and is hence called a shared buffer. Buffer configuration is applied in order to provide lossless
services and to ensure fairness between the ports and priorities.
The buffer mechanism allows defining reserved memory allocation and limiting the usage of memory
based on incoming/outgoing ports and priority of the packet. In addition, the buffer can be divided
into static pools, each for a specific set of priorities. Buffer configuration mechanism allows fair
enforcement from both ingress and egress sides.
The standard configuration mode allows a simple and concise configuration manner by hiding direct
buffer access from user, and collecting all the required configuration settings into “traffic pools”.
Users that wish to gain full control of entire buffers set can do so by enabling advanced buffer
configuration.
572
Available traffic pool types are as follows:
• Lossy – for standard lossy traffic. This is the default type for all traffic.
• Lossless – for traffic which cannot suffer any loss. Using this type enables a flow control
mechanism for the mapped priority as well as setting headroom and Xon/Xoff parameters for
the relevant ingress PG buffer.
• Lossy-MC – for layer 2 multicast traffic which requires special care due to stream duplication
on the egress side over several ports.
There is no restriction for priority mapping to traffic pools. User can map all priorities to a single
traffic pool or create a separate traffic pool for each priority. By default, all memory will be equally
divided between all active traffic pools. User can set a memory percentage for a traffic pool out of
the entire shared buffer. A state of over-subscription (where sum of percentage is bigger than 100%)
is admissible although not advised.
A traffic pool will become functional if at least one priority is mapped to it. Each functional traffic
pool will be matched by an iPool, ePool and iPort.PG buffer on each interface. For further detail see
section “Advanced Buffer Configuration”.
Lossless Traffic
Priority-flow-control
Enabling lossless traffic flow requires relevant switch-priority (see Packet Classification) to be
mapped to a traffic pool type “Lossless”. This could be applied through one of the following
methods:
• Create a new custom lossless traffic pool, and map the switch-priority to the newly created
traffic pool. In this case, PFC configuration is automatic. For example:
• Enabling DCB PFC over the said switch-priority along with enabling DCB PFC globally. This will
result in mapping of the priority to the lossless-default traffic pool which is reserved merely
for this purpose. In addition it is required to enable DCB PFC for the relevant interfaces as
well.
When setting lossless traffic configuration, it is strongly recommended to stick with one of the
upper modes rather than a combination of them.
To ensure all incoming packets are subjected to the global pause mechanism, the port's trust mode
must be set to “port”.
Example:
573
switch (config)# traffic pool my_pool type lossless
switch (config)# traffic pool my_pool map switch-priority 3
switch (config)# interface ethernet 1/1 flowcontrol send on force
switch (config)# interface ethernet 1/1 flowcontrol receive on force
switch (config)# interface ethernet 1/1 qos default switch-priority 3
switch (config)# interface ethernet 1/1 qos trust port
• Port
• Ingress port (iPort) – the port which the packet is received on
• Egress port (ePort) – the port which the packet is transmitted on
• Pool
• Ingress pool (iPool) – the memory pool on which the packet is counted on the ingress
side
• Egress pool (ePool) – the memory pool on which the packet is counted on the egress
side
• Priority
• Switch priority (SP) – internal identifier of the packet priority which is used as a key for
several internal switch functions and decisions, including buffering. The SP of the
packet is assigned according to a port’s trust level configuration and packet QoS
identifiers in the header (PCP, DEI, DSCP).
• Priority group (PG) – PG is combined of a group of SPs. It is used for grouping packets
of several switch priorities into a single ingress buffer space. PG range is from 0-7,
while PG 9 is reserved for control traffic.
• Traffic class (TC) – TC is combined of a group of SPs. It is used for grouping packets of
several switch priorities into a single egress queue and buffer space. TC range is from
0-15, while TC 8-15 is reserved for multicast traffic and TC 16 is reserved for control
traffic.
Buffer configuration mechanism provides a way to allocate buffer space for specific traffic types by
configuring buffers of the following types.
• MC.SP – multicast traffic which is classified per specific switch-priority. Counting occurs on
egress side prior to packet duplication.
• ePort.mc – multicast traffic which is going to be transmitted on a specific port
574
Buffer Allocation
For the aforementioned classification parameters, a buffering region can be allocated. The
buffering region is defined as a set of one of the following: {iPort}, {iPort.pg}, {ePort}, {ePort.TC},
{MC} or {MC.SP}.
For buffer regions, reserved and shared buffering quotas are allocated based on the following
configuration parameters:
• Reserved allocation (size) – guaranteed buffering quota for the region which is not shared
with other regions
• Shared allocation (shared) – best-effort buffering quota for the region which can be shared
with other regions and allocated dynamically. Region usage cannot overflow this quota.
Shared allocation can be set using static or dynamic threshold.
• Shared pool – static bound from which the shared space is dynamically allocated
The iPort.PG buffer can be configured to work in one of two modes:
Pools
Shared buffer space can be statically divided among multiple pools on the ingress side (iPools) and
the egress side (ePools). Each buffer is a region that is mapped to a specific pool.
• Size – the total size which is shared among the regions allocated to that pool. The pool’s size
binds the amount of cumulative shared usage of the regions that are mapped to the pool. The
size can be set to infinite value, in which case occupancy of this pool will not be taken into
consideration upon admittance of the packet.
The pool size does not include the reserved sizes of regions.
575
• Mode – working mode
• Static – each region has a static maximum threshold defined in bytes. The user sets the
maximum shared quota for this buffer from a specific pool by providing a percentage
out of the bounded pool size. If the size is set to infinite, shared quota for mapped
buffers gets set in bytes.
• Dynamic – each region has a dynamic maximal threshold defined as alpha (α) which is
the ratio between the current region usage and the pool’s free space (equal to the
pool usage subtracted from pool size):
• α accepts the following values 0, 1/128, 1/64, …1/2,1,2,…,64, infinity
• Buffer acceptance condition is: region_usage < α*free pool space
The port region is counted against the pool to which the PG/TC region of the packet is mapped.
Usage Counting
A packet is counted once on the ingress side and on the egress side.
• iPort: iPort.iPoolCtrl
• iPort.PG: iPort.pg9
• ePort: ePort.ePoolCtrl
• ePort.TC: iPort.tc16
All control buffers are mapped to control pools and are not configurable.
Default Configuration
The default, out-of-box configuration provides the following settings:
Pools:
• iPool0, ePool0 – default pools for all data traffic. Set to dynamic mode with size of the entire
shared buffer each.
• iPoolCtrl, ePoolCtrl – dynamic pools dedicated for control with size of 256KB each
• ePool15 – multicast pool with static mode and infinite size
Buffers:
• All buffer configuration (apart from MC.SP) is similar for all ports
• All switch-priorities are mapped to PG0
• Each switch-priority is mapped to a corresponding TC buffer (i-to-i)
576
Buffer Reserved Shared Pool Comment
[%/α/Byte]
Configuration Example
The following example exhibits how to divide the buffer among traffic priorities in advanced buffer
management mode. Assuming that over an out-of-box lossy default configuration is set, the user
here configures buffering for lossless traffic classified to switch-priority 1, over Ethernet interfaces
1/1 and 1/5.
577
switch (config) # advanced buffer management force
# Pool configuration
switch (config) # pool iPool1 size 13680063 type dynamic
switch (config) # pool ePool1 size inf type static
# Ingress buffer configuration
switch (config) # interface ethernet 1/1 ingress-buffer iPort pool iPool1 reserved 10k shared alpha 1
switch (config) # interface ethernet 1/1 ingress-buffer iPort.pg1 bind switch-priority 1
switch (config) # interface ethernet 1/1 ingress-buffer iPort.pg1 map pool iPool1 type lossless reserved 85k xoff
20k xon 20k shared alpha 1
switch (config) # interface ethernet 1/1 egress-buffer ePort pool ePool1 reserved 0 shared size inf
switch (config) # interface ethernet 1/1 egress-buffer ePort.tc1 map pool ePool1 reserved 0 shared size inf
switch (config) # interface ethernet 1/1 egress-buffer ePort.mc reserved 0 shared size inf
# Egress buffer configuration
switch (config) # interface ethernet 1/5 ingress-buffer iPort pool iPool1 reserved 10k shared alpha 1
switch (config) # interface ethernet 1/5 ingress-buffer iPort.pg1 bind switch-priority 1
switch (config) # interface ethernet 1/5 ingress-buffer iPort.pg1 map pool iPool1 type lossless reserved 85k xoff
20k xon 20k shared alpha 1
switch (config) # interface ethernet 1/5 egress-buffer ePort pool ePool1 reserved 0 shared size inf
switch (config) # interface ethernet 1/5 egress-buffer ePort.tc1 map pool ePool1 reserved 0 shared size inf
switch (config) # interface ethernet 1/5 egress-buffer ePort.mc reserved 0 shared size inf
# MC buffer configuration
switch (config) # pool ePool1 mc-buffer mc.sp1 reserved 0 shared size inf
# PFC configuration
switch (config) # dcb priority-flow-control enable force
switch (config) # dcb priority-flow-control priority 1 enable
switch (config) # interface ethernet 1/1 dcb priority-flow-control mode on
switch (config) # interface ethernet 1/5 dcb priority-flow-control mode on
• Global scenarios:
• Traffic pool memory over-subscription (total X%) and Traffic pools with size ‘Auto’ are
not allocated.
In this scenario, two or more traffic pools are configured so the sum of their sizes
(specified in the percentage units) is more than 100%. In this case, upon high
utilization, traffic “fights” for resources (free pool memory) and can be lost.
• Switch priority X is mapped to a non-lossless traffic pool, but PFC is enabled on it, or
switch priorities X-1,X are mapped to a non-lossless traffic pool, but PFC is enabled on
them
In these scenarios, switch priority X is mapped to a lossy or lossy-MC traffic pool
(traffic is not important and traffic loss is allowed), but pause packet generation (PFC)
also is enabled over this priority. These cases are allowed if the user expects traffic to
be dropped but has enabled PFC to prevent it.
• Switch priority X is mapped to a lossless traffic pool, but PFC is disabled on it, or
Switch priorities X-1,X are mapped to a lossless traffic pool, but PFC is disabled on
them
As opposed to the previous scenarios, here the traffic pool is created as lossless, but
pause packet generation is disabled. In these cases, the user expects traffic not to
have drops, but it can be dropped.
• Per interface scenarios:
• <if-id> TC X is mapped to more than one traffic pool, or TCs X,X+1 are mapped to more
than one traffic pool.
In these scenarios, traffic class buffers share the same switch priority and are mapped
to two different traffic pool. In this cases, with different traffic pool configuration,
behavior of traffic is not determined.
• <if-id> switch priority X is lossless but neither PFC nor FC is not enabled on this
interface, or Switch priorities X-1,X are lossless but neither PFC nor FC is enabled on
this interface.
In these scenarios, the user has created a lossless traffic pool and expects that traffic
would not be dropped, but pause packet generation (PFC and FC) is disabled on the
interface. In these cases, traffic can be dropped.
• <if-id> has FC enabled, but default priority 0 is not mapped to lossless traffic pool and
FC may not be functional.
In this scenario, global pause packet (FC) generation is enabled on the interface, but
578
default switch priority (traffic arriving to the switch without priority tagging is
assigned the default switch priority) is not in lossless traffic pool. In this case, traffic
cam be dropped.
• <if-id> has insufficient headroom allocation to fulfill configuration derived
requirements (MTU, speed, cable-length).
In this scenario, combination of MTU, speed, cable-length, and amount of lossless
traffic pools consumes all free headroom memory. In this case, not all required buffers
are configured correctly and traffic can be dropped.
traffic pool
traffic pool <name> [force]
no traffic pool <name> [force]
Creates a traffic pool and enters the traffic pool context on prefix
mode enabled.
The no form of the command deletes a traffic pool.
Default N/A
History 3.6.5000
Related Commands
Notes
579
type
type <type>
no type <type>
Configures the traffic pool type.
The no form of the command resets a traffic pool.
History 3.6.5000
Related Commands
map switch-priority
map switch-priority <list-of-priorities>
no map switch-priority <list-of-priorities>
Maps switch-priorities to the traffic pool.
The no form of the command unmaps switch-priorities.
Default N/A
History 3.6.5000
Related Commands
580
type map switch-priority
type {lossless | lossy | lossy-mc} map switch-priority <priority>
no type {lossless | lossy | lossy-mc} map switch-priority
Configures type of traffic pool and maps switch-priorities to it.
The no form of the command unmaps switch-priorities.
History 3.6.5000
Related
Commands
Notes When using “traffic pool <name> type <type> map switch-priority <priority>”, if the traffic
pool does not exist the it is created.
memory percent
memory percent [<percent>]
no memory percent [<percent>]
Sets traffic pool size in percentage out of entire shared buffer memory.
The no form of the command resets this parameter to its default.
Default Auto
History 3.6.5000
581
Related
Commands
Notes • Setting “auto” value ensures fair memory division between all traffic pools with
“auto” size
• Over-subscription of more than 100% is allowed but not recommended, and causes an
exception to be displayed in the “Exceptions list” in “show traffic pool” command
output. See section “Exceptions to Legal Shared Buffer Configuration” for more
details.
Default Disabled
Configuration config
Mode
History 3.6.5000
Related
Commands
Notes When moving advanced buffer management from disable to enable, buffer/PFC configuration
returns all shared buffer configuration to default.
ingress-buffer
ingress-buffer <buffer-name>
no ingress-buffer <buffer-name>
Creates and enters the ingress buffer context.
The no form of the command deletes an existing buffer.
582
Syntax buffer-name Name of ingress buffer
Description
Default N/A
History 3.6.1002
Related
Commands
Notes iPort.pg9 is reserved for control traffic and hence cannot be edited
egress-buffer
egress-buffer <buffer-name>
no egress-buffer <buffer-name>
Creates and enters the buffer context.
The no form of the command deletes an existing buffer.
Default N/A
History 3.6.1002
Related
Commands
Notes ePort.tc16 is reserved for control traffic and hence cannot be edited
583
reserved shared size
reserved <value> shared size <size>
no reserved <value>
Configures the ePort.mc multicast-buffer.
The no form of the command resets buffer to default configuration.
History 3.6.5000
Example switch (config 1/1 egress-buffer ePort.mc)# reserved 5k shared alpha 1/128
Related
Commands
Notes • ePort.tc16 is reserved for control traffic and hence cannot be edited
• It is possible to use “K” and “M” to define shared size
Configuration config
Mode
History 3.6.5000
584
Example switch (config)# pool iPool2 size 2M type dynamic
switch (config)# pool iPool2 size static type static
Related
Commands
Notes It is possible to use “K” for kilobytes and “M” for megabytes to define pool size.
History 3.6.1002
Example switch (config interface ethernet 1/1 ingress-buffer iPort)# pool iPool0 reserved 90K
shared alpha 1/8
Related
Commands
Notes
585
map pool type reserved
map [pool <pool name> type <type> [xoff <xoff-value> xon <xon value>] reserved <reserved
size> shared <shared units> <shared size>]
Maps iPort.pg buffer to a given pool and sets its reserved and shared sizes.
The no form of the command resets buffer to default pool mapping and configuration.
History 3.6.1002
Example switch (config interface ethernet 1/9 ingress-buffer iPort.pg5)# map pool iPool6 type lossy
reserved 3k shared alpha 2
switch (config interface ethernet 1/9 ingress-buffer iPort.pg5)# map pool iPool4 type
lossless reserved 7k xoff 2k xon 1k shared max 20
Related
Commands
Notes • Xon and Xoff values are in KB and valid only for “lossless” type
• It is possible to use “K” and “M” quantifiers to set reserved size
586
bind switch-priority
bind switch-priority <list-of-switch-priorities>
no bind switch-priority <list-of-switch-priorities>
Bind a switch priority (SP) to an ingress buffer.
The no form of the command resets this parameter to its default value.
History 3.6.1002
Example switch (config interface ethernet 1/1 ingress-buffer iPort.pg1)# bind switch-priority 0 1
Related
Commands
Notes
description
description <description>
no description
Configures buffer description.
The no form of the command deletes buffer description.
Default “”
History 3.6.1002
Example switch (config interface ethernet 1/1 ingress-buffer iPort.pg1)# description example
Related
Commands
Notes
587
pool mc-buffer
pool <pool-name> mc-buffer <buffer> reserved <reserved> shared <shared units> <shared-
size>
no pool <pool-name> mc-buffer
Maps MC-buffer to specified egress pool and sets its reserved and shared sizes.
The no form of the command resets the values to their default.
Configuration config
Mode config interface ethernet egress-buffer
History 3.6.100
2
Example switch (config)# pool ePool4 mc-buffer mc.sp6 reserved 3k shared size 2K
Related
Commands
Notes • The qualifiers “K” and “M” may be used to set reserved and shared size
• The units alpha, max, size is presented to the user according to the pool type
“static”, “dynamic” and “size”:
• Alpha when pool type is dynamic and size is defined in bytes
• Max when pool type is static and size is defined in bytes
• Size when pool type is static and size is infinite
588
clear buffers pool mc-buffers max-usage
clear buffers pool mc-buffers max-usage
Clears max-usage statistics for MC.SP (multicast switch priority, mc.sp0 – mc.sp7) shared
buffers.
Syntax N/A
Description
Default N/A
Configuration config
Mode
History 3.8.1000
Related
Commands
Notes
Default N/A
Configuration config
Mode
History 3.6.1002
Related
Commands
Notes
589
clear buffers interface max-usage
clear buffers interface max-usage
Clears max-usage indicator for all buffers of all interfaces.
Syntax N/A
Description
Default N/A
Configuration config
Mode
History 3.6.1002
Related
Commands
Notes
Default N/A
Configuration config
Mode
History 3.6.1002
Related
Commands
590
Notes
Default N/A
History 3.6.1002
Related Commands
Notes
pool description
pool <pool-name> description <description>
no pool <pool-name> description
Configures the buffer description of a specific pool-name.
The no form of the command resets the values to their default.
Default “”
History 3.6.1002
591
Example switch (config)# pool iPool6 description mapped-to-pg3
Related Commands
Notes
cable-length
cable-length [<meters>]
Configures the cable length in meters for the given port.
Default N/A
History 3.6.5000
Related Commands
Notes • The user may use the quantifier “K” to indicate kilometers
(e.g. “cable-length 5K”)
• This command is used to calculate the required buffer to
sustain the delay caused by the cable length
Default N/A
History 3.6.5000
592
Example switch (config)# show buffers mode
Current mode: user mode
Related Commands
Notes
Default N/A
History 3.6.1002
593
Example ------------------------------------------------------------------------------------------
----------------------------
Interface Buffer Pool Resv Shared Usage MaxUsage Resv/
Hdrm Usage Resv/Hdrm MaxUsage
[Byte] [%/a/Byte] [Byte] [Byte]
[Byte] [Byte]
------------------------------------------------------------------------------------------
----------------------------
Eth1/1 iPort.iPool0 iPool0 10.0K alpha 8 0 0 n/
a n/a
Eth1/1 iPort.iPool1 iPool1 0 alpha 0 0 0 n/
a n/a
Eth1/1 iPort.iPool2 iPool2 0 alpha 0 0 0 n/
a n/a
Eth1/1 iPort.iPool3 iPool3 0 alpha 0 0 0 n/
a n/a
Eth1/1 iPort.iPool4 iPool4 0 alpha 0 0 0 n/
a n/a
Eth1/1 iPort.iPool5 iPool5 0 alpha 0 0 0 n/
a n/a
Eth1/1 iPort.iPool6 iPool6 0 alpha 0 0 0 n/
a n/a
Eth1/1 iPort.iPool7 iPool7 0 alpha 0 0 0 n/
a n/a
Eth1/1 iPort.iPoolCtrl iPoolCtrl 0 alpha 8 0 0 n/
a n/a
Eth1/1 iPort.pg0 iPool0 0 alpha 8 0 0
0 0
Eth1/1 iPort.pg1 iPool0 0 alpha 0 0 0
0 0
Eth1/1 iPort.pg2 iPool0 0 alpha 0 0 0
0 0
Eth1/1 iPort.pg3 iPool0 0 alpha 0 0 0
0 0
Eth1/1 iPort.pg4 iPool0 0 alpha 0 0 0
0 0
Eth1/1 iPort.pg5 iPool0 0 alpha 0 0 0
0 0
Eth1/1 iPort.pg6 iPool0 0 alpha 0 0 0
0 0
Eth1/1 iPort.pg7 iPool0 0 alpha 0 0 0
0 0
Eth1/1 iPort.pg9 iPoolCtrl 10.0K alpha 8 0 0
0 0
Eth1/1 ePort.ePool0 ePool0 10.0K alpha 8 0 0 n/
a n/a
Eth1/1 ePort.ePool1 ePool1 0 alpha 0 0 0 n/
a n/a
Eth1/1 ePort.ePool2 ePool2 0 alpha 0 0 0 n/
a n/a
Eth1/1 ePort.ePool3 ePool3 0 alpha 0 0 0 n/
a n/a
Eth1/1 ePort.ePool4 ePool4 0 alpha 0 0 0 n/
a n/a
Eth1/1 ePort.ePool5 ePool5 0 alpha 0 0 0 n/
a n/a
Eth1/1 ePort.ePool6 ePool6 0 alpha 0 0 0 n/
a n/a
Eth1/1 ePort.ePool7 ePool7 0 alpha 0 0 0 n/
a n/a
Eth1/1 ePort.mc ePool15 10.0K 90.0K 0 0 n/
a n/a
594
Eth1/1 ePort.ePoolCtrl ePoolCtrl 0 alpha 8 0 0 n/
a n/a
Eth1/1 ePort.tc0 ePool0 1.0K alpha 8 0 0 n/
a n/a
Eth1/1 ePort.tc1 ePool0 1.0K alpha 8 0 0 n/
a n/a
Eth1/1 ePort.tc2 ePool0 1.0K alpha 8 0 0 n/
a n/a
Eth1/1 ePort.tc3 ePool0 1.0K alpha 8 0 0 n/
a n/a
Eth1/1 ePort.tc4 ePool0 1.0K alpha 8 0 0 n/
a n/a
Eth1/1 ePort.tc5 ePool0 1.0K alpha 8 0 0 n/
a n/a
Eth1/1 ePort.tc6 ePool0 1.0K alpha 8 0 0 n/
a n/a
Eth1/1 ePort.tc7 ePool0 1.0K alpha 8 0 0 n/
a n/a
Eth1/1 ePort.tc16 ePoolCtrl 1.0K alpha 8 0 0 n/
a n/a
Related
Commands
Notes Resv/Hdrm Usage/MaxUsage counters specify the usage of reserved buffer set for lossless PG
buffers, and of headroom buffer set to fixed 20KB for lossy PG buffers.
Default N/A
History 3.6.1002
Flags:
Y: Lossy
L: Lossless
S: Static
D: Dynamic
Interface Eth1/1:
595
--------------------------------------------------------------------
----------------------
Buffer Resv Xoff Xon Shared
Pool Description
[Byte] [Byte] [Byte] [%/a/Byte]
--------------------------------------------------------------------
----------------------
iPort.iPool0(Y) 10.0K - - alpha 8
iPool0(D)
iPort.iPool1(Y) 0 - - alpha 0
iPool1(D)
iPort.iPool2(Y) 0 - - alpha 0
iPool2(D)
iPort.iPool3(Y) 0 - - alpha 0
iPool3(D)
iPort.iPool4(Y) 0 - - alpha 0
iPool4(D)
iPort.iPool5(Y) 0 - - alpha 0
iPool5(D)
iPort.iPool6(Y) 0 - - alpha 0
iPool6(D)
iPort.iPool7(Y) 0 - - alpha 0
iPool7(D)
iPort.iPoolCtrl(Y) 0 - - alpha 8
iPoolCtrl(D)
iPort.pg0(Y) 0 - - alpha 8
iPool0(D)
iPort.pg1(Y) 0 - - alpha 0
iPool0(D)
iPort.pg2(Y) 0 - - alpha 0
iPool0(D)
iPort.pg3(Y) 0 - - alpha 0
iPool0(D)
iPort.pg4(Y) 0 - - alpha 0
iPool0(D)
iPort.pg5(Y) 0 - - alpha 0
iPool0(D)
iPort.pg6(Y) 0 - - alpha 0
iPool0(D)
iPort.pg7(Y) 0 - - alpha 0
iPool0(D)
iPort.pg9(Y) 10.0K - - alpha 8
iPoolCtrl(D)
ePort.ePool0 10.0K - - alpha 8
ePool0(D)
ePort.ePool1 0 - - alpha 0
ePool1(D)
ePort.ePool2 0 - - alpha 0
ePool2(D)
ePort.ePool3 0 - - alpha 0
ePool3(D)
ePort.ePool4 0 - - alpha 0
ePool4(D)
ePort.ePool5 0 - - alpha 0
ePool5(D)
ePort.ePool6 0 - - alpha 0
ePool6(D)
ePort.ePool7 0 - - alpha 0
ePool7(D)
ePort.mc 10.0K - - 90.0K
ePool15(S)
ePort.ePoolCtrl 0 - - alpha 8
ePoolCtrl(D)
ePort.tc0 1.0K - - alpha 8
ePool0(D)
ePort.tc1 1.0K - - alpha 8
ePool0(D)
ePort.tc2 1.0K - - alpha 8
ePool0(D)
ePort.tc3 1.0K - - alpha 8
ePool0(D)
ePort.tc4 1.0K - - alpha 8
ePool0(D)
ePort.tc5 1.0K - - alpha 8
ePool0(D)
596
ePort.tc6 1.0K - - alpha 8
ePool0(D)
ePort.tc7 1.0K - - alpha 8
ePool0(D)
ePort.tc16 1.0K - - alpha 8
ePoolCtrl(D)
switch-priority to Buffers mapping:
------------------------------
Switch-priority Buffer
------------------------------
0 iPort.pg0
1 iPort.pg0
2 iPort.pg0
3 iPort.pg0
4 iPort.pg0
5 iPort.pg0
6 iPort.pg0
7 iPort.pg0
Related Commands
Notes
History 3.6.1002
597
Example switch (config)# show buffers pools
Flags: S - Static, D - Dynamic
-----------------------------------------------------------------
------
Pool Direction Size Usage MaxUsage
Description
[Byte] [Byte] [Byte]
-----------------------------------------------------------------
------
iPool0 ingress(D) 13.2M 0 576 Lossy-
default
iPool1 ingress(D) 0 0 0
iPool2 ingress(D) 0 0 0
iPool3 ingress(D) 0 0 0
iPool4 ingress(D) 0 0 0
iPool5 ingress(D) 0 0 0
iPool6 ingress(D) 0 0 0
iPool7 ingress(D) 0 0 0
iPoolCtrl ingress(D) 256.0K 0 0 Control
ePool0 egress(D) 13.2M 0 0 Default
ePool1 egress(D) 0 0 0
ePool2 egress(D) 0 0 0
ePool3 egress(D) 10.0K 0 0
ePool4 egress(D) 0 0 0
ePool5 egress(D) 0 0 0
ePool6 egress(D) 0 0 0
ePool7 egress(D) 0 0 0
ePool15 egress(S) inf 0 0 Multicast
ePoolCtrl egress(D) 256.0K 0 0 Control
Related Commands
Default N/A
History 3.6.5000
598
Example switch (config)# show buffers pools ePool4 mc-buffers
----------------------------------------------------------------------
--
MC-Buffer Pool Resv Shared Usage
MaxUsage
[Byte] [%/a/Byte] [Byte] [Byte]
----------------------------------------------------------------------
--
mc.sp0 ePool0 0 alpha 1/4 0 0
mc.sp1 ePool0 0 alpha 1/4 0 0
mc.sp2 ePool0 0 alpha 1/4 0 0
mc.sp3 ePool0 0 alpha 1/4 0 0
mc.sp4 ePool0 0 alpha 1/4 0 0
mc.sp5 ePool0 0 alpha 1/4 0 0
mc.sp6 ePool0 0 alpha 1/4 0 0
mc.sp7 ePool0 0 alpha 1/4 0 0
Related Commands
Notes
Syntax N/A
Description
Default N/A
History 3.6.5000
-----------------------------------------------------------------------------------------
------
Traffic Type Memory Switch Memory actual Usage Max
Usage
Pool [%] Priorities [Bytes] [KB]
[Bytes]
-----------------------------------------------------------------------------------------
------
lossless-default (RO) lossless auto 0 0 0
lossy-default lossy auto 0, 1, 2, 3, 13.7M 0 0
4, 5, 6, 7
Exception list:
N/A
Related
Commands
599
Notes • Omission of traffic pool name displays information about all existing traffic pools
• The “Exception list” section displays messages to indicate unrecommended
configuration. See section “Exceptions to Legal Shared Buffer Configuration” for
more details.
Default N/A
History 3.6.5000
------------------------------------------------------
Switch-priority Ingress buffer Egress buffer
------------------------------------------------------
0 iPort.pg0 ePort.tc0
1 iPort.pg0 ePort.tc1
2 iPort.pg0 ePort.tc2
3 iPort.pg0 ePort.tc3
4 iPort.pg0 ePort.tc4
5 iPort.pg0 ePort.tc5
6 iPort.pg0 ePort.tc6
7 iPort.pg0 ePort.tc7
-------------------------------------------------------------------------
Name Memory percent Size (bytes) Usage (bytes) Max Usage
------------------------------------------------------------------------
lossy-default auto 34.9M 0 0
---------------------------------------------------------------------------------------------
--
Ingress buffer Headroom size (bytes) Xon (bytes) Xoff (bytes) Headroom Usage Headroom Max
Usage
---------------------------------------------------------------------------------------------
--
iPort.pg0 20.0K N/A N/A 0 0
--------------------------------------------------------
Direction Pool Usage (bytes) Pool Max Usage (bytes)
--------------------------------------------------------
Ingress 0 0
Egress 0 0
Exception list:
N/A
600
Related
Commands
Notes The “Exception list” section displays messages to indicate unrecommended configuration. See
section “Exceptions to Legal Shared Buffer Configuration” for more details.
Storm Control
Storm control may be enabled on L2 Ethernet ports, LAGs, and MLAGs to monitor inbound traffic to
prevent disruptions caused by a broadcast, multicast, or unicast traffic storm on the physical
interfaces.
Storm control utilizes a bandwidth-based method to measure traffic where packets exceeding the
percentage level specified by the user are dropped.
Users are able to monitor broadcast, unknown unicast, and unregistered multicast traffic while
supporting different thresholds for each type or monitor a summary of all the previously mentioned
traffic with one threshold.
storm-control
storm-control {<broadcast | unreg-multicast | unknown-unicast> | all} {level
<level> | { bits <bits> | bytes <bytes> | packets <packets> [k|m|g]}} [force]
no storm-control {<broadcast | unreg-multicast | unknown-unicast> | all}
The command enables Storm Control on selected interface.
The no form of the command disables Storm Control on selected interface.
601
level <level> | { bits <bits> | bytes Storm control per traffic type may be
<bytes> | packets <packets> [k|m| configured with different thresholds:
g]}
• Level – specifies threshold value in
percentages from interface speed
• Bits – specifies threshold value in bits
per second. Must be specified with
multiplier k, m, or g. Possible ranges:
[1k...999k][1m...999m][1g...200g].
• Bytes – specifies threshold value in
bytes per second. May be specified
with multiplier k, m, or g. Possible
ranges: [128...999][1k...999k]
[1m...999m][1g...25g].
• Packets – specifies threshold value in
packets per second. May be specified
with multiplier k, m, or g. Possible
ranges: [1...999][1k...999k]
[1m...999m][1g...2g].
force Resolves collisions and applies new
configuration
Default no storm control
History 3.6.4006
Example switch (config interface ethernet 1/1) # storm-control broadcast bits 100 m
switch (config interface ethernet 1/1) # storm-control unknown-unicast level 50
switch (config interface ethernet 1/1) # storm-control unreg-multicast packets
900
switch (config interface ethernet 1/1) # storm-control all bytes 1 g
Related Commands
Notes • The parameter “all” and other configurations are mutually exclusive
• Storm control can be configured on a LAG but cannot be configured on LAG
members
• Storm control cannot be configured on router ports
• Storm control cannot be configured on a destination port in a monitoring
session
• Units are in 10^n. The parameter “k” equals 1000 and not 1024.
602
show storm-control
show storm-control [<interface>]
The command displays the configuration levels and dropped packets for
each traffic type.
History 3.6.4006
Related Commands
Notes
When HLL_packet2Stall (7 as default) packets encounter HLL drop, the scheduling group enters a
stall state. During that state all packets to the sub-group are discarded. The subgroup exits stall
state after HLL_time*8.
A counter called HoQ discard packets counts the number of discarded packets due to HLL.
603
HoQ Commands
hll
hll <max-time>
no hll
Configures HLL time on this interface.
The no form of the command resets HLL time to its default value.
History 3.6.5000
Related Commands
Notes
Store-and-Forward
Store-and-Forward is used to describe a functionality where a switch receives a complete packet,
stores it, and only then forwards it.
since the switch make forwarding decisions based on the destination address which is at the header
of the packet, the switch can make the forwarding decision before receiving the complete packet,
this process is called cut-through, the switch forwards part of the packet before receiving the
complete packet.
Cut-through allows lower latency and saves buffer space, but if an error occurred in the packet
while utilizing cut-through, the packet will be forwarded with an error, alternatively, utilizing store-
and-forward allows the switch to drop erroneous packets.
The standard implementation of forwarding mode is for the entire switch; either all ports on a
switch are in store-and-forward mode or all ports on a switch are in cut-through
mode. Mellanox implements forwarding mode per egress port, which is a more flexible method and
vital in cases where a switch is connected to both a storage device and a compute server among
other setups.
604
Additional Reading and Use Cases
For more information about this feature and its potential applications, please refer to the following
Mellanox Community post:
Store-and-Forward Commands
switchmode store-and-forward
switchmode store-and-forward
no switchmode store-and-forward
disable switchmode store-and-forward
Enables global store-and-forward configuration on the switch.
The no form of the command removes store-and-forward configuration
from the switch and reverts it back to the switch’s global
configuration.
The disable form of the command configures the forwarding mode to
cut-through.
Default N/A
History 3.6.3640
Related Commands
Notes
605
Ethernet Switching
The following pages provide information on configuring Ethernet (L2) protocols and features.
• Ethernet Interfaces
• Interface Isolation
• Link Aggregation Group (LAG)
• Link Layer Discovery Protocol (LLDP)
• VLANs
• Voice VLAN
• Spanning Tree Protocol
• MAC Address Table
• MLAG
• Link State Tracking
• QinQ
• Access Control List (ACL)
• Control Plane Policing
• User Defined Keys
• OpenFlow
Ethernet Interfaces
Ethernet interfaces have the following physical set of configurable parameters:
To use 100GbE QSFP interfaces as 25/10GbE (via QSA adapter), the speed must be manually
set with the command “speed 25000” or “speed 10000” respectively under the interface
configuration mode.
Break-Out Cables
The break-out cable is a unique Mellanox capability, where a single physical quad-lane QSFP port is
divided into 2 dual-lane ports or 4 single-lane ports. It maximizes the flexibility of the end user to
use the Mellanox switch with a combination of dual-lane, single-lane and quad-lane interfaces
according to the specific requirements of its network. Certain ports cannot be split at all, and there
are ports which can be split into 2 ports only (for more information please refer to your Switch
Hardware User Manual). Splitting a port changes the notation of that port from x/y to x/y/z with
“x/y” indicating the previous notation of the port prior to the split and “z” indicating the number of
the resulting sub-physical port (1,2 or 1,2,3,4). Each sub-physical port is then handled as an
individual port. For example, splitting port 10 into 4 lanes gives the following new ports: 1/10/1,
1/10/2, 1/10/3, 1/10/4.
606
A split-4 operation results in blocking a quad-lane port in addition to the one being split. A set of
hardware restrictions determine which of the ports can be split.
Specific ports can be split by using a QSFP 1X4 breakout cable to split one single-lane port into 4
lanes (4 SFP+ connectors). These 4 lanes then go, one lane to each of the 4 SFP+ connectors.
When splitting an interface’s traffic into 4 data streams (four lanes) one of the other ports on the
switch is disabled (unmapped).
To see the exact splitting options available per system, refer to each specific system’s hardware
user manual (Cabling chapter) located on the Mellanox website.
The ports on the top 3 rows (in Green) can be split to 2, while the bottom row should not be split to
2. This allows up to 96 splitted ports and another 16 ports of un-splitted.
1 5 9 13 17 21 25 29 33 37 41 45 49 53 57 61
2 6 10 14 18 22 26 30 34 38 42 46 50 54 58 62
3 7 11 15 19 23 27 31 35 39 43 47 51 55 59 63
4 8 12 16 20 24 28 32 36 40 44 48 52 56 60 64
607
Changing the Module Type to a Split Mode
To split an interface:
1. Shut down all the ports related to the interface. Run:• in case of split-2, shut down the
current interface only
• in case of split-4, shut down the current interface and the other interface according switch
system’s spec
The <ports> field in the warning refers to the affected ports from splitting port <inf> in the
applied command.
Please beware that in SN2700 products splitting a port into 4 prevents you from
accessing the splittable port, and an additional one. For example, in the procedure
above, ports 3 and 4 become inaccessible.
2. From the first member of the split (1/54/1), change the module-type back to QSFP. Run:
The module-type can be changed only from the first member of the split and not
from the interface which has been split.
608
3. Type “yes” when prompted with “Type 'yes' to confirm unsplit.”
To achieve 56GbE link speed, run the following on the desired interface:
For more information about this feature and its potential applications, please refer to the following
Mellanox Community post:
Transceiver Information
Mellanox Onyx™ offers the option of viewing the transceiver information of a module or cable
connected to a specific interface. The information is a set of read-only parameters burned onto the
EEPROM of the transceiver by the manufacture. The parameters include identifier (connector type),
cable type, speed and additional inventory attributes.
For more information about this feature and its potential applications, please refer to the following
Mellanox Community post:
609
Transceiver Switch OPN Supported Ports
SN2700 1, 2, 31, 32
If a high power transceiver (e.g. LR4) is inserted to a port that does not support it, the link does not
go up, and the following warning message is displayed: “Warning: High power transceiver is not
supported” when the command “show interfaces ethernet” is run.
If a MellanoxHPE system is connected to a 3rd party system, then FEC is only activated if the 3rd
party requests it also.
610
Ethernet Interface Commands
interface ethernet
interface ethernet <slot>/<port>[/<subport>][-<slot>/<port>[/
<subport>]]
Enters the Ethernet interface or Ethernet interface range configuration
mode.
Related Commands
Notes
boot-delay
boot-delay [<time>]
no boot-delay
Configures interface boot-delay timer.
The no form of the command returns boot-delay time to its default
value.
611
Notes • This command delays the interface from boot time of the
interface
• Configuration save and system reboot is required for the
configuration to take effect
description
description <string>
no description
Configures an interface description.
The no form of the command returns the interface description
to its default value.
fec-override
fec-override <fec-configuration> [force]
no fec-override <fec-configuration> [force]
Changes FEC configuration on a specific port or range of ports.
The no form of the command resets this parameter to its default value.
612
History 3.5.0000
3.6.2002 Added force option
3.7.1000 Updated Example
Example switch (config interface ethernet 1/1) # fec-override fc-fec
flowcontrol
flowcontrol {receive | send} {off | on} [force]
Enables or disables IEEE 802.3x link-level flow control per direction for
the specified interface.
History 3.1.0000
3.3.4500 Added MPO configuration mode
Example switch (config interface ethernet 1/1) # flowcontrol receive on
613
ip address dhcp
ip address dhcp
no ip address dhcp
Enables DHCP on this Ethernet interface.
History 3.4.2008
Example switch (config interface ethernet 1/1) # ip address dhcp
load-interval
load-interval <time>
no load-interval
Sets the interface counter interval.
The no form of the command resets the interval to its default value.
History 3.3.0000
3.3.4500 Added MPO configuration mode
Example switch (config interface ethernet 1/1) # load-interval 30
614
module-type
module-type <type> [force]
no module-type <type> [force]
Splits the interface to two or four separate interfaces, or merges them
back to a single interface (QSFP).
The no form of the command resets the interface to its default
configuration.
Default QSFP
History 3.1.1400
615
mtu
mtu <frame-size>
Configures the Maximum Transmission Unit (MTU) frame size for the
interface.
History 3.1.0000
Notes
shutdown
shutdown
no shutdown
Disables the interface.
The no form of the command enables the interface.
History 3.1.0000
616
Notes
speed
speed {<value> [no-autoneg | speed_value [... speed_value]] | <auto>}
[force]
no speed
Sets the speed of the interface.
The no form of the command sets the speed of the interface to its default
value.
Default Depends on the port module type (see the “Notes” section below)
History 3.1.0000
617
Notes • autoneg is currently not supported in Spectrum-2 based switches.
• The default speed of an interface depends on its speed capabilities, an
interface capable of 100GbE will have 100GbE speed by default
• It is not possible to set the speed on a LAG or MPO interface
• Not all interfaces support all speed options
• It is not possible to set “auto” speed with the “no-autoneg” parameter
• It is not possible to set “auto” speed along with specific speeds
• A port with more than one speed advertised or a port configured to
“auto” speed cannot be added to LAG
• To change the speed of a LAG interface:
a. Remove Ethernet ports from LAG.
b. Shutdown ports.
c. Reconfigure port speed.
d. Re-enable ports.
e. Re-add ports to LAG interface.
clear counters
clear counters
Clears the interface counters.
Default N/A
History 3.1.0000
618
show interfaces counters
show interfaces <type> <id> counters [priority <prio>]
Displays the extended counters for the interface.
Default N/A
History 3.1.0000
619
Example switch (config) # show interfaces ethernet 1/1 counters
Rx
0 packets
0 unicast packets
0 multicast packets
0 broadcast packets
0 bytes
0 packets of 64 bytes
0 packets of 65-127 bytes
0 packets of 128-255 bytes
0 packets of 256-511 bytes
0 packets of 512-1023 bytes
0 packets of 1024-1518 bytes
0 packets Jumbo
0 error packets
0 discard packets
0 hoq discard packets
0 fcs errors
0 undersize packets
0 oversize packets
0 pause packets
0 unknown control opcode
0 symbol errors
(appears only on L2 ethernet ports and port-channels supported
interfaces)
..0 packets
..0 unicast packets
..0 multicast packets
..
0 error packets
0 discard packets
0 discard packets by Storm Control
0 fcs errors
0 undersize packets
Tx
0 packets
0 unicast packets
0 multicast packets
0 broadcast packets
0 bytes
0 error packets
0 discard packets
0 hoq discard packets
0 pause packets
0 TX wait
0 TX wait useconds
0 queue depth TC0
0 queue depth TC1
0 queue depth TC2
0 queue depth TC3
0 queue depth TC4
0 queue depth TC5
0 queue depth TC6
0 queue depth TC7
Related Commands
Notes Mellanox Spectrum® based systems display queue depth for TC0-TC7
620
show interfaces counters discard
show interfaces <type> <id> counters discard
Displays discarded counters of the interface.
Default N/A
History 3.6.6102
Tx:
1154059970 discard packets
0 error packets
0 hoq discard packets
0 oversize packets
0 policy discard packets
0 SLL discard packets
11500 no buffer discard mc packets
0 discard packets by vlan filter
0 discard packets by stp filter
0 discard packets by loopback filter
Related Commands
Notes
621
Default N/A
History 3.1.0000
622
Example switch (config) # show interfaces ethernet 1/10
Eth1/10:
Admin state : Enabled
Operational state : Up
Last change in operational status: 0:00:47 ago (1 oper change)
Boot delay time : 0 sec
Description : N\A
Mac address : 7c:fe:90:f5:8d:2e
MTU : 1500 bytes (Maximum packet size
1522 bytes)
Fec : auto
Operational Fec : rs-fec
Flow-control : receive off send off
Supported speeds : 1G 10G 25G 40G 50G 56G 100G
Advertised speeds : 100G
Actual speed : 100G
Auto-negotiation : Enabled
Width reduction mode : Unknown
Switchport mode : access
MAC learning mode : Enabled
Forwarding mode : inherited cut-through
Telemetry sampling: Disabled TCs: N\A
Telemetry threshold: Disabled TCs: N\A
Telemetry threshold level: N\A
Rx:
25 packets
0 unicast packets
25 multicast packets
0 broadcast packets
1600 bytes
0 discard packets
0 error packets
0 fcs errors
0 undersize packets
0 oversize packets
0 pause packets
0 unknown control opcode
0 symbol errors
0 discard packets by storm control
Tx:
3 packets
0 unicast packets
3 multicast packets
0 broadcast packets
192 bytes
0 discard packets
0 error packets
0 hoq discard packets
Related Commands
623
show interfaces ethernet description
show interfaces ethernet [<inf>] description
Displays the admin status and protocol status for the specified
interface.
Default N/A
History 3.1.0000
---------------------------------------------------------------------
---------------------
Interface Admin Operational Switchport Speed
Description
state state mode
---------------------------------------------------------------------
---------------------
Eth1/20 Enabled Up hybrid 100G
-
Eth1/21 Enabled Up hybrid 100G
(auto) -
Eth1/22 Enabled Up hybrid 100G
(auto) -
---------------------------------------------------------------------
---------------------
Interface Admin Operational Switchport Speed
Description
state state mode
---------------------------------------------------------------------
---------------------
Eth1/20 Enabled Up hybrid 100G
-
Related Commands
Notes
624
Syntax Description transfer-rate-unit • bytes – displays interface transfer rates
in B/s dynamically (while converting to
K/M/G if needed)
• KB – displays interface transfer rate in
Kb/s
• MB – displays interface transfer rate in
Mb/s
• GB – displays interface transfer rate in
Gb/s
• bits – displays interface transfer rates
in b/s dynamically (while converting to
K/M/G if needed)
• Kb – displays interface transfer rate in
Kb/s
• Mb – displays interface transfer rate in
Mb/s
• Gb – displays interface transfer rate in
Gb/s
• If no parameter is entered, transfer
rate is displayed in bits
Default N/A
History 3.6.2002
Related Commands
Notes
625
Default N/A
History 3.1.0000
Related Commands
Notes
Default N/A
History 3.1.0000
626
Related Commands switch (config) # show interfaces ethernet 1/1 transceiver
Port 1/1 state
identifier : QSFP+
cable/module type : Optical cable/module
ethernet speed and type: 40GBASE - SR4
vendor : Mellanox
cable_length : 50 m
part number : MC2210411-SR4
revision : A1
serial number : TT1151-00006
Notes • For a full list of the supported cables and transceivers, please
refer to the LinkX™ Cables and Transceivers webpage in
Mellanox.com
• If a high power transceiver (e.g. LR4) is used, it will be
indicated in the field “cable/module type”
Default N/A
History 3.6.6102
----------------------------------------------------------------
------------------------
Interface Identifier Vendor PN
SN Rev
----------------------------------------------------------------
------------------------
Eth1/1
Related Commands
Notes • For a full list of the supported cables and transceivers, please
refer to the LinkX™ Cables and Transceivers webpage in
Mellanox.com
• If a high power transceiver (e.g. LR4) is used, it will be
indicated in the field “cable/module type”
627
show interfaces ethernet transceiver counters
show interfaces ethernet [<inf>] transceiver counters
Displays PHY counters.
Default N/A
History 3.6.1002
Rx
phy received bits 17725862707200
phy symbol errors 0
phy corrected bits 0
Related Commands
Notes • The counter “phy received bits” provides information on
the total amount of traffic received and can be used to
estimate the ratio of error traffic
• The counter “phy symbol errors” provides information on
the error traffic that was not corrected because the FEC
algorithm could not do it or because FEC was not active on
this interface
• The counter “phy corrected bits” provides the number of
corrected bits by the active FEC mode (RS/FC)
Default N/A
History 3.6.1002
628
Example switch (config) # show interfaces ethernet 1/1 transceiver
counters details
Phy counters
Symbol errors 0
Sync headers errors 0
Edpl/bip errors lane0 0
Edpl/bip errors lane1 0
Edpl/bip errors lane2 0
Edpl/bip errors lane3 0
FC corrected blocks lane0 0
FC corrected blocks lane1 0
FC corrected blocks lane2 0
FC corrected blocks lane3 0
FC uncorrectable blocks lane0 0
FC uncorrectable blocks lane1 0
FC uncorrectable blocks lane2 0
FC uncorrectable blocks lane3 0
RS corrected blocks 0
RS uncorrectable blocks 0
RS no errors blocks 0
RS single error blocks 0
RS corrected symbols total 0
RS corrected symbols lane0 0
RS corrected symbols lane1 0
RS corrected symbols lane2 0
RS corrected symbols lane3 0
Link down events 0
Successful recovery events 0
Time since last clear 3545366
Related Commands
Notes The number of lanes displayed depends on interface splitter ratio
(4-way-split – each split has only 1 lane; 2-way-split – each split
has 2 lanes)
Default N/A
History 3.6.2002
629
Example switch (config) # show interfaces ethernet 1/5 transceiver
diagnostics
Related Commands
Notes This example is for a QSFP transceiver
630
Syntax inf Interface number: <slot>/<port>
Description
Default N/A
History 3.6.1002
Example
switch (config) # show interfaces ethernet 1/7 transceiver raw
Port 1/7 raw transceiver data:
Related
Commands
Notes
631
Syntax N/A
Description
Default N/A
History 3.6.4006
Example
switch (config) # show interfaces status
----------------------------------------------------------------------------------------------------------
----------------------
Port Operational state Admin Speed Description
----------------------------------------------------------------------------------------------------------
----------------------
mgmt0 Up Enabled 1000Mb/s (auto) -
Eth1/1 Down Disabled Unknown -
Eth1/2 Up Enabled 40G -
Eth1/3 Up Enabled 40G -
Eth1/4 Up Enabled 40G -
Eth1/5 Up Enabled 40G -
Eth1/6 Down Disabled Unknown -
Eth1/7 Down Disabled Unknown -
Eth1/8 Down Disabled Unknown -
Eth1/9 Down Disabled Unknown -
Eth1/10 Up Enabled 100G -
Eth1/11 Up Enabled 100G -
Eth1/12 Up Enabled 100G -
Eth1/13 Up Enabled 100G -
Eth1/14 Down Disabled Unknown -
Eth1/15 Up Enabled 100G -
Eth1/16 Up Enabled 100G -
Related
Commands
Note If a high power transceiver (e.g. LR4) is inserted to a port that does not support it, the link does
not go up, and the following warning message is displayed: “Warning: High power transceiver is
not supported” when running the command “show interfaces ethernet” is run. For more
information, please refer to “High Power Transceivers”.
632
Configuration Mode config
History 3.8.2000
Role admin
Example switch (config) # disable interface ethernet 1/1 traffic-class 5 congestion-control
switch (config) # interface ethernet 1/1 disable traffic-class 5 congestion-
control
Configurati config
on Mode
History 3.8.2000
Role admin
Example switch (config) # disable interface port-channel 15 traffic-class 5 congestion-control
switch (config) # interface port-channel 15 disable traffic-class 5 congestion-control
633
disable interface mlag-port-channel traffic-class
congestion-control
disable interface mlag-port-channel <inf> traffic-class <tc> congestion-control
interface mlag-port-channel <inf> disable traffic-class <tc> congestion-control
Disables RED/ECN marking for traffic-class queue on MLAG port.
Configuration config
Mode
History 3.8.2000
Role admin
Example switch (config) # disable interface mlag-port-channel 1 traffic-class 5 congestion-
control
switch (config) # interface mlag-port-channel 1 disable traffic-class 5 congestion-
control
Interface Isolation
Interface isolation provides the ability to group interfaces in sets where traffic from each port is
isolated from other interfaces in the group. The isolated interfaces in the group, however, are able
to communicate with the interface marked as privileged.
634
Configuring Isolated Interfaces
635
switch (config) # interface ethernet 1/1 switchport access vlan 3
switch (config) # interface ethernet 1/2 switchport access vlan 3
switch (config) # interface ethernet 1/3 switchport access vlan 3
8. Isolate Ethernet interfaces 1 and 2 and set Ethernet interfaces 3 as privileged. Run:
11. Isolate Ethernet interfaces 4 and 5 and set Ethernet interfaces 6 as privileged. Run:
protocol isolation-group
protocol isolation-group
no protocol isolation-group
Enables interface isolation and unlocks further isolation-group commands.
The no form of the command disables interface isolation and locks other isolation-
group commands.
636
Related Commands show isolation-group
Notes • MLAG must be disabled before enabling interface isolation
• When disabled, all configuration is lost
isolation-group
isolation-group <name>
no isolation-group <name>
Creates isolation group.
The no form of the command deletes isolation group.
shutdown
shutdown
no shutdown
Disables isolation group.
The no form of the command enables isolation group.
637
Related Commands protocol isolation-group
isolation-group
show isolation-group
Notes Enabling isolation groups fails if there are VLANs with ports both inside and outside
the group
vlan
vlan <vid>
no vlan <vid>
Adds a VLAN to isolation group.
The no form of the command removes a VLAN from an isolation group.
isolation-group mode
isolation-group <name> mode {isolated | privileged}
no isolation-group <name> mode {isolated | privileged}
Adds a VLAN to isolation group.
The no form of the command removes a VLAN from an isolation group.
638
Configuration Mode config interface ethernet
config interface port-channel
History 3.6.1002
Example switch (config interface ethernet 1/2) # isolation-group mygroup mode privileged
show isolation-group
show isolation-group <name>
Displays isolation group information.
Default N/A
History 3.6.1002
Related Commands
Notes
639
Configuring Static LAG
1. Create a port-channel entity. Run:
If the physical port is operationally up, this port becomes an active member of the
aggregation. Consequently, it becomes able to convey traffic.
Or:
640
LAG Commands
interface port-channel
interface port-channel <1-4096>[-<2-4096>]
no interface port-channel <1-4096>[-<2-4096>]
Creates a LAG and enters the LAG configuration mode. There is an
option to create a range of LAG interfaces.
The no form of the command deletes the LAG, or range of LAGs.
Default N/A
History 3.1.1400
lacp
lacp
no lacp
Enables LACP in the switch.
The no form of the command disables LACP in the switch.
History 3.1.1400
641
Example switch (config)# lacp
Related Commands
Notes
lacp system-priority
lacp system-priority <1-65535>
no lacp system-priority
Configures the LACP system priority.
The no form of the command sets the LACP system-priority to
default.
Default 32768
History 3.1.1400
Notes Each device that runs LACP has an LACP system priority value. A
value between 1 and 65535 can be configured. LACP uses the system
priority with the MAC address to form the system ID. When setting
the priority, a higher number means a lower priority.
lacp (interface)
lacp {rate fast | port-priority <1-65535>}
no lacp {rate fast | port-priority}
Configures the LACP interface parameters.
The no form of the command sets the LACP interface configuration to
default.
Syntax Description rate fast Sets LACP PDUs on the port to be in fast (1
second) or slow rate (30 seconds)
642
1-65535 LACP port-priority
History 3.1.1400
Related Commands
Notes Configuring LACP rate (fast or slow) will configure the peer port to send
(fast or slow), it does not make any affect on the local port LACP rate.
643
symmetric Symmetric hashing; bidirectional flows follow
same path
symmetric Enables symmetric hashing
Default source-destination-mac, source-destination-ip, source-destination-port, l3-protocol, l2-
protocol, flow-label
Configuration config
Mode
History 3.1.1400
Notes • As of 3.8.2100, the default value of port-channel load-balance has been changed from
"source-destination-mac" to "source-destination-mac, source-destination-ip, source-
destination-port, l3-protocol, l2-protocol, flow-label". This occurs only upon fresh
installations or after "reset factory". Upgrading users will retain the old load
balancing value and show running-config will indicate this.
• Several load balance methods can be configured (refer to the example)
• "ingress-port" and "symmetric" cannot both be set at the same time. The command
will be rejected under the following conditions:
• 1) "ingress-port" and "symmetric" both appear in the same command.
• 2) "ingress-port" is requested while "symmetric" is in force from a previous
command. It needs to be cancelled first with "no port-channel load-balance
ethernet symmetric".
• 3)"symmetric" is requested BY ITSELF while "ingress-port" is in force from a
previous command. If "symmetric" is part of a larger list that does not include
"ingress-port", the meaning is to exclude "ingress-port" and the command will
be accepted.
• When symmetric is set without other methods: only symmetric hashing can be set
while other methods remain unchanged
• When symmetric is set together with other methods: symmetric hashing is set in
parallel with other methods
• When other methods are set without symmetric: other methods are set, while
symmetric hashing remains unchanged
644
channel-group
channel-group <1-4096> [mode {on | active | passive}]
no channel-group
Assigns and configures a physical interface to a LAG.
The no form of the command removes a physical interface from the
port-channel.
Default N/A
History 3.1.1400
645
lacp-individual enable
lacp-individual enable [force]
no lacp-individual enable [force]
Configures the LAG to act with LACP-individual capabilities.
The no form of the command disables the LACP-individual capability.
Default N/A
History 3.4.1100
Related Commands
ip address dhcp
ip address dhcp
no ip address dhcp
Enables DHCP on this LAG interface.
The no form of the command disables DHCP on this LAG interface.
Default Disabled
History 3.4.2008
646
Related Commands interface port-channel
show interface port-channel
Notes
Default N/A
History 3.1.1400
Notes
647
Syntax inf Interface number (e.g. “1/1”)
Description
Default N/A
History 3.1.1400
Example
switch (config) # show lacp interfaces ethernet 1/1
Port: 1/1
Port State: Down
Channel Group: 1
Pseudo port-channel: Po1
LACP port-priority: 32768
LACP Rate: Slow
LACP Activity: Active
LACP Timeout: Short
Aggregation State: Aggregation, Defaulted,
-------------------------------------------------------------
LACP Port Admin Oper Port Port
Port State Priority Key Key Number State
-------------------------------------------------------------
1/1 Down 32768 13826 13826 0x1 0x0
Related
Commands
Notes
Syntax N/A
Description
Default N/A
648
History 3.1.1400
Example
switch (config) # show lacp interfaces neighbor
Flags:
A - Device is in Active mode
P - Device is in Passive mode
Port 1/4
----------
Partner System ID : 00:00:00:00:00:00
Flags : A
LACP Partner Port Priority : 0
LACP Partner Oper Key : 0
LACP Partner Port State : 0x0
Port 1/49
----------
Partner System ID : 00:02:c9:fa:c4:c0
Flags : A
LACP Partner Port Priority : 255
LACP Partner Oper Key : 33
LACP Partner Port State : 0xbc
Port 1/51
----------
Partner System ID : f4:52:14:10:d8:f1
Flags : A
LACP Partner Port Priority : 255
LACP Partner Oper Key : 33
LACP Partner Port State : 0xbc
Related
Commands
Notes
649
show lacp
show lacp
Displays the LACP global parameters.
Default N/A
History 3.4.0000
Related Commands
Notes
Default N/A
History 3.4.0000
Related Commands
Notes
650
show interfaces port-channel
show interfaces port-channel <port-channel>
Displays LAG configuration properties.
Default N/A
History 3.3.4000
Example
651
switch (config) # show interfaces port-channel 1
Po1:
Admin state : Enabled
Operational state : Down
Description : N/A
Mac address : 24:8A:07:83:30:C8
MTU : 1500 bytes (Maximum packet size 1522 bytes)
lacp-individual mode: Disabled
Flow-control : receive off send off
Actual speed : N/A
Width reduction mode: Not supported
DHCP client : Disabled
Autoconfig : Disabled
IPv4 address:
192.168.100.254/24 [primary]
192.168.110.254/24
Broadcast address:
192.168.100.255 [primary]
192.168.110.255
IPv6 address:
6000::1/64 [primary]
7000::1/64
Rx:
0 packets
0 unicast packets
0 multicast packets
0 broadcast packets
0 bytes
0 discard packets
0 error packets
0 fcs errors
0 undersize packets
0 oversize packets
0 pause packets
0 unknown control opcode
0 symbol errors
Tx:
0 packets
0 unicast packets
0 multicast packets
0 broadcast packets
0 bytes
0 discard packets
0 error packets
0 hoq discard packets
Related
Commands
Notes
652
show interfaces port-channel counters
show interfaces port-channel <port-channel> counters
Displays the extended counters for the interface.
Default N/A
History 3.6.1002
Rx
0 packets
0 unicast packets
0 multicast packets
0 broadcast packets
0 bytes
0 packets of 64 bytes
0 packets of 65-127 bytes
0 packets of 128-255 bytes
0 packets of 256-511 bytes
0 packets of 512-1023 bytes
0 packets of 1024-1518 bytes
0 packets Jumbo
0 error packets
0 discard packets
0 fcs errors
0 undersize packets
0 oversize packets
0 pause packets
0 unknown control opcode
0 symbol errors
Tx
1000000 packets
0 unicast packets
1000000 multicast packets
0 broadcast packets
1505000000 bytes
1000000 error packets
0 discard packets
0 pause packets
Related Commands
Notes
653
show interfaces port-channel compatibility-parameters
show interfaces port-channel compatibility-parameters
Displays LAG parameters.
Default N/A
History 3.3.4000
Compatibility-parameters:
* Port-mode
* Speed
* MTU
* Forwarding mode
* Flow Control
* Access VLAN
* Allowed VLAN list
* Flowcontrol & PFC
* Channel-group mode
* QoS parameters
* MAC learning disable
Related Commands
Notes
654
Syntax Description N/A
Default N/A
History 3.3.4000
source-destination-mac
Notes
Syntax N/A
Description
Default N/A
History 3.1.1400
Example
switch (config) # show interfaces port-channel summary
Flags: D - Down, U - Up, P - Up in port-channel (members)
S - Suspend in port-channel (members), I - Individual
-----------------------------------------------------------------------
Group Port- Type Member Ports
Channel
-----------------------------------------------------------------------
1 Po2(U) LACP Eth1/58(D) Eth1/59(I) Eth1/60(S)
2 Po5(D) LACP Eth1/1(S) Eth1/33(I)
3 Po10(U) LACP Eth1/49(P) Eth1/50(P) Eth1/51(S) Eth1/52(S)
Related
Commands
Notes
655
Link Layer Discovery Protocol (LLDP)
The Link Layer Discovery Protocol (LLDP) is a vendor-neutral Link Layer protocol in the Internet
Protocol Suite used by network devices for advertising their identity, capabilities, and neighbors on
a IEEE 802 LAN. The protocol is formally defined in IEEE 802.1AB. From version 3.8.2000, LLDP is
now enabled by default.
Configuring LLDP
1. Enable LLDP globally on the switch. Run:
DCBX
Data Center Bridging (DCB) is an enabler for running the Ethernet network with lossless connectivity
using priority-based flow control and enhanced transmission selection. DCBX (exchange)
complements the DCB implementation by offering a dynamic protocol that communicates DCB
attributes between peering endpoint. Mellanox Onyx™ supports two versions of DCBX TLVs running
on top of LLDP:
• DCBX IEEE
• DCBX CEE
By default DCBX IEEE is enabled when LLDP is enabled. LLDP is enabled by default.
656
Additional Reading and Use Cases
For more information about this feature and its potential applications, please refer to the following
Mellanox Community posts:
LLDP Commands
lldp
lldp
no lldp
Enables LLDP globally.
The no form of the command disables the LLDP.
Syntax N/A
Description
Default Enabled
Configuration config
Mode
History 3.2.0300
Notes
lldp reinit
lldp reinit <seconds>
no lldp reinit
Sets the delay in seconds from enabling the LLDP on the port until re-initialization will be
attempted.
The no form of the command sets the parameter to default.
657
Syntax seconds 1-10
Description
Default 2
Configuration config
Mode
History 3.2.0300
Notes
lldp timer
lldp timer <seconds>
no lldp timer
Sets the LLDP interval at which LLDP frames are transmitted.
(lldpMessageTxInterval).
The no form of the command sets the parameter to default.
Default 30
History 3.2.0300
Notes
658
lldp tx-delay
lldp tx-delay <seconds>
no lldp tx-delay
Indicates the delay in seconds between successive LLDP
frame transmissions.
The no form of the command sets the parameter to default.
Default 2
History 3.2.0300
lldp tx-hold-multiplier
lldp tx-hold-multiplier <seconds>
no lldp tx-hold-multiplier
The time-to-live value expressed as a multiple of the lldpMessageTxInterval object.
The no form of the command sets the parameter to default.
Default 2
Configuration config
Mode
History 3.2.0300
659
Notes The actual time-to-live value used in LLDP frames, can be expressed by the following
formula: TTL = min(65535, (lldpMessageTxInterval * lldpMessageTxHoldMultiplier)). For
example, if the value of lldpMessageTxInterval is 30, and the value of
lldpMessageTxHoldMultiplier is 4, then the value 120 is encoded in the TTL field in the
LLDP header.
lldp (interface)
lldp {receive | transmit}
no lldp {receive | transmit}
Enables LLDP receive or transmit capabilities.
The no form of the command disables LLDP receive or transmit
capabilities.
History 3.2.0300
lldp tlv-select
lldp tlv-select {[dcbx] [dcbx-cee] [port-description] [sys-name] [sys-
description] [sys-capababilities] [management-address] [none] all}
Sets the LLDP basic TLVs to be transmitted on this port.
660
Syntax Description dcbx Enables LLDP-DCBX TLVs
Default all
History 3.2.0300
lldp med-tlv-select
lldp med-tlv-select {all | media-capability | network-policy |
none}
Configures LLDP media TLV attributes.
661
media- Enables Media Capabilities TLV
capabilities
Default Disabled
History 3.6.1002
Notes
dcb application-priority
dcb application-priority <selector> <protocol> <priority>
History 3.3.4200
Notes
662
clear lldp counters
clear lldp counters [ <Device | Port>]
Clears LLDP counters for all ports or for a specific port.
Default N/A
History 3.6.4006
Related Commands
Notes
Default N/A
History 3.2.0300
Related Commands
Notes
663
show lldp interfaces
show lldp interfaces [ethernet <inf> [med-cap | remote]]
Displays LLDP remote interface table information.
Default N/A
History 3.2.0300
Example
switch (config)# show lldp interfaces
TLV flags:
PD: port-description, SN: sys-name, SD: sys-description, SC: sys-capabilities, MA: management-address
ETS-C: ETS-Configuration, ETS-R: ETS-Recommendation, AP: Application Priority, PFC: Priority Flow Control
CEE: Converged Enhanced Ethernet DCBX version
MED-CAP: Media Capabilities
MED-NWP: MED-Network Policy
Interface Receive Transmit TLVs
-----------------------------------------------------------------------------------------
Eth1/1 Enabled Enabled PD, SD
Eth1/2 Enabled Enabled PD, SN, SD, SC, MA, PFC, AP, ETS-C, ETS-R
Eth1/3 Disabled Disabled PD, SN, SD, SC, MA, PFC, AP, ETS-C, ETS-R, MED-NWP
Eth1/4 Enabled Enabled PD, SN, SD, SC, MA, PFC, AP, ETS-C, ETS-R, MED-CAP, MED-NWP
Eth1/5 Enabled Enabled PD, SN, SD, SC, MA, PFC, AP, ETS-C, ETS-R
Eth1/6 Enabled Enabled PD, SN, SD, SC, MA, PFC, AP, ETS-C, ETS-R
Eth1/7 Enabled Enabled PD, SN, SD, SC, MA, PFC, AP, ETS-C, ETS-R
Related
Commands
Notes
664
show lldp remote
show lldp remote
Displays LLDP remote information (remote device id, remote port id, remote system
name).
Syntax N/A
Description
Default N/A
History 3.6.3004
Example
switch (config)# show lldp remote
------------------------------------------------------------------------------
Local Interface Device ID Port ID System Name
------------------------------------------------------------------------------
Eth1/4 e4:1d:2d:a5:f3:35 e4:1d:2d:a5:f3:35 Not Advertised
Eth1/10 e4:1d:2d:44:65:00 Eth1/10 switch108
Eth1/11 e4:1d:2d:44:65:00 Eth1/11 switch108
Eth1/12 e4:1d:2d:44:65:00 Eth1/12 switch108
Eth1/13 e4:1d:2d:44:65:00 Eth1/13 switch108
Eth1/14 e4:1d:2d:44:65:00 Eth1/14 switch108
Eth1/15 e4:1d:2d:44:65:00 Eth1/15 switch108
Eth1/16 e4:1d:2d:44:65:00 Eth1/16 switch108
Eth1/17 e4:1d:2d:44:65:00 Eth1/17 switch108
Eth1/18 e4:1d:2d:44:65:00 Eth1/18 switch108
Eth1/19 e4:1d:2d:44:65:00 Eth1/19 switch108
Eth1/20 e4:1d:2d:44:65:00 Eth1/20 switch108
Eth1/21 e4:1d:2d:44:65:00 Eth1/21 switch108
Eth1/22 e4:1d:2d:44:65:00 Eth1/22 switch108
Eth1/23 e4:1d:2d:44:65:00 Eth1/23 switch108
Eth1/24 e4:1d:2d:44:65:00 Eth1/24 switch108
Eth1/25 e4:1d:2d:44:65:00 Eth1/25 switch108
Eth1/26 e4:1d:2d:44:65:00 Eth1/26 switch108
Eth1/31 e4:1d:2d:44:65:00 Eth1/31 switch108
Eth1/32 e4:1d:2d:44:65:00 Eth1/32 switch108
Related
Commands
Notes
665
show lldp statistics
show lldp statistics [ <inf>]
Displays LLDP interface statistics.
Syntax N/A
Description
Default N/A
History 3.2.0300
Example
switch (config)# show lldp statistics
----------------------------------------------------------------------------------------------------------
Interface Frames In In TLVs TLVs Ageout Out
Discarded Errors Total Discarded Unrecognized Frames
----------------------------------------------------------------------------------------------------------
Eth1/1 0 0 0 0 0 0 0
Eth1/2 0 0 20 0 40 0 5
Eth1/3 16 0 16 0 0 0 0
Eth1/4 0 0 15 0 30 0 5
Eth1/5 0 0 15 0 30 0 5
Eth1/6 0 0 0 0 0 0 0
Eth1/7 0 0 0 0 0 0 0
Eth1/8 0 0 0 0 0 0 0
Eth1/9 0 0 0 0 0 0 0
Eth1/10 0 0 5 0 15 0 5
Eth1/12 0 0 5 0 15 0 5
Eth1/13 0 0 5 0 15 0 5
Eth1/14 0 0 0 0 0 0 0
Eth1/15 0 0 6 0 18 0 5
Eth1/16 0 0 5 0 15 0 6
Related
Commands
Notes
666
Syntax Description N/A
Default N/A
History 3.2.0300
Related Commands
Notes
Default N/A
History 3.2.0300
Related Commands
Notes
667
show dcb application-priority
show dcb application-priority
Displays application priority admin table.
Default N/A
History 3.3.4200
Related Commands
Notes
VLANs
A Virtual Local Area Network (VLAN) is an L2 segment of the network which defines a broadcast
domain and is identified by a tag added to all Ethernet frames running within the domain. This tag is
called a VLAN ID (VID) and can be assigned a value of 1-4094.
• Access – access port is a port connected to a host. It can accept only untagged frames, and
assigns them a default configured VLAN (Port VLAN ID). On egress, traffic sent from the
access port is untagged.
• Access-dcb – receives ingress untagged traffic but sends egress priority tag (VLAN ID = 0)
• Hybrid – hybrid port is a port connected to either switches or hosts. It can receive both
tagged and untagged frames and assigns untagged frames a default configured VLAN (Port
VLAN ID). It receives tagged frames with VLANs of which the port is a member (these VLANs’
names are allowed). On egress, traffic of allowed VLANs sent from the Hybrid port is sent
tagged, while traffic sent with PVID is untagged.
• Trunk – trunk port is a port connecting 2 switches. It accepts only tagged frames with VLANs
of which the port is a member. On egress, traffic sent from the Trunk port is tagged. By
default, a Trunk port is, automatically, a member on all current VLANs.
668
2. Change back to config mode. Run:
4. From within the interface context, configure the interface mode to Access. Run:
5. From within the interface context, configure the Access VLAN membership. Run:
4. From within the interface context, configure the interface mode to Access. Run:
5. From within the interface context, configure the Access VLAN membership. Run:
669
3. Enter the interface configuration mode. Run:
4. From within the interface context, configure the interface mode to Trunk. Run:
4. From within the interface context, configure the interface mode to Hybrid. Run:
5. From within the interface context, configure the allowed VLAN membership. Run:
VLAN Commands
vlan
vlan {<vlan-id> | <vlan-range>}
no vlan {<vlan-id> | <vlan-range>}
Creates a VLAN or range of VLANs, and enters a VLAN context.
The no form of the command deletes the VLAN or VLAN range.
670
Syntax Description vlan-id Range: 1-4094
History 3.1.1400
name
name <vlan-name>
no name
Adds VLAN name.
The no form of the command deletes the VLAN name.
History 3.1.1400
671
show vlan
show vlan [id <vlan-id>]
Displays the VLAN table.
Default N/A
History 3.1.1400
Notes
switchport mode
switchport mode {access | dot1q-tunnel | trunk | hybrid | access-dcb}
no switchport mode
Sets the switch port mode.
The no form of the command sets the switch port mode to access.
Syntax Description access Untagged port. 802.1q tagged traffic are filtered.
Egress traffic is untagged.
Default access
672
Configuration Mode config interface ethernet
config interface port-channel
config interface mlag-port-channel
History 3.1.1400
Default pipe
History 3.4.3000
Role admin
673
Related Commands show vlan
show interfaces switchport
switchport access vlan
switchport [trunk | hybrid] allowed-vlan
vlan
Notes
switchport access
switchport access vlan <vlan-id>
no switchport access vlan
switchport access none (hybrid mode only)
Configures the port access VLAN.
The no form of the command sets the port access VLAN to 1.
The none clause of the command removes access vlan
membership from the port, thus disallowing untagged traffic
on this port. This is commonly used for fast transaction from
hybrid switchport to trunk-like switchport and vice versa.
Default 1
History 3.1.1400
674
Related Commands show vlan
show interfaces switchport
switchport mode
switchport [trunk | hybrid] allowed-vlan
vlan
Default N/A
History 3.1.1400
675
Related Commands show vlan
show interfaces switchport
switchport access vlan
switchport mode
vlan
switchport voice
switchport voice vlan <vlan-id>
no switchport voice vlan
Configures voice VLAN for the interface.
The no form of the command disables voice VLAN.
Default Disabled
History 3.6.1002
Note
676
show interfaces switchport
show interfaces [<if>] switchport
Displays all interface switch port configurations.
History 3.1.1400
Example
switch (config) # show interfaces switchport
-------------------------------------------------------------------
Interface Mode Access vlan Allowed vlans
-------------------------------------------------------------------
Eth1/1 access 1
Eth1/2 access 1
Eth1/6 access 1
Notes This command can accept an explicit interface or interface range (displays information
only for available interfaces)
Voice VLAN
Voice VLAN allows configuring a port to provide QoS to voice and data traffic in a scenario where a
terminal is connected to an IP phone which is in turn connected to the port on the switch. The IP
phone bridges the data traffic from the terminal into the switch port. Any voice traffic from the IP
phone is also sent to the same port with no differentiation. Therefore it is in the administrator’s
interest to provide different QoS to the voice traffic and the data traffic by placing the voice traffic
on a different VLAN from the data traffic.
This can be achieved by configuring a voice VLAN on the desired switch port using LLDP-MED TLVs.
Media Endpoint Discovery (MED) TLVs allow the switch to apply certain policies by informing the
remote media device to configure itself using different TLV.
In this use-case scenario we employ the use of the network policy TLV, which is defined as per TIA-
TR41. The network policy TLV can be used to inform a specific VLAN to use for an application
stream.
677
The OS allows the user to configure the VLAN for voice traffic. In the following figure, the user
configures a voice VLAN of 25 and the switch port has a PVID of 50. Therefore all the voice traffic is
switched onto VLAN 25 and the untagged packets from the terminal are switched into VLAN 50.
678
switch (config) # show lldp interface
TLV flags:
PD: port-description, SN: sys-name, SD: sys-description, SC: sys-capabilities, MA: management-address
ETS-C: ETS-Configuration, ETS-R: ETS-Recommendation, AP: Application Priority, PFC: Priority Flow Control
CEE: Converged Enhanced Ethernet DCBX version
MED-CAP: Media Capabilities
MED-NWP: MED-Network Policy
Interface Receive Transmit TLVs
-----------------------------------------------------------------------------------------
Eth1/1 Enabled Enabled PD, SD
Eth1/2 Enabled Enabled PD, SN, SD, SC, MA, PFC, AP, ETS-C, ETS-R
Eth1/3 Disabled Disabled PD, SN, SD, SC, MA, PFC, AP, ETS-C, ETS-R, MED-NWP
Eth1/4 Enabled Enabled PD, SN, SD, SC, MA, PFC, AP, ETS-C, ETS-R, MED-CAP, MED-NWP
Eth1/5 Enabled Enabled PD, SN, SD, SC, MA, PFC, AP, ETS-C, ETS-R
Eth1/6 Enabled Enabled PD, SN, SD, SC, MA, PFC, AP, ETS-C, ETS-R
...
switch (config) # show lldp interface ethernet 1/4
TLV flags:
PD: port-description, SN: sys-name, SD: sys-description, SC: sys-capabilities, MA: management-address
ETS-C: ETS-Configuration, ETS-R: ETS-Recommendation, AP: Application Priority, PFC: Priority Flow Control
CEE: Converged Enhanced Ethernet DCBX version
MED-CAP: Media Capabilities
MED-NWP: MED-Network Policy
Interface Receive Transmit TLVs
-----------------------------------------------------------------------------------------
Eth1/4 Enabled Enabled PD, SN, SD, SC, MA, PFC, AP, ETS-C, ETS-R, MED-CAP, MED-NWP.
switch (config) # show lldp interface ethernet 1/4 med-cap
Media Capabilities:
LLDP-MED Capab : Yes
Network Policy : Yes
Location Id : No
Ext Power MDI-PSE: No
Ext Power MDI-PD : No
Network Policy:
Application Type : 1 (Voice)
VLAN Id : 11
L2 Priority : 0
DSCP Value : 0
4. (Optional) Change the PVID of the port so that untagged packets go to a different VLAN than
the default. Run:
679
switch (config)# show interface switchport
Interface Mode Access vlan Allowed vlans
---------------------------------------------------------------------------------
Eth1/1 access 1
Eth1/2 access 1
Eth1/3 access 1
Eth1/4 hybrid 300 200
Eth1/5 access 1
...
switch (config)# show lldp interface ethernet 1/4
TLV flags:
PD: port-description, SN: sys-name, SD: sys-description, SC: sys-capabilities, MA: management-address
ETS-C: ETS-Configuration, ETS-R: ETS-Recommendation, AP: Application Priority, PFC: Priority Flow Control
CEE: Converged Enhanced Ethernet DCBX version
MED-CAP: Media Capabilities
MED-NWP: MED-Network Policy
Interface Receive Transmit TLVs
----------------------------------------------------------------------------------------
Eth1/4 Enabled Enabled PD, SN, SD, SC, MA, PFC, AP, ETS-C, ETS-R, MED-CAP, MED-NWP
switch (config)# show lldp interface ethernet 1/4 med-cap
Media Capabilities:
LLDP-MED Capab : Yes
Network Policy : Yes
Location Id : No
Ext Power MDI-PSE: No
Ext Power MDI-PD : No
Network Policy:
Application Type : 1 (Voice)
VLAN Id : 200
L2 Priority : 0
DSCP Value : 0
Limitations
1. LLDP MED cannot be enabled on a router port interface and vice versa (i.e. a port that has
LLDP MED enabled cannot be configured as a router port interface).
2. LLDP MED cannot be enabled on a LAG and vice versa (i.e. a port that has LLDP MED enabled
cannot be configured as a LAG).
3. If switchport is in trunk, dot1q-tunnel, or dcbx-access, configuring either the TLV or Voice
VLAN gives a warning message.
RSTP enhancements is a set of functions added to increase the volume of RSTP in Mellanox switches.
It adds a set of capabilities related to the behavior of ports in different segments of the network.
For example: the required behavior of a port connected to a non-switch entity, such as host, is to
converge quickly, while the required behavior of a port connected to a switch entity is to converge
based on the RSTP parameters.
680
Additionally, it adds security issues on a port and switch basis, allowing the operator to determine
the state and role of a port or the entire switch should an abnormal event occur. For example: If a
port is configured to be root-guard, the operator will not allow it to become a root-port under any
circumstances, regardless of any BPDU that will have been received on the port.
Port Type
Port type has the following configuration options:
It is recommended to configure the port type for all ports connected to hosts as edge
ports.
Port type is configured using the command spanning-tree port type. It may be applied globally on
the switch (Config) level, which configures all switch interfaces. Another option is to configure ports
individually by entering the interface’s configuration mode.
• Global configuration:
• Interface configuration:
switch (config interface ethernet <inf>)# spanning-tree port type {edge , normal, network}
For more information about this feature and its potential applications, please refer to the following
Mellanox Community post:
681
BPDU Filter
Using BPDU filter prevents the CPU from sending/receiving BPDUs on specific ports.
BPDU filtering is configured per interface. When configured, the port does not send any BPDUs and
drops all BPDUs that it receives. To configure BPDU filter, use the following command:
BPDU Guard
BPDU guard is a security feature which, when enabled, will move the port to "down (suspended)"
mode in case it receives BPDU packets. This feature becomes useful when connecting to an
unauthorized switch.
Loop Guard
Loop guard is a feature that prevents loops in the network.
When a blocking port in a redundant topology transitions to the forwarding state (accidentally), an
STP loop occurs. This happens when BPDUs are no longer received by one of the ports in a physically
redundant topology.
Loop guard is useful in switched networks where devices are connected point-to-point. A designated
bridge cannot disappear unless it sends an inferior BPDU or brings the link down on a point-to-point
connection.
The loop guard configuration is only allowed on “network” and “normal” port types.
If loop guard is enabled and the port does not receive BPDUs, the port is put into an inconsistent
state (blocking) until the port starts to receive BPDUs again. A port in the inconsistent state does
not transmit BPDUs. If BPDUs are received again, loop guard alters its inconsistent state condition.
STP converges to a stable topology without the failed link or bridge after loop guard isolates the
failure.
682
switch (config interface ethernet <inf>)# spanning-tree guard loop
Root Guard
Configuring root guard on a port prevents that port from becoming a root port. A port put in root-
inconsistent (blocked) state if an STP convergence is triggered by a BPDU that makes that port a
root port. The port is unblocked after the port stops sending BPDUs.
MSTP
Spanning Tree Protocol (STP) is a mandatory protocol to run on L2 Ethernet networks to eliminate
network loops and the resulting broadcast storm caused by these loops. Multiple STP (MSTP) enables
the virtualization of the L2 domain into several VLANs, each governed by a separate instance of a
spanning tree which results in a network with higher utilization of physical links while still keeping
the loop free topology on a logical level.
RPVST
Rapid Per-VLAN Spanning Tree (RPVST) flavor of the STP provides finer-grained traffic by paving a
spanning-tree instance per each configured VLAN. Like MSTP, it allows a better utilization of the
network links comparing to RSTP.
The following figure exhibits a typical RPVST network configuration to get a better utilization on the
inter-switch trunk ports.
683
RPVST and VLAN Limitations
When the STP of the switch is set to RPVST, spanning tree is set on each of the configured VLANs in
the system by default. To enable the spanning tree mode, the command “spanning-tree” must be
run.
Each VLAN runs an STP state machine and an RPVST instance. There is a global limitation on the
number of active state machines that can operate inMellanox Onyx. Enforcement of this limitation is
done through the maximum number of VLANs allowed in the system (128).
The state machine takes attributes like forward time, hello time, max age and priority, etc.
When configuring priority on a VLAN in RPVST, the operational priority given to the VLAN is
a summation of what the user configured and the value of the VLAN itself. For example,
running “spanning-tree vlan 10 priority 32768” yields a priority of 32778 for VLAN 10.
RPVST domains can be interconnected by a standard 802.1Q domain that runs RSTP protocol. While
the RSTP domain builds a single common instance spanning tree, the RPVST domains at the edge
continue to build a tree per VLAN while exchanging tagged RPVST multicast BPDUs.
(This exchange may happen on untagged RPVST BPDUs as well.) The switch devices that are in the
boundary between the RPVST and the RSTP domains should be configured as RPVST mode.
When set to RPVST mode, the switch continues to run the common instance spanning tree (CIST)
state machine on VLAN 1 by exchanging IEEE BPDUs with the legacy RSTP switches.
To successfully connect RSTP and RPVST domains, the system administrator must align the native
VLAN configuration across all network switches, or in other words, the internal identification of
untagged packets to VLAN.
684
STP Commands
spanning-tree
spanning-tree
no spanning-tree
Globally enables spanning tree.
The no form disables spanning tree.
History 3.1.0000
spanning-tree mode
spanning-tree mode {mst | rst | rpvst}
no spanning-tree mode
Changes spanning tree mode.
The no form of the command sets the parameter to its default
value.
685
spanning-tree (timers)
spanning-tree [forward-time <time in secs> | hello-time <time in secs> |
max-age <time in secs>]
no spanning-tree [forward-time | hello-time | max-age | priority]
Configures spanning tree timers.
The no form of the command sets the timer to default.
Syntax Description forward-time Controls how fast a port changes its spanning
tree state from Blocking state to Forwarding
state
Parameter range: 4-30 seconds
History 3.1.0000
686
spanning-tree port type (default global)
spanning-tree port type {edge [bpdufilter | bpduguard] | network
[bpduguard] | normal [bpduguard]} default
no spanning-tree port type default
Configures all switch interfaces as edge/network/normal ports. These
ports can be connected to any type of device.
The no form of the command disables the spanning tree operation.
Default normal
History 3.1.0000
spanning-tree priority
spanning-tree priority <bridge-priority>
no spanning-tree priority
Sets the spanning tree bridge priority.
The no form of the command sets the bridge priority to default.
687
Syntax Description bridge-priority Sets the bridge priority for the spanning tree
Value must be in increments of 4096, starting from
0 (accepted values: 0, 4096, 8192, 12288, 16384,
20480, 24576, 28672, 32768, 36864, 40960, 45056,
49152, 53248, 57344, 61440)
Default 32786
History 3.1.0000
spanning-tree port-priority
spanning-tree port-priority <priority>
no spanning-tree port-priority
Configures the spanning-tree interface priority.
The no form of the command returns configuration to its default.
Default 128
History 3.1.0000
688
spanning-tree cost
spanning-tree cost <port cost>
no spanning-tree cost
Configures the interface cost of the spanning tree.
The no form of the command returns configuration to its default.
Syntax Description port cost Sets the spanning tree cost of an interface
Range: 0-200000000
History 3.1.0000
689
edge Assumes all ports are connected to hosts/
servers
History 3.1.0000
Example switch (config interface ethernet 1/1) # spanning-tree port type edge
spanning-tree guard
spanning-tree guard {loop | root}
no spanning-tree guard {loop | root}
Configures spanning-tree guard.
The no form of the command returns configuration to default.
690
Configuration Mode config interface ethernet
config interface port-channel
config interface mlag-port-channel
History 3.1.0000
spanning-tree bpdufilter
spanning-tree bpdufilter {disable | enable}
no spanning-tree bpdufilter
Configures spanning-tree BPDU filter on the interface. The interface
will ignore any BPDU that it receives and will not send PDBUs, The STP
state on the port will move to the forwarding state.
The no form of the command returns the configuration to default.
History 3.1.0000
Notes This command can be used when the switch is connected to hosts
691
clear spanning-tree counters
clear spanning-tree counters
Clears the spanning-tree counters.
692
spanning-tree mst priority
spanning-tree mst <mst-instance> priority <priority>
no spanning-tree mst <mst-instance> priority
Configures the specified instance’s priority number.
The no form of the command sets the parameter to its default value.
693
Configuration Mode config
History 3.3.4150
Example switch (config) # spanning-tree mst 1 vlan 10-20
694
Configuration Mode config
History 3.3.4150
Example switch (config)# spanning-tree mst name mymst
695
spanning-tree mst port-priority
spanning-tree mst <mst-instance> port-priority <priority>
no spanning-tree mode
Changes the spanning tree mode.
The no form of the command sets the parameter to its default value.
Default rst
Configuration Mode config interface ethernet
config interface port-channel
History 3.3.4150
Example switch (config interface ethernet 1/1)# spanning-tree mst 1 port-
priority 32768
696
History 3.3.4150
Example switch (config interface ethernet 1/1)# spanning-tree mst 1 cost
4000
Default 15 seconds
History 3.4.1100
697
Syntax Description vid VLAN ID
History 3.4.1100
Default 20 seconds
History 3.4.1100
698
spanning-tree vlan priority
spanning-tree vlan <vid> priority <priority>
no spanning-tree vlan <vid> priority
Configures RPVST instance port priority.
The no form of the command resets the parameter
value to its default.
History 3.4.1100
show spanning-tree
show spanning-tree
Displays spanning tree information.
Syntax N/A
Description
Default N/A
Configuration Any command mode
Mode
History 3.1.0000
3.4.1100 Updated Example with R and G flags
3.6.6000 Updated Example
3.6.6102 Added note on MLAG spanning-tree cost
699
Example
switch (config) # show spanning-tree
Switch : ethernet-default
Spanning tree protocol rst : enabled
Spanning tree force version: 2
Root ID:
Priority: 32768
Address : 7c:fe:90:ff:2c:40
Bridge ID:
Priority : 32768
Address : 7c:fe:90:ff:2c:40
Hello Time (sec) : 2
Max Age (sec) : 20
Forward Delay (sec): 15
L: Loop Inconsistent
R: Root Inconsistent
G: BPDU Guard Inconsistent
-----------------------------------------------------------------------
Interface Role Sts Cost Prio Type
-----------------------------------------------------------------------
Eth1/7 Designated Discarding 200 128 normal
Eth1/8 Disabled Discarding(G) 200 128 edge
Notes • MLAG spanning-tree cost is always equal to the cost of there being 2 member ports
in the MLAG (even if one of the member ports fails or a new port is added)
• If a port is in BPDU Guard inconsistent mode, the interface status will move to
"down (suspended)".
700
History 3.1.0000
3.6.4110 Updated Example
3.6.5000 Updated Example
Example
Notes
Default N/A
History 3.3.4150
701
show spanning-tree mst
show spanning-tree mst [details | <instance> interface {ethernet <slot>/<port> | port-
channel <port-channel> | mlag-port-channel <mlag-port-channel>}]
Displays basic multi-spanning-tree information.
Default N/A
History 3.3.4150
Example
switch (config) # switch (config) # show spanning-tree mst
MST0:
vlans mapped: 1-1023,1025-2047,2049-3071,3073-4094
L: Loop Inconsistent
R: Root Inconsistent
G: BPDU Guard Inconsistent
-----------------------------------------------------------------------
Interface Role Sts Cost Prio Type
-----------------------------------------------------------------------
Eth1/7 Designated Discarding 200 128.7 normal
Eth1/8 Disabled Discarding(G) 200 128.8 edge
702
show spanning-tree root
show spanning-tree root
Displays root multi-spanning-tree information.
Syntax N/A
Description
Default N/A
History 3.3.4150
Example
switch (config) # show spanning-tree root
Instance Priority MAC addr Root Cost Hello Time Max Age FWD Dly Root Port
------- ------ -------- --------- ---------- -------- ------- ---------
MST0 32768 00:02:c9:71:ed:40 500 2 20 15 Eth1/20
MST1 32768 00:02:c9:71:f0:c0 0 2 20 15 -
MST2 0 00:02:c9:71:f0:c0 0 2 20 15 -
MST3 32768 00:02:c9:71:f0:c0 0 2 20 15 -
703
Default N/A
History 3.4.1100
Example
switch (config) # show spanning-tree vlan 1 detail
Switch ethernet-default
Spanning tree protocol is enabled
Bridge is executing the rpvst compatible Spanning Tree Protocol
Vlan 1:
Bridge Identifier priority: 32769
Bridge Identifier address: e4:1d:2d:3d:5e:c0
Configured hello time: 2, max age 20, forward delay 15
Current root: priority 32769, address e4:1d:2d:3d:5e:c0
Number of topology changes: 0, last change occurred 00:00:00 ago
Last TCN received from: N/A
Timers: hold 6 hello 2, max age 20, forward delay 15
Default port type: normal
Default bpdu filter: disabled
Default bpdu guard: disabled
Default N/A
History 3.6.4110
704
Example switch (config) # show spanning-tree vlan 50 topo-change-
history
Vlan 50
-------------------------------------
Interface Date Time
-------------------------------------
Eth1/49 07/18/17 04:39:58
Eth1/49 07/18/17 04:39:55
Eth1/49 07/18/17 04:38:11
Eth1/49 07/18/17 04:38:09
Default N/A
History 3.6.4110
Instance 5
-------------------------------------
Interface Date Time
-------------------------------------
Eth1/49 07/18/17 04:43:51
Eth1/49 07/18/17 04:43:33
705
show spanning-tree topo-change-history
show spanning-tree topo-change-history
Displays spanning-tree topology change notification history.
Default N/A
History 3.6.4110
-------------------------------------
Interface Date Time
-------------------------------------
Eth1/49 07/27/17 09:39:38
Eth1/35 07/27/17 09:35:42
Eth1/35 07/27/17 09:35:40
Eth1/35 07/27/17 09:35:08
Eth1/35 07/27/17 09:35:06
Eth1/35 07/27/17 09:32:05
Eth1/35 07/27/17 09:32:03
Eth1/35 07/27/17 09:31:42
Eth1/35 07/27/17 09:31:40
mac-address-table static unicast <destination mac address> vlan <vlan identifier(1-4094)> interface ethernet
<slot>/<port>
For example:
706
• To prevent denial-of-service attacks
• To manage the available MAC address table space by controlling which interfaces can learn
MAC addresses
• To duplicate to a dedicated server (port7 in the figure below) all the packets that one host
(host1; port1) sends to another (host2; port2), like in port mirroring. To accomplish this, MAC
learning is disabled on port2. In this case the FDB does not obtain the MAC address of host2.
Also, to prevent broadcast to every port, it is possible to configure a VLAN (VLAN 80) which
ports 1, 2 and 7 are member of.
mac-address-table aging-time
mac-address-table aging-time <age>
no mac-address-table aging-time
Sets the maximum age of a dynamically learnt entry in the
MAC address table.
The no form of the command resets the aging time of the MAC
address table to its default.
Default 300
History 3.1.0600
707
Related Commands show mac-address-table
show mac-address-table aging time
Notes
mac-address-table static
mac-address-table static <mac address> vlan <vlan> interface <if-type>
<if-number>
no mac-address-table static <mac address> vlan <vlan> interface <if-
type> <if-number>
Configures a static MAC address in the forwarding database.
The no form of the command deletes a configured static MAC address
from the forwarding database.
History 3.1.0600
Notes The no form of the command will not clear a dynamic MAC address.
Dynamic MAC addresses are cleared using the “clear mac-address-table
dynamic” command.
708
mac-learning disable
mac-learning disable
no mac-learning disable
Disables MAC-address learning.
The no form of the command enables MAC-address learning.
Syntax N/A
Description
Default Enabled
History 3.1.0600
Related
Commands
Notes • When adding a port to a LAG, the port needs to be aligned with the LAG’s
configuration
• When removing a port from a LAG, the port remains in whichever configuration the
LAG is in
• Disabling MAC learning is not supported on a local analyzer port.
• Disabling MAC learning is not supported on an IPL LAG.
Syntax N/A
Descriptio
n
Default N/A
Configurat config
ion Mode
History 3.1.0600
709
Related mac-address-table aging-time
Command mac-address-table static
s show mac-address-table
Notes This command does not clear the MAC addresses learned on the mgmt0 port. Static entries are
deleted using the “no mac-address-table static” command.
show mac-address-table
show mac-address-table [address <mac-address> | <if-number> | vlan
[<vlan> | range <range>] | unicast]
Displays the static and dynamic unicast and multicast MAC addresses for
the switch. Various of filter options available.
Default N/A
History 3.1.0600
Switch ethernet-default
710
Related Commands mac-address-table static
clear mac-address-table
Notes
Default N/A
History 3.1.0600
Notes MAC addresses learned on the mgmt0 is not shown by this command.
Default N/A
History 3.6.4006
711
Example switch (config) # show mac-address-table
---------------------------------------------------
Vlan Mac Address Type Port
---------------------------------------------------
1 E4:1D:2D:37:11:22 Static Eth1/1
1 E4:1D:2D:37:3E:11 Static Po5
Number of unicast: 2
Number of multicast: 0
switch (config) # show mac-address-table interface port-channel 5
---------------------------------------------------
Vlan Mac Address Type Port
---------------------------------------------------
1 E4:1D:2D:37:3E:11 Static Po5
Number of unicast: 1
Number of multicast: 0
Notes
Default N/A
History 3.8.1000
712
show mac-address-table summary
show mac-address-table summary
Displays total number of unicast/multicast MAC address entries.
Default N/A
History 3.6.2002
Notes
MLAG
A link aggregation group (LAG) is used for extending the bandwidth from a single link to multiple
links and provide redundancy in case of link failure. Extending the implementation of the LAG to
more than a single device provides yet another level of redundancy that extends from the link level
to the node level. This extrapolation of the LAG from single to multiple switches is referred to as
multi-chassis link aggregation (MLAG). MLAG is supported on Ethernet blades’ internal as well as
external ports.
713
Each switch configuration is independent and it is user responsibility to make sure to
configure both switches similarly pertaining MLAG (e.g. MLAG port-channel VLAN
membership, static MAC, ACL, etc).
A peered device (host or switch) connecting to switches running an MLAG runs a standard LAG and is
unaware of the fact that the LAG connects to two separate switches.
The MLAG switches share an inter-peer link (IPL) between them for carrying control messages in a
steady state or data packages in failure scenarios. Thus, the bandwidth of the IPL should be defined
accordingly. The IPL itself can be a LAG and may be constructed of links of any supported speed. In
such a case, PFC must be configured on this IPL. The figure in section ”Configuring MLAG” illustrates
this. The IPL serves the following purposes:
• MLAG protocol control – keepalive messages, MAC sync, MLAG port sync, etc.
• MLAG port failure – serves redundancy in case of a fallen link on one of the MLAG switches
• Layer-3 failure – serves redundancy in case of a failed connection between the MLAG switches
and the rest of the L3 network should there be one
The IPL VLAN interface must be used only for MLAG protocol and must not be used by any
other interfaces (e.g. LAG, Ethernet).
Ports 21 and 22 are dedicated IPL ports for MLAG protocol on the SH2200 switch system.
• Keepalive
714
• Unicast and multicast sync
• MLAG port sync
When positioned at the top of rack (ToR) and connecting with a Layer-3 uplink, the MLAG pair acts
as the L3 border for the hosts connected to it. To allow default gateway redundancy, both MLAG
switches should be addressed by the host via the same default gateway address.
MLAG uses an IP address (VIP) that points to all MLAG member nodes.
When running MLAG as L2/L3 border point, an MAGP VIP must be deployed as the default GW for
MLAG port-channels (MPOs).
When MLAG is connected through a Layer-2 based uplink, there is no need to apply default
gateway redundancy towards hosts since this function is implemented on the L2/L3 border
points of the network. For more information, refer to the “MAGP” page.
The two peer switches need to carry the exact same configuration of the MLAG attributes for
guaranteeing proper functionality of the MLAG.
Ensuring that both switches are configured identically is the responsibility of the user and is
not monitored by the OS.
All nodes in an MLAG must be of the same CPU type (e.g. x86), switch type, and must all
have the same OS version installed.
When working with MLAG, the maximum number of MAC addresses is limited to 88K.
Without it, there is no limitation.
When transitioning from standalone into a group or vice versa, a few seconds are required
for the node state to stabilize. During that time, group feature commands (e.g. MLAG
commands) should not be executed. To run group features, wait for the CLI prompt to turn
into [standalone:master], [<group>:master] or [<group>:standby] instead of
[standalone:*unknown*] or [<group>:*unknown*].
Each MLAG VIP group must be configured with a different unicast IP address. If not, MLAG
behavior is inconsistent.
In a scenario where there is no IP communication between the MGMT ports of the MLAG
switches (for example when one MGMT port is disconnected), the following CLI prompt is
displayed: <hostname>[<mlag cluster name>:unknown]#. This does not reflect the MLAG
state, but only the state of the cluster.
715
It is recommended to configure IPL interface VLAN MTU to 9K.
MLAG master/slave roles take effect in fault scenarios such as split-brain, peer faults, and
during software upgrades.
The MLAG pair of switches periodically exchanges a keepalive message on a user configurable
interval. If the keepalive message fails to arrive for three consecutive intervals the switches break
into two standalone switches. In such a case, the remaining active switch begins to act as a
standalone switch and assumes that its previously peering MLAG switch has failed.
To avoid a scenario where failure on the IPL causes both MLAG peers to assume that their peer has
failed, a safety mechanism is maintained based on UDP packets running via the management plane
which alerts both MLAG switches that its peer is alive. In such case where keepalive packets are not
received the slave shuts down its MLAG interfaces and the master becomes a standalone switch in
order to avoid misalignment in MLAG configuration.
The virtual system MAC is automatically computed based on the MLAG VIP name, but can be
manually set using the command “system-mac”.
MLAG relies on systems to have the same virtual system MAC. Therefore, if a system MAC mismatch
is detected, the slave shuts down its interfaces.
716
When peers identify having different versions, they enter an upgrading state in which the slave peer
waits for a specific period of time (according to the command “upgrade-timeout”) before closing its
ports.
It is advised to plan MLAG upgrade in advance and perform it in a timely manner. Please avoid
performing topology changes during the upgrade period.
When two tiers of MLAG pairs are used, each pair should be upgraded sequentially and not
in parallel to prevent traffic loops.
Protocol Description
Static MAC addresses Static MAC address are not synced between MLAG peers
LACP MPO supports all LACP modes (passive/active), but it is not a must. If
used, their configuration must be identical on each peer.
Note: if LACP system-priority is configured on one switch, and not
both, it will cause MLAG port-channels to be suspended on one switch.
IGMP snooping IGMP snooping must be activated globally on both peers. IGMP
snooping attributes on the MPO must have identical configuration.
sFlow Supported
717
Protocol Description
PTP Not supported over MLAG IPL (not supported over LAG in general)
For cases when we need to redirect the traffic, another physical link is needed which is not part of
the IPL (preferably a router port) to connect the two switches.
Dynamic routing protocols (e.g. OSPF, BGP) are not supported over MPOs. If they are necessary,
router ports must be used instead of MPOs.
Configuring MLAG
This section provides a basic example of how to configure two switches and a server in an MLAG
setup.
718
Configuring L2 MLAG
Prerequisites:
3. Enable QoS on the switch to avoid congestion on the IPL port. Run:
1. Create a VLAN for the inter-peer link (IPL) to run on. Run:
719
The IPL IP address should not be part of the management network, it could be any IP
address and subnet that is not in use in the network. This address is not advertised
outside the switch.
On SwitchA, run:
On SwitchB, run:
9. Map the VLAN interface to be used on the IPL and set the peer IP address (the IP address of
the IPL port on the second switch) of the IPL peer port. IPL peer ports must be configured on
the same netmask.
On SwitchA, run:
On SwitchB, run:
10. (Optional) Configure a virtual IP (VIP) for the MLAG. MLAG VIP is important for retrieving peer
information.
If you have a mgmt0 interface, the IP address should be within the subnet of the
management interface. Do not use mgmt1. The management network is used for
keepalive messages between the switches. The MLAG domain must be unique name
for each MLAG domain. In case you have more than one pair of MLAG switches on the
same network, each domain (consist of two switches) should be configured with
different name.
On SwitchA, run:
On SwitchB, run:
11. (Optional) Configure a virtual system MAC for the MLAG. Run:
720
2. Bind an Ethernet port to the MLAG group. Run:
Enabling MLAG:
When running MLAG as L2/L3 border point, MAGP VIP must be deployed as the
default GW for MPOs. For more information, refer to “MAGP”.
721
switch [my-vip: master] (config)# show mlag statistics
IPL 1:
Rx Heartbeat : 516
Tx Heartbeat : 516
Rx IGMP tunnel : 0
Tx IGMP tunnel : 0
RX XSTP tunnel : 0
TX XSTP tunnel : 0
RX mlag-notification : 0
TX mlag-notification : 0
Rx port-notification : 0
Tx port-notification : 0
Rx FDB sync : 0
Tx FDB sync : 0
RX LACP manager : 1
TX LACP manager : 0
MLAG Commands
• MLAG Commands
MLAG Commands
protocol mlag
protocol mlag
no protocol mlag
Enables MLAG functionality and unhides the MLAG commands.
The no form of the command hides the MLAG commands and deletes its database.
Syntax N/A
Descriptio
n
722
Default no protocol mlag
Configurati config
on Mode
History 3.3.4500
Related
Commands
mlag
mlag
Enters MLAG configuration mode.
Default N/A
History 3.3.4500
Notes
shutdown
shutdown
no shutdown
Disables MLAG.
The no form of the command enables MLAG.
723
Syntax Description N/A
Default Disabled
History 3.3.4500
interface mlag-port-channel
interface mlag-port-channel <if-number>
no interface mlag-port-channel <if-number>
Creates an MLAG interface.
The no form of the command deletes the MLAG interface.
Default N/A
History 3.3.4500
724
ipl
ipl <ipl-id>
no ipl <ipl-id>
Sets this LAG as an IPL port.
The no form of the command resets this LAG as regular LAG.
Default no ipl
History 3.3.4500
Notes • If a LAG is set as IPL, only the commands “no shutdown”, “no
ipl” and “no interface port-channel” become applicable
• A LAG interface set as IPL must have default LAG configuration,
otherwise the set is rejected. Force option can be used
ipl peer-address
ipl <ipl-id> peer-address <ip-address>
no ipl <ipl-id>
Maps a VLAN interface to be used for an IPL LAG and sets the peer IP
address of the IPL peer port.
The no form of the command deletes a peer IPL LAG and unbinds this
VLAN interface from the IPL function.
Default N/A
History 3.3.4500
725
Notes • The subnet mask is the same subnet mask of the VLAN interface
• This VLAN interface should be used for IPL only
keep-alive-interval
keep-alive-interval <value>
no keep-alive-interval
Configures the interval during which keep-alive messages are
issued between the MLAG switches.
The no form of the command resets this parameter to its default
value.
Default 1 second
History 3.3.4500
mlag-channel-group mode
mlag-channel-group <if-number> mode {on | active | passive}
no mlag-channel-group
Binds an Ethernet port to the MLAG port-channel (MPO).
The no form of the command deletes the binding.
726
Default N/A
History 3.3.4500
Notes
mlag-vip
mlag-vip <domain-name> ip [<ip-address> {<masklen> | netmask> [force]]
no mlag-vip
Sets the VIP domain and IP address for MLAG.
The no form of the command deletes the VIP domain and IP address.
Default N/A
Configuration config
Mode
History 3.3.4500
Related
Commands
Notes • This command is supported only by IPv4 address scheme. For management
networks that are IPv6-only, the mlag-vip cannot be configured.
• This IP address must be configured in one of the MLAG switches and must be in the
box management subnet
• Other switches in the MLAG must join the same domain name
727
reload-delay
reload-delay <value>
no reload-delay
Specifies the amount of time that MLAG ports are disabled after
system reboot.
The no form of the command resets this parameter to its default
value.
Default 30 seconds
History 3.3.4500
Related Commands
Notes • This interval allows the switch to learn the IPL topology
to identify the master and sync the MAC address before
opening the MLAG ports
• This parameter must be similar in all MLAG peers
system-mac
system-mac <virtual-mac>
no system-mac <virtual-mac>
Configures virtual system MAC.
The no form of the command resets this value to its default value.
History 3.4.2008
728
Related Commands
Notes This parameter must be configured the same in all MLAG peers
upgrade-timeout
upgrade-timeout <time>
no upgrade-timeout
Configures the time period during which an MLAG slave keeps its
ports active while in upgrading state.
The no form of the command resets the parameter value to its
default.
Default 60
History 3.4.2008
Related Commands
Notes This parameter must be configured the same in all MLAG peers
show mlag
show mlag
Displays MLAG configuration and status.
Syntax N/A
Description
Default N/A
729
History 3.3.4500
Example
SX2 (config)# show mlag
Admin status: Enabled
Operational status: Up
Reload-delay: 1 sec
Keepalive-interval: 30 sec
Upgrade-timeout: 60 min
System-mac: 00:00:5E:00:01:5D
Inactive: 0
Active-partial: 0
Active-full: 1
Related
Commands
Notes If run in the middle of an upgrade, the following message will appear in the output:
*Upgrading* <hostname> --> *Cluster upgrade in progress*
show mlag-vip
show mlag-vip
Displays MLAG VIP configuration and status.
Default N/A
730
Configuration Mode Any command mode
History 3.3.4500
Related Commands
Notes
Syntax N/A
Description
Default N/A
History 3.3.4500
Example
731
switch (config)# show interfaces mlag-port-channel 1
Mpo1:
Admin state : Disabled
Operational state : Down
Description : N\A
Mac address : N\A
MTU : 1500 bytes (Maximum packet size 1522 bytes)
lacp-individual mode: Disabled
Flow-control : receive off send off
Actual speed : 0 Gbps
Auto-negotiation : N/A
Width reduction mode: Not supported
Switchport mode : access
MAC learning mode : Enabled
Forwarding mode : inherited cut-through
Rx:
0 packets
0 unicast packets
0 multicast packets
0 broadcast packets
0 bytes
0 discard packets
0 error packets
0 fcs errors
0 undersize packets
0 oversize packets
0 pause packets
0 unknown control opcode
0 symbol errors
0 discard packets by storm control
Tx:
0 packets
0 unicast packets
0 multicast packets
0 broadcast packets
0 bytes
0 discard packets
0 error packets
0 hoq discard packets
Related
Commands
Notes
732
show interfaces mlag-port-channel counters
show interfaces mlag-port-channel <if-number> counters
Displays the extended counters for the interface.
Default N/A
History 3.6.1002
Rx
12 packets
0 unicast packets
12 multicast packets
0 broadcast packets
2700 bytes
0 packets of 64 bytes
0 packets of 65-127 bytes
12 packets of 128-255 bytes
0 packets of 256-511 bytes
0 packets of 512-1023 bytes
0 packets of 1024-1518 bytes
0 packets Jumbo
0 error packets
0 discard packets
0 fcs errors
0 undersize packets
0 oversize packets
0 pause packets
0 unknown control opcode
0 symbol errors
Tx
0 packets
0 unicast packets
0 multicast packets
0 broadcast packets
152100000000 bytes
100000000 error packets
0 discard packets
0 pause packets
Related Commands
Notes
733
Syntax Description N/A
Default N/A
History 3.3.4500
Port Flags:
D: Down
P: Up in port-channel (members)
S: Suspend in port-channel (members)
I: Individual
---------------------------------------------------------------------
Group Type Local Peer
Port-Channel Ports Ports
(D/U/P/S) (D/P/S/I) (D/P/S/I)
---------------------------------------------------------------------
1 Mpo61(D) LACP Eth1/4(I) Eth1/3(S)
Related Commands
Notes • If a cluster is not available, the column “Peer Ports” shows “N/
A”. If the cluster is available but is not configured on the peer,
the “Peer Ports” column shows nothing.
• If the system happens to be busy, peer ports may be unavailable
and the following prompt may appear in the output: “System
busy and partial information is presented – please try again
later”
• The “I” flag indicates an interface which is part of a LAG and in
individual state
• The “S” flag indicates an interface which is part of a LAG and in
suspended state
734
Syntax Description N/A
Default N/A
History 3.3.4500
Related Commands
Notes
A link can be a member of several groups. A downstream interface is shut down if at least one of the
groups requests a shutdown and is brought back up if all groups request it to be up.
In situations with only downstream links in a group (no upstream links), the downstream links will
stay up.
735
To configure Link State Tracking group:
switch-1 (config) # interface ethernet 1/1 link state tracking group group1
switch-1 (config) # interface ethernet 1/2 link state tracking group group1
736
switch-2 (config) # link state tracking vlan 100
link type
link type {downstream | upstream}
no link type
Configures an interface’s link direction.
The no form of the command deletes the interface’s link direction
configuration.
737
Configuration Mode config config interface ethernet config interface port-channel config
interface mlag-port-channel
History 3.7.1000
Example switch (config interface ethernet 1/1)# link state tracking group
group1
Syntax Description group Displays link state tracking per tracking group
vlan Displays link state tracking per VLAN
Default N/A
738
Configuration Mode Any command mode
History 3.7.1000
Example
switch (config)# show link state tracking
---------------------------------------------------------------------------------------
Group Port Type Interface Admin Status Operational Status
---------------------------------------------------------------------------------------
Vlan 100 Upstream Eth1/54 Enabled Down
Vlan 100 Downstream Eth1/1 Enabled Down (by tracking)
Vlan 100 Unassigned Eth1/2 Enabled Up
Vlan 101 Upstream Eth1/54 Enabled Down
Vlan 101 Downstream Eth1/1 Enabled Down (by tracking)
Vlan 101 Unassigned Eth1/2 Enabled Up
group1 Downstream Eth1/1 Enabled Down (by tracking)
QinQ
A QinQ VLAN tunnel enables a service provider (SP) to segregate the traffic of different customers in
their infrastructure, while still giving the customer a full range of VLANs for their internal use by
adding a second 802.1Q VLAN tag to an already tagged frame.
So let us assume for example that an SP exists which needs to offer L2 connectivity to two
corporations, “X” and “Y”, that have campuses located in both “A”, “B”. All campuses run Ethernet
LANs, and the customers intend to connect through the SP’s L2 VPN network so that their campuses
are in the same LAN (L2 network). Hence, it would be desirable for “X”, “Y” to have a single LAN
each in both “A”, “B” which could easily exceed the VLAN limit of 4096 of the 802.1Q specification.
C-VLAN is the VLAN tag assigned to the ingress traffic of a QinQ-enabled interface.
S-VLAN is the VLAN tag assigned to the egress traffic of a QinQ-enabled interface.
739
Configuring QinQ
1. Create the C-VLAN. Run:
4. Change its port VLAN ID (PVID). This configures the S-VLAN. Run:
740
QinQ Commands
Syntax Description pipe Gives the service provider’s traffic the same QoS as
the customer’s traffic
Default pipe
History 3.4.3000
Notes
ACL support currently allows actions of permit or deny rules, and supports only ingress direction.
ACL search pattern can be taken from either L2 or L3 fields, e.g L2/L3 source and destination
addresses, protocol, VLAN ID and priority or TCP port.
Configuring ACL
ACL is configured by the user and is applied to a port once the ACL search engine matches search
criteria with a received packet.
To configure ACL:
741
1. Create a MAC / IPv4 ACL (access-list) entity. Run:
switch (config mac access-list mac-acl) # seq-number 10 deny 0a:0a:0a:0a:0a:0a mask ff:ff:ff:ff:ff:ff any
vlan 6 cos 2 protocol 80
ACL Actions
An ACL action is a set of actions can be activated in case the packet hits the ACL rule.
To modify the VLAN tag of the egress traffic as part of the ACL “permit” rule:
ACL Logging
A strong insight into the system is given by ACL logging. ACLs can log packets that pass through the
switch, so the flows can later be analyzed.
A packet that hits an ACL with a log clause is passed to the logger. The logger writes the partial
header of the packet (L2 or L3) to the syslog, with a timestamp and some additional information
such as ingress interface and the VLAN to which the packet belongs.
742
To protect the system memory, a limited number of flows are collected for each time interval. If the
number of flows for a specific time interval is exceeded, then no packets are logged for this time
interval.
To further protect the system, a rate-limiter controls the number of packets passed to the CPU.
Only packets traversing the switch are logged. Packets that are passed to the CPU are not.
MAC Permit N/A DST MAC (with VLAN map L2 port 18K
Deny mask) VLAN pop LAG
Remark SRC MAC (with VLAN push MLAG
mask) Counter per rule RIF
Protocol Shared counter to VLAN interface
CoS rules
VLAN-ID Log
VLAN-group Policer
743
ACL Table Policy Protocol Keys Actions Supported Scale
Interfaces (Ingress
Bind Point Only)
744
ACL Table Policy Protocol Keys Actions Supported Scale
Interfaces (Ingress
Bind Point Only)
745
ACL Table Policy Protocol Keys Actions Supported Scale
Interfaces (Ingress
Bind Point Only)
746
• HowTo Configure Filtering Rules on Mellanox Ethernet Switches (ACLs, IP Filtering)
ACL Commands
• ACL Commands
ACL Commands
{ipv4/ipv6/mac/ipv4-udk/mac-udk} access-list
{ipv4 | ipv6 | mac | ipv4-udk | mac-udk} access-list <acl-name>
no {ipv4 | ipv6 | mac | ipv4-udk | mac-udk} access-list <acl-name>
Creates an ACL table and enters its configuration mode.
The no form of the command deletes the ACL table.
History 3.1.1400
bind-point rif
bind-point rif
no bind-point rif
Changes the ACL table bind point from L2 port mode to L3 port.
The no form of the command resets this parameter to its default.
747
Syntax N/A
Description
Default L2 port
History 3.6.5000
Notes • The bind point may only be changed when an ACL table is empty (no rules) and
unbound
• This command is used to attach ACLs to interface VLANs only
remark
[<seq-number>] remark <string>
no [<seq-number>] remark <string>
Creates a remark rule from an ACL table.
The no form of the command deletes a remark rule from an ACL table.
Syntax N/A
Description
Default N/A
History 3.6.5000
Example switch (config mac access-list my-mac-list)# remark “1st group”
Notes • The remark rule has a sequence number like standard rules and it can be displayed
when showing all rules of ACL table
• This rule has no effect on traffic and it is only for management purposes
748
shared-counter
shared-counter <counter-name>
no shared-counter <counter-name>
Creates a shared counter.
The no form of the command deletes a shared counter.
Default N/A
History 3.6.5000
clear shared-counters
clear shared-counters [<counter-name>]
Resets all shared counters in ACL table or a specific shared counter.
Default N/A
History 3.6.5000
Notes
749
clear counters
clear counters [<seq-number>]
Resets all counters (including shared counters) in ACL table or a specific
counter.
Default N/A
History 3.6.5000
Notes
Default N/A
History 3.6.5000
Notes
750
{ipv4/ipv6/mac/ipv4-udk/mac-udk} port access-group
{ipv4 | ipv6 | mac | ipv4-udk | mac-udk} port access-group <acl-
name>
no {ipv4 | ipv6 | mac | ipv4-udk | mac-udk} port access-group <acl-
name>
Binds an ACL to the interface.
The no form of the command unbinds the ACL from the interface.
History 3.1.1400
Example switch (config interface ethernet 1/1) # mac port access-group my-
list
Notes The access control list should be defined prior to the binding action
751
deny Drop all matching traffic
752
Default No rule is added by default to access control list
Default sequence number is by increments of 10
History 3.1.1400
Notes • VLAN and VLAN group cannot be used in the same command
• It is possible to attach the rule to a unique policer, or to create a
policer only for the rule
{any | <source-ip> mask Sets source IP and optionally sets a mask for
<ip>} that IP address. The “any” option causes the
rule to not check the source IP. Range: 0-255.
753
{any | <destination-ip> mask Sets destination IP and optionally sets a mask
<ip>} for that IP. The “any” option causes the rule
to not check the destination IP.
History 3.1.1400
754
3.6.5000 Added log, counter, and shared-counter
parameters
Example switch (config ipv4 access-list my-list) # deny ip any any action act
shared-counter
Notes • User cannot attach a shared counter defined on a different ACL table
• The parameter shared-counter must be defined before attaching it to
the scope of the ACL table
• It is possible to attach the rule to a unique policer, or to create a
policer only for the rule
<source-ip> mask <ip> | any Sets source IP and optionally sets a mask for
that IP address. The “any” option will cause
the rule not to check the source IP.
<dest-ip> mask <ip> | any Sets destination IP and optionally sets a mask
for that IP. The “any” option will cause the
rule not to check the destination IP.
755
src-port L4 source port
Note: User may only choose one of the
following options to configure source port:
src-port; eq-source
ack; urg; rst; syn; fin; psh; Matches flows with specific flag
ns; ece; cwr Possible match: 0 or 1
756
k|m|g Specifies kilo (103), mega (106), or giga (109)
History 3.1.1400
Example switch (config ipv4 access-list my-list)# permit tcp any any src-port 200
dest-port-range 200 400 established
switch (config ipv4 access-list my-list)# permit tcp any any ns 0 policer
packets rate 1 k burst 2050
757
deny/permit (IPv4 TCP-UDP/UDP ACL rule)
[seq-number <sequence-number>] {deny | permit} {tcp-udp | udp} {<source-
ip> mask <ip> | any} {<dest-ip> mask <ip> | any} [src-port <src-port> | eq-
source <src-port> | src-port-range <from> <to>] [dest-port <dest-port> | eq-
destination <dest-port> | dest-port-range <from> <to>] [action <action-id>]
[log] [counter | shared-counter <name>] [ecn <val>] [ttl <val>] [dscp <val>]
[policer {<name> | [bytes | packets] rate <rate_value> [k | m | g] [burst
<burst_value> [k | m | g]]}
no <sequence-number>
Creates a rule for IPv4 TCP-UDP/UDP ACL.
The no form of the command deletes a rule from the ACL.
<source-ip> mask <ip> | any Sets source IP and optionally sets a mask for
that IP address. The “any” option will cause
the rule not to check the source IP.
<dest-ip> mask <ip> | any Sets destination IP and optionally sets a mask
for that IP. The “any” option will cause the
rule not to check the destination IP.
758
log Enables the log option
History 3.1.1400
Example switch (config ipv4 access-list my-list)# permit tcp-udp any any eq-
destination 100 eq-source 300
switch (config ipv4 access-list my-list)# permit udp any any eq-
destination 100 eq-source 300
759
Related Commands {ipv4/ipv4-udk/ipv6/mac/mac-udk} access-list
{ipv4/ipv4-udk/ipv6/mac/mac-udk} port access-group
<source-ip> mask <ip> | any Sets source IP and optionally sets a mask for
that IP address. The “any” option will cause
the rule not to check the source IP.
<dest-ip> mask <ip> | any Sets destination IP and optionally sets a mask
for that IP. The “any” option will cause the
rule not to check the destination IP.
760
bytes Attaches bytes type policer
History 3.1.1400
Example switch (config ipv4 access-list my-list)# permit icmp any any eq-code 10
eq-type 155
761
deny/permit (IPv6 ACL rule)
[seq-number <sequence-number>] {permit | deny} ip {<src-ipv6>/<mask-len>
| any} {<dest-ipv6>/<mask-len> | any} [action <action-id>] [log] [counter |
shared-counter <name>] [ecn <val>] [ttl <val>] [dscp <val>] [policer {<name>
| [bytes | packets] rate <rate_value> [k | m | g] [burst <burst_value> [k | m
| g]]}
no <sequence-number>
Creates an IPv6 ACL rule with a specific protocol.
The no form of the command deletes a rule from the IPv6 ACL.
762
k|m|g Specifies kilo (103), mega (106), or giga (109)
History 3.6.5000
Related Commands
763
Syntax Description sequence-number Optional parameter to set a specific
sequence number for the rule
Range: 1-65535
ack; urg; rst; syn; fin; psh; Matches flows with specific flag
ns; ece; cwr Possible match: 0 or 1
764
policer Attaches shared policer to a rule
History 3.6.5000
Example switch (config ipv6 access-list my-list) # permit tcp any 10:10:12::/48
Related Commands
765
deny/permit (IPv6 TCP-UDP/UDP ACL rule)
[seq-number <sequence-number>] {permit | deny} {tcp-udp | udp} {<source-
ipv6> /<mask-len> | any} {<dest-ipv6> /<mask-len> | any} [src-port <src-
port> | src-port-range <from> <to>] [dest-port <dest-port> | dest-port-range
<from> <to>] [log] [counter | shared-counter <name>] [action <action-id>]
[ecn <val>] [ttl <val>] [dscp <val>] [policer {<name> | [bytes | packets] rate
<rate_value> [k | m | g] [burst <burst_value> [k | m | g]]}
no <sequence-number>
Creates an IPv6 ACL rule with a specific protocol.
The no form of the command deletes a rule from the IPv6 ACL.
766
ecn ECN ACL filter
Range: 0-3
History 3.6.5000
Related Commands
767
deny/permit (IPv6 ICMPv6 ACL rule)
[seq-number <sequence-number>] {permit | deny} icmpv6 {<source-ipv6> /
<mask-len> | any} {<dest-ipv6> /<mask-len> | any} [code <icmp-code>]
[type <icmp-type>] [log] [counter | shared-counter <name>] [action <action-
id>] [ecn <val>] [ttl <val>] [dscp <val>] [policer {<name> | [bytes | packets]
rate <rate_value> [k | m | g] [burst <burst_value> [k | m | g]]}
no <sequence-number>
Creates an IPv6 ACL rule with a specific protocol.
The no form of the command deletes a rule from the IPv6 ACL.
768
bits Attaches bits type policer
History 3.6.5000
Example switch (config ipv6 access-list my-list) # permit icmpv6 any any eq-code
10 eq-type 155
Related Commands
769
deny/permit (MAC UDK ACL rule)
[seq-number <sequence-number>] {deny | permit} {<source-mac> mask
<mac-mask> | any} {<dest-mac> mask <mac-mask> | any} [protocol
<protocol-num>] [cos <cos>] [vlan <vlan-id>] [vlan-mask <vlan_mask>]
[action <action-name>] [log] [counter | shared-counter <name>] [udk
<udk1> <val> [mask <mask>]] [<udk2> <val> [mask <mask>]] [<udk3> <val>
[mask <mask>]] [<udk4> <val> [mask <mask>]] [policer {<name> | [bytes |
packets] rate <rate_value> [k | m | g] [burst <burst_value> [k | m | g]]}
no <sequence-number>
Creates a MAC-UDK ACL rule.
The no form of the command deletes a rule from MAC UDK ACL.
<source-mac> mask <mac- Sets source MAC and optionally sets a mask
mask> | any for that MAC. The “any” option will cause the
rule not to check the source MAC.
770
mask Mask for the UDK value
History 3.6.5000
Example switch (config mac-udk access-list mac_udk_acl) # permit any any udk myUdk
10 mask 0xff
Related Commands
Notes • User cannot attach a shared counter defined on a different ACL table
• The parameter shared-counter must be defined before attaching it to
the scope of the ACL table
• UDK fields must come at the end of the rule configuration
• The default mask is 0xff-0xffffffff (depends on value length)
• UDK cannot be deleted while it is attached to a rule
• 1-4 UDKs per rule may be configured
• Values and masks of the UDK can be decimal or hexadecimal
• It is possible to attach the rule to a unique policer, or to create a
policer only for the rule
771
deny/permit (IPv4 UDK ACL rule)
[seq-number <sequence-number>] {permit | deny} ip {<source-ip> mask <ip>
| any} {<dest-ip> mask <ip> | any} [mask <mask>]] [<udk2> <val> [mask
<mask>]] [<udk3> <val> [mask <mask>]] [<udk4> <val> [mask <mask>]] [ecn
<val>] [ttl <val>] [dscp <val>] [policer {<name> | [bytes | packets] rate
<rate_value> [k | m | g] [burst <burst_value> [k | m | g]]}
no <sequence-number>
Creates a rule for IPv4 ACL.
The no form of the command deletes a rule from the IPv4 ACL.
{any | <source-ip> mask Sets source IP and optionally sets a mask for
<ip>} that IP address. The “any” option causes the
rule to not check the source IP. Range: 0-255.
772
bits Attaches bits type policer
History 3.6.5000
Example switch (config ipv4 access-list my-list) # deny ip any any action act
shared-counter
Notes • User cannot attach a shared counter defined on a different ACL table
• The parameter shared-counter must be defined before attaching it to
the scope of the ACL table
• UDK fields must come at the end of the rule configuration
• The default mask is 0xff-0xffffffff (depends on value length)
• UDK cannot be deleted while it is attached to a rule
• 1-4 UDKs per rule may be configured
• Values and masks of the UDK can be decimal or hexadecimal
• It is possible to attach the rule to a unique policer, or to create a
policer only for the rule
773
deny/permit (IPv4 TCP UDK ACL rule)
[seq-number <sequence-number>] {deny | permit} tcp {<source-ip> mask
<ip> | any} {<dest-ip> mask <ip> | any} [src-port <src-port> | eq-source <src-
port> | src-port-range <from> <to>] [dest-port <dest-port> | eq-destination
<dest-port> | dest-port-range <from> <to>] [action <action-id>] [established
| [ack {0 | 1}] [urg {0 | 1}] [rst {0 | 1}] [syn {0 | 1}] [fin {0 | 1}] [psh {0 | 1}]
[ns {0 | 1}] [ece {0 | 1}] [cwr {0 | 1}]] [log] [counter | shared-counter
<name>] [udk <udk1> <val> [mask <mask>]] [<udk2> <val> [mask <mask>]]
[<udk3> <val> [mask <mask>]] [<udk4> <val> [mask <mask>]] [ecn <val>] [ttl
<val>] [dscp <val>] [policer {<name> | [bytes | packets] rate <rate_value> [k
| m | g] [burst <burst_value> [k | m | g]]}
no <sequence-number>
Creates a rule for IPv4 TCP ACL.
The no form of the command deletes a rule from the ACL.
<source-ip> [mask <ip>] | Sets source IP and optionally sets a mask for
any that IP address. The “any” option will cause
the rule not to check the source IP.
<dest-ip> [mask <ip>] | any Sets destination IP and optionally sets a mask
for that IP. The “any” option will cause the
rule not to check the destination IP.
774
action Action needs to be defined before attaching
to rule
ack; urg; rst; syn; fin; psh; Matches flows with specific flag
ns; ece; cwr Possible match: 0 or 1
775
Configuration Mode config ipv4 acl
History 3.6.5000
Example switch (config ipv4 access-list my-list)# permit tcp any any src-port 200
dest-port-range 200 400 established
Notes • UDK fields must come at the end of the rule configuration
• The default mask is 0xff-0xffffffff (depends on value length)
• UDK cannot be deleted while it is attached to a rule
• 1-4 UDKs per rule may be configured
• It is possible to attach the rule to a unique policer, or to create a
policer only for the rule
<source-ip> mask <ip> | any Sets source IP and optionally sets a mask for
that IP address. The “any” option will cause
the rule not to check the source IP.
<dest-ip> mask <ip> | any Sets destination IP and optionally sets a mask
for that IP. The “any” option will cause the
rule not to check the destination IP.
776
src-port L4 source port
Note: User may only choose one of the
following options to configure source port:
src-port; eq-source
777
rate Policer rate value
Range: 100-1000000000000
History 3.6.5000
Example switch (config ipv4 access-list my-list)# permit tcp-udp any any eq-
destination 100 eq-source 300
switch (config ipv4 access-list my-list)# permit udp any any eq-
destination 100 eq-source 300
Notes • UDK fields must come at the end of the rule configuration
• The default mask is 0xff-0xffffffff (depends on value length)
• UDK cannot be deleted while it is attached to a rule
• 1-4 UDKs per rule may be configured
• It is possible to attach the rule to a unique policer, or to create a
policer only for the rule
778
deny/permit (IPv4 ICMP UDK ACL rule)
[seq-number <sequence-number>] {deny | permit} icmp {<source-ip> mask
<ip> | any} {<dest-ip> mask <ip> | any} [eq-code <icmp-code>] [eq-type
<icmp-type>] [log] [counter | shared-counter <name>] [udk <udk1> <val>
[mask <mask>]] [<udk2> <val> [mask <mask>]] [<udk3> <val> [mask <mask>]]
[<udk4> <val> [mask <mask>]] [ecn <val>] [ttl <val>] [dscp <val>] [policer
{<name> | [bytes | packets] rate <rate_value> [k | m | g] [burst
<burst_value> [k | m | g]]}
no <sequence-number>
Creates a rule for IPv4 ICMP ACL.
The no form of the command deletes a rule from the ACL.
<source-ip> mask <ip> | any Sets source IP and optionally sets a mask for
that IP address. The “any” option will cause
the rule not to check the source IP.
<dest-ip> mask <ip> | any Sets destination IP and optionally sets a mask
for that IP. The “any” option will cause the
rule not to check the destination IP.
779
dscp DSCP ACL filter
Range: 0-63
History 3.6.5000
Example switch (config ipv4 access-list my-list)# permit icmp any any eq-code 10
eq-type 155
780
port access-group (IPv4/IPv4 UDK/IPv6/MAC/MAC UDK)
{ipv4 | ipv4-udk | ipv6 | mac | mac-udk} port access-group <acl-
name>
no {mac | ipv4 | ipv6 | mac-udk | ipv4-udk} port access-group
Attaches an ACL table with bind-point RIF to a VLAN interface.
The no form of the command unmaps ACL table with bind-point RIF
from a VLAN interface.
Default N/A
History 3.6.5000
Notes • Only ACL tables with bind-point set to RIF can be attached
to a VLAN interface
• Interface VLAN must be configured before binding operation
access-list action
access-list action <action-profile-name>
no access-list action <action-profile-name>
Creates access-list action profile and entering the action profile
configuration mode.
The no form of the command deletes the action profile.
Default N/A
History 3.2.0230
Related Commands
Notes
781
access-list log
access-list log [interval <int_num>] [memory <packet_num>] [syslog
<packet_num>]
no access-list log [interval <int_num>] [memory <packet_num>] [syslog
<packet_num>]
Configures access list logger.
The no form of the command resets parameters for access list logger.
Default N/A
History 3.6.5000
Related Commands
vlan-map
vlan-map <vid>
no vlan-map
Adds action to map a new VLAN to the packet (in the ingress
port or VLAN).
The no form of the command removes the action to map a
new VLAN.
782
Syntax Description vid VLAN ID
Range: 1-4094
Default N/A
History 3.2.0230
Related Commands
Notes
vlan-pop
vlan-pop
Pops VLAN frames from traffic.
Default N/A
History 3.4.3000
Related Commands
Notes
vlan-push
vlan-push <vid>
Pushes (or adds) VLAN frames to traffic.
783
Default N/A
History 3.4.3000
Related Commands
Notes
Default N/A
History 3.1.1400
Example
switch (config) # show ipv4 access-lists my-list
----------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------
seq-number p/d protocol s-ipv4 d-ipv4 sport/type end-sport dport/code
end-dport tcp-control action counter Packets ttl ecn dscp policer log
----------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------
10 permit ip any any any none any
none N/A none N/A N/A none none none none NO
20 permit ip any any any none any
none N/A none N/A N/A none none none YES NO
Related deny/permit
Commands {ipv4/ipv4-udk/ipv6/mac/mac-udk} access-list
{ipv4/ipv4-udk/ipv6/mac/mac-udk} port access-group
784
Notes
Default N/A
History 3.6.5000
Example
switch (config) # show ipv4-udk access-lists my-list
Table Type: ipv4-udk
Table Name: my-list
Bind-point: port
----------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------
----------------
seq-number p/d protocol s-ipv4 d-ipv4 sport/type end-sport dport/code end-
dport tcp-control action counter Packets udk ttl ecn dscp
policer log
----------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------
----------------
7 permit tcp any any any none any none
any none N/A N/A none none none none
NO
8 deny tcp 1.1.1.1/32 any any none any none
-U +F none N/A N/A aaa value 5 none none none none
NO
10 permit tcp 1.1.1.1/32 2.2.2.2/32 any none any none
+P-R none N/A N/A bbb value 6 mask 0x8 none none none none
NO
785
Notes
Default N/A
History 3.6.5000
Example
switch (config) # show ipv6 access-lists my-list
Table Type: ipv6
Table Name: my-list
Bind-point: port
----------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------
seq-number p/d protocol s-ipv6 d-ipv6 sport/type end-sport dport/code
end-dport tcp-control action counter Packets ttl ecn dscp policer log
----------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------
10 permit ip any any any none any
none N/A none N/A N/A 33 none none none YES
20 permit ip any any any none any
none N/A none N/A N/A none none none none NO
30 permit ip any any any none any
none N/A none N/A N/A none none none none NO
Related deny/permit
Commands {ipv4/ipv4-udk/ipv6/mac/mac-udk} access-list
{ipv4/ipv4-udk/ipv6/mac/mac-udk} port access-group
Notes
786
show mac access-lists
show mac access-lists <access-list-name>
Displays configuration of MAC rules in a specific table.
Default N/A
History 3.1.1400
Example
switch (config) # show mac access-lists my-list
Table Type: mac
Table Name: my-list
Bind-point: port
----------------------------------------------------------------------------------------------------------
----------------------------------------
seq-number p/d smac dmac protocol cos vlan vlan-mask action
counter Packets policer log
----------------------------------------------------------------------------------------------------------
----------------------------------------
10 permit any any any any any N/A none
N/A N/A roe NO
Related deny/permit
Commands
{ipv4/ipv4-udk/ipv6/mac/mac-udk} access-list
{ipv4/ipv4-udk/ipv6/mac/mac-udk} port access-group
Notes
787
show mac access-lists summary
show mac access-lists <access-list-name>
Displays configuration of MAC rules in a specific table.
Default N/A
History 3.6.8100
Example
switch (config) # show mac access-lists summary
----------------------------------------------------------------------------------------
Table type Table Name Bind Point Total entries Bound to interfaces
----------------------------------------------------------------------------------------
mac mac1 port 1 Eth1/16
Related deny/permit
Commands {ipv4/ipv4-udk/ipv6/mac/mac-udk} access-list
{ipv4/ipv4-udk/ipv6/mac/mac-udk} port access-group
Notes
788
Configuration Mode Any command mode
History 3.6.5000
Example
switch (config) # show mac-udk access-lists my-list
Table Type: mac
Table Name: my-list
Bind-point: port
----------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------
seq-number p/d smac dmac protocol cos vlan vlan-mask action
counter Packets udk policer log
----------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------
10 permit any any any any any N/A none
N/A 0 YES NO
20 permit any any any any any N/A none
N/A N/A none NO
Notes
Default N/A
History 3.2.0230
789
Example switch (config)# show access-lists action my-action
Access-list Action my-action
=======================================================
Mapped_Vlan_ID |Mapped_port |Counter_set |Policer_ID |
=======================================================
10 |N/A |N/A |N/A |
Related Commands
Notes
Default N/A
History 3.6.5000
Example
switch (config) # show mac-udk access-lists my-list
Table Type: mac
Table Name: my-list
Bind-point: port
----------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------
seq-number p/d smac dmac protocol cos vlan vlan-mask action
counter Packets udk policer log
----------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------
10 permit any any any any any N/A none
N/A 0 YES NO
20 permit any any any any any N/A none
N/A N/A none NO
Notes
790
show access-lists log config
show access-lists log config <action-profile-name>
Displays the access-list log configuration information.
Default N/A
History 3.2.0230
Related Commands
Notes
Default N/A
History 3.6.5000
Example
791
switch (config) # show ipv6 access-lists my-list policers
-------------------------------------------------------------------------------------
Name Type Rate Burst Sequence Number
-------------------------------------------------------------------------------------
pol packets 1000 200 50,60,70
rom packets 1000 200 80
N/A bytes 12345 20000 40
Related
Commands
Notes
Default N/A
History 3.6.5000
Example
switch (config mac access-list my-list) # show mac access-lists mac_acl shared-counters
-------------------------------------------------
counter packets total Rules rule IDs
-------------------------------------------------
cnt1 0 3 20 30 40
cnt2 0 2 50 60
cnt3 0 1 70
Related
Commands
792
Notes • For each configured shared counter it also displays the counter value (packets), the
number of rules attached to this counter and the rule IDs
• Up to 5 rule IDs are displayed even though there is no limitation on how many rules
can be attached to a counter
Syntax N/A
Description
Default N/A
History 3.1.1400
Example
switch (config) # show access-lists summary
-----------------------------------------------------------------------------------
Table type Table Name Bind type Total entries Bound to interfaces
-----------------------------------------------------------------------------------
mac aaa port 0 Mpo55
ipv4 ddd port 1 Eth1/3, Po1
ipv4 ggg rif 0 VlanIf555
ipv6 table1 port 9 Eth1/9
Related
Commands
Notes
793
show access-lists log
show access-lists log [last <num>]
Displays captured packets on all access list rules.
History 3.6.5000
Example
switch (config) # show access-lists log
Log status: Normal
Related
Commands
Notes
794
Syntax Description N/A
Default N/A
History 3.6.5000
Related Commands
Notes
• ACLs may be used to limit the rate of packets or bytes of a certain type, including L3 control
packets (L2 control packets are forwarded to the CPU before the ACL)
• Policers on traffic going to the CPU—these policers are configured byMellanox Onyx and
cannot be modified by the user
• IP filter tables limit the traffic to the CPU coming in from the management ports
IP Table Filtering
IP table filtering is a mechanism that allows the user to apply actions to a specific control packet
flow identified by a certain flow key.
This mechanism is used in order to protect switch control traffic against attacks. For example, it
could allow traffic coming from a specific trusted management subnet only, block the SNMP UDP
port from receiving traffic, and force ping rate to be lower than a specific threshold.
Each IP table rule is defined by key, priority, and action:
• Key—the key is a combination of physical port and layer 3 parameters (e.g. SIP, DIP, SPORT,
DPORT, etc.), and other fields. Each part of the key, can be set to a specific value or masked.
• Priority—each rule in the IP table is assigned a priority, and the rule with the highest priority
whose key matches the packet executes the action.
• Action—the action describes the behavior of packets which match the key. The action type
may be drop, accept, rate limit, etc.
An IP-table rule is bound to an IP interface that can be a management out-of-band interface, VLAN
interface, or router port interface. Once bound, all traffic received (ingress rule) or transmitted
(egress rule) in this direction is being verified with all bounded rules.
Once a match was found, the rule action is executed. If no match is found, the default policy of the
chain shall apply.
795
IP table rules get a lower priority than ACL mechanism.
1. Select the policy that applies to the input/output chain (default is “accept”). Run:
2. Append filtering rules to the list or set a specific rule number, select a target, and (optional)
any additional filter conditions. For example, run:
switch (config)# ip filter chain input rule append tail target rate-limit 2 protocol udp
switch (config)# ip filter chain input rule set 2 target drop protocol icmp in-intf mgmt1
switch (config)# ip filter chain output rule append tail target drop protocol icmp
switch (config) # ip filter chain input rule modify 3 target reject-with icmp6-adm-prohibited source-addr 10::0 /
126
796
To delete an existing IP table filtering rule:
switch (config) # ip filter chain input rule 2 set target drop protocol tcp dest-port 22 in-intf mgmt1
Unlike other rules which are a match type of rule, limiting packets should be followed by a rule that
drops additional packets of the same “type”. Alternatively, this can be implicitly achieved by setting
the chain policy to “drop” so that it drops packets not processed by matching rules. Otherwise, no
effect of the rule is observed as the remaining traffic simply gets accepted.
Rate-limit is implemented with an average rate and a burst-limit. Rate values are specified
in pps and take a range from 1-1000 pps. For rate values in the range 1-100, the burst value
is set equal to the rate value. For rate values in the range 101-1000, the burst limit is set to
100.
Syntax N/A
Description
Default Disabled
Configuration config
Mode
History 3.5.1000
797
Related
Commands
Notes It is recommended to run this command only after configuring all of the IP table filter
parameters.
History 3.5.1000
Related Commands
Notes
798
ip filter chain rule target | ipv6 filter chain rule target
{ip | ipv6} filter chain <chain_name> rule <oper> target <target>
[<param>]
no {ip | ipv6} filter chain <chain_name> rule {<number> | all}
Inserts rule before specified rule number.
The no form of the command deletes rule for a specific chain.
799
param • comment <text> – specifies
description string for this rule (60
chars max)
• dest-addr <ip> – IP matching a
specific destination address or
address range. A specific IPv4 address
can be provided or an entire subnet
by giving an address along with
netmask in dot notation or as a CIDR
notation (e.g.
/24).
• not-dest-addr <ip> – IP not matching
a specific destination address range
• dest-port <port(s)> – matching a
specific destination port or port
range
• not-dest-port <port(s)> – port not
matching a specific destination port
or port range
• dup-delete – deletes any preexisting
duplicates of this rule
• in-intf – interface matching a specific
inbound interface
• not-in-intf <if_name> – interface not
matching a specific inbound interface
• out-intf <if_name> – matches a
specific outbound interface
• not-out-intf <if_name> – interface
not matching a specific outbound
interface
800
param4 (cont.) • protocol <if_name> – matches a
specific protocol
• tcp
• udp
• icmp
• all
• not-protocol <protocol> – does not
match a specific protocol
• tcp
• udp
• icmp
• all
• source-addr <ip> – matches a specific
source address range
• not-source-addr <ip> – does not
match a specific source address range
• source-port <port(s)> – matches a
specific source port or port range
• not-source-port <port(s)> – does not
match a specific source port or port
range
• state – matches packets in a
particular state. Possible values:
• established – packet associated with
an established connection which has
seen traffic in both directions
• related – packet that starts a new
connection but is related to an
existing connection
• new – packet that starts a new,
unrelated connection
• A combination can be entered
separated by commas
Default N/A
History 3.5.1000
Example switch (config) # ipv6 filter enable chain input rule append tail target
drop state related protocol all dup-delete
Related Commands
Notes • The source and destination ports may each be either a single
number, or a range specified as “<low>-<high>”. For example:
“10-20” would specify ports 10 through 20 (inclusive).
• The port parameter only works in conjunction with TCP and UDP
• Setting a “positive” rule removes any corresponding “not-” rules,
and vice-versa
• The “state” parameter is a classification of the packet relative to
existing connections
• If TCP or UDP are selected for the “protocol” parameter, source
and/or destination ports may be specified. If ICMP is selected,
these options are either ignored, or an error is produced.
801
show ip filter
show ip filter
Displays IPv4 filtering state.
Default N/A
History 3.6.6000
Related Commands
Notes
Default N/A
802
History 3.6.6000
Related Commands
Notes
Default N/A
History 3.6.6000
IPv4 configuration:
Chain 'input' Policy 'accept':
Rule 1:
Target : accept
Protocol : all
Source : all
Destination : 1.1.1.0/24
Interface : all
State : any
Other Filter: -
803
Related Commands
Notes
Default N/A
History 3.6.6000
Related Commands
Notes
804
show ipv6 filter all
show ipv6 filter all
Displays IPv6 filtering state (including un-configured rules).
Default N/A
History 3.6.6000
Related Commands
Notes
Default N/A
805
History 3.6.6000
IPv6 configuration:
Chain 'input' Policy 'accept':
Rule 1:
Target : accept
Protocol : all
Source : all
Destination : 1.1.1.0/24
Interface : all
State : any
Other Filter: -
Related Commands
Notes
An extraction point may be defined for each packet type in a UDK. For each extraction point, an
offset (from the beginning of the extraction) is defined.
To be able to modify a UDK after attaching it to an ACL rule, it is first necessary to un-match the
UDK from the ACL, and then change the match mode of the UDK to none using the command “no
udk match mode”.
Defining a UDK affects the throughput for packets equal or smaller than 128 bytes.
Configuring UDK
To set UDK with ACL on a specific field:
806
switch (config) # udk ipv4_udk
switch (config udk ipv4_udk) # exit
2. Set user defined key ipv4_udk to match on IPV4 header in offset 4 bytes from start of
header. Run:
switch (config) # udk ipv4_udk extraction point mode l3 packet type ipv4 extraction point start-of-header
offset 4
3. Set the len (in bytes) of the field to match on. Run:
4. Set the user defined key to work with access list. Run:
6. Set new rule on the access list table with the previously defined user defined key to match
0x1234. Run:
switch (config) # ipv4-udk access-list my_acl_table permit ip any any udk ipv4_udk 0x1234
UDK Commands
udk
udk <udk-name>
no udk <udk-name>
Creates user defined key.
The no form of the command deletes user defined key.
udk-name String
Syntax Description
Default N/A
History 3.6.5000
Related Commands
807
Notes Defining UDK affects the throughput for packets equal or
smaller than 128 bytes.
match mode
match mode <match-mode>
no match mode
Configures user defined key match mode.
The no form of the command resets this parameter to its default.
History 3.6.5000
Notes
extraction point
extraction point mode <mode> [packet type <type> [extraction
point <point> [offset <offset>]]]
Configures user-defined key extraction point mode.
808
packet type Sets user defined key packet type.
Possible values:
• For L2: l2
• For L3: arp; ipv4; ipv6
• For L4: udp
extraction point Sets user defined key extraction point.
Possible values for:
• l2: l2-ether-type; start-of-header
• arp: start-of-header
• ipv4; ipv6: start-of-header; start-
of-payload
• udp: start-of-payload
offset Sets user defined key extraction point
offset
Range: 0-126 (even values)
Default Mode: l3
Default extraction point per packet type:
L2: start-of-header
ARP; IPv4; IPv6: start-of-header
UDP: start-of-payload
Offset: 0
History 3.6.5000
Notes
len
len <length>
Configures user-defined key length.
Default 4
History 3.6.5000
809
Related Commands udk <udk-name>
Notes
show udk
show udk [<udk-name>]
Displays summary for user-defined keys.
Default N/A
History 3.6.5000
Notes
OpenFlow
Mellanox Onyx supports OpenFlow 1.3. OpenFlow is a network protocol that facilitates direct
communication between network systems via Ethernet. Software Defined Networks (SDN) allows a
centralist management of network equipment. OpenFlow allows the SDN controller to manage SDN
equipment. The OpenFlow protocol allows communication between the OpenFlow controller and
OpenFlow agent.
OpenFlow is useful to manage switches and allow applications running on the OpenFlow controller
to have access to the switch’s data path and provide functionality such as flow steering, security
enhancement, traffic monitoring and more.
The OpenFlow controller communicates with the OpenFlow switch over secured channel using
OpenFlow protocol.
An OpenFlow switch contains a flow table which contains flows inserted by the OpenFlow controller.
And the OpenFlow switch performs packet lookup and forwarding according to those rules.
810
OpenFlow switch implementation is based on the hybrid model, allowing the coexistence of an
OpenFlow pipeline and a normal pipeline. In this model, a packet is forwarded according to
OpenFlow configuration, if such configuration is matched with the packet parameters. Otherwise,
the packet is handled by the normal (regular forwarding/routing) pipeline.
“OpenFlow-hybrid switches support both OpenFlow operation and normal Ethernet switching
operation, i.e. traditional L2 Ethernet switching, VLAN isolation, L3 routing (IPv4 routing, IPv6
routing...), ACL and QoS processing. Those switches must provide a classification mechanism
outside of OpenFlow that routes traffic to either the OpenFlow pipeline or the normal pipeline.
For example, a switch may use the VLAN tag or input port of the packet to decide whether to
process the packet using one pipeline or the other, or it may direct all packets to the OpenFlow
pipeline.”
Utilizing the built-in capabilities of the hybrid switch/router is the main benefit of the hybrid mode.
It increases network performance and efficiency – faster processing of new flows as well as lower
load on the controllers. The hybrid switch processes non-OpenFlow data through its local
management plane and achieve better efficiency and use of resources, compared to the pure
OpenFlow switch.
• Flow Table
• OpenFlow 1.3 Workflow
• Configuring OpenFlow
• Configuring Flows Using CLI Commands
• Configuring Secure Connection to OpenFlow
• OpenFlow Commands
Flow Table
The flow table contains flows which are used to perform packet lookup, modification and
forwarding. Each flow has a 12 tuple key. The key is used in order to classify a packet into a certain
flow. The key contains the flowing fields: ingress port, source MAC, destination MAC, EtherType,
VLAN ID, PCP, source IP, destination IP, IP protocol, IP ToS bits, TCP/UDP source port and TCP/UDP
destination port.
The flow key can have a specific value for each field or wildcard which signals to the switch to
ignore this part of the key.
Each packet passes through the flow table once a match is found; the switch performs the actions
configured to the specific flow by the OpenFlow controller.
Up-keeping a flow table enables the switch to forward incoming traffic with a simple lookup on its
flow table entries. OpenFlow switches perform a check for matching entries on, or ignore using a
wildcard, specific fields of the ingress traffic. If the entry exists, the switch performs the action
associated with that flow entry. Packets without a flow entry match are forwarded according to the
normal pipeline (hybrid switch).
1. Header fields for matching purposes with each entry containing a specific value or a wildcard
which could match all entries.
2. Matching packet counters which are useful for statistical purposes, in order to keep track of
the number of packets.
3. Actions which specify the manner in which to handle the packets of a flow which can be any
of the following:
• Forwarding the packet
• Dropping the packet
811
• Forwarding the packet to the OpenFlow controller
• Modifying the VLAN, VLAN priority (PCP), and/or stripping the VLAN header
The ingress port must is deployed in hybrid mode so as to serve both the OF and
normalMellanox Onyx pipeline.
The ingress packet which passes the VLAN filter and is a match to the user ACL tables either
progresses to the regularMellanox Onyx flow, or the OpenFlow pipeline depending on the port
coupling.
The following table presents a general summary of the capabilities of the OpenFlow 1.3 pipeline,
which are described in detail further on in the document.
812
Table Match Actions Group Meters
813
ACL support currently allows actions of permit or deny rules, and supports only ingress direction.
ACL search pattern can be taken from either L2 or L3 fields.
When match rule is set to match eth_type 9100, VLAN ID matching does not work.
Non-standard Matches
OpenFlow 1.3 is able to match non-standard OpenFlow matching rules by mapping them to standard
ones. The following non-standard matches are supported:
• Matching source/destination IPv4 address encapsulated with MPLS labels (up to 6 MPLS labels
can be skipped) – ip_src_inner/ip_dst_inner is mapped to OXM_OF_IPV4_SRC,
OXM_OF_IPV4_DST
814
• Table configuration:
The ignr_eth_type is needed to ignore the Ethertype of IP that is required by OpenFlow to set
to as a prerequisite to match on IP addresses.
• Rules:
The above matches IP address from 10.10.10.0/24 to 10.10.20.0/24 which have MPLS label 32
as the first label.
• OFPAT_OUTPUT – the packet is sent out to a port (may also be a controller port)
• OFPAT_GROUP – the packet is sent out to a group
3 types of group ports are supported:
• All: The packet is broadcasted on all ports which are part of the defined group
• Selected: The packets are distributed toward the group ports according to a weight
mechanism
• Fast-Failover (FF): FF is a group of ports, one of which is defined as the primary port
through which the packets are transported. In a failure scenario (defined as part of the
group definition), traffic becomes transported through the most eligible backup port
(from the list of backup ports). Once the failure scenario ends, traffic is routed again
through the primary port
• OFPAT_POP_VLAN – strips 802.1Q (VLAN) tag from the packet
• OFPAT_PUSH_VLAN – adds 802.1Q (VLAN) tag from the packet
• OFPAT_SET_NW_TTL – modifies network TTL
• OFPAT_DEC_NW_TTL – decrements network TTL
• OFPAT_SET_FIELD – ACL set fields detailed in section below
• Normal
815
• OXM_OF_ETH_SRC – sets the source MAC address of the packet
• OXM_OF_ETH_DST – sets the destination MAC address of the packet
• OXM_OF_VLAN_VID – sets the VLAN ID of the packet
• OXM_OF_VLAN_PCP – sets the VLAN priority code point (PCP; 0-7)
• OXM_OF_IP_DSCP – sets IP DSCP
• OXM_OF_IP_ECN – sets network ECN
The default action for the FDB table is normal and this cannot be changed by the user.
The cumulative number of supported FDB & router rules is 88K. Hard timeout, where the switch
removes a rule after a configured timer expires, is supported for router table rules. Switch systems
ignore rule priority and configure rules according to masklen in DST IPv4/IPv6 match. A rule with
action output must have SET_FIELD with ETH_DST and DEC_NW_TTL. The default action for the
router table is DROP.
Set DMAC can be assigned only to one output port. When a new rule with a set DMAC and a new
output port is configured, the previous rules are removed from the HW. Later, if the new
configuration is deleted, the previous rules get reinstalled in HW.
Note that all sent packets from the Router Table are without a VLAN header (untagged).
816
Supported Router Apply Actions
• OFPAT_OUTPUT – the packet is sent out to a port (may be controller port)
• OFPAT_DEC_NW_TTL – decrements network TTL
• OFPAT_SET_DMAC – OFPAT_SET_FIELD with OFPXMT_OFB_ETH_DST
• DROP – drops packet
When an output action is implemented, DEC_TTL and SET_DMAC must also be set.
Configuring OpenFlow
To run OpenFlow on a switch:
It is slightly modified as you need to explicitly input a flow reference number to modify. This flow ID
may be used when performing any modification to the flow (e.g. delete).
All flow configurations also appear in the running-config and are restored after switch reload.
When configuring flows, you may assign them a high priority, and then to configure a “drop all” rule
for non-matching packets with a lower priority.
For the flows (use a higher priority e.g. 10000 then the drop all rule) and input interface:
817
switch (config) # openflow add-flows 1 ip, priority=5000, in_port=Eth1/1, nw_src=192.168.0.1/32, nw_dst=239.0.1.2/
32, actions=output=Eth1/56
The above rule matches on SRC IP=192.168.0.1 and DEST IP=239.0.1.2 and the action is to output
matching traffic to interface Eth1/56.
For the “drop all” rule (use a lower priority than other match rules):
To delete a flow, run the command “del-flows” along with a flow’s reference number:
switch (config) # crypto certificate name my-openflow public-cert pem "-----BEGIN CERTIFICATE-----
> MIIDYzCCAksCCQC9EPbMuxjNBzANBgkqhkiG9w0BAQsFADBeMQswCQYDVQQGEwJJ
...
> fEt2ui9taB1dl9480xDsGUxwUDX4YOs/bQDjp99z+cKXUe2eYzeEwnTdrCzPZuQo
> -----END CERTIFICATE-----"
Successfully installed certificate with name 'my-openflow'
switch (config) # crypto certificate name my-openflow private-key pem "-----BEGIN RSA PRIVATE KEY-----
> MIIEpAIBAAKCAQEAypJnZkwbhmt71Kf/MO6cy7QmWWHhCozzWRwuWGKse+MxSmfC
...
> QAuPOVR1lSyIEnYU+X0rMHc/9tgUh/8C7mBKwj7dccMmnRWz2djsjg==
> -----END RSA PRIVATE KEY-----"
3. Designate “my-openflow” as the global default certificate for authentication of this system to
clients. Run:
switch (config) # # crypto certificate name rootCA public-cert pem "-----BEGIN CERTIFICATE-----
> MIIDjzCCAnegAwIBAgIJALVou4mcQtxlMA0GCSqGSIb3DQEBCwUAMF4xCzAJBgNV
...
> +ZfQIOCFS8gY4BDq73W4ugr38mqIA8UXXAMPwgjCbk4NyOh0rJ1P6WT8fYzvunct
> -----END CERTIFICATE-----"
Successfully installed certificate with name 'rootCA'
818
switch (config) # configuration write
819
OpenFlow Commands
protocol openflow
protocol openflow
no protocol openflow
Unhides the OpenFlow commands.
The no form of the command hides the OpenFlow commands.
Related Commands
Notes
820
openflow add-flows
openflow add-flows <flow-id> [[table-id],[priority-id],<match-parameter1> [,...,< match-
parameterN>],<action1>[,...,<actionN>]]
Adds OpenFlow flow.
table-id Range:
• ACLs: 0-249
• FDB: 250
• Router: 251
action Action to perform on the matched traffic. For a list of supported
actions, see the action column in “OpenFlow 1.3 Pipeline Capabilities
Summary Table”.
History 3.6.4006
Example
821
switch (config interface ethernet 1/1)# openflow add-flows 1,
priority=10,in_port=Eth1/1,nw_src=192.168.0.1/32,nw_dst=239.0.1.2/32,actions=output=Eth 1/11,Eth 1/22,Eth
1/33
switch (config interface ethernet 1/1)# openflow add-flows 3 table=3,in_port=121,actions=output:117
switch (config interface ethernet 1/1)# openflow add-flows 2
in_port=ANY,actions=push_vlan:33024,mod_vlan_vid:4111
switch (config interface ethernet 1/1)# openflow add-flows 4
table=0,priority=101,dl_type=0x0800,in_port=79,dl_vlan=233,nw_dst=172.0.0.0/8,actions=pop_vlan,goto_table:
251
switch (config interface ethernet 1/1)# openflow add-flows 5 in_port=1,actions=dec_ttl
switch (config interface ethernet 1/1)# openflow add-flows 6
table=0,priority=777,in_port=121,dl_type=0x0800,nw_proto=6,actions=mod_nw_ttl:55,output:99
switch (config interface ethernet 1/1)# openflow add-flows 7
table=0,priority=777,in_port=121,dl_type=0x0800,nw_proto=6,actions=Set_field:55-\>nw_ttl,output:99
switch (config interface ethernet 1/1)# openflow add-flows 8
table=0,priority=777,in_port=121,actions=output:99,Set_field:11:22:33:44:00:00-\>eth_dst
switch (config interface ethernet 1/1)# openflow add-flows 9
table=0,priority=777,in_port=121,dl_type=0x0800,nw_proto=6,actions=Set_field:0-\>ip_ecn,output:99
switch (config interface ethernet 1/1)# openflow add-flows 10
table=0,priority=777,in_port=121,actions=output:99,Set_field:ff:ff:ff:ff:55:66-\>eth_src
switch (config interface ethernet 1/1)# openflow add-flows 11
table=0,priority=777,in_port=127,actions=group:11
switch (config interface ethernet 1/1)# openflow add-flows 12 priority=12,in_port=105,actions=group:5
switch (config interface ethernet 1/1)# openflow add-flows 13
table=0,priority=777,in_port=127,actions=meter:6,output:117
switch (config interface ethernet 1/1)# openflow add-flows 14
table=2,priority=777,in_port=127,actions=meter:2,output:117
switch (config interface ethernet 1/1)# openflow add-flows 10
ip,priority=10,in_port=Eth1/1,dl_vlan=10,actions=output=Eth1/11
switch (config interface ethernet 1/1)# openflow add-flows 40
ip,priority=10,in_port=Eth1/1,action=set_field:00:0c:e9:00:00:01→eth_src,output=Eth1/11
switch (config interface ethernet 1/1)# openflow add-flows 30 ip,priority=100,actions=output=normal
switch (config interface ethernet 1/1)# openflow add-flows 10 priority=10,in_port=ANY,actions=DROP
Related
Commands
Notes If no flow-text is provided the command deletes the configured OpenFlow flows
openflow del-flows
openflow del-flows [<flow-id>]
Deletes OpenFlow flow.
822
Syntax Description flow-id ID number to give this flow
Range: 0-65535
Default N/A
History 3.6.4006
Related Commands
Notes If flow ID is not provided, the command deletes all configured
OpenFlow flows
openflow add-group
openflow add-group <group-id> <group-type> <bucket-
parameter1>[,...,<bucket-parameterN>]
Adds an OpenFlow group.
History 3.6.4006
Related Commands
Notes
823
openflow del-group
openflow del-group <group-id>
Deletes matching OpenFlow group ID.
Default N/A
History 3.6.4006
Example switch (config interface ethernet 1/1)# openflow del-group
Related Commands
Notes
openflow mod-group
openflow mod-group <group-id> <group-type> <bucket-
parameter1>[,...,<bucket-parameterN>]
Modifies matching OpenFlow group ID.
History 3.6.4006
824
Example switch (config interface ethernet 1/1)# openflow mod-group
group_id=3,type=ff,bucket=watch_port:117,output:123,bucket=watch_
port:123,output:119,bucket=watch_port:111,output:119,113,121,115,
123,109,117,119
openflow add-meter
openflow add-meter <meter-id> <meter-rule> <band-parameter1>[,...,<band-parameterN>]
Adds OpenFlow meter.
History 3.6.4006
Related
Commands
Notes
openflow del-meter
openflow del-meter <meter-id>
Deletes matching OpenFlow meter ID.
825
Default N/A
History 3.6.4006
Related Commands
Notes
Syn N/A
tax
Des
crip
tion
Def Enabled
ault
Con Config
figu
rati
on
Mo
de
Hist 3.8.2100
ory
Rel
ate
d
Co
mm
and
s
826
Not In the case that a switch loses contact with all controllers as a result of echo request timeouts, TLS
es session timeouts, or other disconnections, the switch should immediately enter either “fail secure
mode” or “fail standalone mode" (depending upon the switch implementation and configuration). "Fail
secure mode" only affects the switch behavior in that packets and messages destined to go to the
controllers are dropped. Flow entries should continue to expire according to their timeouts in “fail
secure mode." In “fail standalone mode," the switch processes all packets using the OFPP_NORMAL
reserved port and the switch acts as a legacy Ethernet switch or router.
openflow mod-meter
openflow mod-meter <meter-id> <meter-rule> <band-
parameter1>[,...,<band-parameterN>]
Modifies matching OpenFlow meter ID.
History 3.6.4006
Related Commands
Notes
827
Syntax Description flow-id Range: 0-65535
Default N/A
History 3.6.4006
Related Commands
Notes
Default N/A
History 3.6.4006
Related Commands
Notes
Default N/A
828
Configuration Mode config interface ethernet
History 3.6.4006
Related Commands
Notes
controller-ip
openflow controller-ip <ip-address> [tls] [tcp-port <tcp-port>]
no openflow controller-ip <ip-address> [tls] [tcp-port <tcp-port>]
Configures the OpenFlow controller’s IP & TCP port.
The command “no openflow controller-ip <ip-address>” deletes all
OpenFlow controller configurations related to its IP address.
The command “no openflow controller-ip <ip-address> tcp-port” deletes
all the OpenFlow controller configurations related to IP address, and any
tcp-port except for TLS ones.
The command “no openflow controller-ip <ip-address> [tls] tcp-port <tcp-
port>” deletes the entry for the OpenFlow controller IP address, TLS (if
applicable), and the TCP port
History 3.6.1002
Related Commands
Notes
829
datapath-id
datapath-id <value>
no datapath-id
Sets a specific identifier for the switch with which the controller is
communicating.
The no form of the command resets the parameter to its default value.
Syntax Description value The most significant 16 bits of the agent data-path
ID
Range: 0x0000-0xFFFF in hexa
Default 0x0000
History 3.3.4200
Related Commands
Notes
History 3.3.4200
Related Commands
830
Notes • OpenFlow match rules are installed according to the configured
match keys
• New match keys are configured only when the table is empty (i.e.
does not contain any rules)
show openflow
show openflow
Displays general information about the OpenFlow protocol configuration.
Syntax N/A
Description
Default N/A
History 3.3.4200
Related
Commands
Notes
831
show openflow flows
show openflow flows
Displays information about the OpenFlow flows.
Default N/A
History 3.3.4302
Related Commands
Notes
Syntax N/A
Description
Default N/A
832
Configuratio Any command mode
n Mode
History 3.6.4006
Example
switch (config) # show openflow flows ethernet-names
OFPST_FLOW reply (OF1.3) (xid=0x2):
cookie=0x0, duration=911.531s, table=0, n_packets=0, n_bytes=0, priority=0 actions=NORMAL
cookie=0x0, duration=80.662s, table=1, n_packets=0, n_bytes=0,
priority=0,in_port=0,dl_src=02:00:00:00:00:00 actions=output:Eth1/13,output:123,output:127
cookie=0x0, duration=80.530s, table=1, n_packets=0, n_bytes=0,
priority=1,in_port=1,dl_src=02:01:00:00:00:00 actions=output:Eth1/13,output:123,output:127
cookie=0x0, duration=80.414s, table=1, n_packets=0, n_bytes=0,
priority=2,in_port=2,dl_src=02:02:00:00:00:00 actions=output:Eth1/13,output:123,output:127
cookie=0x0, duration=80.296s, table=1, n_packets=0, n_bytes=0,
priority=3,in_port=3,dl_src=02:03:00:00:00:00 actions=output:Eth1/13,output:123,output:127
cookie=0x0, duration=80.180s, table=1, n_packets=0, n_bytes=0,
priority=4,in_port=4,dl_src=02:04:00:00:00:00 actions=output:Eth1/13,output:123,output:127
cookie=0x0, duration=80.064s, table=1, n_packets=0, n_bytes=0,
priority=5,in_port=5,dl_src=02:05:00:00:00:00 actions=output:Eth1/13,output:123,output:127
cookie=0x0, duration=79.948s, table=1, n_packets=0, n_bytes=0,
priority=6,in_port=6,dl_src=02:06:00:00:00:00 actions=output:Eth1/13,output:123,output:127
cookie=0x0, duration=79.831s, table=1, n_packets=0, n_bytes=0,
priority=7,in_port=7,dl_src=02:07:00:00:00:00 actions=output:Eth1/13,output:123,output:127
cookie=0x0, duration=79.711s, table=1, n_packets=0, n_bytes=0,
priority=8,in_port=8,dl_src=02:08:00:00:00:00 actions=output:Eth1/13,output:123,output:127
cookie=0x0, duration=79.591s, table=1, n_packets=0, n_bytes=0,
priority=9,in_port=9,dl_src=02:09:00:00:00:00 actions=output:Eth1/13,output:123,output:127
cookie=0x0, duration=79.467s, table=1, n_packets=0, n_bytes=0,
priority=10,in_port=10,dl_src=02:0a:00:00:00:00 actions=output:Eth1/13,output:123,output:127
Related
Commands
Notes
Syntax N/A
Description
Default N/A
Configuration Any command mode
Mode
History 3.6.3004
Example
833
switch (config) # show openflow groups
OFPST_GROUP_DESC reply (OF1.3) (xid=0x2):
group_id=5566,type=select,bucket=weight:5,actions=output:1,bucket=weight:7,actions=output:2,bucket=weight:
22,actions=output:3
Related
Commands
Notes
Syntax N/A
Description
Default N/A
Configuration Any command mode
Mode
History 3.6.4006
Example
switch (config) # show openflow groups
OFPST_GROUP_DESC reply (OF1.3) (xid=0x2):
group_id=4,type=all,bucket=actions=output:Eth1/13,output:123
group_id=1,type=select,bucket=actions=output:Eth1/7,output:Eth1/8,output:Eth1/5,output:123,set_field:11:22
:33:44:00:00->eth_dst
group_id=2,type=select,bucket=actions=output:Eth1/13
group_id=3,type=all,bucket=actions=output:Eth1/13,output:123,set_field:11:22:33:44:00:00->eth_dst
Related
Commands
Notes
834
show openflow meters
show openflow meters [<ID>]
Displays all/specified OpenFlow meters.
Related Commands
Notes
835
Related
Commands
Notes
Related
Commands
Notes A cookie may be associated with a flow using the add-flows, and mod-flows commands.
836
show openflow table match-keys
show openflow table <table_id[-table_id]> match-keys
Displays configured ACL keys in OpenFlow table.
Syntax Description table_id OpenFlow table ID for adding/removing key values. Can be
one ID or range. Range: 0-249.
Default N/A
Configuration Mode Any command mode
History 3.6.3004
Example switch (config) # show openflow table 2 match-keys
Table: 2
Pending keys:
Related Commands
Notes
Syntax Description table_id OpenFlow table ID for adding/removing key values. Can be
one ID or range. Range: 0-249.
Default N/A
Configuration Mode Any command mode
History 3.6.3004
837
Example switch (config) # show openflow table 2 match-keys supported
Related Commands
Notes
838
VXLAN
Data centers are being increasingly consolidated and outsourced in an effort to improve the
deployment time of applications and reduce operational costs, and applications are constantly
raising demand for compute, storage, and network resource. Thus, in order to scale compute,
storage, and network resources, physical resources are being abstracted from their logical
representation, in what is referred to as server, storage, and network virtualization. Virtualization
can be implemented in various layers of computer systems or networks.
Multi-tenant data centers are taking advantage of the benefits of server virtualization to provide a
new kind of hosting—a virtual hosted data center. Multi-tenant data centers are ones where
individual tenants could belong to a different company or a different department. To a tenant,
virtual data centers are similar to their physical counterparts, consisting of end-stations attached to
a network, complete with services such as load balancers and firewalls. To tenant systems, a virtual
network looks like a normal network, except that the only end-stations connected to the virtual
network are those belonging to a tenant’s specific virtual network.
How a virtual network is implemented does not generally matter to the tenant; what matters is that
the service provided (Layer 2 (L2) or Layer 3 (L3)) has the right semantics, performance, etc. It
could be implemented via a pure routed network, a pure bridged network, or a combination of
bridged and routed networks.
VXLAN (Virtual eXtensible Local Area Network) addresses the above requirements of the L2 and L3
data center network infrastructure in the presence of virtual networks in a multi-tenant
environment. It runs over the existing networking infrastructure and provides a means to “stretch”
an L2 network. Each overlay bridge is called a VXLAN segment. Only machines within the same
VXLAN segment can communicate with each other. Each VXLAN segment is identified through a 24-
bit segment ID called “VXLAN Network Identifier (VNI)”. A network endpoint which performs a
conversion from virtual to physical network and back is called VXLAN Tunnel End-Point or VTEP.
In virtual environments, it is typically required to use logical switches to forward traffic between
different virtual machines (VMs) on the same physical host, between virtual machines and the
physical machines and between networks. Virtual switch environments use an OVSDB management
protocol for configuration and state discovery of the virtual networks. OVSDB protocol allows
programmable access to the database of virtual switch configuration.
Configuring VXLAN
To enable VXLAN:
839
switch (config)# interface ethernet 1/17 switchport access vlan 3
6. Configure interface on the VXLAN VLAN and configure an IP address for it. Run:
9. Create loopback interface to terminate the VXLAN tunnel. The IP address of the interface will
be a VTEP endpoint address, and needs to be reachable in the underlay network. Run:
For controller-less deployments, configure the bridging from the CLI directly:
840
3. Configure flood addresses for BUM traffic. Run:
switch (config)# interface nve 1 nve fdb flood bridge 7777 address 1.2.3.5
switch (config)# interface nve 1 nve fdb flood bridge 7777 address 1.2.3.6
Hardware Topology
• 2 ESXi servers pre-configured with VXLAN networking using VMware NSX
• 3 NSX Controllers available for VXLAN unicast type logical switches
• 1 Mellanox switch connected to the ESXi servers and to a physical database server
• Out-of-band network for management and a VLAN network to carry VXLAN traffic
841
Switch Configuration
1. Configure jumbo frames on ESXi and Database server facing interfaces. Run:
2. Create VLAN 3 to carry VXLAN traffic (if it does not exist yet). Run:
842
switch (config)# vlan 3
switch (config vlan 3)# exit
switch (config)#
5. Create a loopback interface to communicate with VTEPs on the ESXi servers by routing
through “interface vlan 3”. This interface will be the VTEP IP assigned to the switch. Run:
8. Configure the source of the NVE interface to be the loopback created above. Run:
9. Start the OVSDB server and connect it to the NSX Controllers. Run:
843
switch (config)# ovs ovsdb server
switch (config)# ovs ovsdb manager remote ssl ip address 10.130.200.100
switch (config)# ovs ovsdb manager remote ssl ip address 10.144.200.101
switch (config)# ovs ovsdb manager remote ssl ip address 10.144.200.102
10. Configure the port facing the Database server as an NVE port. Run:
11. Get the switch certificate for later configuration in the NSX Manager. Run:
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
When the switch needs to send BUM traffic to a virtual machine, it will select one of the hosts in the
replication cluster and send the traffic to it, the host will then replicate it to all other ESXi hosts.
It is recommended to add at least 2 ESXi servers to the replication cluster for redundancy.
844
4. Click OK.
5. Wait until the new switch is showing as “UP” under the connectivity column, you may need to
refresh vSphere client a few times.
845
6. Click OK.
846
DSCP is automatically driven from the original packet into the VXLAN header in Onyx.
• Enable ECN.
interface ethernet 1/15 traffic-class 3 congestion-control ecn minimum-absolute 150 maximum-absolute 1500
interface ethernet 1/16 traffic-class 3 congestion-control ecn minimum-absolute 150 maximum-absolute 1500
interface mlag-port-channel 7-8 traffic-class 3 congestion-control ecn minimum-absolute 150 maximum-
absolute 1500
interface port-channel 1 traffic-class 3 congestion-control ecn minimum-absolute 150 maximum-absolute 1500
interface ethernet 1/15 traffic-class 6 dcb ets strict
interface ethernet 1/16 traffic-class 6 dcb ets strict
interface mlag-port-channel 7-8 traffic-class 6 dcb ets strict
interface port-channel 1 traffic-class 6 dcb ets strict
847
• Configure the switch buffer to support lossless traffic.
• Set Downlinks rewrite to DSCP. This will allow translation from PCP to DSCP in VXLAN.
• Set Uplinks and IPL rewrite to PCP. This will allow translation from DSCP to PCP.
VXLAN Commands
• VXLAN Commands
848
VXLAN Commands
protocol nve
protocol nve
no protocol nve
Enables NVE functionality and displays NVE commands.
The no form of the command hides the NVE commands and deletes its database.
Related Commands
Notes
interface nve
interface nve <nve-id>
no interface nve <nve-id>
Creates VXLAN tunnel.
The no form of the command destroys VXLAN tunnel.
849
nve bridge
nve bridge <vni-id> [name <bridge-name>]
no nve bridge <vni-id>
Creates an NVE bridge with a given VNI.
The no form of the command removes NVE bridge.
850
nve fdb flood bridge address
nve fdb flood bridge <vni-id> address <ip-address>
no nve fdb flood bridge <vni-id> address [ip-address]
Adds an IP address of a remote VTEP to be used for BUM traffic.
The no form of the command has two input options:
• Entering an IP address removes a specific remote address
• No IP address removes all addresses
Syntax Description vni-id VXLAN network identifier
Range: 0-16777216
ip-address IP address
Default N/A
Configuration Mode config interface nve
History 3.6.3212
Example switch (config interface nve 1) # nve fdb flood bridge 7777
address 1.2.3.6
851
nve fdb learning remote
nve fdb learning remote
no nve fdb learning remote
Enables remote (controller-less) FDB learning.
The no form of the command disables remote FDB learning.
852
nve neigh-suppression
nve neigh-suppression
no nve neigh-suppression
Enables neighbor suppression for all VLAN-VNI mappings.
The no form of the command disables neighbor suppression for all VLAN-VNI mappings.
Syntax N/A
Description
Default no nve mode only
Configuration config interface nve
Mode
History 3.8.1000
Example switch (config interface nve 1) # nve neigh-suppression
853
nve vlan neigh-suppression
nve vlan <vlan_id> neigh-suppression
[disable | no] nve vlan <vlan_id> neigh-suppression
Configures neigh-suppression for a specific VLAN mapping.
The no form of the command uses the global neigh-suppression
configuration in this VLAN mapping.
The disable form of the command disables neigh-suppression in this
VLAN mapping regardless of the global configuration.
Notes • BGP controller mode must be set prior to using this command
• VLAN-VNI mapping needs to be set prior to running this
command
854
nve vni vlan
nve vni <vni_value> vlan <vlan_id>
no nve vni <vni_value> vlan <vlan_id>
Creates new VNI-to-VLAN manual mapping.
The no form of the command deletes VNI-to-VLAN manual mapping.
vlan_id VLAN ID
Range: 1-4094
Default N/A
Configuration Mode config interface nve
History 3.8.1000
Example switch (config interface nve 1) # nve vni 5000 vlan 5
855
Example (config interface nve 1) # nve vni auto-vlan-map
(config) # vlan 2-5
(config) # show interfaces nve 1 detail
--------------------------------------------------------------
Vlan VNI Neigh Suppression Mapping type
--------------------------------------------------------------
1 100001 Disabled Auto
2 100002 Disabled Auto
3 100003 Disabled Auto
4 100004 Disabled Auto
5 100005 Disabled Auto
Notes • Base-number cannot be changed, user must unset auto-vlan-map and reconfigure it
with a different base number
• While auto-vlan-map is enabled, user cannot add manual mappings (only deletion
of a manual mapping is allowed)
Notes User can set/unset exclude VLANs while auto-vlan-map is enabled or disabled.
856
vxlan mlag-tunnel-ip
vxlan mlag-tunnel-ip <mlag_ipv4_address>
no vxlan mlag-tunnel-ip <mlag_ipv4_address>
Configures the MLAG tunnel IP.
The no form of the command unbinds VXLAN tunnel from the loopback
interface.
Default N/A
Configuration Mode config interface nve
History 3.8.1000
Example switch (config interface nve 1) # vxlan mlag-tunnel-ip 1.2.3.4
Notes BGP controller mode must be set prior to running this command
Default N/A
Configuration Mode config interface nve
History 3.6.3004
Example switch (config interface nve 1) # vxlan source interface loopback 14
857
shutdown
shutdown
no shutdown
Disables VXLAN tunnel.
The no form of the command enables VXLAN tunnel.
Default N/A
Configuration Mode config interface nve
History 3.6.8008
Example switch (config interface nve 1) # clear mac-address-table nve
858
clear nve counters
clear nve counters
Clears NVE counters.
Default N/A
Configuration Mode config interface nve
History 3.6.3004
Example switch (config interface nve 1) # clear nve counters
Default N/A
Configuration Mode Any command mode
History 3.6.3004
3.8.1000 Updated example
3.8.2200 Updated example. Added auto-
vlan-map status.
Example switch (config) # show interface nve 1
859
Related Commands
Notes
Default N/A
Configuration Mode Any command mode
History 3.8.1000
3.8.2200 Added “Mapping type” to show whether VLAN to VNI mapping was
done manually or by auto-vlan-map
Example switch (config)# show interfaces nve 1 detail
-------------------------------------------------------
Vlan VNI Neigh Suppression Mapping Type
-------------------------------------------------------
1 1000001 Enabled Auto
6 60 Disabled Manual
7 70 Disabled Manual
Related Commands
Notes
Default N/A
Configuration Mode Any command mode
History 3.6.3004
860
Example switch (config) # show interface nve 1 counters
18330 encapsulated (Tx) NVE packets
0 decapsulated (Rx) NVE packets
0 dropped NVE-encapsulated packets
0 NVE-encapsulated packets with errors
Related Commands
Notes
Related Commands
Notes
861
vni Displays NVE flooding on specific VNI
Default N/A
Configuration Any command mode
Mode
History 3.6.3004
Example
switch (config) # show interface nve 1 mac-address-table
NVE Interface Logical Switch VNI ID Mac Address Address Type Remote Endpoint
IP Address
------------- -------------- ------ ----------- ------------
--------------------------
1 ls7777 7777 e4:1d:2d:a5:f2:0a local learned N/A
1 ls7777 7777 00:11:22:33:44:55 remote configured 1.2.3.5
Related
Commands
Notes
862
switch (config) # show interface nve 1 mac-address-table local learned unicast
NVE Interface Logical Switch VNI ID Mac Address Address Type Remote Endpoint
IP Address
------------- -------------- ------ ----------- ------------
--------------------------
1 ls7777 7777 e7:3a:7e:a5:f2:1a local learned N/A
Related
Commands
Notes
NVE Interface Logical Switch VNI ID Mac Address Address Type Remote Endpoint
IP Address
------------- -------------- ------ ----------- ------------
--------------------------
1 ls7777 7777 00:11:22:33:44:55 remote configured 1.2.3.5
Related
Commands
Notes
863
show interfaces nve peers
show interfaces nve <nve-id> peers [vni <vni-id>]
Displays all remote VTEPs.
Related
Commands
Notes
864
ovs ovsdb server
ovs ovsdb server
no ovs ovsdb server
Runs OVSDB-server process and unhides OVS commands.
The no form of the command deactivates OVSDB-server process and hides OVS commands.
Syntax N/A
Description
Default N/A
Configuratio config
n Mode
History 3.6.3004
Related
Commands
Notes OVSDB server runs when “protocol openflow” or “protocol nve” are enabled, even when not
enabled using this command
865
TCP Connect with SSL protocol
Default N/A
History 3.6.3004
Default N/A
History 3.6.3004
Example switch (config) # ovs ovsdb server listen tcp port 20 local ip-
address 20.20.20.20
866
ovs logging level
ovs {ovsdb | vswitchd | vtep} logging level {dbg | emer | err | info | off |
warn}
Configures OVS logging levels for OVS related processes.
Default N/A
History 3.8.1100
Related Commands
Notes
show ovs
show ovs
Displays OVS information.
Default N/A
History 3.8.1100
Logging level:
ovsdb : info
vswitchd: info
vtep : warn
Related Commands
Notes
867
Ethernet VPN (EVPN)
Overview
Many data centers today are moving from legacy Layer 2 (L2) designs to modern Layer 3 (L3) web-
scale IT architectures. L3 designs simplify troubleshooting, provide clear upgrade strategies, support
multi-vendor environments, and dramatically reduce the size of failure domains.
868
However, many applications and storage appliances still require layer 2 adjacency. VXLAN tunnels
can satisfy this L2 adjacency requirement, and EVPN serves as a standard for scale-out L2 Ethernet
fabrics. VXLAN can virtualize the data center network, enabling layer 2 segments to be extended
over an IP core (the underlay). EVPN is the control plane for modern VXLAN deployments, allowing
VTEPs to discover each other via EVPN and exchange reachability information such as MAC and IPs
across racks.
ARP suppression is used to reduce the amount of broadcast packets crossing the extended L2
domain. BGP is the underlay routing protocol serving as the transport layer for the overlay VXLAN.
869
Layer 2 Configuration, MLAG, and VLANs
MLAG between leaf3 and leaf4
lacp
dcb priority-flow-control enable force
protocol mlag
interface port-channel 1
interface ethernet 1/1 channel-group 1 mode active
interface port-channel 1 dcb priority-flow-control mode on force
interface mlag-port-channel 7-8 no shutdown
interface ethernet 1/31 mlag-channel-group 7 mode active
interface ethernet 1/32 mlag-channel-group 8 mode active
vlan 4094
ip routing vrf default
interface vlan 4094
interface vlan 4094 ip address 10.10.10.1/30 primary
interface vlan 4094 mtu 9216
mlag-vip mlag-pair-1 ip 192.168.1.1 /24 force
interface port-channel 1 ipl 1
interface vlan 4094 ipl 1 peer-address 10.10.10.2
no mlag shutdown
Layer 2 Ports
• In our setup we use VLAN 6 as the native VLAN, and VLAN 10 as the Tagged VLAN.
• We use LACP Bond on our servers, and using them we set LACP on the Switch MPOs.
• PXE boot is required to set our MPOs to "lacp-individual enable"
Layer 3 Configuration
Layer 3 Interfaces
• Since we use VXLAN, we will set all of our L3 interfaces to support a maximum MTU of 9216.
The servers' MTU should be set to below the maximum fabric MTU to allow space for the
additional headers of the VXLAN. The VXLAN encapsulation header adds 50 bytes to the
overall size of an Ethernet frame.
• Router ports serve as uplinks.
• Loopback for VTEP source is unique per leaf switch.
NVE represents a VTEP. We will use a single VTEP with multiple VNIs.
870
protocol nve
interface nve 1
interface nve 1 vxlan source interface loopback 1
interface nve 1 nve controller bgp
interface nve 1 vxlan mlag-tunnel-ip 100.0.0.1
interface nve 1 nve vni 10010 vlan 10
interface nve 1 nve vni 10060 vlan 6
Note that "vxlan mlag-tunnel-ip" is used to configure MLAG with VXLAN. This way other VTEPs will
see the MLAG pair as a single entity (for this reason, the "mlag-tunnel-ip" setting should be unique
per MLAG pair). As long as the MLAG is up, both switches will use the same IP as the VTEP source. If
MLAG state changes to Split Brain (IPL is down but mgmt0 interface is up), the standby switch will
use its local loopback for the advertisements; this will prevent impacting traffic from stand-alone
ports by the Split Brain scenario.
ARP Suppression
Traditional L2 network broadcast traffic generated by ARP requests overloads the network. Using
ARP suppression with VXLAN enables suppressing these messages at the leaf layer. Let's consider the
example setup that is illustrated below.
871
BGP and EVPN Configuration
The examples below use eBGP. Nevertheless, iBGP can be used as well.
Now we will configure our L3 underlay using eBGP as the underlay protocol. The Autonomous System
(AS) design that we use as an example represents common designs of eBGP running over leaf/spine
data centers. Specifically, each of the leaf switches will be in a separate AS, and the spine layer will
be in the same AS layer.
BGP
protocol bgp
router bgp 65001 vrf default
router bgp 65001 vrf default bgp fast-external-fallover
router bgp 65001 vrf default maximum-paths 32
router bgp 65001 vrf default bestpath as-path multipath-relax force
router bgp 65001 vrf default neighbor 10.10.10.2 remote-as 65002
router bgp 65001 vrf default neighbor 100.100.100.1 remote-as 65000
router bgp 65001 vrf default neighbor 100.100.100.5 remote-as 65000
router bgp 65001 vrf default network 1.1.1.1 /32
router bgp 65001 vrf default network 100.0.0.1 /32
Note: It is necessary to advertise both the local loopback network and the mlag-tunnel-ip network.
In the following code, we create a peer group that contains all of the EVPN configuration and attach
it to our L3 interfaces.
872
Spine Configuration
Each spine has a unique loopback address that we use to represent its Router-ID.
protocol bgp
router bgp 65000 vrf default
router bgp 65000 vrf default bgp fast-external-fallover
router bgp 65000 vrf default maximum-paths 32
router bgp 65000 vrf default bestpath as-path multipath-relax force
router bgp 65000 vrf default neighbor 100.100.100.1 remote-as 65001
router bgp 65000 vrf default neighbor 100.100.100.5 remote-as 65002
router bgp 65000 vrf default neighbor 100.100.100.9 remote-as 65003
router bgp 65000 vrf default neighbor 100.100.100.13 remote-as 65004
router bgp 65000 vrf default neighbor evpn peer-group
router bgp 65000 vrf default neighbor evpn send-community
router bgp 65000 vrf default neighbor evpn send-community extended
router bgp 65000 vrf default address-family l2vpn-evpn neighbor evpn next-hop-unchanged
router bgp 65000 vrf default address-family l2vpn-evpn neighbor evpn activate
router bgp 65000 vrf default neighbor 100.100.100.1 peer-group evpn
router bgp 65000 vrf default neighbor 100.100.100.5 peer-group evpn
router bgp 65000 vrf default neighbor 100.100.100.9 peer-group evpn
router bgp 65000 vrf default neighbor 100.100.100.13 peer-group evpn
router bgp 65000 vrf default network 1.1.1.5 /32
Traffic forwarding during a failure follows standard MLAG behavior. If a link of the server fails,
traffic will be forwarded across one of the remaining active links.
With reference to the illustration below: If traffic is received on leaf3 due to the ECMP hash of the
spine, leaf3 will decapsulate the frame. And based on its local MAC table, leaf3 will also switch the
frame across the peer link for forwarding to Server via leaf4.
873
Uplink Failure
To cover rare cases such as losing all of the uplinks on one of the MLAG peers, we enable BGP over
the IPL. This way, traffic coming from the servers towards that leaf can still be routed towards the
874
remote servers.
Note: Traffic coming towards the servers connected to leaf4 from the spine will always be
terminated on leaf4 and sent directly to the servers without passing over the IPL.
EVPN Troubleshooting
Admin state: up
Source interface: loopback 1 (ip 3.3.3.3)
Controller mode: BGP
Mlag tunnel IP: (not configured)
Global Neigh-Suppression: Disable
Auto-vlan-map: Enabled
Auto-vlan-map base: 100000
NVE member interfaces: (not configured)
Counters
0 encapsulated (Tx) NVE packets
0 decapsulated (Rx) NVE packets
0 dropped NVE-encapsulated packets
0 NVE-encapsulated packets with errors
875
-----------------------------------------------------
Vlan VNI Neigh Suppression Mapping Type
-----------------------------------------------------
1 1000001 Enable Auto
6 60 Disable Manual
7 70 Disable Manual
876
show ip bgp evpn vni 10060
-------------------------------------------------------------------------------------------------------------------
---------------------------
RD Type Data Next Hop Metric LocPrf
Weight Path
-------------------------------------------------------------------------------------------------------------------
---------------------------
1.1.1.1:321 mac-ip 00:00:01:11:22:33 1.1.1.1 0 100
0 104 101 ?
1.1.1.1:321 mac-ip 00:10:00:00:00:05 1.1.1.1 0 100
0 104 101 ?
1.1.1.1:321 mac-ip 00:10:33:01:7d:2a 1.1.1.1 0 100
0 104 101 ?
1.1.1.1:321 mac-ip 00:10:66:02:fa:54 1.1.1.1 0 100
0 104 101 ?
1.1.1.1:321 mac-ip 00:10:88:06:a7:33 1.1.1.1 0 100
0 104 101 ?
1.1.1.1:321 mac-ip 00:10:cc:05:f4:a8 1.1.1.1 0 100
0 104 101 ?
9.9.9.9:321 mac-ip 00:10:94:00:00:02 9.9.9.9 0 100
0 104 102 ?
9.9.9.9:321 mac-ip 00:10:94:00:00:03 9.9.9.9 0 100
0 104 102 ?
show mac-address-table
Display all local and remote MAC addresses.
-----------------------------------------------------------
Vlan Mac Address Type Port\Next Hop
-----------------------------------------------------------
10 00:00:01:11:22:33 Static 9.9.9.9(nve1)
10 00:00:01:55:A4:25 Static 1.1.1.1(nve1)
10 00:10:00:00:0A:67 Dynamic Eth1/10
10 00:10:44:03:51:01 Dynamic Eth1/10
10 00:10:88:06:A2:02 Dynamic Eth1/10
10 00:10:AA:07:0F:B1 Dynamic Eth1/10
30 00:10:00:00:05:29 Dynamic 1.1.1.1(nve1)
30 00:10:00:00:0A:52 Dynamic 1.1.1.1(nve1)
123 00:10:00:00:0A:5B Dynamic 9.9.9.9(nve1)
123 00:10:44:03:51:0E Dynamic 9.9.9.9(nve1)
123 00:10:88:06:A2:1C Dynamic 9.9.9.9(nve1)
Number of unicast(local): 4
Number of NVE: 7
show ip arp
Display all local and remote neighbors (ARP entries), this command is only relevant when arp-
suppression is enabled.
877
EVPN Data Center Interconnect (DCI)
Regular BGP/EVPN Configuration is required since the connection between the sites is L2 based.
As the WAN transport layer does not support the EVPN/BGP address family, a remote BGP/EVPN
connection should be set between each of the local leafs and the remote leafs. To allow this
connection BGP should be set to multi-hop mode.
878
EVPN Logging Examples
[metad.WARNING]: EVPN MAC duplication detected for MAC 24:8A:07:A0:B0:0D, IP 2.2.2.2 and VLAN 6 from BGP neighbor
1.1.1.1
When receiving EVPN MAC mobility route for a static MAC address, the following message will
appear:
[metad.WARNING]: EVPN MAC mobility route received for sticky MAC 24:8A:07:A0:B0:0D, IP 2.2.2.2 and VLAN 6 from BGP
neighbor 1.1.1.1
879
IP Routing
The following pages provide information on configuring IP routing (L3) protocols and features.
• IP Routing Overview
• OSPF
• BGP
• Bidirectional Forwarding Detection (BFD) Infrastructure
• Policy Rules
• VRRP
• MAGP
• DHCP Relay
IP Routing Overview
IP Interfaces
Mellanox Onyx™ supports the following 3 types of IP interfaces:
• VLAN interface
• Loopback interface
• Router port interface
Onyx supports up to 999 IP interfaces.
Each IP interface can be configured with multiple IP addresses. The first address assigned to the
interface automatically becomes its primary address (only one primary address is supported per
interface), and the rest are secondary addresses.
Secondary addresses are advertised via OSPF. No “HELLO” messages are sent on them and
no adjacencies are established on them either.
Primary addresses cannot be modified once assigned. To assign a different primary address, all
addresses of the interface must be removed and then reconfigured.
IPv4 link local IP addresses such as 169.254.x.x can be assigned to IP interfaces, thus
allowing all routing, forwarding functions and applications on top of the interfaces to
function as the real IP addresses. Only unique addresses from that range can be assigned to
IP interface, same address assignment is not supported.
VLAN Interfaces
VLAN interface is a logical IPv4 interface created per subnet over a specific 802.1Q VLAN ID. If two
hosts from two different subnets need to communicate (via the IP layer), the network administrator
needs to configure two interface VLANs, one for each of the subnets.
880
• Admin state
• Operational state
• MAC address
• IP address and mask
• MTU
• Description
• Set of counters
Loopback Interfaces
Loopback interface is a logical software entity where traffic transmitted to this interface is
immediately received on the sending end.
Once configured, router port interfaces no longer partake in the bridging activities of the switch and
VLANs configured on them are separate from the pool allocated for the switch ports.
3. There must be at least one interface in the operational state “UP”. Run:
881
switch (config interface vlan 10) # show interfaces vlan 10
Vlan 10:
Admin state : Enabled
Operational state: Down
Autostate : Enabled
Mac Address : 24:8A:07:F3:04:C8
DHCP client : Disabled
IPv4 address:
10.10.10.10/24 [primary]
Broadcast address:
10.10.10.255 [primary]
Arp responder: Disabled
MTU : 1500 bytes
Arp timeout : 1500 seconds
Icmp redirect: Enabled
Description : my-ip-interface
VRF : default
Counters : Disabled
882
switch (config interface ethernet 1/10)# show interfaces ethernet 1/10
Eth1/10:
Admin state : Enabled
Operational state : Down
Last change in operational status: Never
Boot delay time : 0 sec
Description : N/A
Mac address : 24:8A:07:F3:04:C8
MTU : 1500 bytes (Maximum packet size 1522 bytes)
Fec : auto
Flow-control : receive off send off
Supported speeds : 1G 10G 25G
Advertised speeds : 1G 10G 25G
Actual speed : Unknown
Auto-negotiation : Enabled
Width reduction mode : Unknown
DHCP client : Disabled
Autoconfig : Disabled
IPv4 address:
100.100.100.100/24 [primary]
Broadcast address:
100.100.100.255 [primary]
Arp responder: Disabled
Arp timeout : 1500 seconds
VRF : default
Forwarding mode: inherited cut-through
Telemetry sampling: Disabled TCs: N\A
Telemetry threshold: Disabled TCs: N\A
Telemetry threshold level: N\A
Last clearing of "show interface" counters: Never
60 seconds ingress rate : 0 bits/sec, 0 bytes/sec, 0 packets/sec
60 seconds egress rate : 0 bits/sec, 0 bytes/sec, 0 packets/sec
Rx:
0 packets
0 unicast packets
0 multicast packets
0 broadcast packets
0 bytes
0 discard packets
0 error packets
0 fcs errors
0 undersize packets
0 oversize packets
0 pause packets
0 unknown control opcode
0 symbol errors
Tx:
0 packets
0 unicast packets
0 multicast packets
0 broadcast packets
0 bytes
0 discard packets
0 error packets
0 hoq discard packets
In the following figures, routers R1 and R2 can both access each of their router peer networks.
Router R1 routing table for 10.0.40/24 will contain the following routes:
• 10.0.10.2
• 10.0.20.2
• 10.0.30.2
883
The load balancing function of the ECMP is configured globally on the system.
Hash algorithm can be symmetric or asymmetric. In symmetric hash functions bidirectional flows
between routes will follow the same path, while in asymmetric hash functions, bidirectional traffic
can follow different paths in both directions.
• Source IP & Port – source IP (SIP) and source UDP/TCP port: If the packet is not UDP/TCP, only
SIP is used for the hash calculation. This is an asymmetric hash function.
• Destination IP & Port – destination IP (DIP) and destination UDP/TCP port: If the packet is not
UDP/TCP, only DIP is used for the hash calculation. This is an asymmetric hash function.
• Source and Destination IP & Port – destination and source IP, as well as destination and source
UDP/TCP port: If the packet is not UDP/TCP, only SIP/DIP are used for the hash calculation.
This is a symmetric hash function.
• Traffic Class – Load balance based on the traffic class assigned to the packet. This is an
asymmetric hash function.
• All (default) – all above fields are part of the hash calculations. This is a symmetric hash
function.
Hash Functions
It is advised that LAG and ECMP hash function configuration over more than one hop is different. If
the same hash function is used over two hops, all the traffic sorted from one hop to following one
will arrive already having the same characteristics, which will render the next hash function useless.
For example, configure load-balancing on the first hop based on source IP while on the next hop
based on destination IP.
884
ECMP Consistent Hashing
In an IP network multiple flows share the same path defined by their destination prefix. ECMP allows
those flows to travel with the same prefix and be distributed over multiple next hops that usually
belong to different physical links, in order to reach better bandwidth utilization. When using the
standard ECMP some links in the network become unreachable, thus the next hop list and hash
function distribution change, and flows are moved to other links. Packet reordering in the network
or failure in a user session might occur, while others which use anycast IP addresses utilize ECMP
distribution for load balancing. Therefore, changing the next hop may cause flows to arrive to the
wrong destination.
When network is reconfigured, and route next hop set is changed, flows that are not affected by the
change should continue to be sent to the same next hops and keep the same outgoing link.
Using consistent hash containers enables you to use size arrays with next hop buckets to make sure
unaffected flows are sent to the same next hops when some next hops are removed from the
container. When a new next hop is added to the consistent hash container, some buckets are
replaced with a new next hop, so part of the existing flows are moved to a new next hop.
When a route is installed, it points to a hash container. Each flow in the route is mapped to a
respective bucket, and is eventually forwarded to the next hop in the bucket.
In the following example we see a single route with 3 flows and 4 next hops, so the container has 12
bucket.
885
Remove Next Hops
Unlike the default IP load-sharing hashing, when consistent hashing is used, and a next hop needs to
be removed, the number of hash buckets does not change. All appearances of the deleted next hop
are removed from the container and replaced by the remaining next hops.
886
Add Next Hops
When adding a new next hop, some of existing next hops should be removed from the hash, and the
new next hop should be located in one of the newly available places.The new next hops are not
applied to HW immediately, but only after a convergence time period.
887
Supported Number of Containers
When the consistent hashing containers count exceeds the maximum number of containers, the
operational state of consistent hashing function will become “unstable” and the containers with the
same next hop sets will be merged to release more resources. Once more resources are available to
deploy the containers, the operation state will become “stable”.
In the unstable case which may result from lack of consistent hashing resources, the new route will
be installed as a non-consistent route, and a random next hop from its next hop set will be chosen
as the actual next hop and installed in hardware. The route will only be partially programed in
hardware.
512 40 96
1024 20 48
888
Virtual Routing and Forwarding
Virtual Routing and Forwarding (VRF) allows multiple routing table instances to coexist within the
same router simultaneously. Since the routing instances are independent, IP addresses on each
routing table may overlap without conflicting with each other.
• Different IP interfaces can be attached to different VRFs (only one IP interface can be in a
single VRF)
• Routing in VRF can be enabled or disabled
• Each VRF component can run its own routing protocol independently from other instances
• Differently configured IPv4 and IPv6 services
The first VRF in the system is created automatically and it is called “default” VRF. It cannot be
deleted or configured.
• A station wants to initiate an IP session with another station on the same IP subnet and needs
to obtain its L2 address
• A station wants to update other stations that its MAC address has changed
• A station wants to check that the MAC address of its peer did not change
• The peer responds with unicast ARP response.
The following are two scenarios when ARP responder functionality is needed:
• Network wants to avoid broadcast in the network or on some parts of the network, so
broadcast ARP packets are not distributed in that part of the network
• There is no L2 connectivity between some parts of the network, and even IP addressing
scheme does not reflect it
ARP responder answers a broadcast ARP requests that arrive to the switch.
ARP responder is configured on an IP interface (with or without IP address) of any type (e.g. VLAN
interface, router port, or LAG).
This functionality is provided for all ARP entries that are configured or provided on the interface:
Static, dynamic, or per protocol.
889
There is no need to enable IP routing in the system to enable ARP responder functionality.
If a user has multiple VRFs the interface can be created in any VRF. If IP routing is disabled the
interface is created in default VRF.
ARP responder can be enabled together with IP routing and given an interface which can be used in
routing.
When IP routing on the interface is enabled, all entries that have been used by the responder
become ARP entries for the router and vice versa.
A user must avoid using ARP responder in broadcast networks—the system itself does not
block it.
4. Create ACL to drop broadcast, and assign it to all relevant L2 interface (VLAN’s members).
Run:
890
ip l3
ip l3 [force]
no ip l3 [force]
Enables IP routing capabilities.
The no form of the command disables IP routing and removes its configuration.
Related Commands
Note
vrf definition
vrf definition <vrf-name>
Creates the VRF.
Related Commands
Notes 63 VRFs are supported aside from the default VRF
routing-context vrf
routing-context vrf <vrf-name>
Enters the active-context of the specified session.
891
Default N/A
History 3.4.2008
Related Commands
ip routing
ip routing [vrf <vrf-name>]
Enables L3 forwarding between high speed interfaces.
Related Commands
Notes • RD must be configured to enable IP routing on the VRF
• If no routing-context is specified, the “routing-context” VRF
is automatically configured.
description
description <description>
no description forceAdds description for the VRF.
The no form of the command removes the description of the VRF.
Syntax Description description Text string
892
force Forces deletion (no confirmation
needed if configuration exists
inside the VRF)
Default N/A
Configuration Mode config vrf definition
History 3.4.2008
Example switch (config vrf definition my-vrf) # description vrf-
description
Related Commands
Notes
rd
rd [<ip addr>:<0-65,535> | <AS Number>:<0-4,294,967,295> | <AS Number>:<ip
addr>]
Adds a Route Distinguisher (RD) to the VRF configuration mode.
History 3.4.2008
Related Commands
893
vrf forwarding
vrf forwarding <vrf-name>
Maps an interface to VRF.
Default N/A
History 3.4.2008
Related Commands
Notes
Default N/A
History 3.6.6102
Related Commands
Notes
894
show ip routing
show ip routing [vrf <vrf-name> | all]
Displays IP routing information per VRF.
History 3.2.0230
3.4.2008 Added VRF parameter
3.6.8008 Updated Example
Example switch (config) # show ip routing
VRF Name default:
IP routing: enabled
switch (config) # show ip routing vrf all
VRF Name default:
IP routing: enabled
VRF Name new:
IP routing: disabled
Related Commands
Default N/A
History 3.6.6102
895
Related Commands
Notes
Default N/A
History 3.4.2008
Related Commands
Notes
show vrf
show vrf [<vrf-name> | all]
Displays VRF information.
History 3.4.2008
3.6.6000 Updated Example
896
Example switch (config) # show vrf my-vrf
VRF Info:
Name: default
RD: NA
Description: NA
IP routing state: Disabled
IPv6 routing state: Disabled
IP multicast routing state: Disabled
Protocols:
Interfaces:
Related Commands
IP Interface
switchport
switchport [force]
no switchport [force]
Configures the Ethernet interface as a regular switchport.
The no form of the command configures the Ethernet interface as router
port interface.
Default N/A
History 3.3.5200
Related Commands
897
encapsulation dot1q vlan
encapsulation dot1q vlan <vlan-id> [force]
no encapsulation dot1q vlan [force]
Enables L2 802.1Q encapsulation of traffic on a specified router port
interface in a VLAN.
The no form of the command disables L2 802.1Q encapsulation of traffic
on a specified router port interface in a VLAN.
Default N/A
History 3.3.5200
Related Commands
Notes
Interface VLAN
interface vlan
interface vlan <vid>
no interface vlan <vid>
Creates a VLAN interface and enters the interface
VLAN configuration mode.
The no form of the command deletes the VLAN
interface.
Default N/A
Configuration Mode config
History 3.2.0230
Example switch (config) # interface vlan 10
switch (config interface vlan 10) #
898
Related Commands ip routing
vlan <vlan-id>
switchport mode
switchport access
show interface vlan
Default N/A
Configuration Mode config
History 3.6.4006
Example switch (config) # interface vlan 10 no-autostate
switch (config) # interface vlan 10-13 no-
autostate
899
ip address
ip address <ip-address> <mask> no ip address [<ip-address>
[<mask>]]
Enters user-defined IPv4 address for the interface. The no
form of the command removes the specified IPv4 address. If no
address is specified, then all IPv4 addresses of this interface
are removed.
Default 0.0.0.0/0
Configuration Mode config interface vlan
History 3.2.0230
Example switch (config interface vlan 10) # ip address 10.10.10.10 /
24
counters
counters
no counters
Enables counters on the IP interface. The no form of the command disables counters gathering
on the IP interface.
Syntax N/A
Description
Default Disabled
Configuration config interface vlan
Mode
900
History 3.2.0230
Example switch (config interface vlan 10) # counters
description
description <string>
no description
Enters a description for the interface.
The no form of the command sets the description to default.
Default “”
Configuration Mode config interface vlan
History 3.2.0230
Example switch (config interface vlan 10) # description my-ip-interface
mtu
mtu <size> [force]
no mtu
Sets the Maximum Transmission Unit for the interface.
The no form of the command sets the MTU to default.
Default 1522
Configuration Mode config interface vlan
History 3.2.0230
Example switch (config interface vlan 10)# mtu 9216
901
Related Commands interface vlan
show interfaces vlan
Notes
shutdown
shutdown
no shutdown
Disables the interface.
The no form of the command enables the interface.
Default Enabled
Configuration Mode config interface vlan
History 3.1.0000
Example switch (config interface vlan 20) # shutdown
clear counters
clear counters
Clears the interface counters.
Default N/A
Configuration Mode config interface vlan
History 3.2.0230
Example switch (config interface vlan 10) # clear counters
902
ip icmp redirect
ip icmp redirect
no ip icmp redirect
Enables ICMP redirect.
The no form of the command disables ICMP redirect.
Syntax N/A
Description
Default Enabled
Configuratio config interface vlan
n Mode
History 3.4.0010
Example switch (config interface vlan 10) # no ip icmp redirect
show interfaces
show interfaces [brief]
Displays interface configuration.
Default N/A
Configuration Mode Any command mode
History 3.2.3000
3.6.8008 Updated Example
Example
903
switch (config) # show interfaces
Interface lo status:
Comment :
Admin up : yes
Link up : yes
DHCP running : no
...
Interface mgmt0 status:
Comment :
Admin up : yes
Link up : yes
DHCP running : yes
...
Interface mgmt1 status:
Comment :
Admin up : yes
Link up : yes
DHCP running : yes (but no valid lease)
...
Eth1/1:
Admin state : Enabled
Operational state : Up
Last change in operational status: 0:22:11 ago (5 oper change)
Boot delay time : 0 sec
...
Default N/A
History 3.2.3000
904
Example switch (config) # show interfaces vlan 100
Vlan 100:
Admin state : Enabled
Operational state: Down
Autostate : Enabled
Mac Address : 24:8A:07:83:30:C8
DHCP client : Disabled
IPv4 address:
192.168.70.254/24 [primary]
192.168.80.254/24
Broadcast address:
192.168.70.255 [primary]
192.168.80.255
IPv6 address:
4000::1/64 [primary]
5000::1/64
Related Commands
Notes
show ip interface
show ip interface [vrf <vrf-name>]
Displays IP interfaces information.
Default N/A
History 3.4.2008
905
Example switch (config) # show ip interface
Related
Commands
Notes
906
show ip interface brief
show ip interface [vrf <vrf-name] brief
Displays IP interfaces brief information.
Default N/A
History 3.4.2008
Example
switch (config) # show ip interface brief
---------------------------------------------------------------------------------------------------
Interface Address/Mask Primary Admin-state Oper-state MTU VRF
---------------------------------------------------------------------------------------------------
mgmt0 10.12.67.33/25 Enabled Up 1500 default
mgmt1 Unassigned Enabled Up 1500 default
Vlan 100 192.168.70.254/24 primary Enabled Down 1500 default
Vlan 100 192.168.80.254/24
Eth1/1 192.168.50.254/24 primary Enabled Up 1500 default
Eth1/1 192.168.60.254/24
Po1 192.168.100.254/24 primary Enabled Down 1500 default
Po1 192.168.110.254/24
Loopback 1 192.168.1.1/32 primary Enabled Up 1500 default
Loopback 1 192.168.2.1/32
Related Commands
Notes
Syntax Description <type> <id> Specifies the interface for which to display
data
Default N/A
History 3.4.2008
907
3.6.8008 Updated Example
Related Commands
Notes
show ip
show ip interface [vrf <vrf-name>] ethernet <slot>/<port>
Displays information on the specified Ethernet interface in the routing-context VRF.
Default N/A
History 3.4.2008
Example
908
switch (config) # show ip interface ethernet 1/1
Eth1/1:
Admin state : Enabled
Operational state : Up
Last change in operational status: 0:11:14 ago (5 oper change)
Boot delay time : 0 sec
Description : N/A
Mac address : 24:8A:07:83:30:C8
MTU : 1500 bytes (Maximum packet size 1522 bytes)
Fec : auto
Flow-control : receive off send off
Supported speeds : 1G 10G 25G
Advertised speeds : 1G 10G 25G
Actual speed : 25G (auto)
Auto-negotiation : Enabled
Width reduction mode : Unknown
DHCP client : Disabled
Autoconfig : Disabled
IPv4 address:
192.168.50.254/24 [primary]
192.168.60.254/24
Broadcast address:
192.168.50.255 [primary]
192.168.60.255
IPv6 address:
2000::1/64 [primary]
3000::1/64
fe80::268a:7ff:fe83:30c8/64
Rx:
698 packets
0 unicast packets
0 multicast packets
698 broadcast packets
44672 bytes
0 discard packets
0 error packets
0 fcs errors
0 undersize packets
0 oversize packets
0 pause packets
0 unknown control opcode
0 symbol errors
Tx:
1923 packets
0 unicast packets
1859 multicast packets
64 broadcast packets
142718 bytes
0 discard packets
0 error packets
0 hoq discard packets
Related
Commands
Notes
909
show ip interface mgmt0
show ip interface [vrf <vrf-name>] mgmt0
Displays management interface information.
Default N/A
History 3.4.2008
910
Example switch (config) # show ip interface mgmt0
IPv6 address:
fe80::268a:7ff:fe53:3d8e/64
Rx:
1843422 bytes
25627 packets
0 mcast packets
0 discards
0 errors
0 overruns
0 frame
Tx:
236174 bytes
1897 packets
0 discards
0 errors
0 overruns
0 carrier
0 collisions
0 queue len
Related Commands
Notes
Syntax id LAG ID
Description
vrf VRF name
Default N/A
911
History 3.4.2008
Example
switch (config) # show ip interface port-channel 1
Po1:
Admin state : Enabled
Operational state : Down
Description : N/A
Mac address : 24:8A:07:83:30:C8
MTU : 1500 bytes (Maximum packet size 1522 bytes)
lacp-individual mode: Disabled
Flow-control : receive off send off
Actual speed : 25G (auto)
Auto-negotiation : N/A
Width reduction mode: Not supported
DHCP client : Disabled
Autoconfig : Disabled
IPv4 address:
192.168.100.254/24 [primary]
192.168.110.254/24
Broadcast address:
192.168.100.255 [primary]
192.168.110.255
IPv6 address:
6000::1/64 [primary]
7000::1/64
Rx:
0 packets
0 unicast packets
0 multicast packets
0 broadcast packets
0 bytes
0 discard packets
0 error packets
0 fcs errors
0 undersize packets
0 oversize packets
0 pause packets
0 unknown control opcode
0 symbol errors
Tx:
0 packets
0 unicast packets
0 multicast packets
0 broadcast packets
0 bytes
0 discard packets
0 error packets
0 hoq discard packets
912
Related
Commands
Notes
Default N/A
History 3.4.2008
913
Example switch (config) # show ip interface vrf default port-channel 1
Po1:
Admin state : Enabled
Operational state : Down
Description : N/A
Mac address : 24:8A:07:83:30:C8
MTU : 1500 bytes (Maximum packet size 1522 bytes)
lacp-individual mode: Disabled
Flow-control : receive off send off
Actual speed : 25G (auto)
Auto-negotiation : N/A
Width reduction mode: Not supported
DHCP client : Disabled
Autoconfig : Disabled
...
Related Commands
Default N/A
History 3.6.8008
914
Example switch (config) # show ipv6 interface
Eth1/1:
VRF : default
Admin state: enabled
IPv6 : enabled
IPv6 address:
2000::1/64 [primary]
3000::1/64
Po1:
VRF : default
Admin state: enabled
IPv6 : enabled
IPv6 address:
6000::1/64 [primary]
7000::1/64
vlan100:
VRF : default
Admin state: enabled
IPv6 : enabled
IPv6 address:
4000::1/64 [primary]
5000::1/64
loopback1:
VRF : default
Admin state: enabled
IPv6 : enabled
IPv6 address:
2001::1/128 [primary]
2002::1/128
Related Commands
Notes
915
show ipv6 interface brief
show ipv6 interface [vrf <vrf-name>] brief
Displays IPv6 interface information.
Default N/A
History 3.6.8008
Example
switch (config) # show ipv6 interface brief
----------------------------------------------------------------------------------------------------------
-------------------------
Interface Address/Mask Primary Address-state Admin-state Oper-
state MTU VRF
----------------------------------------------------------------------------------------------------------
-------------------------
mgmt0 fe80::268a:7ff:fe53:3d8e/64 valid Enabled Up
1500 default
mgmt1 fe80::268a:7ff:fe53:3d8f/64 valid Enabled Up
1500 default
Eth1/1 2000::1/64 primary valid Enabled Up
1500 default
Eth1/1 3000::1/64 valid
Eth1/1 fe80::268a:7ff:fe83:30c8/64 valid
Po1 6000::1/64 primary valid Enabled Down
1500 default
Po1 7000::1/64 valid
vlan100 4000::1/64 primary valid Enabled Down
1500 default
vlan100 5000::1/64 valid
loopback1 2001::1/128 primary valid Enabled Up
1500 default
loopback1 2002::1/128 valid
loopback1 fe80::4c01:40ff:feb3:b753/64 valid
Related
Commands
Notes
916
show ipv6
show ipv6 interface [vrf <vrf-name>] ethernet <slot>/<port>
Display IPv6 information of the specified Ethernet interface.
Default N/A
History 3.6.8008
Eth1/1:
VRF : default
Admin state: enabled
IPv6 : enabled
IPv6 address:
2000::1/64 [primary]
3000::1/64
Related Commands
Notes
Default N/A
917
Configuration Mode Any command mode
History 3.6.8008
loopback1:
VRF : default
Admin state: enabled
IPv6 : enabled
IPv6 address:
2001::1/128 [primary]
2002::1/128
Related Commands
Notes
Default N/A
History 3.6.8008
Po1:
VRF : default
Admin state: enabled
IPv6 : enabled
IPv6 address:
6000::1/64 [primary]
7000::1/64
918
Related Commands
Notes
Default N/A
History 3.6.8008
vlan100:
VRF : default
Admin state: enabled
IPv6 : enabled
IPv6 address:
4000::1/64 [primary]
5000::1/64
Related Commands
Notes
919
Default N/A
History 3.6.8008
Eth1/1:
VRF : default
Admin state: enabled
IPv6 : enabled
...
Po1:
VRF : default
Admin state: enabled
IPv6 : enabled
...
vlan100:
VRF : default
Admin state: enabled
IPv6 : enabled
...
loopback1:
VRF : default
Admin state: enabled
IPv6 : enabled
...
Related Commands
Notes
Default N/A
History 3.6.8008
Example
920
switch (config) # show ipv6 interface vrf default brief
----------------------------------------------------------------------------------------------------------
-------------------------
Interface Address/Mask Primary Address-state Admin-state Oper-
state MTU VRF
----------------------------------------------------------------------------------------------------------
-------------------------
mgmt0 fe80::268a:7ff:fe53:3d8e/64 valid Enabled Up
1500 default
mgmt1 fe80::268a:7ff:fe53:3d8f/64 valid Enabled Up
1500 default
Eth1/1 2000::1/64 primary valid Enabled Up
1500 default
Eth1/1 3000::1/64 valid
Eth1/1 fe80::268a:7ff:fe83:30c8/64 valid
Po1 6000::1/64 primary valid Enabled Down
1500 default
Po1 7000::1/64 valid
vlan100 4000::1/64 primary valid Enabled Down
1500 default
vlan100 5000::1/64 valid
loopback1 2001::1/128 primary valid Enabled Up
1500 default
loopback1 2002::1/128 valid
loopback1 fe80::4c01:40ff:feb3:b753/64 valid
Related
Commands
Notes
Loopback Interface
interface loopback
interface loopback <id>
no interface loopback <id>
Creates a loopback interface and enters the interface
configuration mode.
The no form of the command deletes the interface.
Default N/A
History 3.2.3000
Related Commands
921
ip address
ip address <ip-address> <mask>
no ip address [<ip-address> [<mask>]]
Enters user-defined IPv4 address for the interface.
The no form of the command removes the specified IPv4 address. If
no address is specified, then all IPv4 addresses of this interface are
removed.
Default 0.0.0.0/0
History 3.3.5006
description
description <string>
no description
Enters a description for the interface.
The no form of the command sets the description to default.
922
mask There are two possible ways to the mask:
• /length – only /32 is possible
• Network address (i.e.
255.255.255.0)
The mask length may be configured
without a space (i.e. <ipv4-address>/
<length>).
Default “”
History 3.3.5006
Notes
Default N/A
History 3.2.3000
Loopback 1:
IPv4 address:
192.168.1.1/32 [primary]
192.168.2.1/32
Broadcast address:
192.168.1.1 [primary]
192.168.2.1
IPv6 address:
2001::1/128 [primary]
2002::1/128
fe80::4c01:40ff:feb3:b753/64
923
Related Commands interface loopback
Notes
ip route
ip route [vrf <vrf-name>] <ip-prefix> <netmask> {<next -hop-ip-
address> | ethernet <port> | port-channel <id> | vlan <id> | null0}
[<distance>]
no ip route [vrf <vrf-name>] <ip-prefix> <netmask> [<next -hop-ip-
address>]
Configures a static route inside VRF.
The no form of the command removes the static route configured.
ip-prefix IP address
History 3.1.0000
Related Commands
924
Notes If no routing-context is specified, the “routing-context” VRF is
automatically configured.
ip load-sharing
ip load-sharing <type> [ecmp-group-size <size> [ max-ecmp-groups <max>]]
no ip load-sharing
Default all
History 3.2.0230
925
show ip route
show ip route [vrf <vrf-name] [[<ip-address> | <ip-address>/<length>] [longer-prefixes]]
[connected | bgp | static]
Displays routing table.
Syntax ip-address Performs longest prefix match (LPM) and displays best route
Description
<ip-address>/ Displays next hop for the specified network. If the network does not
<length> exist in routing table, it is not shown.
Note: It is the user’s responsibility to calculate the mask and enter it
correctly.
For example:
• Valid - show ip route 10.10.10.0/24
• Invalid - show ip route 10.10.10.10/24
longer-prefixes Displays the routes to the specified destination and any routes to a
more specific destination. (Only available if both IP and mask are
specified.)
connected Displays entries for routes to networks directly connected to the switch
Default N/A
History 3.6.5000 Updated Example
Example
switch (config) # show ip route
Flags:
F: Failed to install in H/W
B: BFD protected (static route)
i: BFD session initializing (static route)
x: protecting BFD session failed (static route)
c: consistent hashing
p: partial programming in H/W
Related ip route
Commands
926
Notes • If no default route exists, then the message “Route not found” is printed
• Route next hop is BFD controlled, status is viewable when <all> is inserted in the
command, and it will be shown as follows:
• If route is removed from routing decision it will be marked as “Active”
• Protected next hops are marked with “B”
• BFD protected failed/non active neighbors are marked with “BF”
• If no routing-context is specified, the “routing-context” VRF is automatically
displayed
Default N/A
History 3.4.2008
Example
927
switch (config) # show ip route vrf default
Flags:
F: Failed to install in H/W
B: BFD protected (static route)
i: BFD session initializing (static route)
x: protecting BFD session failed (static route)
Flags:
F: Failed to install in H/W
B: BFD protected (static route)
i: BFD session initializing (static route)
x: protecting BFD session failed (static route)
Related ip route
Commands
Notes • If no default route exists, then the message “Route not found” is printed
• Route next hop is BFD controlled, status is viewable when <all> is inserted in the
command, and it will be shown as follows:
• If route is removed from routing decision it will be marked as “Active”
• Protected next hops are marked with “B”
• BFD protected failed/non active neighbors are marked with “BF”
• If no routing-context is specified, the “routing-context” VRF is automatically
displayed
• When using a network prefix, the user must calculate the host mask and enter
correctly. For example, “show ip route 10.10.10.0/24” is valid, but “ip route
10.10.10.10/24” is invalid.
show ip route -a
show ip route [vrf {<vrf-name> | all}] -a
Displays routing table of VRF instance.
928
-a Displays static routes currently inactive due to the interface being down
Default N/A
History 3.4.0000
Example
switch (config) # show ip route vrf my-vrf -a
VRF Name: my-vrf
-----------------------------
Destination Mask Gateway Interface Source Distance/Metric
90.90.90.0 255.255.255.0 1.1.1.2 NA static 1/0
Related ip route
Commands
Notes • If no default route exists, then the message “Route not found” is printed
• Route next hop is BFD controlled, status is viewable when <all> is inserted in the
command, and it will be shown as follows:
• If route is removed from routing decision it will be marked as “Active”
• Protected next hops are marked with “B”
• BFD protected failed/non active neighbors are marked with “BF”
• If no routing-context is specified, the “routing-context” VRF is automatically
displayed
Default N/A
History 3.6.6000
929
Example
switch (config) # show ip route failed
Flags:
F: Failed to install in H/W
B: BFD protected (static route)
i: BFD session initializing (static route)
x: protecting BFD session failed (static route)
Related ip route
Commands
Notes • If no default route exists, then the message “Route not found” is printed
• Route next hop is BFD controlled, status is viewable when <all> is inserted in the
command, and it will be shown as follows:
• If route is removed from routing decision it will be marked as “Active”
• Protected next hops are marked with “B”
• BFD protected failed/non active neighbors are marked with “BF”
• If no routing-context is specified, the “routing-context” VRF is automatically
displayed
Default N/A
930
History 3.1.0000
Example
switch (config) # show ip route static
Flags:
F: Failed to install in H/W
B: BFD protected (static route)
i: BFD session initializing (static route)
x: protecting BFD session failed (static route)
Related ip route
Commands
Notes • If no default route exists, then the message “Route not found” is printed
• Route next hop is BFD controlled, status is viewable when <all> is inserted in the
command, and it will be shown as follows:
• If route is removed from routing decision it will be marked as “Active”
• Protected next hops are marked with “B”
• BFD protected failed/non active neighbors are marked with “BF”
• If no routing-context is specified, the “routing-context” VRF is automatically
displayed
Default N/A
931
History 3.6.6000
Example
switch (config) # show ip route vrf default static multicast-override
VRF "default":
----------------------------------------------------------------------
Destination Mask Gateway Route preference
----------------------------------------------------------------------
50.50.50.0 255.255.255.0 20.20.20.45 1
100.100.8.0 255.255.255.0 20.20.20.9 1
100.100.100.0 255.255.255.0 20.20.20.22 7
100.100.100.100 255.255.255.255 20.20.20.9 1
Related
Commands
Notes
Default N/A
History 3.1.0000
932
Example switch (config) # show ip route vrf my-vrf summary
VRF Name: default
------------------------
Route Source Routes
------------------------
direct 3
static 0
ospf 0
bgp 0
DHCP 1
Total 4
Default N/A
Example
933
switch (config) # show ip route interface vlan 10
VRF Name: default
Total number of entries: 1
----------------------------------------------------------------------------
Address Type Hardware Address Interface
----------------------------------------------------------------------------
15.0.0.2 Static ETH DE:DE:BE:EF:DE:AD vlan 10
Related ip route
Commands
Notes
show ip load-sharing
show ip load-sharing
Displays ECMP hash attribute.
History 3.4.2008
Notes The command’s output is different for static & consistent hashing
934
Network to Media Resolution (ARP)
ip arp
ip arp [vrf <vrf-name>] <ip-address> <mac-address>
no ip arp <ip-address>
Configures IP ARP properties of VRF.
The no form of the command deletes the static ARP configuration.
Default N/A
History 3.4.2008
Related Commands
ip arp responder
ip arp responder
Initiates ARP responder functionality.
Default N/A
History 3.6.8008
935
Related Commands ip arp
show ip arp
Note
ip arp timeout
ip arp timeout <timeout-value>
no ip arp timeout
Sets the dynamic ARP cache timeout.
The no form of the command sets the timeout to default.
Syntax Description timeout-value Time that an entry remains in the ARP cache
Range: 240-28800 seconds
History 3.2.0230
clear ip arp
clear ip arp [vrf <vrf-name>] [interface <type> | <IP-address>]
Clears the dynamic ARP cache for the specific VRF session.
936
ip-address Clears dynamic ARP entries for a
specific IP address
Default N/A
History 3.2.0230
show ip arp
show ip arp [vrf [<vrf-name> | all]] [interface <type> | count | timeout]
Displays all ARP information for VRF instance.
History 3.3.3000
937
switch (config) # show ip arp vrf my-vrf interface vlan 20
VRF Name: default
Total number of entries: 1
--------------------------------------------------------------------------
Address Type Hardware Address Interface
--------------------------------------------------------------------------
15.0.0.2 Static ETH DE:DE:BE:EF:DE:AD vlan 10
Related ip arp
Commands
IP Diagnostic Tools
ping
ping [vrf <vrf-name>] [-LRUbdfnqrvVaA] [-c count] [-i interval] [-w deadline] [-p pattern] [-s
packetsize] [-t ttl] [-I interface or address] [-M mtu discovery hint] [-S sndbuf] [-T
timestamp option ] [-Q tos ] [hop1 ...] destination
Sends ICMP echo requests to a specified host.
Default N/A
Configuration config
Mode
History 3.1.0000
Example
switch (config) # ping 172.30.2.2
PING 172.30.2.2 (172.30.2.2) 56(84) bytes of data.
64 bytes from 172.30.2.2: icmp_seq=1 ttl=64 time=0.703 ms
64 bytes from 172.30.2.2: icmp_seq=2 ttl=64 time=0.187 ms
64 bytes from 172.30.2.2: icmp_seq=3 ttl=64 time=0.166 ms
64 bytes from 172.30.2.2: icmp_seq=4 ttl=64 time=0.161 ms
64 bytes from 172.30.2.2: icmp_seq=5 ttl=64 time=0.153 ms
64 bytes from 172.30.2.2: icmp_seq=6 ttl=64 time=0.144 ms
^C
--- 172.30.2.2 ping statistics ---
6 packets transmitted, 6 received, 0% packet loss, time 5004ms
rtt min/avg/max/mdev = 0.144/0.252/0.703/0.202 ms
938
Related traceroute
Commands
Notes When using -I option use the interface name + interface number, for example “ping -I
vlan10”
traceroute
traceroute [vrf <vrf-name>] [-46dFITUnrAV] [-f first_ttl] [-g gate,...] [-i device] [-m
max_ttl] [-N squeries] [-p port] [-t tos] [-l flow_label] [-w waittime] [-q nqueries] [-s
src_addr] [-z sendwait] host [packetlen]
Traces the route packets take to a destination.
939
-w Sets the number of seconds to wait for response to a probe (default is 5.0). Non-
integer (float point) values allowed too.
-q Sets the number of probes per each hop
Default: 3
-s Uses source src_addr for outgoing packets
-z Sets minimal time interval between probes (default is 0). If the value is more
than 10, then it specifies a number in milliseconds, else it is a number of
seconds (float point values allowed too).
Default N/A
Configuration config
Mode
History 3.1.0000
3.4.2008 Added VRF parameter
Example
switch (config) # traceroute 192.168.10.70
traceroute to 192.168.10.70 (192.168.10.70), 30 hops max, 40 byte packets
1 172.30.0.1 (172.30.0.1) 3.632 ms 2.849 ms 3.544 ms
2 10.222.128.46 (10.222.128.46) 3.176 ms 3.289 ms 3.656 ms
3 10.158.128.30 (10.158.128.30) 15.331 ms 15.819 ms 16.388 ms
4 10.158.128.65 (10.158.128.65) 20.468 ms 7.893 ms 12.27 ms
5 10.7.34.115 (10.7.34.115) 16.405 ms 11.985 ms 12.264 ms
6 192.168.10.70 (192.168.10.70) 16.377 ms 16.091 ms 20.475 ms
Related
Commands
Notes • The following flags are not supported: -6, -l, -A
• When using -i option use the interface name + interface number, for example
“traceroute -i vlan10”
tcpdump
tcpdump [vrf <vrf-name>] [-aAdeflLnNOpqRStuUvxX] [-c count] [-C file_size] [-E
algo:secret] [-F file] [-i interface] [-M secret] [-r file] [-s snaplen] [-T type] [-w file] [-W
filecount] [-y datalinktype] [-Z user] [expression]
Invokes standard binary, passing command line parameters straight through. Runs in
foreground, printing packets as they arrive, until the user hits Ctrl+C.
Default N/A
940
Configuration config
Mode
History 3.1.0000
Example
switch (config) # tcpdump
......
09:37:38.678812 IP 192.168.10.7.ssh > 192.168.10.1.54155: P 1494624:1494800(176) ack 625 win 90
<nop,nop,timestamp 5842763 858672398>
09:37:38.678860 IP 192.168.10.7.ssh > 192.168.10.1.54155: P 1494800:1495104(304) ack 625 win 90
<nop,nop,timestamp 5842763 858672398>
...
9141 packets captured
9142 packets received by filter
0 packets dropped by kernel
Related
Commands
Notes • When using -i option use the interface name + interface number, for example
“tcpdump -i vlan10”
• For all flag options of this command refer to the linux ‘man page’ of tcp dump
QoS
Syntax N/A
Description
Default Disabled
Configuration config
Mode
History 3.3.4000
Related
Commands
Notes
941
IPv6
IP version 6 (IPv6) is a routing protocol which succeeds IPv4. With the expansion of the Internet and
databases IPv6 addresses consist of 128 bits whose purpose is to allow networks to include a
significantly higher number of nodes by increasing the pool of available unique IP addresses. IPv6
packets alleviate overhead and allow for future customizability.
Textual representations of IPv6 addresses consist of 128 bits made up from eight 16-bit hexadecimal
numbers separated by colons. IPv6 addresses may be abbreviated as follows:
• af23:0000:0000:0000:1284:037d:35ce:2401
• af23:0:0:0:1284:37d:35ce:2401
• af23::1284:37d:35ce:2401
IPv6 addresses typically denote a 64-bit network prefix and a 64-bit host address.
• Static Routes
• ECMP
• Neighbor Discovery
• BGP
• BFD for BGP (IPv4 & IPv6), OSPFv2 and Static Route
• DHCPv6 Relay
• Neighbor advertisement
• Router advertisement
• Neighbor solicitation
• Router solicitation
• Redirect
ND checks whether a neighboring node’s address has changed, whether the neighbor is still
reachable, and also resolves the address of the neighbor which a packet is being forwarded to. ND is
also useful for network nodes for discovering other nodes and performing basic link-layer
configuration.
942
Configuring IPv6
To configure Router1:
5. Configure IPv6 addresses for each one of the VLAN interfaces. Run:
To configure Router2:
943
switch (config)# vlan 10
switch (config vlan 10) # exit
switch (config)# vlan 20
switch (config vlan 20) # exit
switch (config)# vlan 50
switch (config vlan 50) # exit
3. Configure the switch ports to accept the VLANs of which they are part only. Run:
7. Configure IPv6 addresses for each one of the VLAN interfaces. Run:
944
IPv6 Commands
ipv6 enable
ipv6 enable
no ipv6 enable
Assigns automatic link-local IPv6 address to the interface.
The no form of the command de-assigns that automatic local address
and disables IPv6 if no static IPv6 address has been assigned to the
interface.
Default Unassigned
History 3.4.1100
Related Commands
ipv6 address
ipv6 address <ipv6-address> /<length>
no ipv6 address [<ipv6-address> [/<length>]]
Enables IPv6 processing and assigns an IPv6 address to the interface.
The no form of the command removes the specified IPv6 address. If
no address is specified, then all addresses of the interface are
removed.
945
length Mask length for the associated
address space
Range: 1-128
The mask length may be
configured without a space (i.e.
<ipv6-address>/<length>)
Default N/A
History 3.4.1100
Related Commands
ipv6 nd managed-config-flag
ipv6 nd managed-config-flag
no ipv6 nd managed-config-flag
Sets the managed address configuration flag in IPv6 router
advertisements.
The no form of the command restores the default setting.
History 3.4.1100
Related Commands
Notes
946
ipv6 nd ns-interval
ipv6 nd ns-interval <period>
no ipv6 nd ns-interval
Configures the interval between IPv6 neighbor solicitation (NS)
transmissions.
The no form of the command restores the default value.
Default 1000
History 3.4.1100
Related Commands
Notes
ipv6 nd other-config-flag
ipv6 nd other-config-flag
no ipv6 nd other-config-flag
Indicates that other configuration information is available via DHCPv6.
The no form of the command removes the other configuration flag.
History 3.4.1100
947
Example switch (config vlan 10) # ipv6 nd other-config-flag
Related Commands
Notes
ipv6 nd prefix
ipv6 nd prefix <ipv6-address> /<length> [no-autoconfig] [no-onlink]
[valid-time {<time> | infinite}] [preferred-time {<time> | infinite}]
ipv6 nd prefix <prefix> no-advertise
no ipv6 nd prefix <prefix>
Configures inclusion for router advertisements (RAs) for neighbor.
The no form of the command removes the corresponding IPv6 nd
prefix.
History 3.4.1100
948
3.6.4110 Updated syntax description,
configuration mode and default
values
Related Commands
History 3.4.1100
Related Commands
Notes • Using the RDNSS and DNSSL options, an IPv6 host can perform
IPv6 address network configuration and DNS information
simultaneously, without using DHCPv6 for the DNS configuration
• A lifetime value set for an individual RDNSS overrides this value
• The lifetime value is the maximum amount of time after a route
advertisement packet is sent that the RDNSS referenced in the
packet may be used for name resolution
949
ipv6 nd ra dns-server
ipv6 nd ra dns-server <ipv6 address> [lifetime [<time> | infinite]]
no ipv6 nd ra dns-server [<ipv6 address>]
Configures the IPv6 address of a Recursive DNS Server (RDNSS) to
include in the neighbor-discovery router advertisements (RAs).
The no form of the command removes the RDNSS from the
configuration.
History 3.4.1100
Related Commands
950
ipv6 nd ra dns-suffixes lifetime
ipv6 nd ra dns-suffixes <domain-name> lifetime {<time> | infinite}
no ipv6 nd ra dns-suffixes <domain-name> lifetime
Advertises a lifetime of a DNS Search List (DNSSL).
Using RDNSS and DNSSL options, an IPv6 host can perform IPv6 address
network configuration and DNS information simultaneously, without
using DHCPv6 for the DNS configuration.
The no form of the command resets the lifetime value to its default.
History 3.4.1100
Related Commands
Notes The DNSSL contains the domain names of DNS suffixes for IPv6 hosts to
append to short, unqualified domain names for DNS queries
ipv6 nd ra dns-suffix
ipv6 nd ra dns-suffix <domain-name> [lifetime {<time> | infinite}]
no ipv6 nd ra dns-suffix [<domain-name>]
Creates a DNS search list (DNSSL) to include in the neighbor-discovery Router
Advertisements (RAs).
The no form of the command removes the DNSSL from the configuration.
951
Syntax Description domain-name Domain suffix for IPv6 hosts to append to short
unqualified domain names for DNS queries
The suffix must contain only alphanumeric
characters, “.” (periods), “-” (hyphens), and must
begin and end with an alphanumeric character
Default If no lifetime period is configured on the interface, the default value is 1.5
times the Router Advertisement (RA) interval set by the command “ipv6 nd ra
interval”
History 3.4.1100
Role admin
Related Commands
Notes • The DNSSL contains the domain names of DNS suffixes for IPv6 hosts to
append to short, unqualified domain names for DNS queries
• Multiple DNS domain names can be added to the DNSSL by reusing the
command
• A lifetime value for the DNSSL can optionally be specified with this
command which overrides any default value configured for the
interface using the command “ipv6 nd ra dns-suffixes lifetime”
ipv6 nd ra hop-limit
ipv6 nd ra hop-limit <limit>
no ipv6 nd ra hop-limit
Sets a suggested hop-limit value to be included in route advertisement
(RA) packets.
The no form of the command resets the parameter to its default value.
952
Syntax Description limit The hop-limit value to be included by attached
hosts in outgoing packets.
• 0 – unspecified (by this router)
• 1-255 – number of hops
Default Limit value is 64
History 3.4.1100
Related Commands
Notes
History 3.4.1100
953
Related Commands
ipv6 nd ra lifetime
ipv6 nd ra lifetime <time>
no ipv6 nd ra lifetime
Router lifetime is associated with a router’s usefulness as default route, it
does not apply to information contained in other message fields or options.
Options that need time limits for their information include their own
lifetime fields.
The no form of the command resets the parameter to its default value.
Syntax Description time The router lifetime specifies the period that the
router can be considered as a default router by RA
recipients in seconds.
• 0 – the router should not be considered a
default router on this interface
• 1-9000 – lifetime period advertised in RAs
should not be less than the max router
advertisement interval
Default 3*<router advertisement interval>
History 3.4.1100
Related Commands
Notes
954
ipv6 nd ra mtu suppress
ipv6 nd ra mtu suppress
no ipv6 nd ra mtu suppress
Suppresses advertisement (RA) MTU option sent to router.
MTU option ensures all nodes on a link use the same MTU value.
The no form of the command restores the MTU option to enabled.
Default Suppressed
History 3.4.1100
Related Commands
ipv6 nd ra suppress
ipv6 nd ra suppress [all]
no ipv6 nd ra suppress
Suppresses periodic and solicited IPv6 router advertisement (RA)
transmissions.
The no form of the command restores the transmission of RAs.
Syntax Description all Configures the switch to suppress all RAs, including
those responding to a router solicitation.
History 3.4.1100
955
Example switch (config vlan 10) # ipv6 nd ra suppress all
Related Commands
Notes
ipv6 nd reachable-time
ipv6 nd reachable-time <time>
no ipv6 nd reachable-time
Sets the time period the switch includes in the reachable time field of
outgoing advertisements (RAs).
The no form of the command resets the parameter to its default value.
Syntax Description time In milliseconds; the reachable time defines the period
that a node assumes a neighbor is reachable after
having received a reachability confirmation. Values:
• 0 – unspecified by router
• 1 – 3600000 the period that a node assumes a
neighbor is reachable
Default 0 (unspecified)
History 3.4.1100
Related Commands
Notes RAs that advertise zero seconds indicate that the router does not specify a
reachable time
956
ipv6 nd router-preference
ipv6 nd router-preference {high | medium | low}
no ipv6 nd router-preference
Sets the value the switch enters in the default router preference (DRP)
field of router advertisements (RAs) it sends.
The no form of the command resets the parameter to its default value.
Default Medium
History 3.4.1100
Related Commands
Notes • IPv6 hosts maintain a default router list from which to select a
router for traffic to offlink destinations. The router’s address is
then saved in the destination cache. The neighbor discovery
protocol (NDP) prefers routers that are reachable or probably
reachable over routers whose reachability is unknown or
suspect. For reachable or probably reachable routers, NDP can
either select the same router every time or cycle through the
router list. DRP values specify a host’s preferred router.
• If router lifetime is zero, preference value must be medium
ipv6 nd retrans-timer
ipv6 nd retrans-timer <time>
no ipv6 nd retrans-timer
Advertises the time between consecutive neighbor solicitation (NS)
messages.
The no form of the command resets the parameter to its default value.
957
Configuration Mode config interface vlan
config interface ethernet configured as a router port interface
config interface port-channel configured as a router port interface
History 3.4.1100
Related Commands
Notes
ipv6 nd redirects
ipv6 nd redirects
no ipv6 nd redirects
Enables sending ICMPv6 redirect messages.
The no form of the command disables sending ICMPv6 redirect messages.
Default Disabled
History 3.4.1100
Related Commands
Notes
958
Syntax Description number Number of attempts:
• 0 – DAD is not performed
• Range: 1-1000
Default 1
History 3.4.1100
Role admin
Related Commands
Notes
ipv6 neighbor
ipv6 neighbor [vrf <name>] <ipv6-address> <mac-address>
ipv6 neighbor <ipv6-address> interface {ethernet <port> | vlan <vlan-
id> | port-channel <port-channel>} <mac-address>
no interface {ethernet <port> | vlan <vlan-id> | port-channel} ipv6
neighbor <ipv6-address> <mac-address>
no ipv6 neighbor [vrf <name>] <ipv6-address>
Creates an IPv6 neighbor discovery cache static entry.
The no form of the command removes the specified static entry from
the IPv6 neighbor discovery cache.
Default N/A
History 3.4.1100
959
Related Commands
Notes This command do not affect any dynamic entries in the cache.
Default N/A
History 3.4.1100
Related Commands
960
ipv6 route
• General route:
ipv6 route [vrf <vrf-name>] {<ipv6-prefix> | <ipv6-address> /
<length>} <next-hop-ipv6-address> [<distance>]
• Local route:
ipv6 route [vrf <vrf-name>] {<ipv6-prefix> | <ipv6-address> /
<length>} {<ethernet <port> | vlan <id> | port-channel <id>}
[<distance>]
• Drop route:
ipv6 route [vrf <vrf-name>] {<ipv6-prefix> | <ipv6-address> /
<length>} null0 [<distance>]
• Delete route(s):
no ipv6 route [vrf <vrf-name>] {<ipv6-prefix> | <ipv6-
address> /<length>} [<next-hop-ipv6-address>]
Creates an IPv6 static route.
The no form of the command deletes static routes.
History 3.4.1100
Related Commands
961
Notes • Static routes have a default administrative distance of 1
• Assigning a higher administrative distance to a static route
configures it to be overridden by dynamic routing data
• Multiple routes which are configured to the same destination
with the same administrative distance comprise an Equal Cost
Multi-Path (ECMP) route
• A no command not including a source deletes all statements
to the destination
• Route with distance value 255 is not inserted to the
forwarding table
ipv6 routing
ipv6 routing
no ipv6 routing
Enables forwarding IPv6 unicast packets.
The no form of the command disables IPv6 unicast routing.
Syntax N/A
Descripti
on
Default Disabled
Configura config
tion
Mode
History 3.4.1100
Related
Comman
ds
Notes When routing is enabled, the switch attempts to deliver inbound packets to destination addresses
by forwarding them to interfaces or next hop addresses specified by the IPv6 routing table
962
Syntax ethernet <port> Displays output pertaining to the specified Ethernet interface
Description
port-channel <port- Displays output pertaining to the specified LAG interface
channel>
Default N/A
History 3.6.4110
Example
switch (config) # show ipv6 interface
Vlan10 is Enabled , line protocol is UP
IPv6 : Enabled
Link-local address : fe80::f652:14ff:fe2d:9808
Global Unicast Addresses :
2001:db01::2 /64
Joined Group Addresses :
ff02::1
ff02::2
ff02::1:ff2d:9808
MTU : 1500 bytes
ICMP error messages limited to every milliseconds : 100
ICMP redirects : enabled
ND DAD : enabled
Number of DAD attempts : 1
ND reachable time (milliseconds) : 30000
ND advertised retransmit interval (milliseconds) : 0
ND router advertisements maximum interval (seconds) : 600
ND router advertisements minimum interval (seconds) : 198
ND router advertisements managed configuration flag : unset
ND router advertisements other configuration flag : unset
ND solicited router advertisement : suppressed
ND router advertisements lifetime (seconds) : 1800
ND advertised default router preference : medium
ND router advertisements hop-limit : 64
Related
Commands
Notes
963
show ipv6 interfaces brief
show ipv6 interfaces [<type> <id>] brief
Displays basic IPv6 information regarding all IPv6 interfaces
Syntax <type> <id> Specifies the interface for which to display data
Description
Default N/A
History 3.6.4110
Example
switch (config) # show ipv6 interface brief
----------------------------------------------------------------------------------------------------------
---
Interface Address/Mask Primary Address-state Admin-state Oper-state MTU VRF
----------------------------------------------------------------------------------------------------------
---
mgmt0 fe80::784e/64 valid Enabled Up 1500
default
Eth1/1 2001::1/64 primary valid Enabled Down 1500
default
Eth1/1 2002::1/64 valid
Related
Commands
Notes
964
Configuration Mode Any command mode
History 3.6.4110
Related Commands
Notes
Syntax ethernet <port> Displays output pertaining to the specified Ethernet interface.
Description
vlan <vlan-id> Displays output pertaining to the specified VLAN interface.
Default N/A
History 3.4.1100
Example
switch (config) # show ipv6 neighbors
IPv6 Address MAC Address State Interf
------------------------ ----------------- ---------- ------
2001:db01::1 f4:52:14:2d:98:88 Reachable vlan10
Related
Commands
Notes
965
show ipv6 route
show ipv6 route [vrf <vrf-name] {[<ipv6-address> <ipv6-address>/<length> [longer-
prefixes]] [connected | bgp | static]}
Displays IPv6 neighbor discovery (ND) cache information.
connected Displays entries for routes to networks directly connected to the switch
summary Displays the current contents of the IPv6 routing table in summary
format
Default N/A
History 3.4.1100
Example
switch (config) # show ipv6 route
Flags:
F: Failed to install in H/W
B: BFD protected
i: BFD session initializing
x: protecting BFD session failed
Related
Commands
Note
966
OSPF
Open Shortest Path First (OSPF) is a link-state routing protocol for IP networks. It uses a link state
routing algorithm and falls into the group of interior routing protocols, operating within a single
autonomous system (AS).
OSPF-speaking routers send Hello packets on all OSPF-enabled IP interfaces. If two routers sharing a
common data link agree on certain parameters specified in their respective Hello packets, they
become neighbors.
Adjacencies, which can be thought of as virtual point-to-point links, are formed between some
neighbors. OSPF defines several network types and several router types. The establishment of an
adjacency is determined by the types of routers exchanging Hellos and the type of network over
which the Hello packets are exchanged.
Each router sends link-state advertisements (LSAs) over all adjacencies. The LSAs describe all of the
router’s links, or interfaces, the router's neighbors, and the state of the links. These links might be
to stub networks (those without another router attached), to other OSPF routers, to networks in
other areas, or to external networks (those learned from another routing process). Because of the
varying types of link-state information, OSPF defines multiple LSA types.
Each router receiving an LSA from a neighbor records the LSA in its link-state database and sends a
copy of the LSA to all of its other neighbors. By flooding LSAs throughout an area, all routers will
build identical link-state databases.
When the databases are complete, each router uses the SPF algorithm to calculate a loop-free graph
describing the shortest (lowest cost) path to every known destination, with itself as the root.
When all link-state information has been flooded to all routers in an area, and neighbors have
verified that their databases are identical, it means the link-state databases have been
synchronized and the route tables have been built. Hello packets are exchanged between neighbors
as keepalives, and LSAs are retransmitted. If the network topology is stable, no other activity should
occur.For OSPF network design over Mellanox L3 VMS, please refer to Mellanox Virtual Modular
Switch Reference Guide.
Router ID
The router ID is a 32-bit number assigned to the router running the OSPF protocol. This number
uniquely identifies the router in the OSPF link-state database.
Router ID can be configured statically, however, if it is not configured, then the default election is
as follows:
• If a loopback interface already exists, the router ID selects the highest loopback IP address
assigned to a loopback interface;
• Otherwise, the the highest IP address assigned to any other interface on the system is
selected as router ID.
ECMP
Equal-cost multi-path (ECMP) routing is a routing strategy where next-hop packet forwarding to a
single destination can occur over multiple paths. The OSPF link-state routing algorithm can find
967
multiple routes to the same destination, all multiple routes are added to the routing table only if
those routes are equal-cost routes.
In case there are several routes with different costs, only the route with the lowest cost is selected.
In case there are multiple routes with the same lowest cost, all of them are used (up to maximum of
64 ECMP routes).
Configuring OSPF
Prerequisites:
The following configuration example refers to Router 2 in the figure above The remainder
of the routers in the figure are configured similarly.
It is recommended to disable STP before enabling OSPF. Use the command “no spanning-
tree”.
968
switch (config)# interface ethernet 1/1
switch (config ethernet 1/1)# switchport access vlan 10
switch (config ethernet 1/1)# exit
switch (config)# interface ethernet 1/2
switch (config ethernet 1/2)# switchport access vlan 20
3. Associate the VLAN interfaces to the OSPF area. Area 0 is the backbone area. Run:
969
switch (config) # show ip ospf
Routing Process 1 with ID 10.10.10.10 vrf-default
Stateful High Availability disabled
Graceful-restart is not supported
Supports only single TOS (TOS 0) route
Opaque LSA not supported
OSPF Admin State is enabled
Redistributing External Routes: Disabled
Administrative distance 110
Reference Bandwidth is 100Gb
Initial SPF schedule delay 1 msecs
SPF Hold time 10 msecs
Maximum paths to destination 64
Router is not originating router LSA with maximum metric
Condition: Always
Number of external LSAs 0, checksum sum 0
Number of opaque AS LSAs 0,checksum sum 0
Number of areas is 1, 1 normal, 0 stub, 0 nssa
Number of active areas is 1, 1 normal, 0 stub, 0 nssa
Area (0.0.0.0) (Active)
Interfaces in this area: 2 Active Interfaces: 2
Passive Interfaces: 0
SPF Calculation has run 5 times
This area is Normal area
Number of LSAs: 1, checksum sum 7700
2. Verify the OSPF neighbors status. Make sure that each neighbor reaches FULL state with its
peer to enable it take part in all dynamic routing changes in the network. Run:
970
OSPF Commands
• OSPF Commands
OSPF Commands
protocol ospf
protocol ospf
no protocol ospf
Enables Open Shortest Path First Protocol (OSPF), and unhides the related OSPF commands.
The no form of the command deletes the OSPF configuration and hides the OSPF related
commands.
Syntax N/A
Description
Default Disabled
Configuration config
Mode
History 3.3.3500
Related ip routing
Commands
Notes
router ospf
router ospf [<process-id> [vrf <vrf-name>]]
no router ospf [<process-id> [vrf <vrf-name>]]
Creates an ospf instance in the specified VRF and enters the ospf configuration mode. The
default process ID is 1
If a VRF is not specified, the OSPF instance is created in the default VRF.
971
Default Process ID – 1
VRF – active VRF routing-context
Configuration config
Mode
History 3.3.3500
Related
Commands
router-id
router-id <ip-address>
no router-id
Sets Router ID for the OSPF instance.
The no form of the command causes automatic election of router ID by
the router.
Default The router ID is a 32-bit number assigned to the router running the OSPF
protocol. This number uniquely identifies the router within an OSPF link-
state database.
Router ID can be configured statically. However, if it is not configured,
then the default election is as follows:
• If a loopback interface already exists, the router ID takes the
highest loopback IP address assigned to a loopback interface
• Otherwise, the highest IP address is elected as router ID
Configuration Mode config ospf router
History 3.3.3500
Related Commands
Notes
972
shutdown
shutdown
no shutdown
Disables the OSPF instance.
The no form of the command enables the OSPF instance.
History 3.3.3500
Related Commands
Note
auto-cost reference-bandwidth
auto-cost reference-bandwidth <ref-bw> [Gbps | Mbps]
no auto-cost reference-bandwidth
Configures reference-bandwidth in Gb/s (Default) or Mb/s.
The no form of the command resets this parameter to its default
value.
Default 100Gbps
History 3.3.3500
Related Commands
973
Notes
distance
distance <value>
no distance
Configures the OSPF route administrative distance.
The no form of the command resets this parameter to default.
Default 110
History 3.3.3500
Related Commands
Notes
redistribute
redistribute {bgp | direct | static | ebgp | ibgp}
no redistribute {bgp | direct | rip | static}
Enables importing routes from other routing protocols as well as any
statically configured routers into OSPF.
The no form of the command disables the importing of the routes.
974
Default Disable (no redistribution)
History 3.6.3506
Example switch (config router ospf)# redistribute direct
Related Commands
History 3.3.3500
Example switch (config router ospf)# timers throttle spf 100 1000
Related Commands
Notes
975
area default-cost
area <area-id> default-cost <cost>
no area <area-id> default-cost
Specifies cost for the default summary route sent into an OSPF stub
or not-so-stubby area (NSSA).
The no form of the command sets the cost to the default value.
Default The summary route cost is based on the area border router that
generated the summary route
History 3.3.3500
Related Commands
area range
area <area-id> range <ip-address> <prefix> [not-advertise]
no area <area-id> range <ip-address> <prefix> [not-advertise]
Consolidates and summarizes routes at an OSPF area boundary.
The no form of the command removes the ip-prefix range from
summarization.
Default Disabled
976
History 3.3.3500
Related Commands
Notes
area stub
area <area-id> stub [no-summary]
no area <area-id> stub [no-summary]
Configures an area as an OSPF stub area (an area is created if non-
existent).
The no form of the command removes the stub area configuration
and changes the area to normal, or deletes the area (if stub is not
used).
History 3.3.3500
Related Commands
Note
977
area nssa
area <area-id> nssa [default-information-originate [metric <m-
value>] [metric-type <m-type>]] [nosummary] [translate type7
always]
no area <area-id> nssa [default-information-originate ] [no-
summary] [translate type7 always]
Configures an area as an OSPF not-so-stubby (NSSA) area.
The no form of the command removes the NSSA area configuration
and changes the area to default.
History 3.3.3500
Related Commands
no area
no area <area-id>
Deletes OSPF area and its related configuration.
978
Syntax Description area-id OSPF area ID
Range: 0-4294967295
Default N/A
History 3.3.3500
Related Commands
default-information originate
default-information originate [always] [metric <m-value>] [metric-type
<m-type>]
no default-information originate
Enables default route origination to normal areas.
The no form of the command resets the parameter values to their default.
Default m-value – 1
m-type – 2
History 3.6.8008
Related Commands
979
summary-address
summary-address <ip-address> <prefix> [not-advertise]
no summary-address <ip-address> <prefix> [not-advertise]
Creates aggregate addresses for the OSPF protocol.
The no form of the command disables the aggregation of the ip-
address.
Default N/A
History 3.3.3500
Related Commands
ip ospf cost
ip ospf cost <cost>
no ip ospf cost
Sets OSPF cost of sending packet of this interface.
The no form of the command resets this parameter to default.
Syntax Description cost The Interface cost used by the OSPF. Range is
1-65535.
Default Reference_BW/Link_BW
History 3.3.3500
980
Example switch (config interface vlan 10)# ip ospf cost 100
Related Commands
Notes
ip ospf dead-interval
ip ospf dead-interval <seconds>
no ip ospf dead-interval
Configures the interval during which at least one Hello packet must
be received from a neighbor before the router declares that neighbor
as down.
The no form of the command resets this parameter to its default.
Default 40 seconds
History 3.3.3500
Related Commands
Notes The value must be the same for all nodes on the network.
ip ospf hello-interval
ip ospf hello-interval <seconds>
no ip ospf hello-interval
Configures the interval between Hello packets that OSPF sends on the
interface.
The no form of the command resets this parameter to default.
981
Default 10
History 3.3.3500
Related Commands
Notes The value must be the same for all nodes on the network.
ip ospf priority
ip ospf priority <number>
no ip ospf priority
Configures the priority for this OSPF interface.
The no form of the command resets this parameter to default.
Syntax Description number The Interface priority used by the OSPF protocol
Range: 0-255
Default 1
History 3.3.3500
Related Commands
Notes • Use the “ip ospf priority” command to set the router priority,
which determines the designated router for this network. When
two routers are attached to a network, both attempt to become
the designated router.
• The router with the higher router priority takes precedence. If
there is a tie, the router with the higher router ID takes
precedence. A router with a router priority set to zero cannot
become the designated router or backup designated router.
982
ip ospf network
ip ospf network <type>
no ip ospf network
Sets the OSPF interface network type.
The no form of the command resets the interface network type to its default.
History 3.3.3500
Related
Commands
Notes • The network type influences the behavior of the OSPF interface. An OSPF network
type is usually broadcast, which uses OSPF multicast capabilities. Under this
network type, a designated router and backup designated router are elected. For
point-to-point networks, there are only two neighbors and multicast is not required.
• All routers on the same network must have the same network type
ip ospf retransmit-interval
ip ospf retransmit-interval <seconds>
no ip ospf retransmit-interval
Configures the time between OSPF link-state advertisement (LSA)
retransmissions for adjacencies that belongs to the interface.
The no form of the command resets this parameter to its default.
Default 5
983
Configuration Mode config interface vlan
config interface ethernet (configured as a router port interface)
config interface port-channel (configured as a router port interface)
History 3.3.3500
Related Commands
Notes
ip ospf passive-interface
ip ospf passive-interface
no ip ospf passive-interface
Suppresses flooding of OSPF routing updates on an interface.
The no form of the command reverts the status to active OSPF interface.
History 3.3.3500
Related Commands
Notes
ip ospf transmit-delay
ip ospf transmit-delay <seconds>
no ip ospf transmit-delay
Sets the estimated time required to send an OSPF link-state update
packet.
The no form of the command resets this parameter to its default.
984
Syntax Description seconds The transmit-delay interval in seconds
Range: 0-3600
Default 1
History 3.3.3500
Related Commands
Notes
ip ospf shutdown
ip ospf shutdown
no ip ospf shutdown
Disables the OSPF instance on the interface.
The no form of the command enables the OSPF on this interface.
History 3.3.3500
Related Commands
Notes
985
ip ospf authentication
ip ospf authentication [message-digest]
no ip ospf authentication
Specifies the authentication type for OSPF.
The no form of the command disables the authentication.
Default Disabled
History 3.3.3500
Related Commands
ip ospf authentication-key
ip ospf authentication-key [<auth-type>] <password>
no ip ospf authentication-key
To assign a password for simple password authentication for the OSPF.
The no form of the command deletes the simple password
authentication key.
986
History 3.3.3500
Related Commands
Notes • When selecting an encrypted password “7”, the user must input
a password encrypted with an MD5 key
• When selecting an unencrypted password “0”, the user must
input a cleartext password. Then when examining the running-
config, it exhibits the encrypted password.
ip ospf message-digest-key
ip ospf message-digest-key <key-id> md5 [auth-type] <key>
no ip ospf message-digest-key <key-id>
Sets the message digest key for MD5 authentication.
The no form of the command deletes the key for MD5 authentication.
Default Unencrypted
History 3.3.3500
Related Commands
Notes The user cannot delete the last key until authentication is disabled.
987
ip ospf area
ip ospf area <area-id>
no ip ospf area
Configures OSPF area of this interface (and creates the area if non-
existent).
The no form of the command removes the interface from the area.
Default N/A
History 3.3.3500
Related Commands
Notes
show ip ospf
show ip ospf [<process-id> [vrf <vrf-name>]]
Displays general OSPF configuration on specific VRF and status.
Default Process ID – 1
VRF – active VRF routing-context
History 3.3.3500
Example
988
switch (config)# show ip ospf 2 vrf myvrf
Related
Commands
Notes
Syntax vrf OSPF routing table entries to an Area Border Routers on specific VRF
Description
History 3.3.350
0
989
3.6.100 Added VRF parameter and updated Example
2
Example
switch (config)# show ip ospf border-routers vrf myvrf
OSPF Process ID 2, vrf myvrf Internal Routing Table
Codes: i - Intra-area route, I - Inter-area route
i 1.1.1.1 [0] ABR Area: 0.0.0.0, Next Hop: 21.21.21.1
Related
Commands
Notes
Default Process ID – 1
VRF – active VRF routing-context
History 3.3.3500
990
3.6.1002 Added VRF and process ID parameters and updated
Example
Related Commands
switch (config)# show ip ospf database 2 vrf myvrf
OSPF Router with ID (2.2.2.2) (Process ID 2 VRF myvrf)
Notes
vlan <vlan-id> Displays OSPF interface configuration and status per VLAN interface
Default Process ID – 1
VRF – active VRF routing-context
991
History 3.3.3500
Example
switch (config) # show ip ospf interface 2 vrf myvrf
Related
Commands
Notes
Syntax vlan-id Displays OSPF interface configuration and status per VLAN
Description interface
992
Default VRF – active VRF routing-context
History 3.3.3500
Example
switch (config) # show ip ospf neighbors vrf myvrf
Neighbor 1.1.1.1, interface address 21.21.21.1
In the area 0.0.0.0 via Interface Vlan 21
Neighbor priority is 1, State is FULL
DR is 2.2.2.2
Backup Designated Router is 1.1.1.1
Options 2
Dead timer due in 36
Related
Commands
Notes BFD session state is displayed as: established, failed or not established. When BFD is not
defined in the command, it is not displayed in the output.
993
Default vrf – active VRF routing-context
History 3.3.3500
Example
switch (config) # show ip ospf request-list 4.4.4.4 vlan 7
OSPF Router with ID (7.7.7.1) (Process ID 1)
Neighbor 4.4.4.4, Interface vlan 7, Address 7.7.7.2
42 LSAs on request-list
Related
Commands
Notes
History 3.3.3500
Example
994
switch (config) # show ip ospf retransmission-list 4.4.4.4 vlan 6
OSPF Router with ID (7.7.7.1) (Process ID 1)
Neighbor 4.4.4.4, Interface vlan 6, Address 6.6.6.2
Link state retransmission due in 3780 msec, Queue length 207
Related
Commands
Notes
Syntax vrf <vrf-name> Display summary address and area range information on specific VRF
Description
Default vrf – active VRF routing-context
Configuration Any command mode
Mode
History 3.3.3500
Example
switch (config)# show ip ospf summary-address
Related
Commands
Notes
995
If a loopback interface already exists, the router ID takes
BGP
Border Gateway Protocol (BGP) is an exterior gateway protocol which is designed to transfer routing
information between routers. It maintains and propagates a table of routes which designates
network reachability among autonomous systems (ASs).
BGP neighbors, or peers, are routers configured manually to converse using the BGP protocol on top
of a TCP session on port 179. A BGP speaker periodically sends keep-alive messages to maintain the
connection. Network reachability includes such information as forwarding destinations (IPv4 or IPv6)
together with a list of ASs that this information traverses and other attributes, so it becomes
possible to construct a graph of AS connectivity without routing loops. BGP makes possible to apply
policy rules to enforce connectivity graph.
BGP routers communicate through TCP connection on port 179. Connection between BGP neighbors
is configured manually or can be established dynamically by configuring dynamic listen groups.
When BGP runs between two peers in the same AS, it is referred to as Internal BGP (iBGP, or Interior
Border Gateway Protocol). When it runs between separate ASs, it is called External BGP (eBGP, or
Exterior Border Gateway Protocol). Both sides can initiate a connection, after the initial
connectivity is created, BGP state machine drives both sides to enter into ESTABLISHED state where
they can exchange UPDATE messages with reachability information.
State Machine
In order to make decisions in its operations with peers, a BGP peer uses a simple finite state
machine (FSM) that consists of six states: Idle; Connect; Active; OpenSent; OpenConfirm; and
Established. For each peer-to-peer session, a BGP implementation maintains a state variable that
tracks which of these six states the session is in. The BGP protocol defines the messages that each
peer should exchange in order to change the session from one state to another.
The first state is the “Idle” state. In “Idle” state, BGP initializes all resources, refuses all inbound
BGP connection attempts and initiates a TCP connection to the peer. The second state is “Connect”.
In the “Connect” state, the router awaits the TCP connection to complete and transitions to the
“OpenSent” state if successful. If unsuccessful, it initializes the ConnectRetry timer and transitions
to the “Active” state upon expiration. In the “Active” state, the router resets the ConnectRetry
timer to zero and returns to the “Connect” state. In the “OpenSent” state, the router sends an
Open message and waits for one in return in order to transition to the “OpenConfirm” state.
KeepAlive messages are exchanged and, upon successful receipt, the router is placed into the
“Established” state. In the “Established” state, the router can send/receive: KeepAlive; Update;
and Notification messages to/from its peer.
When the default address family configuration is modified – it will cause a renegotiation of
capabilities for all neighbors that do not have explicit configuration of active address families. The
default address family in BGP is IPv4.
996
Default Route Originate
Default Route Originate initial value is set to “false”.
A system will automatically generate an update group from peer groups members.
Peer that has a different outbound policy from peer-group will not become a part of update group.
Configuring BGP
Follow these steps for basic BGP configuration on two switches (Router 1 and Router 2):
Prerequisites:
997
6. Apply IP address to the VLAN interface on Router 2. Run:
Configure BGP:
To run iBGP, the AS number of all remote neighbors should be identical to the local AS
number of the configured router.
Verifying BGP
1. Check the general status of BGP. Run:
• Verify that the state of each BGP neighbor reached to ESTABLISHED state.
• If the neighbor is disabled (shutdown). The state of the neighbor will be IDLE.
• BGP incoming and outgoing messages should be incremented.
• The AS number of each neighbor is the correct one.
2. Check the status of the neighbors. Run:
998
You should be able to see running BGP counters and ESTABLISHED state per active neighbor.
BGP L2-EVPN address family distributes EVPN “routes” between EVPN enabled nodes where some of
them are Virtual Tunnel Endpoints (VTEPs) with VXLAN functionality and some of them are transit
nodes that perform BGP reflection functionality.
• MAC/IP advertisement route (route type 2) – advertises MAC and IP addresses of end-systems
and their mapping to broadcast domains (VXLAN VNIs and EVPN EVIs). It is used for unicast
forwarding, ARP suppression, and advertising default gateway in the EVPN network.
• Inclusive multicast Ethernet tag route (route type 3) – advertises EVPN bridge domain (EVI)
and originating router IP address. The EVPN network uses those addresses to instantiate
forwarding plane for BUM (Broadcast, unknown Unicast, unknown Multicast) traffic.
• IP prefix route (type 5) – advertises IP prefix, IP gateway, IP address, and HW encapsulation
(VNI in the case of VXLAN). This route is used to establish IP prefix LPM routing in the EVPN
nodes.
Other route types (type 1 and 4) are used in multi-homing environments only.
RFC 7432 defines BGP attributes that should be used together with L2-EVPN address family routes:
• PMSI tunnel attributes – used for inclusive multicast Ethernet tag route to define multicast
type (head end replication) and data path (VNI)
• MAC mobility extended community – used in MAC/IP routes to inform neighbors about MAC
roaming events
• Default gateway – used by MAC/IP route to establish default gateway routes
• Route targets – used by all routes to import and export BGP L2-VPN to forwarding and from
plane
BGP Commands
• BGP Commands
• BGP Monitoring Protocol
999
BGP Commands
Config
protocol bgp
protocol bgp
no protocol bgp
Enables BGPv4, and unhides BGP related commands.
The no form of the command deletes all BGP configuration and hides BGP related
commands.
Syntax N/A
Description
Default Disabled
Configuration config
Mode
History 3.3.5006
Related ip routing
Commands
Notes
clear ip bgp
clear ip bgp [{<ip-address> | all} [soft] [in | out]]
Clears BGP learned routes from the BGP table and resets the connection to
the neighbor.
1000
in Inbound routes are reset
Default N/A
Related Commands
Notes This command removes BGPv4 learned routes from the routing table, reads
all routes from designated peers, and sends routes to those peers as
required.
router bgp
router bgp <as-number>
no router bgp <as-number>
Creates and enters a BGP instance with the specified AS number.
The no form of the command deletes all router BGP instance configuration.
Default N/A
History 3.3.5006
Notes
1001
Config Router
shutdown
shutdown
no shutdown
Gracefully disables BGP protocol without removing existing configuration.
The no form of the command enables BGP.
Default Enabled
History 3.3.5006
Related Commands
Notes
address-family
address-family {ipv4-unicast | ipv6-unicast | l2vpn-evpn}
Enables selected address family configuration mode.
Default IPv4
History 3.6.4070
1002
Related Commands
Notes
aggregate-address
aggregate-address <ip_prefix_length> [summary-only] [as-set] [attribute-
map]
no aggregate-address <ip_prefix_length> [summary-only] [as-set]
[attribute-map]
Creates an aggregate route in the BGP database.
The no form of the command disables ECMP across AS paths.
Default Disabled
History 3.4.0000
Related Commands
1003
bestpath as-path multipath-relax
bestpath as-path multipath-relax [force]
no bestpath as-path multipath-relax [force]
Enables ECMP across AS paths.
The no form of the command disables ECMP across AS paths.
Default Disabled
History 3.3.5006
Notes • With this option disabled, only routes with exactly the same AS
path as the best route to a destination are considered for ECMP
• With this option enabled, all routes with similar length AS path as
the best route are considered for ECMP
bgp default
no bgp default {ipv4-unicast | ipv6-unicast}
disable bgp default {ipv4-unicast | ipv6-unicast}
Reverts protocol to initial state (IPv4 enabled), enabling setting address
families as default for peer or peer-group activation.
Disables setting address families as default for peer or peer-group
activation.
Default N/A
History 3.6.4070
1004
3.6.4110 Added support for IPv6
Related Commands
Notes This command can be used multiple times and each address family can be
configured separately.
bgp fast-external-fallover
bgp fast-external-fallover
no bgp fast-external-fallover
Terminates eBGP sessions of any directly adjacent peer without waiting for the hold-down timer
to expire if the link used to reach the peer goes down.
The no form of the command waits for hold-down timer to expire before terminating eBGP
sessions.
Syntax N/A
Descriptio
n
History 3.4.0000
Related maximum-paths
Command
s
Notes Although this feature improves BGP conversion time, it may cause instability in your BGP table
due to a flapping interface.
1005
bgp listen limit
bgp listen limit <maximum>
no bgp listen limit
Limits the number of dynamic BGP peers allowed on the switch.
The no form of the command resets to the default value.
Default 100
History 3.4.0000
Example switch (config router bgp 100)# bgp listen limit 101
Related Commands
Notes
Default 100
History 3.4.0000
1006
Example switch (config router bgp 100)# bgp listen range 10.10.10.10 /24
peer-group my-group remote-as 13
Related Commands
bgp redistribute-internal
bgp redistribute-internal
no bgp redistribute-internal
Enables iBGP redistribution into an interior gateway protocol (IGP).
The no form of the command disables iBGP redistribution into an
interior gateway protocol (IGP).
Default Disabled
History 3.4.0000
Related Commands
Notes
1007
cluster-id
cluster-id <ip-address> [force]
no cluster-id <ip-address> [force]
Configures the cluster ID in a cluster with multiple route reflectors.
The no form of the command resets the cluster ID for route reflector.
History 3.2.1000
Related Commands
Notes
client-to-client reflection
client-to-client reflection
no client-to-client reflection
The switch will be configured as a route reflector.
The no form of the command stops the switch from being a route reflector
History 3.2.1000
1008
Related Commands
Notes
distance
distance <external> <internal> <local>
no distance
Sets the administrative distance of the routes learned through BGP.
The no form of the command resets the administrative distance its
default.
Default external: 20
internal: 200
local: 200
History 3.3.5006
Related Commands
1009
graceful-restart stalepath-time
graceful-restart stalepath-time <interval>
no graceful-restart stalepath-time
Configures the maximum time that stale routes from a restarting
BGP neighbor are retained after a BGP session is reestablished with
that peer.
The no form of the command resets to the default value.
History 3.4.0000
Related Commands
Note
graceful-restart helper
[neighbor {<ip-address> | <peer-group-name>}] graceful-restart helper
no [neighbor {<ip-address> | <peer-group-name>}] graceful-restart
helper
Enables BGP graceful restart helper mode on the switch for all or
specific BGP neighbor.
The no form of the command disables BGP graceful restart helper mode
on the switch for all or a specific BGP neighbor.
History 3.4.0000
Related Commands
1010
Notes • When graceful restart helper mode is enabled, the switch
retains routes from neighbors capable of graceful restart while
those neighbors are restarting BGP
• Individual neighbor configuration takes precedence over the
global configuration
• This parameter can only be configured when BGP is admin-down
state
maximum-paths
maximum-paths [ibgp] <maximum-path>
Configures the maximum number of parallel eBGP/iBGP routes that
the switch installs in the routing table.
Default 1
History 3.3.5006
Related Commands
1011
neighbor activate
neighbor <ip-address | peer-group> activate
no neighbor <ip-address | peer-group> activate
disable neighbor <ip-address | peer-group> activate
Sends advertisement for given address-family to neighbor.
The no form of the command removes the command from running-config and
enables inheritance.
The disable form of the command sets boolean value to false, and disables
inheritance.
Default N/A
History 3.6.4070
Related Commands
1012
neighbor advertisement-interval
neighbor {<ip-address> | <peer-group-name>} advertisement-interval <delay>
no neighbor {<ip-address> | <peer-group-name>} advertisement-interval
Sets the minimum route advertisement interval (MRAI) between the sending of BGP
routing updates.
The no form of the command disables this function.
Default 30 seconds
History 3.4.0000
Example switch (config router bgp 100)# neighbor 10.10.10.10 advertisement-interval 100
Related Commands
neighbor allowas-in
neighbor {<ip-address > | <peer-group-name>} allowas-in [number]
no neighbor {<ip-address > | <peer-group-name>} allowas-in
Configures the switch to permit the advertisement of prefixes
containing duplicate autonomous switch numbers (ASNs).
The no form of the command disables this function.
1013
peer-group-name Peer group name
Default N/A
History 3.4.0000
Notes Neighbors from the same AS as the router are considered as iBGP
peers, and neighbors from other ASs are considered eBGP peers.
neighbor default-originate
neighbor <ip-address | peer_group> default-originate
[route_map_name]
no neighbor <ip-address | peer_group> default-originate
[route_map_name]
disable neighbor <ip-address | peer_group> default-originate
[route_map_name]
Enables advertisement of the default route to a specified neighbor or
peer group.
The no form of the command disables advertisement of the default
route and enables inheritance.
The disable form of the command disables advertisement of the
default route and disables inheritance.
Default N/A
1014
History 3.6.4070
Related Commands
Notes
neighbor description
neighbor {<ip-address> | <peer-group-name>} description <string>
no neighbor {<ip-address> | <peer-group-name>} description
Associates descriptive text with the specified peer or peer group.
The no form of the command removes the description from the peer.
Default No description
History 3.3.5006
Example switch (config router bgp 100)# neighbor 10.10.10.10 description The
next door neighbor
Related Commands
1015
neighbor ebgp-multihop
neighbor {<ip-address > | <peer-group-name>} ebgp-multihop [<ttl>]
no neighbor {<ip-address > | <peer-group-name>} ebgp-multihop
Enables BGP to connect to external peers that are not directly connected
to the switch.
The no form of the command resets the value to the default (TTL = 1).
ttl Time-to-live
Range: 1-255 hops; where “1” disables
connecting to external peers and prevents
the system from inheriting this parameter’s
group configuration
Default ttl – 1
History 3.3.5006
Notes The command does not establish the multi-hop if the only route to the
peer is the default route (0.0.0.0)
neighbor export-localpref
neighbor {<ip-address> | <peer-group-name>} export-localpref <value>
no neighbor {<ip-address> | <peer-group-name>} export-localpref
Configures the local preference value sent to the specified peer or peer
group.
The no form of the command resets the local preference to its default
value.
1016
value Preference value
Range: 0-2147483647; where “100”
configures the default, and prevents the
system from inheriting this parameter’s
group configuration
Default 100
History 3.4.0000
Related Commands
Notes
Default Enabled
History 3.6.4070
Related Commands
Notes The command “no neighbor <ip_address> fall-over bfd” affects traffic.
BGP will restore the connection based on Hello protocol.
1017
neighbor graceful-restart helper
neighbor {<ip-address> | <peer-group-name>} graceful-restart helper
no neighbor {<ip-address> | <peer-group-name>} graceful-restart helper
Enables BGP graceful restart helper mode for the specified BGP neighbor
or peer group.
The no form of the command disables this parameter.
History 3.4.0000
Related Commands
Notes • When graceful restart helper mode is enabled, the switch retains
routes from neighbors capable of graceful restart while those
neighbors are restarting BGP
• Individual neighbor configuration takes precedence over the
global configuration
neighbor import-localpref
neighbor {<ip-address> | <peer-group-name>} import-localpref <value>
no neighbor {<ip-address> | <peer-group-name>} import-localpref <value>
Configures the local preference value assigned to routes received from
the specified peer or peer group.
The no form of the command resets the local preference to its default
value.
Default 100
1018
Configuration Mode config router bgp
History 3.4.0000
Related Commands
Notes
neighbor local-as
neighbor {<ip-address> | <peer-group-name>} local-as <asn-id> [no-
prepend | no-prepend replace-as]
no neighbor {<ip-address> | <peer-group-name>} local-as
Enables the modification of the AS path attribute for routes received
from an eBGP neighbor.
The no form of the command disables AS path modification for the
specified peer or peer group.
Default N/A
History 3.4.0000
1019
3.8.2000 Modified the "replace-as" option and
changed it to "no-prepend replace-as"
Example switch (config router bgp 4) # neighbor 100.100.100.100 local-as 123
neighbor local-v6-addr
neighbor {<ip-address > | <peer-group-name>} local-v6-addr <ipv6_local>
no neighbor {<ip-address > | <peer-group-name>} local-v6-addr
Specifies the switche’s next-hop value sent using IPv6 NLRI in IPv4
transport session.
The no form of the command removes next-hop value.
Default N/A
History 3.6.4070
Related Commands
Notes
1020
neighbor maximum-prefix
neighbor {<ip-address> | <peer-group-name>} maximum-prefix
<maximum> [warning-only]
no neighbor {<ip-address> | <peer-group-name>} maximum-prefix
Configures the number of BGP routes the switch accepts from a specified
neighbor and defines an action when the limit is exceeded.
The no form of the command removes the limitation.
Default 12000
History 3.4.0000
Notes
neighbor next-hop-peer
neighbor {<ip-address> | <peer-group-name>} next-hop-peer [disable]
no neighbor {<ip-address> | <peer-group-name>} next-hop-peer
Configures the switch to list the peer address as the next hop in routes
that it receives from the specified peer BGP-speaking neighbor or
members of the specified peer group.
The no form of the command disables this function.
1021
Syntax Description ip-address IP address of the neighbor
Default no next-hop-peer
History 3.3.5006
Related Commands
Notes This command overrides the next hop for all routes received from this
neighbor or peer group
neighbor next-hop-self
neighbor {<ip-address> | <peer-group-name>} next-hop-self [disable]
no neighbor {<ip-address> | <peer-group-name>} next-hop-self
Configures the IP address of the router as the next hop address in routes
advertises to the specific neighbor.
The no form of the command resets this parameter to its default.
Default no next-hop-self
History 3.3.5006
1022
Notes • This function is used in networks where BGP neighbors do not
directly access all other neighbors on the same subnet.
• In the default state, the next hop is generated based on the IP
address and the present next hop in the route information.
[neighbor] next-hop-unchanged
[neighbor <ip-address | peer group>] next-hop-unchanged
no [neighbor <ip-address | peer group>] next-hop-unchanged
disable [neighbor <ip-address | peer group>] next-hop-unchanged
Enables preserving BGP next-hop when forwarding routes to this eBGP
peer or all eBGP peers in this address family.
The no form of the command removes configuration and enables
inheritance of AFI SAFI next-hop-unchanged configuration from a peer
group if this neighbor is member in one.
The disable form of the command disables preserving BGP next-hop
when forwarding routes to this eBGP peer or all eBGP peers in this
address family.
History 3.6.8100
1023
neighbor out-delay
neighbor {<ip-address> | <peer-group-name>} out-delay <delay>
no neighbor {<ip-address> | <peer-group-name>} out-delay
Configures the period a routing update remains in the routing table
before BGP exports it to the neighbor.
The no form of the command resets the value to its default.
Default 0 seconds
History 3.3.5006
neighbor password
neighbor {<ip-address> | <peer-group-name>} password [<encryption>]
<string>
no neighbor {<ip-address> | <peer-group-name>} password
Enables authentication on a TCP connection with a BGP peer.
The no form of the command resets the value to its default.
1024
Default no neighbor password
History 3.4.0000
Related Commands
neighbor no-password
neighbor {<ip-address> | <peer-group-name>} no-password
Disables authentication for peer without inheritance.
Default N/A
History 3.6.3004
Notes
1025
neighbor peer-group
1. neighbor {<ip-address >} peer-group <peer-group-name>
2. neighbor {<peer-group-name>} peer-group
3. no neighbor {<ip-address >} peer-group <peer-group-name>
4. no neighbor {<peer-group-name>} peer-group
1. Assigns BGP neighbors to an existing peer group
2. Creates a peer-group
3. Unassigns a BGP neighbor from a peer-group
4. Deletes the peer-group
Default N/A
History 3.4.0000
Related Commands
Notes • Once a peer group is created, the group name can be used as a
parameter in neighbor configuration commands, and the
configuration will be applied to all members of the group
• Settings applied to an individual neighbor in the peer group
override group settings
• A neighbor can only belong to one peer group, so issuing this
command for a neighbor that is already a member of another
group removes it from that group
• When a neighbor is removed from a peer group, the neighbor
retains the configuration inherited from the peer group
• Router BGP peer-group password cannot be set when enabling
with secure mode
• A BGP group must be used by either a single listen range, or by a
set of neighbors sharing the same type (iBGP or eBGP)
• A group must already exist before a node is configured to use it
• Any configuration change on a group affects each of the peers
inheriting this specific parameter from the group only after
undergoing admin state toggle
1026
neighbor remote-as
neighbor {<ip-address>} remote-as <as-number>
no neighbor {<ip-address>} remote-as <as-number>
Configures a neighbor.
The no form of the command removes the neighbor, dropping the
connection and all routes if already connected.
Default N/A
History 3.3.5006
Example switch (config router bgp 100)# neighbor 10.10.10.10 remote-as 200
Notes Neighbors from the same AS as the router are considered as iBGP peers,
and neighbors from other ASs are considered eBGP peers
neighbor remove-private-as
neighbor {<ip-address> | <peer-group-name>} remove-private-as [disable]
no neighbor {<ip-address> | <peer-group-name>} remove-private-as
Removes private autonomous system numbers from outbound routing
updates for external BGP (eBGP) neighbors.
The no form of the command preserves private AS numbers for the
specified peer.
1027
Default N/A
History 3.4.0000
Notes • This can only be used with external BGP (eBGP) peers
• If the update has only private AS numbers in the AS path, BGP
removes these numbers
• If the AS path includes both private and public AS numbers, BGP
does not remove the private AS numbers. This situation is
considered a configuration error
• If the AS path contains the AS number of the eBGP neighbor, BGP
does not remove the private AS number
• If the AS path contains confederations, BGP removes the private
AS numbers only if they come after the confederation portion of
the AS path
neighbor route-map
neighbor <ip-address | peer-group-name> route-map <route-map-name>
[in | out]
no neighbor <ip-address | peer-group-name> route-map <route-map-
name> [in | out]
disable neighbor <ip-address | peer-group-name> route-map <route-
map-name> [in | out]
Configures route-map export or import to the peer either for a specific
address family or for all (depending on the configuration context).
The no form of the command removes map-route configuration and
enables inheritance. The Onyx inheritance priority is as follows:
a. Peer AFI-SAFI
b. Peer
c. Peer Group AFI-SAFI
d. Peer Group
The “disable” form of the command resets the route-map configuration
to the default and disables inheritance.
1028
in | out • in – sets route import to the peer
for this AFI/SAFI
• out – sets route export to the
peer for this AFI/SAFI
If no parameter is explicitly used, both in
and out are configured.
Default N/A
History 3.3.5006
1029
neighbor no-route-map
neighbor {<ip-address> | <peer-group-name>} no-route-map
Unsets route-map for neighbor and prevents the system from inheriting
this parameter’s group configuration.
Default N/A
History 3.6.3004
Notes
neighbor route-reflector-client
neighbor <ip-address | peer-group> route-reflector-client
no neighbor <ip-address | peer-group>] route-reflector-client
disable neighbor <ip-address | peer-group>] route-reflector-client
Configures a given peer to be a reflector client of this router for this
address-family.
The no form of the command removes configuration and enables
inheritance of AFI/SAFI route-reflector-client configuration from a peer
group if this neighbor is member in one.
The disable form of the command removes a given peer from being a
reflector client of this router for this AFI/SAFI and disables
configuration inheritance.
Default N/A
1030
History 3.3.5006
Related Commands
neighbor send-community
neighbor <ip-address | peer group> send-community [extended]
no neighbor <ip-address | peer group> send-community [extended]
disable neighbor <ip-address | peer group> send-community
[extended]
Enables sending UPDATE messages to the peer containing BGP
community attributes either for this address family or all relevant
address-families.
The no form of the command removes configuration and enables
inheritance of send-community attribute configuration.
The disable form of the command disables sending UPDATE messages
containing BGP community attributes.
1031
Default Enabled
History 3.4.0000
Related Commands
neighbor shutdown
neighbor {<ip-address> | <peer-group-name>} shutdown [disable]
no neighbor {<ip-address> | <peer-group-name>} shutdown
Disables BGP neighbor gracefully.
The no form of the command enables BGP neighbor.
Default Enabled
1032
History 3.3.5006
Related Commands
neighbor soft-reconfiguration
neighbor {<ip-address> | <peer-group-name>} soft-reconfiguration
inbound
no neighbor {<ip-address> | <peer-group-name>} soft-reconfiguration
Enables neighbor soft reconfiguration.
The no form of the command disables neighbor soft reconfiguration.
Default Enabled
History 3.6.4070
Related Commands
Notes
1033
neighbor soft-reconfiguration inbound
neighbor <ip-address | peer-group-name> soft-reconfiguration inbound
no neighbor <ip-address | peer-group-name> soft-reconfiguration
inbound
Enables neighbor soft reconfiguration.
The no form of the command disables neighbor soft reconfiguration.
Default N/A
History 3.6.8100
Related Commands
Notes This command is mandatory to show received EVPN for this neighbor
neighbor timers
neighbor {<ip-address> | <peer-group-name>} timers <keep-alive> <hold-
time>
no neighbor {<ip-address> | <peer-group-name>} timers
Configures the keepalive and hold times for a specified peer.
The no form of the command resets the parameters to their default
values.
1034
hold-time The period the switch waits for a
keepalive or update message before it
disables peering
• Range: 3-7200 seconds
• “0” means that keepalive is not
sent and the connection does not
expire
• Explicitly configuring the default,
“180”, prevents the system from
inheriting this parameter’s group
configuration
Default keep-alive – 60 seconds
hold-time – 180 seconds
History 3.3.5006
Example switch (config router bgp 100)# neighbor 10.10.10.10 timers 65 195
Notes Hold time must be at least 3 seconds and should be three times longer
than the keep-alive setting.
1035
disable Sets the specified BGP neighbor or peer
group to active connection mode and
prevents the system from inheriting this
parameter’s group configuration
History 3.4.0000
Related Commands
neighbor update-source
neighbor <ip-address> update-source {ethernet <slot/port> | loopback
<number> | port-channel <number> | vlan <vlan-id>}
no neighbor <ip-address> update-source
Configures the source-address for routing updates and to establish TCP
connections with peers.
The no form of the command disables configured source-address for
routing updates and for TCP connection establishment with a peer.
History 3.3.5006
1036
3.6.4070 Added IPv6 and IPv4 support
Example switch (config router bgp 100)# neighbor 10.10.10.2 update-source vlan
10
Related Commands
neighbor no-update-source
neighbor <ip-address> no-update-source
Disables configured source-address for routing updates and for TCP connection establishment with
a peer and prevents the system from inheriting this parameter’s group configuration.
Syntax N/A
Descripti
on
History 3.6.3004
Related
Comman
ds
Notes
neighbor weight
neighbor {<ip-address> | <peer-group-name>} weight <value>
no neighbor {<ip-address> | <peer-group-name>} weight
Assigns a weight attribute to paths from the specified neighbor.
The no form of the command resets to default values.
1037
Syntax Description ipv4_addr, ipv6_addr IP address of the neighbor
History 3.4.0000
Related Commands
Notes • Weight values set through route map commands have precedence
over neighbor weight command values
• Other attributes are used only when all paths to the prefix have the
same weight
• A path’s BGP weight is also configurable through route maps
• When multiple paths to a destination prefix exist, the best-path
selection algorithm prefers the path with the highest weight
• Weight is the first parameter that the BGP best-path selection
algorithm considers
network
network <ip_prefix length> [<route-map-name>]
no network <ip_prefix length> [<route-map-name>]
Configures a route for advertisement to BGP peers.
The no form of the command removes the route from the BGP routes table, preventing its
advertisement. The route is only advertised if the router has a gateway to the destination.
Syntax ip_prefix_length A string that specific route map is assigned to the network.
Description
length /24 or 255.255.255.0 format.
route-map-name The name of a route-map which is used to set the route’s attributes
when it is advertised.
1038
Default N/A
History 3.3.5006
3.6.4070
Example switch (config router bgp 100)# network 10.10.10.0 /24 routemap
Related
Commands
Notes • The parameters “ip-prefix” and “length” specify the route destination
• The configuration zeros the host portion of the specified network address (e.g.
192.0.2.4/24 is stored as 192.0.2.0/24)
• Address family is identified by the network address itself and not by the configuration
command context
redistribute
[neighbor <peer_group>] redistribute {connected | static | ospf | ospf-
internal | ospf-external} [<route-map>]
no redistribute {connected | static | ospf}
Enables redistribution of specified routes to the BGP domain.
The no form of the command disables route redistribution from the
specified source.
Default No redistribution
1039
History 3.2.1000
3.6.4070
Example switch (config router bgp 100)# redistribute ospf
Related Commands
router-id
router-id <ip-address> [force]
no router-id [force]
Configures a fixed router ID for BGP.
The no form of the command removes the fixed router ID and restores
the system default.
History 3.3.5006
Related Commands
Notes The IP address configured identifies the BGP speaker. The command
triggers an automatic notification and session reset for the BGP
neighbors.
1040
route-map
[neighbor <peer_group>] route-map <route_map_name> [{in | out}]
no [neighbor <peer_group>] route-map <route_map_name> [{in | out}]
Specifies a route map that will be applied in the given direction for
specific address family.
The no form of the command removes this configuration.
Default N/A
History 3.6.4070
Related Commands
Notes
timers bgp
timers bgp <keep-alive> <hold>
no timers bgp
Configures the BGP keepalive and hold times.
The no form of the command resets the parameters to their default settings.
1041
History 3.3.5006
vni
vni <vni_value>
no vni <vni_value>
Create VNI on the router BGP.
The no form of the command deletes VNI on the router BGP.
Default N/A
History 3.8.1000
Example switch (config router bgp 100 vrf default address-family l2vpn-
evpn) # vni 1000
1042
vni rd
vni <vni_value> rd <rd>
no vni <vni_value> rd
Configure route distinguisher to VNI.
The no form of the command deletes route distinguisher
configuration
Default N/A
History 3.8.1000
Example switch (config router bgp 100 vrf default address-family l2vpn-
evpn) # vni 1000 rd 2.3.4.5:15
vni route-target
vni <vni_value> route-target {both | import | export} <route_target>
no vni <vni_value> route-target {both | import | export}
Configure route target to VNI.
The no form of the command deletes route distinguisher configuration.
1043
Default N/A
History 3.8.1000
Example switch (config router bgp 100 vrf default address-family l2vpn-evpn) # vni 1000 route-
target both 1.2.3.4:15
Related vni
Commands
Notes This command is irrelevant when using the enabled auto-create mode.
vni auto-create
vni auto-create
no vni auto-create
Enables auto-create mode on router bgp.
The no form of the command disables auto-create mode on router bgp.
Syntax N/A
Description
Default N/A
History 3.8.1000
Related vni
Commands
1044
route-table prefix-list
route-table prefix-list <prefix-list-name> <export|import>
[no] route-table prefix-list <prefix-list-name> <export|import>
Configure RTM policy for IPv4 or IPv6 address-family and bind it with a prefix-list in export
direction from BGP RIB to routing table or import in the reverse direction.
The no forms of the command removed the RTM policy for IPv4 or IPv6 address-family.
History 3.8.2100
Show
1045
detail Displays detailed information about a subset of the bgp learned routes
longer-prefixes Displays the routes to the specified destination and any routes to a
more specific destination.
Example: If “10.20.30.0 /24 longer-prefixes” is run, all routes starting
with 10.20.30 regardless of the prefix length (10.20.30.X /24,
10.20.30.X /25, etc.) are displayed - providing there are any such
routes received/sent from/to that neighbor.
Default N/A
History 3.3.5200
Example
switch (config) # show ip bgp 192.168.100.0 /24
Status codes:
s: suppressed
d: damped
h: history
*: valid
>: best
i: internal
r: RIB-failure
S: Stale
m: multipath
b: backup-path
x: best-external
Origin codes:
i: IGP
e: EGP
?: incomplete
-------------------------------------------------------------------------
Network Next Hop Status Metric LocPrf Weight Path
-------------------------------------------------------------------------
192.168.100.0/24 0.0.0.0 *> 0 100 32768 i
Related
Commands
Notes • Aggregated information in the “detail” parameter (i.e. aggregator AS, aggregator
ID) is displayed only for aggregated routes.
• Generic and “Longer prefixes” examples were updated.
1046
show ip bgp address-family
show ip bgp address-family [vrf <vrf-name>] {l2vpn-evpn | <ipv4-unicast | ipv6-unicast>}
[active] [detail]
Displays address-family configuration.
active Displays active neighbors in that address family (configured, active or dynamic)
detail Displays detailed info about configuration and configured/active neighbors for
the specified address-family
Default N/A
History 3.6.4070
1047
Example output 1:
switch (config) # show ip bgp address-family l2vpn-evpn
Address family : L2VPN EVPN
Maximum Path : 0/0
Redistribute :
Total Neighbors : 0
Total peer-groups : 0
Total dynamic ranges : 0
Auto-Create VNI : Disable
Route table prefix list (import/export):
RD/RT Auto-Create : Disable
Neighbors:
---------------------------------------------------------------------------------------
Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd
---------------------------------------------------------------------------------------
1.1.1.1 4 65002 0 1 6 0 0 Never ACTIVE/0
Total peer-groups : 1
Peer Group : peer
Total dynamic ranges : 0
Auto-Create VNI : Disable
-----------------------------------------------------------------------------------
VNI Vlan Route Distinguisher Route Target
-----------------------------------------------------------------------------------
1000 5 1.2.3.4:3 None
Example output 2:
switch (config) # show ip bgp address-family ipv4-unicast detail
Address family : IPv4
Maximum Path : 0/0
Redistribute :
Total Neighbors: 1
Neighbors:
---------------------------------------------------------------------------------------
Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd
---------------------------------------------------------------------------------------
3.3.3.3 4 200 0 0 1 0 0 Never IDLE/0
Total peer-groups : 1
Peer Group : basim_ipv4
Total dynamic ranges: 0
Address family configuration:
Next hop unchanged: Enable
Example output 3:
switch (config) # show ip bgp address-family ipv4-unicast
Address family : IPv4
Maximum Path : 0/0
Redistribute :
Total Neighbors : 1
Total peer-groups : 0
Total dynamic ranges : 0
Route table prefix list (import/export): a-list/a-list
1048
Related
Commands
Notes
Syntax N/A
Description
Default N/A
History 3.4.0000
1049
switch (config) # show ip bgp community 100:1
BGP table version is 8, local router ID is 3.5.7.4
Status codes: s suppressed, d damped, h history, * valid, > best, i - internal
r RIB-failure, S Stale, m multipath, b backup-path, x best-external
Origin codes: i - IGP, e - EGP, ? - incomplete
Notes
1050
community <aa:nn> – community number
<number> – community number
History 3.6.8100
1051
switch (config) # show ip bgp evpn summary
VRF name : vrf-default
BGP router identifier : 192.168.5.1
local AS number : 65001
BGP table version : 2
Main routing table version : 2
IPV4 Prefixes : 0
IPV6 Prefixes : 0
L2VPN EVPN Prefixes : 1
----------------------------------------------------------------------------------------------
Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd
----------------------------------------------------------------------------------------------
192.168.3.2 4 65002 25 29 2 0 0 0:00:11:10 ESTABLISHED/1
192.168.5.2 4 65003 24 28 2 0 0 0:00:11:17 ESTABLISHED/0
Related Commands
Notes
1052
show ip bgp evpn summary
show ip bgp [vrf <vrf>] evpn summary
Displays some basic statistics about BGP per VRF only for neighbors who support L2EVPN AF.
Default N/A
History 3.6.8100
Example
switch (config) # show ip bgp evpn summary
VRF name : vrf-default
BGP router identifier : 192.168.5.1
local AS number : 65001
BGP table version : 2
Main routing table version : 2
IPV4 Prefixes : 0
IPV6 Prefixes : 0
L2VPN EVPN Prefixes : 1
----------------------------------------------------------------------------------------------
Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd
----------------------------------------------------------------------------------------------
192.168.3.2 4 65002 25 29 2 0 0 0:00:11:10 ESTABLISHED/1
192.168.5.2 4 65003 24 28 2 0 0 0:00:11:17 ESTABLISHED/0
Related
Commands
Notes
1053
Syntax ip-prefix Destination to aggregate
Description
length Mask length (e.g. /24 or 255.255.255.254)
longer- Displays information about routes with longer prefixes than given
prefixes
Default N/A
3.8.2200 Updated example to reflect the new "Enhanced Route Refresh" display
Example
1054
switch (config) # show ip bgp neighbors 192.168.2.2
Neighbor configuration:
------------------------------------------------------------------------
Configuration IPV4 Unicast IPV6 Unicast L2VPN EVPN
------------------------------------------------------------------------
Configured AFI SAFI Enabled Disabled Enabled
Send Community Disabled Disabled Disabled
Send Extended Community Disabled Disabled Disabled
Route Reflection Disabled Disabled Disabled
Next Hop Unchanged Disabled Disabled Disabled
Neighbor capabilities:
Route Refresh : advertise and received
Enhanced Route Refresh : advertise and received
Soft Reconfiguration : Disabled
Graceful Restart Capability: advertise
Address family IPv4 Unicast: advertise and received
Address family IPv6 Unicast: n/a
Address family L2VPN EVPN : advertise and received
Message statistics:
InQ depth : 0
OutQ depth: 0
-------------------------------------------
Parameter Sent Rcvd
-------------------------------------------
Opens 1 1
Notification 0 0
Updates 3 2
Keepalives 12 11
Refreshes 0 0
Total 16 14
L2VPN EVPN:
----------------------------------------------
Prefix activity Sent Rcvd
----------------------------------------------
Prefixes Current 2 2
Prefixes Total 2 2
Implicit Withdraw 0 0
Explicit Withdraw 0 0
Used as bestpath n/a 2
Used as multipath n/a n/a
--------------------------------------------------------
Local Policy Denied Prefixes Outbound Inbound
--------------------------------------------------------
Total 0 0
Connection Information:
Connections established : 4
Dropped : 1
Last Reset : 0:00:03:22
Last Drop Reason : 6 (2)
Maximum hops to external BGP neighbor: 255
Connection State : ESTABLISHED
Local host : 192.168.2.1
Local port : 179
Foreign host : 192.168.2.2
Local Port : 50394
1055
Related
Commands
Notes
Default N/A
History 3.8.2200
Related Commands
1056
Notes • In order to use received option, user must first configure soft-
reconfiguration-inboud as follows:
switch (config) # router bgp 100 neighbor 192.168.7.2 soft-
reconfiguration inbound
• Received option "shows BGP routes" shows all received routes
before applying policies
• Advertised option shows BGP routes after applying policies.
longer- Displays the routes to the specified destination and any routes to a more
prefixes specific destination (only available if both IP and mask are specified)
Default N/A
History 3.3.5200
1057
switch (config) # show ip bgp neighbors 192.168.3.2 received
Status codes:
s: suppressed
d: damped
h: history
*: valid
>: best
i: internal
r: RIB-failure
S: Stale
m: multipath
b: backup-path
x: best-external
Origin codes:
i: IGP
e: EGP
?: incomplete
---------------------------------------------------------------------------------------------------
Network Next Hop Status Metric LocPrf Weight Path
---------------------------------------------------------------------------------------------------
94.0.0.0/24 192.168.3.2 *> 0 100 0 100 i
Related
Commands
Notes
1058
Syntax ip-address Neighbor IP address. Provide optionally to display routes received from
Description specified neighbor.
mask Mask length. Displays routes received from specified neighbor filtered by the
specified network.
longer- Displays routes received from specified neighbor filtered by the specified
prefixes prefix and longer
Default N/A
Example
switch (config)# show ip bgp 192.168.100.0 /24 longer-prefixes detail
Local Connected:
Origin : IGP
metric : 0
localpref : 100
weight : 32768
Attributes: valid, best
switch (config)# show ip bgp 192.168.100.0 /24 detail
Local connected:
0.0.0.0 from 0.0.0.0 (192.168.100.11):
Origin : IGP
metric : 0
localpref : 100
weight : 32768
Attributes: valid, sourced, best
Related
Commands
Notes
1059
show ip bgp paths
show ip bgp paths [vrf <vrf-name>] [ipv4 | ipv6]
Displays summary of all AS paths and for prefixes for specific address
family.
Default N/A
History 3.3.5200
Related Commands
Notes
Default N/A
History 3.4.0000
Example
1060
switch (config) # show ip bgp peer-group peerGrp1
Name : peerGrp1
Hold time : 180
Keep-alive : 60
Max prefix : 100000
Weight : 0
Export local preferences: 100
Import local preferences: 100
Status Down : no
EBGP Multihop : 1
Next Hop Self : no
Soft Reconfiguration : no
Next Hop Peer : no
Remove Private AS : no
Transport Mode : no
Password : no
Local AS : 0
No Prepend : no
Replace AS : no
Soft Reconfiguration : Disabled
------------------------------------------------------------------------
Configuration IPV4 Unicast IPV6 Unicast L2VPN EVPN
------------------------------------------------------------------------
Configured AFI SAFI Disabled Disabled Disabled
Send Community Disabled Disabled Disabled
Send Extended Community Disabled Disabled Disabled
Route Reflection Disabled Disabled Disabled
Next Hop Unchanged Disabled Disabled Disabled
------------------------------------------------------------------------------------------------------
Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd
------------------------------------------------------------------------------------------------------
192.168.2.2 4 65001 355 413 7 0 0 0:00:00:26 ESTABLISHED/2
Related
Commands
Notes
Syntax N/A
Description
Default N/A
1061
Configuration Any command mode
Mode
History 3.3.5200
Example
switch (config) # show ip bgp summary
BGP router identifier 3.5.7.4, local AS number 4
BGP table version is 70/120, main routing table version 70/96
BGP using 26308 total bytes of memory
BGP activity 37/8 IPv4 prefixes, 37/8 IPv6 prefixes, 37/4 paths
Neighbor V AS MsgRcvd MsgSent InQ OutQ Up/Down State/PfxRcd
2001::1 4 7 3 9 0 0 0:00:00:48 ESTABLISHED/total number of prefixes
Related
Commands
Notes
Syntax N/A
Description
Default N/A
History 3.6.4070
Example
1062
switch (config)# show ip bgp update-group 192.168.2.2
----------------------------------------------------------------------------------------------------
Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd
----------------------------------------------------------------------------------------------------
192.168.2.2 4 65001 368 428 7 0 0 0:00:06:30 ESTABLISHED/2
Update-group : 5
BGP version : 4
Address Family : IPv4 Unicast
Minimum time between advertisements runs in seconds: 30
Has 1 members:
192.168.2.2
Update-group : 6
BGP version : 4
Address Family : L2VPN EVPN
Minimum time between advertisements runs in seconds: 30
Has 1 members:
192.168.2.2
Related
Commands
Notes
Default N/A
1063
Configuration Any command mode
Mode
History 3.6.6000
Example
switch (config)# show ip bgp summary
VRF name : vrf-default
BGP router identifier : 1.1.1.2
local AS number : 65001
BGP table version : 3
Main routing table version : 3
IPV4 Prefixes : 0
IPV6 Prefixes : 0
L2VPN EVPN Prefixes : 2
--------------------------------------------------------------------------------------------
Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd
--------------------------------------------------------------------------------------------
1.1.1.1 4 65002 25 29 3 0 0 0:00:10:38 ESTABLISHED/2
1.1.1.5 4 100 0 0 3 0 0 Never IDLE/0
Related
Commands
Notes
IP AS-Path Access-List
ip as-path access-list
ip as-path access-list <list-name> {permit | deny} <reg-exp> [any | egp
| igp | incomplete]
no ip as-path access-list <list-name>
Creates an access list to filter BGP route updates.
The no ip as-path access-list command deletes the named access list.
1064
incomplete Routes marked as “Incomplete”
Default N/A
History 3.4.0000
Related Commands
Notes If access list_name does not exist, this command creates it. If it already
exists, this command appends statements to the list.
Default N/A
History 3.4.0000
Related Commands
Notes
IP Community-List
ip community-list standard
ip community-list standard <list-name> {deny | permit} <list-of-
communities>
no ip community-list standard <list-name>
Adds a standard entry to a community-list.
The no form of the command deletes the specified community list.
1065
Syntax Description list-name The name for the community list
History 3.4.0000
Related Commands
Notes A BGP community access list filters route maps that are configured as
BGP communities. The command uses regular expressions to name the
communities specified by the list.
ip community-list expanded
ip community-list expanded <list-name> {deny | permit} <reg-exp>
no ip community-list expanded <list-name>
Adds a regular expression entry to a community-list.
The no form of the command deletes the specified community list.
Default N/A
History 3.4.0000
1066
Example switch (config)# ip community-list expanded mycommunity permit
1:[0-9]+
Related Commands
Notes A BGP community access list filters route maps that are configured as BGP
communities. The command uses regular expressions to name the
communities specified by the list.
show ip community-list
show ip community-list [community-list-name]
Displays the defined community lists.
Default N/A
History 3.4.0000
Related Commands
Notes A BGP community access list filters route maps that are configured as BGP
communities. The command uses regular expressions to name the
communities specified by the list.
1067
BMP Commands
protocol bmp
protocol bmp
no protocol bmp
Enables BMP.
The no form of the command disables BMP.
Default N/A
History 3.7.1100
Related Commands
Notes • BMP commands are not executed when protocol BMP is disabled
• Running protocol BMP when “no ip l3” is configured is not possible
ip bmp server
ip bmp [vrf <vrf name>] server <id>
no ip bmp [vrf <vrf name>] server <id>
Creates a BMP server, up to three servers per VRF.
The no form of the command removes BMP server
configuration.
Default N/A
History 3.7.1100
Related Commands
Notes
1068
ip bmp server activate
ip bmp [vrf <vrf name>] server <id> activate
no ip bmp [vrf <vrf name>] server <id> activate
Activates BMP server.
The no form of the command deactivates the BMP server.
Default N/A
History 3.7.1100
Related Commands
Notes
Default N/A
History 3.7.1100
Related Commands
1069
Notes It is not possible to update a server’s stats-reporting-period while
the server is active
Default N/A
History 3.7.1100
Related Commands
show ip bmp
show ip bmp [vrf <vrf name>] [server <id>]
Displays BMP configuration.
Default N/A
Configuration config
Mode
History 3.7.1100
1070
Example
switch (config)# show ip bmp
----------------------------------------------------------------------------------------
ID Admin State Address Port Statistics Reporting Period
----------------------------------------------------------------------------------------
1 Active 1.1.1.1 11 20
2 Active 2.2.2.2 22 30
Related
Commands
Note If no server ID is supplied, the command displays BMP configurations for all configured BMP
servers under a VRF
BFD session is established by the application that uses it. There is no discovery mechanism. E.g. in
OSPF BFD session is established to neighbors that were discovered by OSPF hello protocol.
In Asynchronous mode a system periodically sends BFD packets to verify connectivity. If a number of
packets in a row are not received – the session is declared down.
A system can be passive or active. Active system initiates BDF sessions. Both systems can be active.
(Only active mode is supported.)
Session Establishment
A session begins with exchange of control packets. When bidirectional communication is achieved –
a session becomes Up.
Each side informs the neighbor in what intervals it is going to send BFD packets and what minimum
interval it can receive BFD packets is.
Detection time is equal to agreed transmit interval of remote system multiplied to multiplier
received from remote system.
1071
Interaction with Protocols
BFD session can be single-hop or multi-hop:
• Single hop session traverse between two adjacent IP neighbors. BFD control packet should be
encapsulated in UDP with DPORT = 3784. SPORT should be in range 49152 to 65535. Same
SPORT must be used for all control BFD packets for given session and is unique between
different sessions. TTL value is 255.
• Multi-hop sessions traverse between to remote ip neighbors. Control packets are
encapsulated in UDP with DPORT = 4784.
If different protocols want to establish a BFD session with the same remote system for same data
plane – they should share BFD session.
In OSPF Protocol neighbor discovery protocol establishes single hop BFD sessions. For OSPF when
session fails – it tears down OSPF neighbor.
Single hop BFD session can be established for static route next hop.
BFD Commands
protocol bfd
protocol bfd
no protocol bfd
Enables bfd on a system level
The no form of the command removes bfd configuration.
Syntax N/A
Description
Default N/A
History 3.6.4070
Related
Commands
Notes The command returns an error if BFD is enabled in clients already running on the system
(static routes or BGP of OSPF)
1072
bfd shutdown
bfd shutdown [vrf <vrf-name>]
no bfd shutdown [vrf <vrf-name>]
Disables bfd sessions but doesn't remove the configuration.
if VRF is not given the command will be executed in active VRF.
Syntax N/A
Description
Default N/A
History 3.6.4070
Related
Commands
Notes • The command “no ip bfd shutdown” or BFD interval parameters modification are
affect traffic for all protocols; OSPF, BGP, static routes. The dynamic protocols
(OSPF and BGP) restore the connection based on Hello protocol.
• For static routes, please execute “no ip route static bfd <ip address>”
bfd interval
bfd interval [vrf <vrf-name>] [transmit-rate] [min-rx] [multiplier]
no bfd interval
Sets the interval rates between BFD messages.
The no form of the command removes bfd interval rates.
1073
Default transmit-rate – 300
min-rx – 150
multiplier – 3
History 3.6.4070
Example switch (config) # ip bfd interval transmit-rate 300 multiplier 3 min-rx 300
force
Related Commands
Notes The command is executed in the active VRF if a VRF is not specified
ip ospf bfd
ip ospf bfd
no ip ospf bfd
Enables BFD on the given interface for all OSPF neighbors on a number
of active sessions.
The no form of the command disables BFD on all OSPF neighbors.
Default N/A
History 3.6.4070
Related Commands
Notes The command “ip ospf bfd” affects traffic, OSPF restores the
connection based on Hello protocol
1074
ip route bfd
ip route [vrf <vrf_name>] <prefix> <next_hop> bfd
no ip route [vrf <vrf_name>] <prefix> <next_hop> bfd
Configures static route with BFD enabled on a specified VRF.
The no form of the commands removes the route.
Default N/A
History 3.6.4070
Related Commands
Notes When a session fails, all static routes pointing to the specified
gateway are removed from the routing decision
Syntax Description all Displays routing tables for all VRF instances
History 3.6.4070
1075
Related Commands ip route
1076
switch (config) # show ip bgp neighbors 1000::1040
BGP neighbor: 1000::1040, remote AS: 100, link: external
BGP version: 4, remote router ID: 2.1.1.1
BGP State: ESTABLISHED
Last read: 0:00:09:28, last write: 0:00:09:28, hold time is: 180, keepalive interval in seconds: 60
BFD State: Up
Configured hold time in seconds: 180, keepalive interval in seconds: 60
Minimum holdtime from neighbor in seconds: 180
Neighbor capabilities:
Route refresh: advertise and received
Graceful Restart Capability: advertise and received
Address family IPv4 Unicast: advertise and received
Address family IPv6 Unicast: n/a
Message statistics:
InQ depth is: 0
OutQ depth is: 0
---- -----
Sent Rcvd
---- -----
Opens: 1 1
Notifications: 0 0
Updates: 4 4
Keepalives: 1587 1593
Route Refresh: 0 0
Total: 1592 1598
Default minimum time between advertisement runs in seconds: 30
---- ----
Sent Rcvd
Prefix activity: ---- ----
Prefixes Current: 4 2
Prefixes Total: 4 2
Implicit Withdraw: 0 0
Explicit Withdraw: 0 0
Used as bestpath: n/a 2
Used as multipath: n/a n/a
-------- -------
Outbound Inbound
Local Policy Denied Prefixes: -------- -------
Total: 0 0
Related
Commands
Notes
Policy Rules
Route Map
Route maps define conditions for redistributing routes between routing protocols. A route map
clause is identified by a name, filter type (permit or deny) and a sequence number. Clauses with the
1077
same name are components of a single route map; the sequence number determines the order in
which the clauses are compared to a route.
route-map
route-map <map-name> [deny | permit] [sequence-number]
no route-map <map-tag> {deny | permit} [<sequence-number>]
Creates a route map that can be used for importing, exporting
routes and applying local policies.
The no form of the command deletes configured route maps.
Default N/A
History 3.3.5006
Related Commands
1078
continue <sequence-number>
continue <sequence-number>
no continue
Enables additional route map evaluation of routes whose parameters meet the clause’s
matching criteria.
The no form of the command removes this configuration from the route map clause.
Syntax N/A
Description
Default N/A
History 3.3.5006
Notes • A clause typically contains a match (route-map) and a set (route-map) statement.
The evaluation of routes whose settings are the same as match statement parameters
normally end and the clause’s set statement are applied to the route. Routes that
match a clause containing a continue statement are evaluated against the clause
specified by the continue statement.
• When a route matches multiple route-map clauses, the filter action (deny or permit)
is determined by the last clause that the route matches. The set statements in all
clauses matching the route are applied to the route after the route map evaluation is
complete. Multiple set statements are applied in the same order by which the route
was evaluated against the clauses containing them.
• Continue cannot be set to go back to a previous clause; <sequence-number> of the
continue must always be higher than the current clause’s sequence number.
abort
abort
Discards pending changes and returns to global configuration mode.
Default N/A
1079
Configuration Mode config route map
History 3.3.5006
Related Commands
Notes
match as-number
match as-number <number>
no match as-number
Filters according to one of the AS numbers in the AS path of the route.
The no form of the command removes this configuration from the
route map clause.
Default N/A
History 3.3.5006
Related Commands
1080
match as-path
match as-path <as-path-list name>
no match as-path
Creates a route map clause entry that matches the route‘s AS path
using an as-path access-list.
The no form of the command removes the match statement from the
configuration mode route map clause.
Default N/A
History 3.3.5006
Example switch (config route-map mymap permit 10)# match as-path my-list
Related Commands
match community
match community <list-of-communities> [exact-match]
no match community <list-of-communities>
Creates a route map clause entry that matches a route if it contains at
least the specified communities.
The no form of the command removes the match clause.
1081
Syntax Description list of communities List of standard communities:
• <aa:nn>
• <number>
• internet
• local-AS
• no-advertise
• no-export
exact-match Creates a route map clause entry that
matches the route‘s communities
exactly
Default N/A
History 3.3.5006
Example switch (config route-map mymap permit 10)# match community 1:100 3:52
Related Commands
match community-list
match community <communities-list-name> exact-match
no match community <communities-list-name> exact-match
Creates a route map clause entry that specifies one route filtering
condition.
The no form of the command removes the match clause.
Default N/A
History 3.3.5006
Example switch (config route-map mymap permit 10)# match community-list COM_LIST
exact-match
1082
Related Commands
match interface
match interface <interface-type> <number>
no match interface
Matches the route’s interface.
The no form of the command removes the match clause.
Default N/A
History 3.3.5006
Example switch (config route-map mymap permit 10)# match interface ethernet
1/1
Related Commands
1083
match ip address
match ip address <prefix-list-name>
no match ip address
Filters according to IPv4 prefix list.
The no form of the command removes this configuration from the
route map clause.
Default N/A
History 3.3.5006
Related Commands
match ip next-hop
match ip next-hop <ipv4/ipv6>
no match ip next-hop
Configures a route’s entry next-hop match.
The no form of the command removes a route-map’s entry next-hop
match.
Default N/A
History 3.3.5200
1084
3.6.4070 Added support for IPv4 and IPv6
Related Commands
match local-preference
match local-preference <value>
no match local-preference
Configures a route’s entry local-preference match.
The no form of the command removes a route-map’s entry local-
preference match.
Default N/A
History 3.3.5200
Related Commands
1085
match metric
match metric <value>
no match metric
Configures a route’s entry metric match.
The no form of the command removes a route-map’s entry metric
match.
Default N/A
History 3.3.5200
Related Commands
Default N/A
History 3.4.0000
1086
Example switch (config route-map mymap permit 10)# set as-path prepend 5 10
Related Commands
Notes
Default N/A
History 3.3.5200
Example switch (config route-map mymap permit 10)# set as-path tag 1
Related Commands
Notes
set community
set community {none}
no set community {none}
Sets the community attribute of a distributed route.
The no form of the command removes the set statement from the
clause.
Default N/A
1087
History 3.3.5200
Example switch (config route-map mymap permit 10)# set community 1:2 3:4
Related Commands
Notes
History 3.3.5200
Example switch (config route-map mymap permit 10)# set community none
Related Commands
Notes
1088
set community none
set community none
no set community none
Sets the community attribute of a distributed route to be empty.
The no form of the command removes the set statement from the clause.
Default N/A
History 3.3.5200
Example switch (config route-map mymap permit 10)# set community none
Related Commands
Notes
History 3.3.5200
Example switch (config route-map test_route_map permit 10) # set community 400:1
delete
Related Commands
Notes
1089
set community-list
set community-list <community-list-name>
no set community <list of communities>
Configures a named standard community list.
The no form of the command removes the set statement from the clause.
Default N/A
History 3.3.5200
Example switch (config route-map mymap permit 10 )# set community internet 1:3
additive
Related Commands
Default N/A
History 3.3.5200
Related Commands
Notes
1090
set community-list delete
set community-list <community-list-name> delete
no set community-list
Deletes the matching community list permit entries from the route
community list.
The no form of the command removes the set statement from the clause.
Default N/A
History 3.3.5200
Related Commands
Notes
set ip next-hop
set ip next-hop <ipv4/ipv6>
no set ip next-hop
Configures a route’s entry next-hop parameter.
The no form of the command removes a route-map’s entry next-hop
setting.
Default N/A
History 3.3.5200
Example switch (config route-map mymap permit 10)# set ip next-hop 10.10.10.10
Related Commands
1091
Notes
set local-preference
set local-preference <value>
no set local-preference
Configures a route’s entry local-preference parameter.
The no form of the command removes a route-map’s entry local-
pref setting.
Default N/A
History 3.3.5200
Related Commands
Notes
set metric
set metric <value>
no set metric
Configures a route’s entry metric parameter.
The no form of the command removes a route-map’s entry metric
setting.
Default N/A
History 3.3.5200
1092
Example switch (config route-map mymap permit 10)# set metric 10
Related Commands
Notes
set origin
set origin {egp | igp | incomplete}
no set origin
Configures a route’s entry origin parameter.
The no form of the command removes a route-map’s entry origin
setting.
Default N/A
History 3.3.5200
Example switch (config route-map mymap permit 10)# set origin egp
Related Commands
Notes
set tag
set tag <value>
no set tag
Configures a route’s entry tag parameter.
The no form of the command removes a route-map’s entry tag
setting.
1093
Default N/A
History 3.3.5200
Related Commands
Notes
set weight
set weight <number>
no set weight
Configures modifications to redistributed routes.
The no form of the command removes this configuration from the
route map clause.
Default N/A
History 3.3.5006
Notes
1094
show route-map
show route-map [<name>]
Displays route map configuration.
Default N/A
History 3.3.5006
Related Commands
Notes
IP Prefix-List
IP prefix-lists are used to match two components of IP packets or an IP route. Prefix-list is a list of
entries that include an IP network address and a bit mask (Range: 1 to 32 and should match the
input IP network address).
Apply:
1095
switch (config) # configuration text file prefix-list-001 apply verbose
All commands succeeded.
IP Prefix-List Commands
1096
ip prefix-list
ip prefix-list <list-name> [seq <number>]
no ip prefix-list <list-name> [seq <number>]
ipv6 prefix-list <list-name> [seq <number>]
no ipv6 prefix-list <list-name> [seq <number>]
Configures or updates the IPv4 or IPv6 prefix-list in context mode.
The no form of the command deletes the prefix-list or a prefix-list entry.
Default N/A
Configuration config
Mode
History 3.3.5200
Notes The maximum entries for IPv4 prefix-list is 50K and for IPv6 is 25K.
1097
permit
[seq <number>] <permit|deny> <ipv4_address|ipv6_address> <mask> [eq <length> | le
<length> | ge <length> [le <length>]]
Configures IPv4 or IPv6 permit/deny clauses.
Configuration config
Mode
History 3.8.2100
Notes
Default N/A
1098
Configuration Any command mode
Mode
History 3.3.5200
Related
Commands
Notes
VRRP
The Virtual Router Redundancy Protocol (VRRP) is a computer networking protocol that provides for
automatic assignment of available IP routers to participating hosts. This increases the availability
and reliability of routing paths via automatic default gateway selections on an IP subnetwork.
The protocol achieves this by creating virtual routers, which are an abstract representation of
multiple routers (that is, a master and backup routers, acting as a group). The default gateway of a
participating host is assigned to the virtual router instead of a physical router. If the physical router
that is routing packets on behalf of the virtual router fails, another physical router is selected to
automatically replace it. The physical router that is forwarding packets at any given time is called
the master router.
VRRP provides information on the state of a router, not the routes processed and exchanged by that
router. Each VRRP instance is limited, in scope, to a single subnet. It does not advertise IP routes
beyond that subnet or affect the routing table in any way.
Routers have a priority of between 1-255 and the router with the highest priority becomes the
master. The configurable priority value ranges from 1-254, the router which owns the interface IP
address as one of its associated IP addresses has the priority value 255. When a planned withdrawal
of a master router is to take place, its priority can be lowered, which means a backup router will
preempt the master router status rather than having to wait for the hold time to expire.
Load Balancing
To create load balancing between routers participating in the same VR, it is recommended to create
2 (or more) VRs. Each router will be a master in one of the VRs, and a backup to the other VR(s). A
group of hosts should be configured with Router 1’s virtual address as the default gateway, while the
second group should be configured with Router 2’s virtual address.
1099
Configuring VRRP
The Virtual Router Redundancy Protocol (VRRP) is a computer networking protocol that provides for
automatic assignment of available IP routers to participating hosts. This increases the availability
and reliability of routing paths via automatic default gateway selections on an IP subnetwork.The
protocol achieves this by creating virtual routers, which are an abstract representation of multiple
routers (that is, a master and backup routers, acting as a group). The default gateway of a
participating host is assigned to the virtual router instead of a physical router. If the physical router
that is routing packets on behalf of the virtual router fails, another physical router is selected to
automatically replace it. The physical router that is forwarding packets at any given time is called
the master router.VRRP provides information on the state of a router, not the routes processed and
exchanged by that router. Each VRRP instance is limited, in scope, to a single subnet. It does not
advertise IP routes beyond that subnet or affect the routing table in any way.Routers have a priority
of between 1-255 and the router with the highest priority becomes the master. The configurable
priority value ranges from 1-254, the router which owns the interface IP address as one of its
associated IP addresses has the priority value 255. When a planned withdrawal of a master router is
to take place, its priority can be lowered, which means a backup router will preempt the master
router status rather than having to wait for the hold time to expire.
Preconditions
1. Enable IP routing functionality. Run:
1100
The VLAN cannot be the same one configured for the MLAG IPL, if MLAG is used.
Configuring VRRP
1. Enable VRRP protocol globally. Run:
2. Create a virtual router group for an IP interface. Up to 255 VRRP IDs are supported. Run:
4. Influence the election of the master in the VR cluster make sure that the priority of the
desired master is the highest. Note that the higher IP address is selected in case the priority
of the routers in the VR are the same. Select the priority. Run:
5. The advertizement interval should be the same for all the routers within the VR. Modify the
interval. Run:
6. The authentication text should be the same for all the routers within the VR. Configure the
authentication text. Run:
1101
switch (config interface vlan 20 vrrp 100)# authentication text my-password
7. Use the preempt command to enable a high-priority backup virtual router to preempt the
low-priority master virtual router. Run:
The configuration will not be deleted, only the VRRP state machine will be stopped.
Verifying VRRP
1. Display VRRP brief status. Run:
1102
VRRP Commands
protocol vrrp
protocol vrrp
no protocol vrrp
Enables VRRP globally and unhides VRRP related commands.
The no form of the command deletes all the VRRP configuration and hides VRRP related
commands.
Syntax N/A
Description
Configuration config
Mode
History 3.3.4500
Related
Commands
Notes
Syntax N/A
Description
Default N/A
Configuration config
Mode
History 3.3.4500
1103
Related
Commands
Notes
vrrp
vrrp <number>
no vrrp <number>
Creates a virtual router group on this interface and enters a new configuration mode.
The no form of the command deletes the VRRP instance and the related configuration.
Default N/A
History 3.3.4500
Related
Commands
Notes A maximum total of 64 VRRP instances are supported per switch system.
address
address <ip-address> [secondary]
no address [<ip-address> [secondary]]
Sets virtual router IP address (primary and secondary).
The no form of the command deletes the IP address from the VRRP interface.
1104
secondary A secondary IP address for the virtual router
Default N/A
History 3.3.4500
Related
Commands
Notes • The virtual address can be either from the interface’s primary or secondary subnet
• This command is the enabler of the protocol. Therefore, set all the protocol
parameters initially and only then set the ip-address.
• There are up to 20 IP addresses associated with the VRRP instance. One primary and
up to 19 secondary ip-addresses.
• If the configured IP address is the same as the interface IP address, this switch
automatically owns the IP address (priority 255)
shutdown
shutdown
no shutdown
Disables the virtual router.
The no form of the command enables the virtual router (stops the VRRP state machine).
Syntax N/A
Description
History 3.3.4500
Related
Commands
Notes
1105
priority
priority <level>
no priority
Sets the priority of the virtual router.
The no form of the command resets the priority to its default.
Default 100
History 3.3.4500
Related Commands
preempt
preempt
no preempt
Sets virtual router preemption mode.
The no form of the command disables the virtual router preemption.
Syntax N/A
Description
History 3.3.4500
Related
Commands
1106
Notes To set this router as backup for the current virtual router master, preempt must be
enabled.
preempt delay
preempt delay <time>
no preempt delay
Sets the time a virtual router waits before taking over as master.
The no form of the command resets this parameter to its default value.
History 3.3.4500
Related
Commands
Notes
authentication text
authentication text <password>
no authentication text
Sets virtual router authentication password and enables authentication.
The no form of the command disables the authentication mechanism.
Default Disabled
1107
History 3.3.4500
Related
Commands
advertisement-interval
advertisement-interval <seconds>
no advertisement-interval
Sets the virtual router advertisement-interval.
The no form of the command resets the parameter to its default.
Default 1
History 3.3.4500
Related
Commands
Notes
show vrrp
show vrrp [interface <type> <number>] [vr <id>]
Displays VRRP brief configuration and status.
Syntax interface <type> Filters the output to a specific interface type and number
Description <number>
1108
vr <id> Filters the output to a specific virtual router
Range: 1-10
Default N/A
History 3.3.4500
Related
Commands
Notes
Syntax interface <type> Filters the output to a specific interface type and number
Description <number>
Default N/A
History 3.3.4500
1109
Example switch (config)# show vrrp detail
VRRP Admin State: Enabled
Vlan3200 - Vrrp 110 (IPV4):
Instance Admin State: Enabled
State: Init
Primary IP Address: 33.0.0.1
Virtual IP Address: 33.0.0.2
Priority: 100
Advertisement interval(sec): 2
Preemption: Enabled
Virtual MAC address: 00:00:5E:00:01:6E
Master router: 33.0.0.1
Master priority: 100
Master advertisement interval: 2
Associated IP Addresses:
33.0.0.3
33.0.0.4
Related
Commands
Notes
Syntax interface <type> Filters the output to a specific interface type and number
Description <number>
Default N/A
History 3.3.4500
1110
Related
Commands
Notes
MAGP
Multi-active gateway protocol (MAGP) is aimed to solve the default gateway problem when a host is
connected to a set of switch routers (SRs) via MLAG.
The network functionality in that case requires that each SR is an active default gateway router to
the host, thus reducing hops between the SRs and directly forwarding IP traffic to the L3 cloud
regardless which SR traffic comes through.
Configuring MAGP
Prerequisites
1. Enable IP routing functionality. Run:
The VLAN cannot be the same one configured for the MLAG IPL, if MLAG is used.
1111
Configuring MAGP
1. Enable MAGP protocol globally. Run:
Only a virtual IP from the primary subnet can be configured for MAGP.
To obtain the virtual router’s MAC address, please run the command “show vrrp
detail”.
Verifying MAGP
To verify the MAGP configuration, run:
1112
MAGP Commands
protocol magp
protocol magp
no protocol magp
Enables MAGP globally and unhides MAGP commands.
The no form of the command deletes all the MAGP configuration and hides MAGP
commands.
Syntax N/A
Description
Default Disabled
Configuration config
Mode
History 3.3.4500
Related
Commands
magp
magp <instance>
no magp <instance>
Creates an MAGP instance on this interface and enters a new
configuration mode.
The no form of the command deletes the MAGP instance.
Default Disabled
History 3.3.4500
1113
Example switch (config interface vlan 20)# magp 100
switch (config interface vlan 20 magp 100)#
Related Commands
shutdown
shutdown
no shutdown
Enables MAGP instance.
The no form of the command disables the MAGP instance.
Default Disabled
History 3.3.4500
Related Commands
Notes
virtual-router ip-address
virtual-router ip-address <IP-Address> mac-address <MAC-address>
no virtual-router ip-address
Sets the IP address and the MAC address of the virtual router.
The no form of the command resets the MAC address to its default.
1114
Default N/A
History 3.3.4500
Related Commands
ip virtual-router address
ip virtual-router address <ip-address> [secondary]
no ip virtual-router address <ip-address> [secondary]
Sets MAGP virtual IP address.
The no form of the command resets this parameter to its default.
Default N/A
History 3.3.4500
Related Commands
Notes The MAGP virtual IP address must be different from the interface IP
address
1115
ip virtual-router mac-address
ip virtual-router mac-address <mac-address>
no ip virtual-router mac-address
Sets MAGP virtual MAC address.
The no form of the command resets the MAC address to its default.
History 3.3.4500
Related Commands
Notes
show magp
show magp [<instance>]
Displays the MAGP configuration.
Default N/A
History 3.3.4500
1116
Example switch (config)# show magp
MAGP 1:
Interface vlan: 10
Admin state : Enabled
State : Master
Virtual IP : 192.168.11.10
Virtual MAC : 00:00:5E:00:01:14
Associated IP Addresses:
192.168.10.10
Related Commands
Note
Default N/A
History 3.3.4500
MAGP 1:
Interface vlan: 10
Admin state : Enabled
State : Master
Virtual IP : 192.168.11.10
Virtual MAC : 00:00:5E:00:01:14
Associated IP Addresses:
192.168.10.10
Related Commands
Notes
1117
DHCP Relay
Since Dynamic Host Configuration Protocol must work correctly even before DHCP clients have been
configured, the DHCP server and DHCP client need to be connected to the same network.
In larger networks, this is not always practical because each network link contains one or more
DHCP relay (DHCP-R) agents. These agents receive messages from DHCP clients and forward them to
DHCP servers thus extending the reach of the DHCP beyond the local network.
Only one instance in each VRF can have vrf-auto-helper capability. Whenever a new instance is
created in a VRF, it automatically becomes a vrf-auto-helper.
It is possible to manually disable auto-helper capability for the instance. See the command “vrf-
auto-helper” for more information.
ip dhcp relay
ip dhcp relay [instance <instance-id>]
no ip dhcp relay [instance <instance-id>]
Enters DHCP relay instance configuration mode, and creates DHCP
instance in active VRF context.
The no form of the command deletes the instance and DHCP relay
process corresponding to it.
1118
Default N/A
History 3.6.3004
Related Commands
address
address <ip-address>
no address <ip-address>
Configures the DHCP server IP address on a particular instance.
The no form of the command deletes the DHCP server IP address.
Default N/A
History 3.3.4150
1119
always-on
always-on
no always-on
Enables broadcast mode on a particular instance.
The no form of the command disables the broadcast mode from
instance.
Default Disabled
History 3.3.4150
information option
information option
no information option
Enables DHCP relay agents to insert option 82 on the packets of a
particular instance.
The no form of the command removes option 82 from the packets.
Default Disabled
1120
Configuration Mode config ip dhcp relay
History 3.3.4150
Notes The following option for running this command is also possible: ip dhcp
relay instance 1 information option. However, if an instance is not
specified then instance 1 is used (if nonexistent, then it is created).
vrf
vrf <vrf-name>
no vrf <vrf-name>
Configures mention instance in the given VRF.
The no form of the command moves the instance back to default VRF.
Syntax N/A
Description
Default N/A
History 3.6.3004
Related
Commands
Notes • If no VRF is specified, then the DHCP-R instance is created in the active VRF
• If the VRF is changed, then the configuration of the DHCP-R instance is
automatically deleted
• The following option for running this command is also possible: ip dhcp relay
instance 1 vrf <vrf-name>. However, if an instance is not specified then instance 1
is used (if nonexistent, then it is created).
1121
port
port <udp-port>
no port <udp-port>
Changes the UDP port for the given instance.
The no form of the command sets the UDP port to default value.
Default 67
History 3.6.3004
Related
Commands
Notes • The system allocated 2 ports: One is the server port (udp-port), and another is
client port (udp-port+1)
• The following option for running this command is also possible: ip dhcp relay
instance 1 port <udp-port>. However, if an instance is not specified then instance 1
is used (if nonexistent, then it is created).
use-secondary-ip
use-secondary-ip
no use-secondary-ip
Enables the switch to relay a single request from the client multiple times simultaneously,
with each of the IP addresses configured on the corresponding downstream interfaces as
the respective gateway address (linkaddr field of IPv4 DHCP request packet).
The no form of the command disables this function.
Syntax N/A
Description
Default Disabled
History 3.6.8008
1122
Example switch (config ip dhcp relay instance 1)# use-secondary-ip
Related
Commands
Notes
vrf-auto-helper
vrf-auto-helper
no vrf-auto-helper
Makes all L3 interfaces (existing/newly created) to be part of the given instance.
The no form of the command resets this parameter to its default
Syntax N/A
Description
Default N/A
History 3.6.3004
Related
Commands
Notes • Every new DHCP-R instance created in a VRF automatically becomes the VRF auto-
helper if no other DHCP-R instance has been configured VRF auto-helper previously
in that VRF
• The following option for running this command is also possible: ip dhcp relay
instance 1 vrf-auto-helper. However, if an instance is not specified then instance 1
is used (if nonexistent, then it is created).
1123
ip dhcp relay instance (config interface)
ip dhcp relay instance <instance-id> [downstream] [upstream]
no ip dhcp relay instance <instance-id> [downstream] [upstream]
Enables the given interface to listen for DHCP packets coming from
specified instance (i.e. binds interface to that instance).
The no form of the command removes the interface mapping from
that instance.
Default Downstream
History 3.6.3004
Related Commands
1124
clear ip dhcp relay counters
clear ip dhcp relay counters [vrf {<vrf-name> | all} | instance
<instance-id>]
Clears all DHCP relay counters (all interfaces) in a given VRF or
instance.
Default N/A
History 3.3.4150
Related Commands
Syntax Description label Specifies the label attached to packets. The string
may be up to 15 characters.
1125
Default The label is taken from the IP interface name (e.g. “vlan1”)
History 3.3.4150
Example switch (config interface vlan 10)# ip dhcp relay information options
circuit-id my-label
Related Commands
Default Disabled
History 3.6.4070
Example switch (config interface ethernet 1/1) # ipv6 dhcp relay instance 1
downstream
Related Commands
1126
Notes • An instance without an assigned addresses is sent to
All_DHCP_servers address
• Each interface is either upstream, downstream, or
bidirectional
• At most, 64 interfaces can be configured on each instance
• If only downstream interfaces are defined, all interfaces in
VRF are assumed to be upstream interfaces
• An instance must meet two conditions to become active:
• A server address or an upstream interface
• A downstream interface
Default N/A
History 3.6.4070
Example switch (config)# ipv6 dhcp relay instance 1 address 2001::1
Related Commands
1127
ipv6 dhcp relay instance address (destination address on
interface)
ipv6 dhcp relay instance <instance-id> address <link-local-address>
no ipv6 dhcp relay instance <instance-id> address <link-local-
address>
Configures the destination address on a particular instance on a
specific upstream interface. Only link local address is supported.
The no form of the command deletes the destination address on a
specific upstream interface from a particular instance.
Default N/A
History 3.6.4070
Example switch (config interface ethernet 1/13)# ipv6 dhcp relay instance 1
address fe80::1
Related Commands
1128
ipv6 dhcp relay instance interface-id option
ipv6 dhcp relay instance <instance-id> interface-id option
no ipv6 dhcp relay instance <instance-id> interface-id option
Enables the instance to insert interface ID option.
The no form of the command disables this option.
History 3.6.4070
Example switch (config)# ipv6 dhcp relay instance 1 interface-id option
Related Commands
Notes
History 3.6.4070
Example switch (config)# ipv6 dhcp relay 1 vrf test
Related Commands
Notes When an instance is moved from one VRF to another - it loses all its
current configuration.
1129
ipv6 dhcp relay instance port
ipv6 dhcp relay instance <instance-id> port <udp-port>
no ipv6 dhcp relay instance <instance-id> port <udp-port>
Modifies the UDP port for the given instance.
The no form of the command will set the UDP port to default value.
History 3.6.4070
Example switch (config)# ipv6 dhcp relay 1 port 555
Related Commands
Notes
Default N/A
History 3.6.4070
Example switch (config)# ipv6 dhcp relay instance <instance-id> interface-
id option eth1/1
Related Commands
Notes
1130
ipv6 dhcp relay instance use-secondary-ip
ipv6 dhcp relay instance use-secondary-ip
no ipv6 dhcp relay instance use-secondary-ip
Enables the switch to relay a single request from the client multiple times simultaneously,
with each of the IP addresses configured on the corresponding downstream interfaces as
the respective gateway address (giaddr field of IPv6 DHCP request packet).
The no form of the command disables this function.
Syntax N/A
Description
Default Disabled
Configuration config
Mode
History 3.6.8008
Related
Commands
Notes
Default N/A
History 3.6.4070
Example switch (config)# clear ipv6 dhcp relay counters vrf all
Related Commands
Notes
1131
show ip dhcp relay
show ip dhcp relay [instance <instance-id>]
Displays general DHCP configuration.
Default N/A
History 3.3.4150
Instance ID 1:
VRF Name: default
DHCP Servers:
1.1.1.1
-------------------------------------------
Interface Label Mode
-------------------------------------------
eth1/5 N/A downstream
Related Commands
1132
show ip dhcp relay counters
show ip dhcp relay counters [instance <instance-id> | vrf <vrf-name>]
Displays the DHCP relay counters.
Syntax instance- Displays the DHCP relay counters for a given instance
Description id
Default N/A
History 3.3.4150
Example
switch (config) # show ip dhcp relay counters
Instance 1:
VRF Name: vrf-default
-----------------------------------
Req/Resp Received Forwarded
-----------------------------------
All Req 0 0
All Res 0 0
------------------------------------------------------
If SPRE SPE SPR CPR
------------------------------------------------------
eth1/5 0 0 0 0
Related
Commands
Notes
1133
show ipv6 dhcp relay
show ipv6 dhcp relay [instance <instance-id>]
Displays general DHCP configuration on all instances.
If instance ID is defined then specific instance configuration is
displayed.
Default N/A
Instance ID 1:
VRF Name: default
DHCP Servers:
2001:db8:701f::8f9
-------------------------------------------
Interface Label Mode
-------------------------------------------
eth1/5 N/A downstream
Related Commands
Syntax instance-id Displays the DHCPv6 relay counters for a given instance
Description
1134
vrf Displays the DHCPv6 relay counters in a given VRF
Default N/A
History 3.3.4150
Example
switch (config) # show ipv6 dhcp relay counters
Instance 1:
VRF Name: vrf-default
-----------------------------------
Req/Resp Received Forwarded
-----------------------------------
All Req 0 0
All Res 0 0
------------------------------------------------------
If SPRE SPE SPR CPR
------------------------------------------------------
eth1/5 0 0 0 0
Related
Commands
Notes
1135
RDMA Over Converged Ethernet (RoCE)
RoCE Overview
RDMA over Converged Ethernet (RoCE) is a network protocol that leverages Remote Direct Memory
Access (RDMA) capabilities to accelerate communications between applications hosted on clusters of
servers and storage arrays. RoCE incorporates the IBTA RDMA semantics to allow devices to perform
direct memory-to-memory transfers at the application level without involving the host CPU. Both
the transport processing and the memory translation and placement are performed by the hardware
which enables lower latency, higher throughput, and better performance compared to software-
based protocols.
RoCE traffic can take advantage of IP/Ethernet L3/L2 Quality of Service (QoS). Given some of the
most prevalent use cases for RDMA technology (e.g. low latency, high bandwidth), the use of QoS
becomes particularly relevant in a converged environment where RoCE traffic shares the underlying
network with other TCP/UDP packets. In this regard, RoCE traffic is no different than other IP flows:
QoS is achieved through proper configuration of relevant mechanisms in the fabric.
Configuration of IP/Ethernet L3/L2 QoS is determined by the RoCE application using the The SL
component in the Address Vector. RoCE Congestion Management
RoCE Congestion Management (RCM) relies on the mechanism defined in RFC3168 in the ECN
protocol for the signaling of congestion. While ECN marks packets that arrive to their destination,
the congestion notification is sent back to the source using a CNP packet, which limits the rate of
the packet injection for the relevant QP.
Definitions/Abbreviation
Definitions/ Description
Abbreviation
Lossless Network As with RoCE, the underlying networks for RoCEv2 should be configured as lossless.
In this context, lossless does not mean that packets are absolutely never lost.
1136
Definitions/ Description
Abbreviation
Configuring RoCE
Configuring simplified RoCE in ONYX allows the user to select the RoCE configuration that best suits
their use-case. To configure the simplified RoCE setting, configure the default mode of RoCE based
on the Mellanox recommended definitions or the advanced mode for specific DCN and use
cases. There are three modes in which RoCE can be configured: lossless, semi-lossless, and lossy.
Options Functionality
Lossless This is the most optimal and automated option and is the default mode for the
command, but requires a lossless network (PFC).
In addition to the PFC control that exists in semi-lossless, it includes that following
features:
• Adds traffic pool for lossless and map switch priority (3)
• Enable PFC on priority RoCE (3) on all ports.
Semi-lossless Requires a one-way PFC between the host and the ToR (the fabric will remain lossy).
In addition to the elements common to all options, it includes the following:
• Enables PFC on priority RoCE (3) on all ports.
Lossy No PFC, but has the factors common to all modes.
RoCE Parameters
1137
Parameters Lossy Semi-lossless Lossless
• The RoCE command defines the switch default values for several parameters defined
in details in the RoCE Parameters table, above. Changes made by the user for RoCE-
related parameters will not be changed by the RoCE command when executed.
• Changing buffer configuration mode to "advanced buffer management" after
configuring RoCE returns the buffer configuration to its default configuration.
RoCE Commands
• RoCE Commands
Further Information
For more information about this feature and its potential applications, please refer to the following
Mellanox Community posts:
1138
• RoCE Configuration for Onyx Switches in PCP-Based QoS Mode (Advanced Mode)
• How To Configure Resilient RoCE End-to-End Using ConnectX-4 and Spectrum (No QoS)
• Lossless RoCE Configuration for Onyx Switches in PCP-Based QoS Mode
• How To Configure Mellanox Spectrum Switch for Lossless RoCE
• How To Configure Mellanox Spectrum Switch for Resilient RoCE
• RoCE Configuration for Onyx Switches in DSCP-Based QoS Mode
• Lossless RoCE Configuration for MLNX-OS Switches in DSCP-Based QoS Mode (Advanced Mode)
RoCE Commands
roce
roce [< lossy | semi-lossless | lossless >]
[no] roce
Configures the switch to RoCE mode.
The no form of the command disables RoCE mode.
Syntax Lossless Full PFC support (this is the default when no parameter is chosen).
Description
Semi- Micro-burst absorption (pause rx compliant, no pause propagation).
lossless
Lossy Congestion control based on ECN marking only. No PFC support.
Default N/A
Configuration config
Mode
History 3.8.2000
switch (config) #
1139
show roce
show roce
Displays RoCE mode information.
Syntax N/A
Descriptio
n
Default N/A
Configura config
tion Mode
History 3.8.2000
Application TLV:
Selector: udp
Protocol: 4791
Priority: 3
Port congestion-control:
Mode: ecn, absolute
Min : 150
Max : 1500
PFC : enabled
switch-priority 3: enabled
1140
show interfaces ethernet 1/1 counters roce
show interfaces ethernet 1/1 counters roce
Display specific interfaces counters relevant to RoCE. See example below.
Syntax N/A
Description
Default N/A
Configuration config
Mode
History 3.8.2000
Rx:
0 RoCE PG packets
0 RoCE PG bytes
0 RoCE no buffer discard
0 CNP PG packets
0 CNP PG bytes
0 CNP no buffer discard
0 RoCE PFC pause packets
0 RoCE PFC pause duration
0 RoCE buffer usage (bytes)
0 RoCE buffer max usage (bytes)
0 CNP buffer usage (bytes)
0 CNP buffer max usage (bytes)
0 RoCE PG usage (bytes)
0 RoCE PG max usage (bytes)
0 CNP PG usage (bytes)
0 CNP PG max usage (bytes)
Tx:
0 ECN marked packets
0 RoCE TC packets
0 RoCE TC bytes
0 RoCE unicast no buffer discard
0 CNP TC packets
0 CNP TC bytes
0 CNP unicast no buffer discard
0 RoCE PFC pause packets
0 RoCE PFC pause duration
0 RoCE buffer usage (bytes)
0 RoCE buffer max usage (bytes)
0 CNP buffer usage (bytes)
0 CNP buffer max usage (bytes)
0 RoCE TC usage (bytes)
0 RoCE TC max usage (bytes)
0 CNP TC usage (bytes)
0 CNP TC max usage (bytes)
Related roce
Commands
show roce
Notes
1141
clear roce interface ethernet 1/1
clear roce interface ethernet 1/1
Clears all the counters including the max-usage counters.
Syntax N/A
Description
Default N/A
Configuration config
Mode
History 3.8.2000
Notes
1142
Multicast (IGMP and PIM)
Protocol independent multicast (PIM) is a collection of protocols that deal with efficient delivery of
IP multicast (MC) data. Those protocols are published in the series of RFCs and define different ways
and aspects of multicast data distribution. PIM protocol family includes Internet Group Management
protocol (IGMP), IGMP Snooping, Bootstrap router (BSR) protocol, and PIM variations: Sparse mode
(PIM-SM), Source-Specific mode (PIM-SSM), Dense mode (PIM-DM) and Bidirectional mode (PIM-
BIDIR). PIM-DM and PIM-BIDIR are both not supported on Mellanox Onyx.
PIM builds and maintains multicast routing tables based on the unicast routing information provided
by unicast routing tables that can be maintained statically or dynamically by IP routing protocols
like OSPF and BGP.
Basic PIM-SM
PIM relies on the underlying topology gathering protocols that collect unicast routing information
and build multicast routing information base (MRIB). The primary role of MRIB is to determine the
next hop for PIM messages. MC data flows along with the reverse path of the PIM control.
1. Construction of a shared distribution tree. This tree is built around a special router called the
rendezvous point (RP).
2. Establishing a native forwarding path from MC sources to the RP.
3. Building an optimized MC distribution tree directly from each MC source to all MC targets.
The first stage of the multicast tree establishment starts when the MC receiver expresses desire to
start receiving MC data. It can happen as a result of using one of the L3 protocols like MLD or IGMP,
or by static configuration. When such request is received by the last hop router (a designated
router) this router starts to build a distribution path from the RP. It starts to send periodic “Join”
messages to the nearest PIM neighbor router towards the RP. The next router continues to do the
same. Eventually the process converges when Join messages reach RP or a router that has already
created that distribution tree. Usually that tree is called a shared tree because it is created for any
source for specific MC group G and is noted as (*,G).
At that stage, MC senders can start sending MC data. The DR next to the MC source extracts the
packets from the data flow and tunnels them to the RP. The RP decapsulates the packets and
distributes them to all MC receivers along with the share tree.
On the second stage the RP switches from tunneling of multicast packets from MC sources to
forwarding native traffic. When the RP identifies that a new MC source started to send packets, it
initiates an establishment of a native forwarding path from the DR of that source to itself. For this
purpose it starts to send Join messages towards MC source to nearest neighbor to that source
according the MRIB. This is a source specific Join and is noted as (S,G). When data path is
established up to the DR, the DR switches from tunneling MC packets to their native forwarding, so
the RP does not need to decapsulate MC packets anymore, but still continue to distribute the
packets along with shared tree.
On the third phase multicast receivers will try to switch from shared tree to source specific tree by
creating a direct distribution path from a multicast source. When last hop router of the multicast
receiver identifies multicast traffic coming from any multicast source it will start to send Join
messages towards the source with purpose to create a direct source specific path to that source.
Once such path will be established and Designated router that is attached to the source L2 network
will start to distribute the multicast traffic directly bypassing shared tree, the last hop router will
1143
detach its receivers from shared tree for that data and will switch to the shortest path tree
distribution.
SSM requires that the receiver specify the source address and explicitly excludes the use of the (*,G)
join for all multicast groups in RFC 3376, which is possible only in IPv4's IGMPv3 and IPv6's MLDv2.
Source-specific multicast is best understood in contrast to any-source multicast (ASM). In the ASM
service model a receiver expresses interest in traffic to a multicast address. The multicast network
must discover all multicast sources sending to that address, and route data from all sources to all
interested receivers.
This behavior is particularly well suited for groupware applications where all participants in the
group want to be aware of all other participants, and the list of participants is not known in
advance.
The source discovery burden on the network can become significant when the number of sources is
large.
In the SSM service model, in addition to the receiver expressing interest in traffic to a multicast
address, the receiver expresses interest in receiving traffic from only one specific source sending to
that multicast address. This relieves the network of discovering many multicast sources and reduces
the amount of multicast routing information that the network must maintain.
SSM requires support in last-hop routers and in the receiver's operating system. SSM support is not
required in other network components, including routers and even the sending host. Interest in
multicast traffic from a specific source is conveyed from hosts to routers using IGMPv3 as specified
in RFC 4607.
By default SSM destination addresses defined in the ranges 232.0.0.0/8 for IPv4 or FF3x::/96 for
IPv6. This range may be configured by user.
Source-specific multicast delivery semantics are provided for a datagram sent to an SSM address.
That is, a datagram with source IP address S and SSM destination address G is delivered to each
upper-layer “socket” that has specifically requested the reception of datagrams sent to address G
by source S, and only to those sockets.
Bootstrap Router
For correct operation each PIM router requires a capability to map a multicast group that it needs to
serve to a Rendezvous point for that group. This mapping can be done manually or the mapping can
be distributed dynamically in the network. BSR protocol serves for this purpose.
This protocol introduces new role in the multicast network – Bootstrap router. That router is
responsible to flood multicast group to RP mapping through the multicast routing domain. Bootstrap
router is elected dynamically among bootstrap router candidates (C-BSR) and once elected will
collect from Rendezvous point candidate (C-RP) mapping information and distribute it in the
domain.
1144
Bootstrap activity contains 4 steps. First each C-BSR configured in the network originates floods into
the network bootstrap messages that express the router desire to become BSR and also its BSR
priority. Any C-BSR that receives that information and has lower priority will suspend itself, so
eventually only one router will send BSR messages and become BSR.
When BSR is elected all RP candidates start to advertise to BSR a list of groups that this RP can
serve. On the next step, after BSR learns the group mapping proposals, it forms a final group to RP
mapping in the domain and starts to distribute it among PIM routers in the multicast routing domain.
When PIM router receives BSR message with the group to RP mapping, it installs that mapping in the
router local cache and uses that information to create multicast distribution trees.
Configuring Multicast
Precondition steps:
Configuring IGMP
IGMP is enabled when IP multicast is enabled and static multicast or PIM is enabled on the interface.
Verifying IGMP
1. Display a brief IGMP interface status. Run:
1145
switch (config)# show ip igmp interface brief
VRF "default":
---------------------------------------------------------------------------
Interface IP Address IGMP Querier Membership Count Version
---------------------------------------------------------------------------
Vlan10 10.10.10.1 10.10.10.1 1 v2
Errors:
Checksum errors : 0
Packet length errors : 0
Packets with Local IP as source : 0
Source subnet check failures : 0
Query from non-querier : 0
Report version mismatch : 0
Query version mismatch : 0
Unknown IGMP message type : 0
Invalid v2 reports : 0
Invalid v3 reports : 0
Invalid leaves : 0
Packets dropped due to router-alert check: 0
Configuring PIM
Prerequisites:
1146
switch (config)# ip multicast-routing
To configure PIM:
2. Enable PIM on any IP interface (router port or VLAN interface) facing an L3 multicast source
or L3 multicast receiver including transit interfaces. For example, run:
If IGMP must be enabled on a VLAN interface, IP IGMP snooping must also be enabled (globally
and on the relevant VLAN interface):
You may also specify a “group-list <ip-address> <prefix>” parameter (ip pim rp-
address 192.168.0.1 group-list 224.0.0.0/4) if you want different RPs for different
groups.
1147
• HowTo Configure IP Multicast (PIM, IGMP) on Mellanox Ethernet Switches
PIM
protocol pim
protocol pim
no protocol pim
Enables protocol independent multicast (PIM).
The no form of the command hides all PIM commands and deletes all PIM configurations.
Default Disabled
History 3.3.5006
Related Commands
Notes
ip pim sg-expiry-timer
ip pim [vrf <vrf-name>] sg-expiry-timer <seconds>
no ip pim [vrf <vrf-name>] sg-expiry-timer
Adjusts the SG expiry timer interval for PIM-SM SG
multicast routes.
The no form of the command resets the parameters to
their default values
1148
seconds Range: 1-65535
History 3.6.6102
Related Commands
Notes
ip pim rp-address
ip pim [vrf <vrf-name>] rp-address <rp-address> [group-
list <ip-address> <prefix>] [override]
no ip pim [vrf <vrf-name>] rp-address <rp-address>
[group-list <ip-address> <prefix>] [override]
Configures a static IP address of a rendezvous point for a
multicast group range or adds new multicast range to
existing RP.
The no form of the command removes the rendezvous
point for a multicast group range or removes all
configuration of the RP.
Default N/A
History 3.3.5006
1149
Related Commands
Notes
ip pim bsr-candidate
ip pim [vrf <vrf-name>] bsr-candidate {vlan <vlan-id> |
loopback <number> | ethernet <port> | port-channel
<id>} [hash-len <hash-length>] [priority <priority>]
[interval <interval>]
no ip pim [vrf <vrf-name>] bsr-candidate {vlan <vlan-id>
| loopback <number> | ethernet <port>} [hash-len
<hash-length>] [priority <priority>] [interval <interval>]
Configures the switch as a candidate BSR router (C-BSR).
The no form of the command removes BSR-candidate
configuration or restores default parameters values.
1150
Configuration Mode config
config interface ethernet (configured as a router port
interface)
config interface loopback
config interface port-channel (configured as a router
port interface)
config interface vlan
History 3.3.5006
ip pim register-source
ip pim [vrf <vrf-name>] register-source <interface>
no ip pim [vrf <vrf-name>] register-source <interface>
Configures interface from which to use IP as source in
PIM communications.
The no form of the command undoes this configuration.
Default N/A
1151
Configuration Mode config
config interface ethernet (configured as a router port
interface)
config interface loopback
config interface port-channel (configured as a router
port interface)
config interface vlan
History 3.6.6102
Related Commands
ip pim rp-candidate
ip pim [vrf <vrf-name>] rp-candidate {vlan <vlan-id> |
loopback <number> | ethernet <slot/port>} group-list
<ip-address> <prefix> [priority <priority>] [interval
<interval>]
no ip pim [vrf <vrf-name>] rp-candidate {vlan <vlan-id> |
loopback <number> | ethernet <slot/port>} group-list
<ip-address> <prefix> [priority <priority>] [interval
<interval>]
Configures the switch as a candidate rendezvous point
(C-RP).
The no form of the command removes the ip pim rp-
candidate from running-config command for the
specified multicast group.
1152
prefix Network prefix (for example /24, or
255.255.255.0)
History 3.3.5006
Related Commands
1153
ip pim sparse-mode
ip pim sparse-mode
no ip pim sparse-mode
Sets PIM sparse mode on this interface.
The no form of the command disables the sparse-mode on the interface and deletes all
interfaces configuration.
Syntax N/A
Description
Default Disabled
History 3.3.5006
Related
Commands
Notes
ip pim dr-priority
ip pim dr-priority <priority>
no ip pim dr-priority
Configures the designated router (DR) priority of PIM Hello messages.
The no form of the command resets this parameter to its default.
Syntax Description priority The designated router priority of the PIM Hello
messages. Range is 1-4294967295.
Default 1
History 3.3.5006
1154
Example switch (config interface vlan 10) # ip pim dr-priority 5
Notes The command “ip pim sparse-mode” must be run prior to using this
command.
ip pim hello-interval
ip pim hello-interval <interval>
no ip pim hello-interval
Configures PIM Hello interval in seconds.
The no form of the command resets this parameter to its default.
Default 30 seconds
History 3.3.5006
Notes The command “ip pim sparse-mode” must be run prior to using this
command
ip pim join-prune-interval
ip pim join-prune-interval <period>
no ip pim join-prune-interval
Configures the period between Join/Prune messages that the
configuration mode interface originates and sends to the upstream
RPF neighbor.
The no form of the command resets this parameter to its default.
1155
Syntax Description period Range: 1-18000 seconds
Default 60 seconds
History 3.3.5200
Related Commands
Notes
Default N/A
History 3.6.4006
1156
Related Commands
History 3.6.8100
Related Commands
Notes
1157
ip pim multipath rp
ip pim multipath rp [<algorithm>]
no ip pim multipath rp
Configures PIM RP selection algorithm.
The no form of the command resets PIM RP selection algorithm to default
(g-hash algorithm which is described in RFC 4601, sec. 4.7.2).
History 3.7.1100
Related Commands
Note
Default N/A
History 3.6.6102
Related Commands
Notes
1158
show ip pim protocol
show ip pim [vrf {all | <vrf_name>}] protocol
Displays PIM protocol information.
Default N/A
History 3.3.5200
Example
switch (config) # show ip pim vrf default protocol
Related
Commands
Notes
1159
show ip pim bsr
show ip pim [vrf {all | <vrf_name>}] bsr
Displays PIM BSR information.
Default N/A
History 3.3.5006
Related Commands
Notes
1160
show ip pim interface
show ip pim [vrf {all | <vrf_name>}] interface {[ethernet <port> | port-channel <id> | vlan
<vlan id>]}
Displays information about the enabled interfaces for PIM.
Default N/A
History 3.3.5006
Example
switch (config)# show ip pim vrf default interface ethernet 1/17
VRF "default":
Interface eth1/17 address 17.17.17.10:
PIM : enabled
PIM version : 2
PIM mode : sparse
PIM DR : 17.17.17.10 (this system)
PIM DR Priority : 1
PIM configured DR priority: 1
PIM neighbor count : 1
PIM neighbor holdtime : 105 secs
PIM Hello Interval : 30 seconds, next hello will be sent in: 00:00:00
PIM Hello Generation ID : d674dec2
PIM Join-Prune Interval : 60 seconds
PIM domain border :
Errors:
Checksum errors : N/A
Invalid packet types/DF subtypes : N/A / 0
Authentication failed : N/A
Packets from non-neighbors : 0
JPs received on RPF-interface : N/A
(*,G) Joins received with no/wrong RP : N/A / N/A
(*,G)/(S,G) JPs received for Bidir groups: N/A
Related
Commands
1161
Notes
Default N/A
History 3.3.5006
Example
switch (config)# show ip pim vrf all interface brief
VRF "default":
------------------------------------------------------------------------
Address Interface Ver/ Nbr Query DR DR
Mode Count Intvl Prior
------------------------------------------------------------------------
20.20.20.10 eth1/1 v2/S 0 30 1 20.20.20.10
30.30.30.10 eth1/2 v2/S 0 30 1 30.30.30.10
17.17.17.10 eth1/17 v2/S 1 30 1 17.17.17.10
Related
Commands
Notes
1162
show ip pim neighbor
show ip pim [vrf {all | <vrf_name>}] neighbor [vlan <vlan-id> | <other interfaces> | <ip-
addr>]
Displays information about IPv4 PIM neighbors.
Default N/A
History 3.3.5006
Example
switch (config) # show ip pim vrf default neighbor
VRF "default":
-------------------------------------------------------------------------
Neighbor Interface Uptime Expires Ver DR-Prio Mode BFD
-------------------------------------------------------------------------
17.17.17.5 eth1/17 01:08:07 00:01:38 v2 1 None
Related
Commands
Notes
show ip pim rp
show ip pim [vrf {all | <vrf_name>}] rp [<rp-address>]
Displays information about the rendezvous points (RPs) for PIM.
1163
Syntax Description vrf Displays output for a specific VRF
Default N/A
History 3.3.5006
RP 17.17.17.10:
expires : 00:02:07
RP-source: 17.17.17.10
group ranges:
225.0.0.0/24, priority: 192
Related Commands
Notes
Default N/A
History 3.3.5006
1164
Example switch (config) # show ip pim rp-hash 224.1.1.0
VRF "default":
RP 192.167.7.1, v2:
RP-source:
priority : N/A
Uptime : N/A
Expires : N/A
Related Commands
Default N/A
History 3.3.5006
VRF "default":
No RP candidates
VRF "vrf_1":
RP 17.17.17.10:
Interface : eth1/17
Interval : 60
Next advertisement in: 6
Holdtime : 150
Priority : 192
Group prefixes:
1: 225.0.0.0/24
Related Commands
Notes
1165
show ip pim ssm range
show ip pim ssm [vrf {all | <vrf_name>}] range
Displays information about configured PIM SSM ranges.
Default N/A
History 3.6.6000
VRF "default":
PIM SSM is not configured
VRF "vrf_1":
Range type : group-list
Total number of entries: 1
Group ranges:
1: 234.1.1.0/24
2: 234.1.2.0/24
3: 234.1.3.0/24
4: 234.1.4.0/24
5: 234.1.5.0/24
Related Commands
Notes
Default N/A
1166
History 3.3.5006
VRF "default":
There are no upstream joins
VRF "vrf_1":
Neighbor address 17.17.17.5:
via interface : 17.17.17.10
next message in: N/A seconds
Group 238.0.0.1:
Joins:
1: 10.10.10.5
Prunes:
No prunes included
Group 225.0.0.1:
Joins:
1: 10.10.10.5
Prunes:
No prunes included
Related Commands
Multicast
ip multicast-routing
ip multicast-routing [vrf <vrf-name>]
no ip multicast-routing [vrf <vrf-name>]
Allows the switch to forward multicast packets.
The no form of the command disables multicast routing.
Default Disabled
History 3.3.5006
Related Commands
1167
Notes
ip mroute
ip mroute [vrf <vrf-name>] {<ip-addr> <ip-mask> <next-hop>} [pref]
no ip mroute [vrf <vrf-name>] {<ip-addr> <ip-mask> <next-hop>}
Configure multicast reverse path forwarding (RPF) static routes.
The no form of the command deletes the static multicast route.
Default Preference is 1
History 3.3.5006
Related Commands
Notes
ip multicast ttl-threshold
ip multicast ttl-threshold <ttl-value>
no ip multicast ttl-threshold
Configures the time-to-live (TTL) threshold of packets being
forwarded out of an interface.
The no form of the command removes RPF static routes.
1168
Default 0 – all packets are forwarded
History 3.3.5006
Related Commands
Notes
clear ip mroute
clear ip mroute [vrf <vrf>] [<group-address> [<source-address>]]
Clears multicast route information.
Syntax Description vrf Clears multicast route information for specific VRF
Default N/A
History 3.6.6102
Related Commands
Notes This command does not support clearing specific (S,G) state if G
belongs to an ASM group range. Here (S,G) refers to source and group
parameters accordingly.
show ip mroute
show ip mroute [vrf {all | <vrf-name>}] [<group> [<prefix> [<source>]]]
Displays information about IPv4 multicast routes.
1169
Syntax source Source IP address
Description
group IP address of multicast group
prefix Network prefix of multicast group (in the format of /24, or 255.255.255.0 for
example)
Default N/A
History 3.2.1000
Timers : Uptime/Expires
Interface state: Interface, State/Mode
VRF "vrf_1":
(*, 225.0.0.1/32), 00D 00:04:40, RP 17.17.17.10, flags: AL:
Incoming interface: eth1/17
RPF Neighbor : 0.0.0.0
1170
RPF Neighbor : 17.17.17.5
Timers : Uptime/Expires
Interface state: Interface, State/Mode
VRF "vrf_1":
(*, 225.0.0.1/32), 00D 00:13:27, RP 17.17.17.10, flags: AL:
Incoming interface: eth1/17
RPF Neighbor : 0.0.0.0
VRF "vrf_1":
(*, 225.0.0.1/32), 00D 00:14:54, RP 17.17.17.10, flags: AL:
Incoming interface: eth1/17
RPF Neighbor : 0.0.0.0
Related
Commands
Notes
1171
show ip mroute summary
show ip mroute [vrf {all | <vrf-name>}] summary
Displays a summary of the IPv4 multicast routes.
Default N/A
History 3.2.1000
VRF "vrf_1":
(*, 225.0.0.1/32):
Uptime : 00D 00:11:18
RP : 17.17.17.10
OIF count: 1
flags : AL
(10.10.10.5, 225.0.0.1/32):
Uptime : 00D 00:11:15
Exptime : 00D 00:00:44
OIF count: 0
flags : AT
(10.10.10.5, 238.0.0.1/32):
Uptime : 00D 00:11:18
Exptime : 00D 00:00:41
OIF count: 1
flags : ST
Total: 3 routes
Related
Commands
1172
Notes
IGMP
ip igmp immediate-leave
ip igmp immediate-leave
no ip igmp immediate-leave
Enables the device to remove the group entry from the multicast routing table immediately
upon receiving a leave message for the group.
The no form of the command disables immediate-leave.
Syntax N/A
Description
Default Disabled
History 3.6.8100
Related
Commands
Notes
ip igmp last-member-query-response-time
ip igmp last-member-query-response-time <interval>
no ip igmp last-member-query-response-time
Configures the IGMP last member query response time in seconds.
The no form of the command resets this parameter to its default.
Default 1
1173
Configuration Mode config interface vlan
config interface ethernet (configured as a router port interface)
config interface port-channel (configured as a router port interface)
History 3.3.5006
Related Commands
Notes When both “IGMP” and “IGMP Snooping” handle a Leave message and
have different values for “Last Member Query Time” timer configured,
then traffic loss may occur for a short period of time.
ip igmp startup-query-count
ip igmp startup-query-count <count>
no ip startup-query-count
Configures the number of query messages an interface sends
during startup.
The no form of the command resets this parameter to its
default.
Default 2
History 3.3.5006
Related Commands
Notes
1174
ip igmp startup-query-interval
ip igmp startup-query-interval <interval>
no ip startup-query-interval
Configures the IGMP startup query interval in seconds.
The no form of the command resets this parameter to its default.
Default 31
History 3.3.5006
Related Commands
Notes
ip igmp query-interval
ip igmp query-interval <interval>
no ip igmp query-interval
Configures the IGMP query interval in seconds.
The no form of the command resets this parameter to its default.
History 3.3.5006
Related Commands
Notes
1175
ip igmp query-max-response-time
ip igmp query-max-response-time <time>
no ip igmp query-max-response-time
Configures the IGMP max response time in seconds.
The no form of the command resets this parameter to its default.
Default 10
History 3.3.5006
Related Commands
Notes
ip igmp robustness-variable
ip igmp robustness-variable <count>
no ip igmp robustness-variable
Configures the IGMP robustness variable.
The no form of the command resets this parameter to its default.
Default 2
History 3.3.5006
Related Commands
1176
Notes • The robustness variable can be increased to increase the
number of times that packets are resent
• This parameter reflects expected packet loss on a congested
network
ip igmp static-oif
ip igmp static-oif <group> [source-ip <address>]
no ip igmp static-oif <group> [source-ip <address>]
Statically binds an IP interface to a multicast group.
The no form of the command deletes the static multicast address
from the interface.
Default N/A
History 3.3.5006
Related Commands
1177
vrf Clears IGMP groups in specific VRF
Default N/A
History 3.3.5200
Related Commands
Notes
iface Filters the output to a specific IP interface (i.e. ethernet, port-channel, vlan
interface)
Default N/A
History 3.3.5200
Example
1178
switch (config)# show ip igmp vrf all groups
VRF "default":
No IGMP group memberships learned or configured
VRF "vrf_1":
--------------------------------------------------------------------------------------------
Group Address Type Interface Uptime Expires Last Reporter
--------------------------------------------------------------------------------------------
225.0.0.1 D eth1/1 01:03:03 00:03:51 20.20.20.5
238.0.0.1 D eth1/2 01:03:03 N/A 30.30.30.5
Related
Commands
Notes
Default N/A
History 3.3.5200
1179
3.6.8100 Added “IGMP interface immediate leave” line to output
Example
switch (config)# show ip igmp interface vlan 10
Interface vlan10
Status: protocol-down/link-down/admin-up
VRF: "vrf-default"
IP address: 10.10.10.1/24
Active querier: 10.10.10.1
Version: 2
Next query will be sent in: 00:01:45
Membership count: 0
IGMP version: 2
IGMP query interval: 125 secs
IGMP max response time: 10 secs
IGMP startup query interval: 31 secs
IGMP startup query count: 2
IGMP last member query interval: 1 secs
IGMP last member query count: 2
IGMP group timeout: 260 secs
IGMP querier timeout: 0 secs
IGMP unsolicited report interval: 10 secs
IGMP robustness variable: 2
IGMP interface immediate leave: Disabled
Multicast routing status on interface: Enabled
Multicast TTL threshold: 0
Errors:
Checksum errors : 0
Packet length errors : 0
Packets with Local IP as source : 0
Source subnet check failures : 0
Query from non-querier : 0
Report version mismatch : 0
Query version mismatch : 0
Unknown IGMP message type : 0
Invalid v2 reports : 0
Invalid v3 reports : 0
Invalid leaves : 0
Packets dropped due to router-alert check: 0
Related
Commands
Notes
1180
show ip igmp interface brief
show ip igmp interface [ethernet <if> | port-channel <if> | vlan <vlan-id>] brief
Displays brief IGMP configuration and status information.
Default N/A
History 3.3.5200
Example
switch (config)# show ip igmp vrf all interface brief
VRF "default":
------------------------------------------------------------------------------------------
Interface IP Address IGMP Querier Membership Count Version
------------------------------------------------------------------------------------------
eth1/10 12.14.192.5 0.0.0.0 0 v3
VRF "vrf_1":
------------------------------------------------------------------------------------------
Interface IP Address IGMP Querier Membership Count Version
------------------------------------------------------------------------------------------
eth1/1 20.20.20.10 20.20.20.10 1 v2
eth1/2 30.30.30.10 30.30.30.10 1 v3
eth1/17 17.17.17.10 17.17.17.5 0 v3
Related
Commands
Notes
Assert winner/loser
IGMP Snooping
The Internet Group Multicast Protocol (IGMP) is a communications protocol used by hosts and
adjacent routers on IP networks to establish multicast group memberships. The host joins a
multicast-group by sending a join request message towards the network router, and responds to
queries sent from the network router by dispatching a join report.
1181
A given port can be either manually configured to be a MRouter port or it can be dynamically
manifested when having received a query, hence, the network router is connected to this port. All
IGMP Snooping control packets received from hosts (joins/leaves) are forwarded to the MRouter
port, and the MRouter port updates its multicast-group database accordingly. Each dynamically
learned multicast group will be added to all of the MRouter ports on the switch.
b. Change the interface switchport mode of the port (the interface is member of VLAN 1
by default). Run:
1182
c. Change back to config mode. Run:
d. Change the interface switchport mode of the port (the interface is member of VLAN 1
by default). Run:
switch (config interface ethernet 1/22) # switchport mode hybrid allowed-vlan 200
switch (config interface ethernet 1/22) #
d. Change the interface switchport mode of the port (the interface is member of VLAN 1
by default). Run:
1183
IGMP Snooping Querier
IGMP Snooping Querier complements the IGMP snooping functionality. IGMP Snooping Querier is used
to support IGMP snooping in a VLAN where PIM and IGMP are not configured because the multicast
traffic does not need to be routed. When IGMP Snooping Querier is enabled, IGMP queries are sent
out periodically by the switch through all ports in the VLAN and to which hosts wishing to receive IP
multicast traffic respond with IGMP report messages. IGMP Snooping Querier must be used in
conjunction with IGMP snooping as IGMP snooping listens to these IGMP reports to establish
appropriate forwarding.
IGMP Snooping Querier Guard enables the switch administrator to define a filter to discard IGMP
Membership Query messages, allowing it to be selected as the IGMP querier by ignoring the received
messages. Connecting a device to an interface where this filter is defined stops the IGMP Querier
election process that allows a 3rd party device to trigger the local interface to be demoted from
being the IGMP querier.
IGMP Snooping Querier Guard can be configured on specific interfaces such as a port, MLAG port
channel, or port channel. It only works when "igmp snooping" is enabled.
1184
To configure IGMP Snooping Querier Guard on a specific interface, do the following:
Syntax N/A
Descriptio
n
Configura config
tion Mode config vlan
History 3.1.1400
Notes IGMP snooping has global admin state, and per VLAN admin state. Both states need to be enabled
in order to enable the IGMP snooping on a specific VLAN.
1185
ip igmp snooping (config)
ip igmp snooping {last-member-query-interval <1-25> | proxy reporting mrouter-
timeout <60-600> | port-purge-timeout <130-1225> | report-suppression-interval
<1-25> | unregistered multicast {flood | forward-to-mrouter-ports} | version {2 |
3}}
no ip igmp snooping {last-member-query-interval | proxy reporting | mrouter-
timeout | report-suppression-interval | unregistered multicast | version}
Configures global IGMP parameters.
The no form of the command resets the global IGMP parameters to default.
Syntax Description last-member-query-interval Sets the time period (in seconds) with which
<1-25> the general queries are sent by the IGMP
querier. After timeout expiration, the port is
removed from the multicast group.
port-purge-timeout <130-1225> Sets the IGMP snooping port purge time interval
after which the port gets deleted if no IGMP
reports are received
1186
History 3.1.1400
Notes When both IGMP and IGMP snooping protocols handle a Leave message and have
different values for “Last Member Query Time” timer configured, then there is
traffic loss for a short period of time.
Default Enabled
History 3.1.1400
Notes
1187
ip igmp snooping mrouter
ip igmp snooping mrouter interface <type> <number>
no ip igmp snooping mrouter interface <type> <number>
Creates a static multicast router port on a specific VLAN, on a specific
interface.
The no form of the command removes the static multicast router port from a
specific VLAN.
Syntax Description interface <type> <number> Attaches the group to a specific interface
type – ethernet or port-channel
History 3.1.1400
Notes The multicast router port can be created only if IGMP snooping is enabled
both globally and on the VLAN.
1188
Configuration Mode config vlan
History 3.1.1400
Notes If the deleted interface is the last port, it deletes the entire multicast
group.
Default Disable
History 3.3.4200
Notes
1189
Syntax Description N/A
Default Disable
History 3.8.2000
History 3.3.4200
Example switch (config vlan 1)# igmp snooping querier query-interval 100
Notes
1190
ip igmp version
ip igmp version <2, 3>
no ip igmp version
Sets IGMP version on interface.
The no form of the command resets the IGMP version on the interface to
default value.
History 3.3.5006
Related Commands
Notes
Default N/A
History 3.6.1002
Related Commands
Notes
1191
show ip igmp snooping
show ip igmp snooping
Displays IGMP snooping information for all VLANs or a specific VLAN.
Default N/A
History 3.1.1400
Related Commands
Notes
Default N/A
1192
Configuration Any command mode
Mode
History 3.1.1400
Example
switch (config) # show ip igmp snooping groups
--------------------------------------------------
Vlan ID Group St/Dyn Ports
--------------------------------------------------
1 230.0.0.1 St Eth1/1,Eth1/2
2 230.0.0.1 St Eth1/4,Eth1/6
2 230.0.0.2 St Eth1/5
Related
Commands
Notes
Default N/A
1193
History 3.1.1400
Notes
Default N/A
History 3.6.2100
Example
switch (config) # show ip igmp snooping membership vlan 1 group 224.5.5.5
Snooping membership information for VLAN 1 and group 224.5.5.5
Related
Commands
Notes
1194
show ip igmp snooping mrouter
show ip igmp snooping mrouter
Displays IGMP snooping multicast router information.
Default N/A
History 3.1.1400
Related Commands vlan <id> ip igmp snooping mrouter interface ethernet <id>
Notes
Syntax Description vlan <num> Displays the IGMP snooping querier configuration
running on the specified VLAN
Default N/A
History 3.3.4200
1195
3.6.2100 Updated example
Notes
lag-id LAG ID
mlag-id MLAG ID
Default N/A
Configuration config
Mode
History 3.8.2000
Eth1/1:
Querier Guard Mode : Enabled
Denied IGMP Query Messages: 0
Notes
1196
show ip igmp snooping querier counters
show ip igmp snooping querier counters [vlan <num> [group <group-
id>]]
Displays IGMP snooping querier counters.
Default N/A
History 3.6.1002
Related Commands
Notes
Default N/A
History 3.1.1400
1197
3.6.2100 Updated example
Related Commands
Notes
Default N/A
History 3.1.1400
Related Commands
Notes
1198
Appendixes
The document contains the following appendixes:
ESF runs on purpose-built switches which are optimized to deliver the highest levels of
performance, lowest latency and zero packet loss, with unique form factor and storage aware
features. Other capabilities of ESF include simultaneous handling of compute and storage traffic,
future proofed with support for the NVMe over fabric protocol, support for file, block, and object
storage, and it is best suited for scale-out storage and Hyperconverged infrastructures.
This section describes Mellanox Ethernet Storage Fabric solution, its use cases, implementation and
monitoring and debugging capabilities.
The most common deployment of ESF is a single rack of 6-18 servers, or in the case of HCI 6-18
appliances. The servers/appliances are connected in high availability architecture, utilizing MLAG,
to two ToR SN2100/SN2010 half ``19 width Spectrum switches, enabling high availability in a single
rack unit.
We will start with the setup/topology overview, followed by its Bill of Material and connectivity
guidelines.
The following sections will describe the various ESF deployment manners available for the user:
1199
ESF Configuration using CLI
Before starting the configuration process, make sure both switches have the same software version
installed. To check the software version, run the "show version" command in the CLI.
Switch Configuration
Run the following commands on both switches:
2. Turn off spanning tree using this command only if using (ONYX version v3.6.6102 or earlier)
3. Enable IP routing:
1200
IPL Configuration
Control traffic for the MLAG is sent over the IPL ports via a L3 interface (interface VLAN).
For high availability, it is recommended to have more than one physical link serving as the IPL,
therefore the IPL is configured over LAG (port-channel).
It is recommended to use a VLAN ID that is not used within the subnet (4000 in this example) to
avoid mixing the host traffic with the control traffic on this interface.
All VLANs are open on the IPL port. There is no need to configure this port, once an interface is
mapped as “IPL”, all VLANs are open on this port.
In this example, ports 1/35 and 1/36 are used for the IPL connectivity between the switches.
The IPL link may pass traffic upon MLAG port failures, but not under normal circumstances when all
ports are in UP state.
The IPL IP address should not be part of the management network, it could be any IP address and
subnet that is not in use in the network. This address is not advertised outside the switch
MAGP Configuration
As stated in the previous chapter, MAGP configuration is required on the Spine switches when the
fabric is utilizing L2 routing in the whole fabric. You can find more details about MAGP in the MAGP
section of the UM.
To configure MAGP on the switches, you need to take the following steps on all spine switches used
in your setup. In our use case we have one rack with two such switches:
Switch 1 configuration:
1. Create a VLAN interface:
1201
2. Set an IP address to the VLAN interface:
Switch 2 configuration:
1. Create a VLAN interface:
4. Next steps (9-11) should be taken per VLAN (done for VLAN 10 below):Create a virtual router
group for an IP interface. Run:
MAGP 10
Interface vlan: 20
Admin state: Master
State: Enabled
Virtual IP: 11.11.11.254
Virtual MAC: AA:BB:CC:DD:EE:FF
1202
1. Configure the following on both switches:
sx01 (config) #
interface ethernet 1/1 mlag-channel-group 1 mode active
sx01 (config) # interface ethernet 1/2 mlag-channel-group 2 mode active
LACP mode 4 should be configured on the host side. Configuring LACP is similar in LAG and
MLAG ports. LACP notifications arrive via the control protocol and not via the port physical
status. It will show the remote system-id and may encounter configuration errors. LACP is
very valuable, especially in large scale configurations with multiple MLAGs, as it helps detect
any mismatched configurations in terms of connectivity.
4. To change any MLAG port parameter (e.g. MTU), enter the MLAG interface configuration
mode and perform the change:
1203
sx01 [my-mlag-vip-domain: master] (config) # show mlag-vip
MLAG VIP
========
MLAG group name: my-mlag-vip-domain
MLAG VIP address: 10.209.28.200/24
Active nodes: 2
Hostname VIP-State IP Address
----------------------------------------------------
sx01 master 10.209.28.50
sx02 standby 10.209.28.51
The management network is used for keep-alive messages between the switches.
The MLAG domain must be unique name for each MLAG domain. In case you have more than one pair
of MLAG switches on the same network, each domain (consist of two switches) should be configured
with different name.
2. Set a virtual system MAC. The System MAC is used to identify the far-end switch used for the
LACP System ID. It should be unicastrange.
In case of an upgrade the MAC address is auto-calculated. For new MLAG installation, it must
be added as configuration.
The MLAG system-mac needs to be identical between both switches.
3. Enable MLAG globally, run:
Server Configuration
There are various options to configure a bond on the servers but not all bond modes are applicable.
The supported bonding modes are as follows:
• balance-rr: mode 0
• balance-xor: mode 2
• 802.3ad (LACP): mode 4 (starting from 3.4.0000 MLNX-OS release)
1204
Modes 1,3,5,6 were designed to work without LAG configured on the switch side, which limits
support for all other modes. Configuring LAG on the switch side will break the solution.
For bonding modes which require LAG on the switch, MLAG must be configured when using
redundant switches.
For the bonding modes which don’t use LAG on the switch, two independent switches or non MLAG
ports on MLAG switches are enough.
Linux Bonding Mode Mode Number LAG on switch requirement Availability on MLAG interface
active-backup 1 No No
broadcast 3 No No
balance-tlb 5 No No
balance-alb 6 No No
When the master reboots with the upgraded software, the other standby node (which is running)
becomes the master. After the old master reboots, it joins the cluster and then the configuration is
set.
For a more detailed description of Mellanox Onyx upgrade procedure, please refer to the following
posts:
1205
It is recommended to ensure that the below conditions are followed:
1. Both switches are part of the same management subnet (connected to the same switch or
more but on the same subnet).
2. The management network is connected on mgmt0 port.
3. The mlag-port-channel number is identical in both switches (recommended but not
obligatory).
4. The same switch version is installed on both switches.
5. The IPL link is in UP state. try to ping the other switch via the IPL ping.
6. Align the MLAG interface mode on both the server and the switch.
For example, if you select LACP mode on the MLAG interface (active), mode 4 should be
configured on the bond interface.
Below are failure scenarios followed by monitoring and debug instructions.
If we run “show mlag” command when only one “mlag-port-channel” port is configured, we will get
the following:
Master:
Standby:
1206
mti-mar-sx03 [my-new-domain: standby] (config) # show mlag
Admin status: Enabled
Operational status: Up
Reload-delay: 30 sec
Keepalive-interval: 1 sec
Upgrade-timeout: 60 min
System-mac: 00:00:5E:00:01:5D
MLAG Ports Configuration Summary:
Configured: 1
Disabled: 0
Enabled: 1
MLAG Ports Status Summary:
Inactive: 0
Active-partial: 0
Active-full: 1
MLAG IPLs Summary:
ID Group Vlan Operational Local Peer
Port-Channel Interface State IP address IP address
--------------------------------------------------------------------------
1 Po1 4000 Up 10.10.10.1 10.10.10.2
MLAG Members Summary:
System-id State Hostname
-------------------------------------
E4:1D:2D:37:54:88 Up <mti-mar-sx03>
E4:1D:2D:37:50:88 Up mti-mar-sx04
mti-mar-sx03 [my-new-domain: standby] (config) #
Standby switch:
1207
'Inactive Ports' and 'Active-Partial' Status on the “show mlag” command
By default, all ethernet ports are admin UP, while the mlag-port-channels are down, as in most
cases the full network configuration is done first and then the mlag-port-channel is enabled. Make
sure to enable the ports when creating mlag-port-channel and adding ethernet interface to it
(either static or LACP).
Note: When one port is down, it doesn't mean that the whole mlag-port-channel is down.
To enable it:
1208
The “show mlag” and “show mlag-vip” output will look like this:
Verify that the two switches are in the cluster. The other MLAG switch must reflect the same
information.
The management subnet must only point out of the MGMT port. inband management is acceptable.
If there is a conflict, the MGMT Keep alive is sent out on the wrong port and not advertised to
another switch.
In case the switch still does not see the cluster: The MGMT keep alive is broadcast to a well known
multicast DNS group – 224.0.0.251. Check to see if both switches are advertising to this group. It is
1209
likely that the mgmt. port will see a lot of traffic. This output will need to be captured and
analyzed.
This is a transmission from master to the multicast group. Before we have a master, both switches
will see this frame, and both will transmit it. After the cluster is formed, only the master will
transmit this. If this frame is not seen, the cluster will not form.
IPL issues
IPL Link needs to be up for MLAG peer ports and sync data to be available. The IPL VLAN is local to
the MLAG switches and can be any number. VLAN 4000 or higher is typically used for control vlans
and is recommended.
The “show mlag” command shows IPL link state and other valuable information.
The IPL link needs to be Up. Both switches must be in Up State in the “Member” summary. Peering
or down are not a good state. Peering could be a transient state but should move to UP eventually.
In case IPL is up and still member ports are not visible, try ping the remote IPL interface. Ping the
local switch and then the MLAG Peer switch IPL IP address. If ping doesn’t go through use tcpdump
to debug this case. In case link is up and ping is lossy, check for traffic on the IPL interface. During
normal operation, IPL traffic is a few frames per second at the most. If you see a lot of traffic, it is
likely an indication of a loop in the setup.
The other usual suspects are checking if both sides are set to static, or LACP. Check interface
transceiver for matching serial numbers to identify cabling issues.
1210
mti-mar-sx03 [my-mlag-vip-domain: master] (config) # show interface mlag-port-channel summary
MLAG Port-Channel Flags: D-Down, U-Up
P-Partial UP, S - suspended by MLAG
Port Flags: D - Down, P - Up in port-channel (members)
S - Suspend in port-channel (members), I - Individual
Group
Port-Channel Type Local Ports Peer Ports
(D/U/P/S) (D/P/S/I) (D/P/S/I)
--------------------------------------------------------------------------------
1 Mpo1(U) LACP Eth1/10(P) Eth1/10(P)
mti-mar-sx03 [my-mlag-vip-domain: master] (config) #
“Partial” means that all ports are down on the MLAG-peer switch side. This could be a result of
interface MLAG being shut on the remote side or mlag protocol shut on remote side.
Peer ports not being visible means that ports in the MLAG-Peer switch are either not added in the
MLAG or there are cluster issues.
If the physical port shows (S) that could result from either receiving no PDUs from the remote side
or by receiving a PDU that doesn’t match what is being received on other members of the MLAG
port-channel
Check the LACP counters to see continuous increment of counters, both sent and receive must
increment. One every second for fast retransmit and one every 30 seconds for slow retransmit.
In case the lacp counters are incrementing and port is still down, then check the SID received on
different port of the MLAG. They should match across all MLAG ports.
To check the SID used by the Mellanox switch use this command:
1211
mti-mar-sx03 [my-mlag-vip-domain: master] (config) # show lacp interfaces mlag-port-channel 1 system-identifier
Priority: 32768
MAC: 00:00:5E:00:01:06
To leverage the high availability and connectivity to the L3 cloud, Multi-Active Gateway Protocol
(MAGP) is used, resolving the default gateway problem when a host is connected to a set of switch
routers (SRs) via MLAG with no LACP control (MAGP is Mellanox proprietary protocol that implements
active-active VRRP). The network functionality in that case requires that each SR is an active
default gateway router to the host, thus reducing hops between the SRs and directly forwarding IP
traffic to the L3 cloud regardless which SR traffic comes through.
In ESF deployment in a single rack, the ToR switches’ router ports are configured for connectivity
with the external network.
To get a detailed overview of the MLAG terminology and its architecture, please refer to the MLAG
section in this user manual.
1212
Bill of Materials
As described in the diagram above (two switches in a Rack running MLAG) the fabric in this solution
is built with the following components:
Leaf Switch 2 SN2010 Spectrum based 25GbE/100GbE, 1U Open Ethernet Switch with
Mellanox Onyx, 18 SFP28 and 4 QSFP28 ports, 2 Power Supplies (AC), short
depth, x86 quad core, P2C airflow, Rail Kit must be purchased separately,
RoHS6
Uplinks 2 N/A
Network 2 per ConnectX-5 Dual-Port SFP28 Port, PCIe 3.0 x16, tall bracket, ROHS R6
Adapters server
1213
Scale-out Common Deployments
When moving from a single rack deployment into a Leaf-Spine deployment where the ToR switches
of each rack are connected to spine switches, there are two major deployment options:
1. Whole fabric L2 with MLAG configured on the ToR and spine switches, and the Spine switches
deploy MAGP.
2. L2 up to the ToR switches and L3 routing between the ToR and spine switches.
Please refer to the following community post for BGP deployment on top of MLAG in a leaf-spine
topology.
Overview
This appendix describes how to enhance the security of a system in order to comply with the NIST SP
800-131A standard. This standard is a document which defines cryptographically “acceptable”
technologies. This document explains how to protect against possible cryptographic vulnerabilities
in the system by using secure methods. Because of compatibility issues, this security state is not the
default of the system and it should be manually set.
Some protocols, however, cannot be operated in a manner that complies with the NIST SP
800-131A standard.
Web Certificate
The OS supports signature generation of sha256WithRSAEncryption, sha1WithRSAEncryption self-
signed certificates, and importing certificates as text in PEM format.
1214
1. Create a new sha256 certificate. Run:
switch (config) # crypto certificate name <cert name> generate self-signed hash-algorithm sha256
For more details and parameters refer to the command “crypto certificate name”.
When no options are selected, the generated certificate uses the default values for
each field.
To test strict mode connect to the WebUI using HTTPS and get the certificate. Search for “signature
algorithm”.
There are other ways to configure the certificate to sha256. For example, it is possible to
use “certificate generation default hash-algorithm” and then regenerate the certificate
using these default values.
Code Signing
Code signing is used to verify that the data in the image is not modified by any third-party. MLNX-OS
supports signing the image files with SHA256, RSA2048 using GnuPG.
1215
SNMP
SNMPv3 supports configuring username, authentication keys and privacy keys. For authentication
keys it is possible to use MD5 or SHA. For privacy keys AES or DES are to be used.
To configure strict mode, create a new user with HMAC-SHA1-96 and AES-128. Run:
switch (config) # snmp-server user <username> v3 auth sha <password1> priv aes-128 <password2>
To test strict mode, configure users and check them using the CLI, then run an SNMP
request with the new users.
SNMPv1 and SNMPv2 are not considered to be secure. To run in strict mode, only use
SNMPv3.
SSH
The SSH server on the switch by default uses secure ciphers only, message authentication code
(MAC), key exchange methods, and public key algorithm. When configuring SSH server to strict
mode, the aforementioned security methods only use approved algorithms as detailed in the NIST
800-181A specification and the user can connect to the switch via SSH in strict mode only.
The following ciphers are disabled for SSH when strict security is enabled:
• 3des-cbc
• aes256-cbc
• aes192-cbc
• aes128-cbc
• arcfour
• blowfish-cbc
• cast128-cbc
• [email protected]
Make sure to configure the SSH server to work with minimum version 2 since 1 is vulnerable to
security breaches.
1216
Once this is done, the user cannot revert back to minimum version 1.
HTTPS
By default, the OS supports HTTPS encryption using TLS1.2 only. Working in TLS1.2 mode also bans
MD5 ciphers which are not allowed per NIST 800-131a. In strict mode, the switch supports
encryption with TLS1.2 only with the following supported ciphers:
• RSA_WITH_AES_128_CBC_SHA256
• RSA_WITH_AES_256_CBC_SHA256
• DHE_RSA_WITH_AES_128_CBC_SHA256
• DHE_RSA_WITH_AES_256_CBC_SHA256
• TLS_RSA_WITH_AES_128_GCM_SHA256
• TLS_RSA_WITH_AES_256_GCM_SHA384
• TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
• TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
To enable all encryption methods, run:
1217
LDAP
By default, our switches support LDAP encryption SSL version 3 or TLS1.0 up to TLS1.2. The only
banned algorithm is MD5 which is not allowed per NIST 800-131a. In strict mode, the switch supports
encryption with TLS1.2 only with the following supported ciphers:
• DHE-DSS-AES128-SHA256
• DHE-RSA-AES128-SHA256
• DHE-DSS-AES128-GCM-SHA256
• DHE-RSA-AES128-GCM-SHA256
• DHE-DSS-AES256-SHA256
• DHE-RSA-AES256-SHA256
• DHE-DSS-AES256-GCM-SHA384
• DHE-RSA-AES256-GCM-SHA384
• ECDH-ECDSA-AES128-SHA256
• ECDH-RSA-AES128-SHA256
• ECDH-ECDSA-AES128-GCM-SHA256
• ECDH-RSA-AES128-GCM-SHA256
• ECDH-ECDSA-AES256-SHA384
• ECDH-RSA-AES256-SHA384
• ECDH-ECDSA-AES256-GCM-SHA384
• ECDH-RSA-AES256-GCM-SHA384
• ECDHE-ECDSA-AES128-SHA256
• ECDHE-RSA-AES128-SHA256
• ECDHE-ECDSA-AES128-GCM-SHA256
• ECDHE-RSA-AES128-GCM-SHA256
• ECDHE-ECDSA-AES256-SHA384
• ECDHE-RSA-AES256-SHA384
• ECDHE-ECDSA-AES256-GCM-SHA384
• ECDHE-RSA-AES256-GCM-SHA384
• AES128-SHA256
• AES128-GCM-SHA256
• AES256-SHA256
• AES256-GCM-SHA384
To enable LDAP strict mode, run:
Both modes operate using SSL. The different lies in the connection initialization and the
port used.
New features added on release 3.6.81xx and beyond are supported on Spectrum-based switches
only.
1218
Feature SwitchX®-2 PPC SwitchX®-2 x86 Spectrum® Family
This appendix provides a guide on the first steps with Splunk and helps you to begin enjoying
reduced time in detecting and resolving production problems.
1219
4. A new folder called Splunk is created.
Now you can access your Splunk WebUI at http://IP:8000/ or http://hostname:8000/. You need to
make sure that port 8000 is open in your server firewall.
Switch Configuration
In this example we are not using the default UDP port 514 to show that any other port can be also
used.
5. In order to add a task, the switch must be configured to send logs to our Splunk server. Run:
Read-only communities:
public
Read-write communities:
(none)
Interface listen enabled: yes
No Listen Interfaces.
Summary configuration:
Adding a Task
6. The first screen encountered after signing into the Splunk WebUI includes the “Add Data” icon.
1220
7. The “Add Data” tab opens up with three options: Upload, Monitor, and Forward. Here our task is
to monitor a folder, so we click Monitor. to proceed
1221
9. Click the TCP or UDP button to choose between a TCP or UDP input, and enter a port number in
the “Port” field.
10. In the “Source name override” field, enter a new source name to override the default source
value, if required.
11. Click “Next” to continue to the Input Settings page where we will create a new source type
called Mellanox-Switch.
1222
12. Click Next > Review > Done > Start Searching
1223
SNMP agents may also send notifications, called Traps, to an SNMP trap listening daemon.
Getting Started
Browse to Splunkbase and download the SNMP Modular Input from https://splunkbase.splunk.com/
app/1537/.
Configuration
Login to the Splunk WebUI and go to Manager > Add Data > Monitor > SNMP > New, and set up your
input data.
1224
13. After configuration is complete it is recommend to run Mellanox-Switch again: Search > Data
Summary > Sourcetypes > Mellanox-Switch.
1225
14. Select “Mellanox-Switch” and “Add to search”.
15. You can add to search any value that is relevant for you.
1226
Patterns can be viewed not on real time and you can create alert on most repeatable
events.
Logging
show log
1227
show log matching *
Puppet Agent
Scheduled Jobs
show jobs
show jobs *
User Interfaces
show cli
show terminal
1228
Appendix: What Just Happened (WJH) Events
Drop Reason Group Drop Reason Comment
1229
Drop Reason Group Drop Reason Comment
1230
Drop Reason Group Drop Reason Comment
Buffer WRED
1231
Document Revision History
Rev 6.3 December 2019
Added:
Updated:
Added:
1232
• New command "route-table prefix-list"
• New command "ip prefix-list * permit"
• EVPN MAC mobility logging examples
• Logging example in case of a BPDU Guard event
Updated:
Removed:
Added:
1233
• New command "ptp enable ipv6"
• ACL option for the "what-just-happened" command
• ACL option for the "what-just-happened auto-export" command
• ACL option for the "clear what-just-happened" command
• New page of RoCE commands
• The command "ip igmp snooping querier-guard"
• The command "show ip igmp snooping querier-guard"
• The command "clear buffers interface ethernet 1/1 max-usage" to the user manual
• The command "clear buffers interface max-usage" to the user manual
• The command "clear buffers pool iPool2 max-usage" to the user manual
• The command "clear buffers pool max-usage" to the user manual
• The command "show ptp interface ethernet" to the user manual
• The command "show ptp interface" to the user manual
• Option to the "show ip arp" command
• The command "disable interface ethernet traffic-class congestion-control"
• The command "disable interface port-channel traffic-class congestion-control"
• The command "disable interface mlag-port-channel traffic-class congestion-control"
Updated:
1234
Rev 6.1 August 07, 2019
No changes to this version. The software version was changed due to bug fixes. For further
information, see Release Notes.
Added:
• Licensing section.
Rev 6.0 July 2019
No changes to this version. The software version was changed due to bug fixes. For further
information, see Release Notes.
Added:
No changes to this version. The software version was changed due to bug fixes. For further
information, see Release Notes.
1235
Added:
• "Web Interface Overview" with note on the maximum allowed number of WebUI sessions
• "Upgrading HA Groups" with note regarding slave switches not learning MAC addresses when
they are upgraded while master switches are still in the lower version
• JSON "Authentication" section
• Section "Authentication Example"
• Section "Defining a Multicast Router Port on a VLAN"
• Section "IGMP Snooping Querier"
• The command "ip igmp snooping (config)"
• The command "show ip igmp snooping membership"
• Content under "Multicast (IGMP and PIM)"
Rev 5.8 April 2019
Added:
• “Additional Reading and Use Cases” sections referring to various Mellanox Community posts
providing more information about a given subject matter
• Section "56GbE Link Speed" on page "Ethernet Interfaces"
• Sections Configure WJH Using CLI, Configure WJH Using NEO
• Sections SALT, Ansible
• Sections ESF Configuration using CLI, ESF Configuration using AnsibleAdded IPv4 link local to
section IP Routing Overview
• Section WJH Streaming and Integration with Telegraf, InfluxDB and Grafana (TIG) Stack
• Section Ethernet VPN (EVPN)
• Section "Transceiver Information" on page "Ethernet Interfaces"
• Section "Port Type" on page "Spanning Tree Protocol"
• The command "show running-config interface"
• The command "file stats telemetry delete latest"
• The command "file stats telemetry delete all"
• The command "file stats telemetry upload latest"
• The command "file stats telemetry upload all"
• Section "Upgrade Ramifications" on page "Linux Dockers"
• The command "what just happened auto-export"
• The command "show snmp source interface"
• The command "snmp server source interface"
• The command "nve controller bgp"
• The command "vxlan mlag-tunnel-ip"
• The command "vxlan mlag-tunnel-ip"
• The command "nve neigh-suppression"
• The command "nve vlan neigh-suppression"
• The command "show interface nve detail"
• The command "vni"
• The command "vni rd"
• The command "vni route-target"
1236
• The command "auto-create"
Updated:
Added:
1237
• The command “show stats sample data”
Updated:
Added:
Added:
1238
• The command “interface port-channel”
• The command “ptp vrf”
• The command “show ptp interface port-channel”
• The command “show ptp vrf”
• The command “show ptp vrf counters”
• The command “show ptp interface port-channel counters”
• The command “email autosupport mailhub”
• The command “email autosupport recipient”
• The command “show email”
• The command “snmp-server cache enable”
• Section “What Just Happened (WJH)”
• Section “Link State Tracking”
Updated:
1239
• The command “show access-lists action”
• Section “Configuring VXLAN”
• Section “IGMP Snooping Querier”
• The command “igmp snooping querier query-interval”
• The command “Trust Levels”
• The command “qos default switch-priority”
• The command “storm-control”
• Section “Configuring a Router Port Interface”
• The command “show ip interface ethernet”
• The command “show ip interface port-channel”
• The command “show ip interface vrf”
• Section “Configuring OSPF”
• Section “Configuring BGP”
• The command “show {ip | ipv6} bgp”
Rev 5.4 November 2018
Added:
1240
Notice
This document is provided for information purposes only and shall not be regarded as a warranty of
a certain functionality, condition, or quality of a product. Neither NVIDIA Corporation nor any of its
direct or indirect subsidiaries (collectively: “NVIDIA”) make any representations or warranties,
expressed or implied, as to the accuracy or completeness of the information contained in this
document and assumes no responsibility for any errors contained herein. NVIDIA shall have no
liability for the consequences or use of such information or for any infringement of patents or other
rights of third parties that may result from its use. This document is not a commitment to develop,
release, or deliver any Material (defined below), code, or functionality.
NVIDIA reserves the right to make corrections, modifications, enhancements, improvements, and
any other changes to this document, at any time without notice.
Customer should obtain the latest relevant information before placing orders and should verify that
such information is current and complete.
NVIDIA products are sold subject to the NVIDIA standard terms and conditions of sale supplied at the
time of order acknowledgement, unless otherwise agreed in an individual sales agreement signed by
authorized representatives of NVIDIA and customer (“Terms of Sale”). NVIDIA hereby expressly
objects to applying any customer general terms and conditions with regards to the purchase of the
NVIDIA product referenced in this document. No contractual obligations are formed either directly
or indirectly by this document.
NVIDIA products are not designed, authorized, or warranted to be suitable for use in medical,
military, aircraft, space, or life support equipment, nor in applications where failure or malfunction
of the NVIDIA product can reasonably be expected to result in personal injury, death, or property or
environmental damage. NVIDIA accepts no liability for inclusion and/or use of NVIDIA products in
such equipment or applications and therefore such inclusion and/or use is at customer’s own risk.
NVIDIA makes no representation or warranty that products based on this document will be suitable
for any specified use. Testing of all parameters of each product is not necessarily performed by
NVIDIA. It is customer’s sole responsibility to evaluate and determine the applicability of any
information contained in this document, ensure the product is suitable and fit for the application
planned by customer, and perform the necessary testing for the application in order to avoid a
default of the application or the product. Weaknesses in customer’s product designs may affect the
quality and reliability of the NVIDIA product and may result in additional or different conditions
and/or requirements beyond those contained in this document. NVIDIA accepts no liability related
to any default, damage, costs, or problem which may be based on or attributable to: (i) the use of
the NVIDIA product in any manner that is contrary to this document or (ii) customer product designs.
No license, either expressed or implied, is granted under any NVIDIA patent right, copyright, or
other NVIDIA intellectual property right under this document. Information published by NVIDIA
regarding third-party products or services does not constitute a license from NVIDIA to use such
products or services or a warranty or endorsement thereof. Use of such information may require a
license from a third party under the patents or other intellectual property rights of the third party,
or a license from NVIDIA under the patents or other intellectual property rights of NVIDIA.
Reproduction of information in this document is permissible only if approved in advance by NVIDIA in
writing, reproduced without alteration and in full compliance with all applicable export laws and
regulations, and accompanied by all associated conditions, limitations, and notices.
THIS DOCUMENT AND ALL NVIDIA DESIGN SPECIFICATIONS, REFERENCE BOARDS, FILES, DRAWINGS,
DIAGNOSTICS, LISTS, AND OTHER DOCUMENTS (TOGETHER AND SEPARATELY, “MATERIALS”) ARE BEING
PROVIDED “AS IS.” NVIDIA MAKES NO WARRANTIES, EXPRESSED, IMPLIED, STATUTORY, OR OTHERWISE
WITH RESPECT TO THE MATERIALS, AND EXPRESSLY DISCLAIMS ALL IMPLIED WARRANTIES OF
NONINFRINGEMENT, MERCHANTABILITY, AND FITNESS FOR A PARTICULAR PURPOSE. TO THE EXTENT
NOT PROHIBITED BY LAW, IN NO EVENT WILL NVIDIA BE LIABLE FOR ANY DAMAGES, INCLUDING
WITHOUT LIMITATION ANY DIRECT, INDIRECT, SPECIAL, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL
DAMAGES, HOWEVER CAUSED AND REGARDLESS OF THE THEORY OF LIABILITY, ARISING OUT OF ANY
USE OF THIS DOCUMENT, EVEN IF NVIDIA HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Notwithstanding any damages that customer might incur for any reason whatsoever, NVIDIA’s
Trademarks
NVIDIA, the NVIDIA logo, and Mellanox are trademarks and/or registered trademarks of Mellanox
Technologies Ltd. and/or NVIDIA Corporation in the U.S. and in other countries. Other company and
product names may be trademarks of the respective companies with which they are associated.
For the complete and most updated list of Mellanox trademarks, visit http://www.mellanox.com/
page/trademarks
Copyright