Page 706 / 757 Scroll up to view Page 701 - 705
xStack
®
DGS-3600 Series Layer 3 Gigabit Ethernet Managed Switch CLI Manual
702
DGS-3627:admin# config traffic control 1-12 broadcast enable action shutdown threshold 1
countdown 5 time_interval 10
Command: config traffic control 1-12 broadcast enable action shutdown threshold 1
countdown 5 time_interval 10
Success.
DGS-3627:admin#
config traffic trap
Purpose
Used to configure trap modes.
Syntax
config traffic trap [ none | storm_occurred | storm_cleared | both ]
Description
Occurred Mode:
This trap is sent when a packet storm is detected by the packet storm
mechanism.
Cleared Mode:
This trap is sent when the packet storm is cleared by the packet storm
mechanism.
Parameters
none
- No trap state is specified for storm control.
storm_occurred
- Occurred mode is enabled and cleared mode is disabled.
storm_cleared
- Occurred mode is disabled and cleared mode is enabled.
both
- Both occurred and cleared modes are enabled.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example usage:
To enable both the occurred mode and cleared mode traffic control traps:
DGS-3627:admin# config traffic trap both
Command: config traffic trap both
Success.
DGS-3627:admin#
show traffic control
Purpose
Used to display the current traffic control settings.
Syntax
show traffic control { <portlist>}
Description
The show traffic control command displays the current traffic control settings.
Parameters
portlist
- Used to specify the range of ports to be shown.
If no parameter is specified, the system will display the packet storm control configuration for
all ports.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example usage:
To display the traffic control parameters for ports 1 to 10:
Page 707 / 757
xStack
®
DGS-3600 Series Layer 3 Gigabit Ethernet Managed Switch CLI Manual
703
DGS-3627:admin# show traffic control 1-10
Command: show traffic control 1-10
Traffic Control Trap
: [None]
Traffic Control Auto Recover Time
: 5 Minutes
Port Thres
Broadcast Multicast Unicast
Action
Count
Time
Shutdown
hold
Storm
Storm
Storm
down
Interval Forever
---- ------ --------- --------- -------- -------- ----- -------- --------
1
1
Enabled
Disabled
Disabled Shutdown 5
10
2
1
Enabled
Disabled
Disabled Shutdown 5
10
3
1
Enabled
Disabled
Disabled Shutdown 5
10
4
1
Enabled
Disabled
Disabled Shutdown 5
10
5
1
Enabled
Disabled
Disabled Shutdown 5
10
6
1
Enabled
Disabled
Disabled Shutdown 5
10
7
1
Enabled
Disabled
Disabled Shutdown 5
10
8
1
Enabled
Disabled
Disabled Shutdown 5
10
9
1
Enabled
Disabled
Disabled Shutdown 5
10
10
1
Enabled
Disabled
Disabled Shutdown 5
10
DGS-3627:admin#
config traffic control auto_recover_time
Purpose
Used to configure the traffic auto recover time used to specify the time allowed for a port to
recover from shutdown forever status.
Syntax
config traffic control auto_recover_time [<min 0> | <min 1-65535>]
Description
Configure all ports’ auto recover time from shutdown forever state.
Parameters
minutes
- The time allowed for auto recovery from shutdown for a port. The default value is 0,
so no auto recovery is possible; the port remains in shutdown forever mode. This requires
manual entry of the CLI command “config ports [ <portlist> | all ] state enable" to return the
port to a forwarding state.
The default value is 0, which means disable auto recover mode, shutdown forever.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example usage:
To configure the auto recover time to 5 minutes:
DGS-3627:admin# config traffic control auto_recover_time 5
Command: config traffic control auto_recover_time 5
Success.
DGS-3627:admin#
Page 708 / 757
xStack
®
DGS-3600 Series Layer 3 Gigabit Ethernet Managed Switch CLI Manual
704
99
TRAFFIC SEGMENTATION COMMANDS
Traffic segmentation allows users to further sub-divide VLANs into smaller groups of ports that will help to reduce traffic
on the VLAN.
The VLAN rules take precedence, and then the traffic segmentation rules are applied.
Command
Parameters
config traffic_segmentation
[<portlist>|all] forward_list [null |all |<portlist>]
show traffic_segmentation
{<portlist>}
Each command is listed, in detail, in the following sections.
config traffic_segmentation
Purpose
Used to configure traffic segmentation on the Switch.
Syntax
config traffic_segmentation [<portlist>|all] forward_list [null |all |<portlist>]
Description
The
config traffic_segmentation
command is used to configure traffic segmentation on the
Switch.
Parameters
<portlist>
Specifies a port or range of ports that will be configured for traffic segmentation. The
beginning and end of the port list range are separated by a dash. Non-contiguous portlist entries
are separated by a comma. (ex: 1-3,7-9)
forward_list
Specifies a range of ports that will receive forwarded frames from the ports specified
in the portlist, above.
1.
null
No ports are specified.
2.
all –
All ports are specified.
3.
<portlist>
Specifies a range of ports for the forwarding list. This list must be on the same
Switch previously specified for traffic segmentation (i.e. following the
<portlist>
specified
above for
config traffic_segmentation
). The beginning and end of the port list range are
separated by a dash. Non-contiguous portlist entries are separated by a comma. (ex:1-3,7-
9)
Restrictions
Only Administrator and Operator-level users can issue this command.
Example usage:
To configure ports 1 through 5 to be able to forward frames to port 6 through 10:
DGS-3627:admin# config traffic_segmentation 1-5 forward_list 6-10
Command: config traffic_segmentation 1-5 forward_list 6-10
Success.
DGS-3627:admin#
Page 709 / 757
xStack
®
DGS-3600 Series Layer 3 Gigabit Ethernet Managed Switch CLI Manual
705
show traffic_segmentation
Purpose
Used to display the current traffic segmentation configuration on the Switch.
Syntax
show traffic_segmentation {<portlist>}
Description
The
show traffic_segmentation
command is used to display the current traffic
segmentation configuration on the Switch.
Parameters
<portlist>
Specifies a port or range of ports for which the current traffic
segmentation configuration on the Switch will be displayed.
The beginning and
end of the port list range are separated by a dash. Non-contiguous portlist entries
are separated by a comma. (ex: 1-3,7-9)
Restrictions
The port lists for segmentation and the forward list must be on the same Switch.
Example usage:
To display the current traffic segmentation configuration on the Switch.
DGS-3627:admin# show traffic_segmentation
Command: show traffic_segmentation
Traffic Segmentation Table
Port
Forward Portlist
----
-------------------------------------------------
1:1
1:1-1:25
1:2
1:1-1:25
1:3
1:1-1:25
1:4
1:1-1:25
1:5
1:1-1:25
1:6
1:1-1:25
1:7
1:1-1:25
1:8
1:1-1:25
1:9
1:1-1:25
1:10
1:1-1:25
1:11
1:1-1:25
1:12
1:1-1:25
1:13
1:1-1:25
1:14
1:1-1:25
1:15
1:1-1:25
1:16
1:1-1:25
1:17
1:1-1:25
1:18
1:1-1:25
CTRL+C ESC q
Quit
SPACE n
Next Page
Enter
Next Entry
a
All
Page 710 / 757
xStack
®
DGS-3600 Series Layer 3 Gigabit Ethernet Managed Switch CLI Manual
706
100
TRUSTED HOST COMMANDS
Trusted Host is a security feature which denies an illegal network address to access the switch.
The Trusted Host commands in the Command Line Interface (CLI) are listed (along with the appropriate parameters) in
the following table.
Command
Parameters
create trusted_host
[<ipaddr> | network <network_address>]
delete trusted_host
[ipaddr <ipaddr> | network <network_address> | all]
show trusted_host
Each command is listed, in detail, in the following sections.
create trusted_host
Purpose
Used to create the trusted host.
Syntax
create trusted_host [<ipaddr> | network <network_address>]
Description
The create trusted host command creates the trusted host. The switch allows you to specify
up to three IP addresses that are allowed to manage the switch via in-band SNMP or Telnet
based management software. These IP addresses must be members of the Management
VLAN.
If no IP addresses are specified, then there is nothing to prevent any IP address from
accessing the switch, provided the user knows the Username and Password.
When the access interface is not specified, the trusted host will be created for all interfaces.
Parameters
ipaddr
- The IP address of the trusted host.
network
- The network address of the trusted network. The form of network address is
xxx.xxx.xxx.xxx/y.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example usage:
To create a trusted host:
DGS-3627:admin# create trusted_host 10.48.74.121
Command: create trusted_host 10.48.74.121
Success.
DGS-3627:admin#
delete trusted_host
Purpose
Used to delete a trusted host entry made using the create trusted_host command above.
Syntax
delete trusted_host [ipaddr <ipaddr> | network <network_address> | all]
Description
The delete trusted_host command is used to delete a trusted host entry made using the
create trusted_host command above.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top