cc/td/doc/product/lan/cat6000/sw_5_3
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

set rspan
set security acl ip
set security acl ipx
set security acl mac
set security acl map
set snmp community
set snmp rmon
set snmp trap
set span
set spantree backbonefast
set spantree disable
set spantree enable
set spantree fwddelay
set spantree hello
set spantree maxage
set spantree portcost
set spantree portfast
set spantree portpri
set spantree portstate
set spantree portvlancost
set spantree portvlanpri
set spantree priority
set spantree root
set spantree uplinkfast

set rspan

Use the set rspan commands to create remote SPAN sessions.

set rspan disable source [rspan_vlan | all]
set rpsan disable destination [mod_num/port_num | all]
set rspan source {mod/ports... | vlans... | sc0} {rspan_vlan} [rx | tx | both] [multicast {enable      | disable}] [filter vlans...] [create]
set rspan destination {mod_num/port_num} {rspan_vlan} [inpkts {enable | disable}]     [learning {enable | disable}] [create]

Syntax Description

disable source

Keywords to disable remote SPAN source information.

rspan_vlan

(Optional) Remote SPAN VLAN.

all

(Optional) Keyword to disable all remote SPAN source or destination sessions.

disable destination

Keywords to disable remote SPAN destination information.

mod_num/port_num

(Optional) Remote SPAN destination port.

mod/ports...

Monitored ports (remote SPAN source).

vlans...

Monitored VLANs (remote SPAN source).

sc0

Keyword to specify the inband port is a valid source.

rx

(Optional) Keyword to specify that information received at the source (ingress SPAN) is monitored.

tx

(Optional) Keyword to specify that information transmitted from the source (egress SPAN) is monitored.

both

(Optional) Keyword to specify that information both transmitted from the source (ingress SPAN) and received (egress SPAN) at the source are monitored.

multicast enable

(Optional) Keywords to enable monitoring multicast traffic (egress traffic only).

multicast disable

(Optional) Keywords to disable monitoring multicast traffic (egress traffic only).

filter vlans

(Optional) Keywords to monitor traffic on selected VLANs on source trunk ports.

create

(Optional) Keyword to create a new remote SPAN session instead of overwriting the previous SPAN session.

inpkts enable

(Optional) Keywords to allow the the remote SPAN destination port to receive normal ingress traffic (from the network to the bus) while forwarding the remote SPAN traffic.

inpkts disable

(Optional) Keywords to disable the receiving of normal inbound traffic on the remote SPAN destination port.

learning enable

(Optional) Keywords to enable learning for the remote SPAN destination port.

learning disable

(Optional) Keywords to disable learning for the remote SPAN destination port.

Default

The defaults are as follows:

Command Type

Switch command.

Command Mode

Privileged.

Usage Guidelines

The rspan_vlan variable is optional in the set rspan disable source command and required in the set rspan source and set rspan destination commands.

After SPAN is enabled, system defaults are used if no parameters were ever set. If you changed parameters, these are stored in NVRAM, and the new parameters are used.

Use a network analyzer to monitor ports.

Use the inpkts keyword with the enable option to allow the remote SPAN destination port to receive normal incoming traffic in addition to the traffic mirrored from the remote SPAN source. Use the disable option to prevent the remote SPAN destination port from receiving normal incoming traffic.

You can specify an MSM port as the remote SPAN source port. However, you cannot specify an MSM port as the remote SPAN destination port.

When you enable the inpkts option, a warning message notifies you that the destination port does not join STP and may cause loops if this option is enabled.

If you do not specify the keyword create and you have only one session, the session will be overwritten. If a matching rspan_vlan or destination port exists, the particular session will be overwritten (with or without specifying create). If you specify the keyword create and there is no matching rspan_vlan or destination port, the session will be created.

Each switch can source only one remote SPAN session (ingress, egress, or both). When a remote ingress or bidirectional SPAN session is configured in a source switch, the limit for local ingress or bidirectional SPAN session is reduced to one. There are no limits on the number of remote SPAN sessions carried across the network within the remote SPAN session limits.

You can configure any VLAN as a remote SPAN VLAN as long as these conditions are met:

Examples

This example shows how to disable all enabled source sessions:

Console> (enable) set rspan disable source all
This command will disable all remote span source session(s).
Do you want to continue (y/n) [n]? y
Disabled monitoring of all source(s) on the switch for remote span.
Console> (enable) 
 

This example shows how to disable one source session to a specific VLAN:

Console> (enable) set rspan disable source 903
Disabled monitoring of all source(s) on the switch for rspan_vlan 903.
Console> (enable) 
 

This example shows how to disable all enabled destination sessions:

Console> (enable) set rspan disable destination all
This command will disable all remote span destination session(s).
Do you want to continue (y/n) [n]? y
Disabled monitoring of remote span traffic on ports 9/1,9/2,9/3,9/4,9/5,9/6.
Console> (enable) 
 

This example shows how to disable one destination session to a specific port:

Console> (enable) set rspan disable destination 4/1
Disabled monitoring of remote span traffic on port 4/1.
Console> (enable) 
Related Command

show rspan

set security acl ip

Use the set security acl ip commands to create a new entry in a standard IP VACL, and append the new entry at the end of VACL.

set security acl ip {acl_name} {permit | deny} {src_ip_spec} [before editbuffer_index |
    modify editbuffer_index]

set security acl ip {acl_name} {permit | deny | redirect mod_num/port_num} {protocol}     {src_ip_spec} {dest_ip_spec} [precedence precedence] [tos tos] [before editbuffer_index |     modify editbuffer_index]

set security acl ip {acl_name} {permit | deny | redirect {mod_num/port_num}} [IP | 0]     {src_ip_spec} {dest_ip_spec} [precedence precedence] [tos tos] [before editbuffer_index |     modify editbuffer_index]

set security acl ip {acl_name} {permit | deny | redirect {mod_num/port_num}} [ICMP | 1]     {src_ip_spec} {dest_ip_spec} [icmp_type] [icmp_code] | [icmp_message]
    [precedence precedence] [tos tos] [before editbuffer_index | modify editbuffer_index]

set security acl ip {acl_name} {permit | deny | redirect {mod_num/port_num}} [IGMP | 2]     {src_ip_spec} {dest_ip_spec} [igmp_type] [precedence precedence] [tos tos]
    [before editbuffer_index | modify editbuffer_index]

set security acl ip {acl_name} {permit | deny | redirect {mod_num/port_num}} [TCP | 6]     {src_ip_spec} [operator port [port]] {dest_ip_spec} [operator port [port]] [established]     [precedence precedence] [tos tos] [before editbuffer_index | modify editbuffer_index]

set security acl ip {acl_name} {permit | deny | redirect {mod_num/port_num}} [UDP | 17]     {src_ip_spec} [operator port [port]] {dest_ip_spec} [operator port [port]] [precedence     precedence] [tos tos] [before editbuffer_index | modify editbuffer_index]

Syntax Description

acl_name

Unique name that identifies the lists to which the entry belongs.

permit

Keyword to allow traffic from the source IP address.

deny

Keyword to block traffic from the source IP address.

src_ip_spec

Source IP address and the source mask. Refer to the "Usage Guidelines" section for the format.

before editbuffer_index

(Optional) Keyword and variable to insert the new ACE in front of another ACE.

modify editbuffer_index

(Optional) Keyword and variable to replace an ACE with the new ACE.

redirect

Keyword to specify to which switched ports the packet is redirected.

mod_num/port_num

Number of the module and port.

protocol

Keyword or number of an IP protocol; valid numbers are from 0 to 255 representing an IP protocol number. Refer to the "Usage Guidelines" section for the list of valid keywords.

dest_ip_spec

Destination IP address and the destination mask. Refer to the "Usage Guidelines" section for the format.

precedence precedence

(Optional) Keyword and variable to specify the precedence level; valid values are from 0 to 7 or by name. Refer to the "Usage Guidelines" section for a list of valid names.

tos tos

(Optional) Keyword and variable to specify the type of service level; valid values are from 0 to 15 or by name. Refer to the "Usage Guidelines" section for a list of valid names.

ip | 0

(Optional) Keyword or number to specify ICMP.

icmp | 1

(Optional) Keyword or number to specify ICMP.

icmp-type

(Optional) ICMP message type name or a number; valid values are from
0 to 255. Refer to the "Usage Guidelines" section for a list of valid names.

icmp-code

(Optional) ICMP message code name or a number; valid values are from
0 to 255. Refer to the "Usage Guidelines" section for a list of valid names.

icmp-message

(Optional) ICMP message type name or ICMP message type and code name. Refer to the "Usage Guidelines" section for a list of valid names.

igmp | 2

(Optional) Keyword or number to specify IGMP.

igmp-type

(Optional) IGMP message type or message name; valid message type numbers are from 0 to 15. Refer to the "Usage Guidelines" section for a list of valid names and corresponding numbers.

tcp | 6

(Optional) Keyword or number to specify TCP.

operator

(Optional) Operands; valid values include lt (less than), gt (greater than), eq (equal), neq (not equal), and range (inclusive range).

port

(Optional) Number or name of a TCP or UDP port; valid port numbers are from 0 to 65535. Refer to the "Usage Guidelines" section for a list of valid names.

established

(Optional) Keyword to specify an established connection; used only for TCP protocol.

udp | 17

(Optional) Keyword or number to specify UDP.

Default

There are no default ACLs and no default ACL-VLAN mappings.

Command Type

Switch command.

Command Mode

Privileged.

Usage Guidelines

Configurations you make by entering this command are saved to NVRAM and hardware only after you enter the commit command. Enter ACEs in batches and then enter the commit command to save them in NVRAM and in the hardware.

If you use the redirect keyword, the destination must be 255.255.255.255.

When you enter the ACL name, follow these naming conventions:

When you specify the source IP address and the source mask, use the form source_ip_address source_mask and follow these guidelines:

When you enter a destination IP address and the destination mask, use the form destination_ip_address destination_mask. The destination mask is required.

Valid names for precedence are critical, flash, flash-override, immediate, internet, network, priority and routine.

Valid names for tos are max-reliability, max-throughput, min-delay, min-monetary-cost, and normal.

Valid protocol keywords include: icmp (1), igmp (2), ip (0), ipinip (4), tcp (6), udp (17), igrp (9), eigrp (88), gre (47), nos (94), ospf (89), ahp (51), esp (50), pcp (108), and pim (103). The IP protocol number is displayed in parentheses. Use the keyword ip to match any Internet protocol.

ICMP packets that are matched by ICMP message type can also be matched by the ICMP message code.

Valid names for icmp_type and icmp_code are administratively-prohibited, alternate-address, conversion-error, dod-host-prohibited, dod-net-prohibited, echo, echo-reply, general-parameter-problem, host-isolated, host-precedence-unreachable, host-redirect, host-tos-redirect, host-tos-unreachable, host-unknown, host-unreachable, information-reply, information-request, mask-reply, mask-request, mobile-redirect, net-redirect, net-tos-redirect, net-tos-unreachable, net-unreachable, network-unknown, no-room-for-option, option-missing, packet-too-big, parameter-problem, port-unreachable, precedence-unreachable, protocol-unreachable, reassembly-timeout, redirect, router-advertisement, router-solicitation, source-quench, source-route-failed, time-exceeded, timestamp-reply, timestamp-request, traceroute, ttl-exceeded, and unreachable.

Valid names and corresponding numbers for igmp_message are dvmrp (3), host-query (1), host-report (2), pim (4), and trace (5).

If the operator is positioned after the source and source-wildcard, it must match the source port. If the operator is positioned after the destination and destination-wildcard, it must match the destination port. The range operator requires two port numbers. All other operators require one port number.

TCP port names can be used only when filtering TCP. Valid names for TCP ports are bgp, chargen, daytime, discard, domain, echo, finger, ftp, ftp-data, gopher, hostname, irc, klogin, kshell, lpd, nntp, pop2, pop3, smtp, sunrpc, syslog, tacacs-ds, talk, telnet, time, uucp, whois, and www.

UDP port names can be used only when filtering UDP. Valid names for UDP ports are biff, bootpc, bootps, discard, dns, dnsix, echo, mobile-ip, nameserver, netbios-dgm, netbios-ns, ntp, rip, snmp, snmptrap, sunrpc, syslog, tacacs-ds, talk, tftp, time, who, and xdmcp.

The number listed with the protocol type is the layer protocol number (for example, UDP | 17).

If no layer protocol number is entered, the following syntax can be used:

set security acl ip {acl_name} {permit | deny} {src_ip_spec} [before editbuffer_index | modify editbuffer_index]

If a Layer 4 protocol is specified, the following syntax can be used:

set security acl ip {acl_name} {permit | deny | redirect mod_num/port_num} {protocol}     {src_ip_spec} {dest_ip_spec} [precedence precedence] [tos tos] [before editbuffer_index |     modify editbuffer_index]

For IP you can use the following syntax:

set security acl ip {acl_name} {permit | deny | redirect {mod_num/port_num}} [IP | 0]     {src_ip_spec} {dest_ip_spec} [precedence precedence] [tos tos] [before editbuffer_index |     modify editbuffer_index]

For ICMP you can use the following syntax:

set security acl ip {acl_name} {permit | deny | redirect {mod_num/port_num}} [ICMP | 1]     {src_ip_spec} {dest_ip_spec} [icmp_type] [icmp_code] | [icmp_message]
    [precedence precedence] [tos tos] [before editbuffer_index | modify editbuffer_index]

For IGMP you can use the following syntax:

set security acl ip {acl_name} {permit | deny | redirect {mod_num/port_num}} [IGMP | 2]     {src_ip_spec} {dest_ip_spec} [igmp_type] [precedence precedence] [tos tos]
    [before editbuffer_index | modify editbuffer_index]

For TCP you can use the following syntax:

set security acl ip {acl_name} {permit | deny | redirect {mod_num/port_num}} [TCP | 6]     {src_ip_spec} [operator port [port]] {dest_ip_spec} [operator port [port]] [established]     [precedence precedence] [tos tos] [before editbuffer_index | modify editbuffer_index]

For UDP you can use the following syntax:

set security acl ip {acl_name} {permit | deny | redirect {mod_num/port_num}} [UDP | 17]     {src_ip_spec} [operator port [port]] {dest_ip_spec} [operator port [port]]
    [precedence precedence] [tos tos] [before editbuffer_index | modify editbuffer_index]

Examples

These examples show different ways to use the set security acl ip commands to configure IP security ACL:

Console> (enable) set security acl ip IPACL1 deny 1.2.3.4 0.0.0.0
IPACL1 editbuffer modified.  Use `commit' command to apply changes.
Console> (enable) 
 
Console> (enable) set security acl ip IPACL1 deny host 171.3.8.2 before 2 
IPACL1 editbuffer modified. Use `commit' command to apply changes.
Console> (enable)
 
Console> (enable) set security acl ip IPACL1 permit any any
IPACL1 editbuffer modified. Use `commit' command to apply changes.
Console> (enable) 
 
Console> (enable) set security acl ip IPACL1 redirect 3/1 ip 3.7.1.2 0.0.0.255 host 255.255.255.255 preedence 1 tos min-delay
IPACL1 editbuffer modified. Use `commit' command to apply changes.
Console> (enable) 
Related Commands

clear security acl
clear security acl map
commit
show security acl
set security acl map

set security acl ipx

Use the set security acl ipx command to create a new entry in a standard IPX VACL and to append the new entry at the end of the VACL.

set security acl ipx {acl_name} {permit | deny | redirect mod_num/port_num} {protocol}     {src_net} [dest_net.[dest_node] [[dest_net_mask.]dest_node_mask]] [before editbuffer_index     modify editbuffer_index]

Syntax Description

acl_name

Unique name that identifies the list to which the entry belongs.

permit

Keyword to allow traffic from the specified source IPX address.

deny

Keyword to block traffic from the specified source IPX address.

redirect

Keyword to redirect traffic from the specified source IPX address.

mod_num/port_num

Number of the module and port.

protocol

Keyword or number of an IPX protocol; valid values are from 0 to 255 representing an IPX protocol number. Refer to the "Usage Guidelines" section for a list of valid keywords amd corresponding numbers.

src_net

Number of the network from which the packet is being sent. Refer to the "Usage Guidelines" section for format guidelines.

dest_net.

(Optional) Number of the network from which the packet is being sent.

.dest_node

(Optional) Node on destination-network to which the packet is being sent.

dest_net_mask.

(Optional) Mask to be applied to the destination network. Refer to the "Usage Guidelines" section for format guidelines.

dest_node_mask

(Optional) Mask to be applied to destination-node. Refer to the "Usage Guidelines" section for format guidelines.

before editbuffer_index

(Optional) Keyword and variable to insert the new ACE in front of another ACE.

modify editbuffer_index

(Optional) Keyword and variable to replace an ACE with the new ACE.

Default

There are no default ACLs and no default ACL-VLAN mappings.

Command Type

Switch command.

Command Mode

Privileged.

Usage Guidelines

Configurations you make by entering this command are saved to NVRAM and hardware only after you enter the commit command. Enter ACEs in batches and then enter the commit command to save all of them in NVRAM and in the hardware.

When you enter the ACL name, follow these naming conventions:

Valid protocol keywords include: ncp (17), netbios (20), rip (1), sap (4), and spx (5).

The src_net and dest_net variables are eight-digit hexadecimal numbers that uniquely identify network cable segments. When you specify the src_net or dest_net, use the following guidelines:

The .dest_node is a 48-bit value represented by a dotted triplet of 4-digit hexadecimal numbers (xxxx.xxxx.xxxx).

The dest_net_mask is an eight-digit hexadecimal mask. Place ones in the bit positions you want to mask. The mask must be immediately followed by a period, which must in turn be immediately followed by destination-node-mask. You can enter this value only when dest_node is specified.

The dest_node_mask is a 48-bit value represented as a dotted triplet of 4-digit hexadecimal numbers (xxxx.xxxx.xxxx). Place ones in the bit positions you want to mask. You can enter this value only when dest_node is specified.

The dest_net_mask is an eight-digit hexadecimal number that uniquely identifies network cable segment. It can be a number in the range 0 to FFFFFFFF. A network number of -1 or any matches all networks. You do not need to specify leading zeros in the network number. For example, for the network number 000000AA, you can enter AA. Following are dest_net_mask examples:

Use the show security acl command to display the list.

Example

This example shows how to block traffic from a specified source IP address:

Console> (enable) set security acl ipx IPXACL1 deny 1.a
IPXACL1 editbuffer modified. Use `commit' command to apply changes.
Console> (enable)
Related Commands

clear security acl
clear security acl map
commit
show security acl
set security acl map

set security acl mac

Use the set security acl mac command to create a new entry in a non-IP or non-IPX protocol VACL and to append the new entry at the end of the VACL.

set security acl mac {acl_name} {permit | deny} {src_mac_addr_spec}     {dest_mac_addr_spec} [ether-type] [before editbuffer_index | modify editbuffer_index]

Syntax Description

acl_name

Unique name that identifies the list to which the entry belongs.

permit

Keyword to allow traffic from the specified source MAC address.

deny

Keyword to block traffic from the specified source MAC address.

src_mac_addr_spec

Source MAC address and mask in the form source_mac_address source_mac_address_mask.

dest_mac_addr_spec

Destination MAC address and mask.

ether-type

(Optional) Number or name that matches the ethertype for Ethernet-encapsulated packets; valid values are 0x0600, 0x0601, 0x0BAD, 0x0BAF, 0x6000-0x6009, 0x8038-0x8042, 0x809b, and 0x80f3. Refer to the "Usage Guidelines" section for a list of valid names.

before editbuffer_index

(Optional) Keyword and variable to insert the new ACE in front of another ACE.

modify editbuffer_index

(Optional) Keyword and variable to replace an ACE with the new ACE.

Default

There are no default ACLs and no default ACL-VLAN mappings.

Command Type

Switch command.

Command Mode

Privileged.

Usage Guidelines

Configurations you make by entering this command are saved to NVRAM and hardware only after you enter the commit command. Enter ACEs in batches and then enter the commit command to save all of them in NVRAM and in the hardware.

When you enter the ACL name, follow these naming conventions:

The src_mac_addr_spec is a 48-bit source MAC address and mask and entered in the form of source_mac_address source_mac_address_mask (for example, 08-11-22-33-44-55 ff-ff-ff-ff-ff-ff). Place ones in the bit positions you want to mask. When you specify the src_mac_addr_spec, follow these guidelines:

The dest_mac_spec is a 48-bit destination MAC address and mask and entered in the form of dest_mac_address dest_mac_address_mask (for example, 08-00-00-00-02-00/ff-ff-ff-00-00-00). Place ones in the bit positions you want to mask. The destination mask is mandatory. When you specify the dest_mac_spec, use the following guidelines:

Valid names for Ethertypes (and corresponding numbers) are Ethertalk (0x809B), AARP (0x8053), dec-mop-dump (0x6001), dec-mop-remote-console (0x6002), dec-phase-iv (0x6003), dec-lat (0x6004), dec-diagnostic-protocol (0x6005), dec-lavc-sca (0x6007), dec-amber (0x6008), dec-mumps (0x6009), dec-lanbridge (0x8038), dec-dsm (0x8039), dec-netbios (0x8040), dec-msdos (0x8041), banyan-vines-echo (0x0baf), xerox-ns-idp (0x0600), and xerox-address-translation (0x0601).

Use the show security acl command to display the list.

Example

This example shows how to block traffic to an IP address:

Console> (enable) set security acl mac MACACL1 deny 01-02-02-03-04-05
MACACL1 editbuffer modified. User `commit' command to apply changes.
Console> (enable)
Related Commands

clear security acl
clear security acl map
commit
show security acl
set security acl map

set security acl map

Use the set security acl map command to map an existing VACL to a VLAN.

set security acl map acl_name vlan

Syntax Description

acl_name

Unique name that identifies the list to which the entry belongs.

vlan

Number of the VLAN to be mapped to the VACL.

Default

There are no default ACLs and no default ACL-VLAN mappings.

Command Type

Switch command.

Command Mode

Privileged.

Usage Guidelines

Configurations you make by entering this command are saved in NVRAM. This command does not require that you enter the commit command. Each VLAN can be mapped to only one ACL of each type (IP, IPX, and MAC). An ACL can be mapped to a VLAN only after you have committed the ACL.

When you enter the ACL name, follow these naming conventions:

Examples

This example shows how to map an existing VACL to a VLAN:

Console> (enable) set security acl map IPACL1 1
ACL IPACL1 mapped to vlan 1
Console> (enable)
 

This example shows the output if you try to map an ACL that has not been committed:

Console> (enable) set security acl map IPACL1 1
Commit ACL IPACL1 before mapping.
Console> (enable)
 

This example shows the output if you try to map an ACL that is already mapped to a VLAN for the ACL type (IP, IPX, or MAC):

Console> (enable) set security acl map IPACL2 1
Mapping for this type already exists for this VLAN.
Console> (enable)
Related Commands

clear security acl
clear security acl map
commit
show security acl

set snmp community

Use the set snmp community command to set SNMP communities and associated access types.

set snmp community {read-only | read-write | read-write-all} [community_string]

Syntax Description

read-only

Keyword to assign read-only access to the specified SNMP community.

read-write

Keyword to assign read-write access to the specified SNMP community.

read-write-all

Keyword to assign read-write access to the specified SNMP community.

community_string

(Optional) Name of the SNMP community.

Default

The default is the following communities and access types are defined:

Command Type

Switch command.

Command Mode

Privileged.

Usage Guideline

There are three configurable SNMP communities, one for each access type. If you do not specify the community string, the community string configured for that access type is cleared.

Examples

This example shows how to set read-write access to the SNMP community called yappledapple:

Console> (enable) set snmp community read-write yappledapple
SNMP read-write community string set.
Console> (enable)
 

This example shows how to clear the community string defined for read-only access:

Console> (enable) set snmp community read-only
SNMP read-only community string cleared.
Console> (enable)
Related Command

show port counters

set snmp rmon

Use the set snmp rmon command to enable or disable SNMP RMON support.

set snmp rmon {enable | disable}

Syntax Description

enable

Keyword to activate SNMP RMON support.

disable

Keyword to deactivate SNMP RMON support.

Default

The default is RMON support is disabled.

Command Type

Switch command.

Command Mode

Privileged.

Usage Guidelines

RMON statistics are collected on a segment basis.

The RMON feature deinstalls all of the domains for all of the interfaces on an Ethernet module that has been removed from the system.

When RMON is enabled, the supported RMON groups for Ethernet ports are Statistics, History, Alarms, and Events as specified in RFC 1757.

Use of this command requires a separate software license.

Examples

This example shows how to enable RMON support:

Console> (enable) set snmp rmon enable
SNMP RMON support enabled.
Console> (enable)
 

This example shows how to disable RMON support:

Console> (enable) set snmp rmon disable
SNMP RMON support disabled.
Console> (enable)
Related Command

show port counters

set snmp trap

Use the set snmp trap commands to enable or disable the different SNMP traps on the system or to add an entry into the SNMP authentication trap receiver table.

set snmp trap {enable | disable} [all | module | chassis | bridge | repeater | auth | vtp |
    ippermit | vmps | config | entity | stpx]

set snmp trap rcvr_addr rcvr_community

Syntax Description

enable

Keyword to activate SNMP traps.

disable

Keyword to deactivate SNMP traps.

all

(Optional) Keyword to specify all trap types.

module

(Optional) Keyword to specify the moduleUp and moduleDown traps from the CISCO-STACK-MIB.

chassis

(Optional) Keyword to specify the chassisAlarmOn and chassisAlarmOff traps from the CISCO-STACK-MIB.

bridge

(Optional) Keyword to specify the newRoot and topologyChange traps from RFC 1493 (the BRIDGE-MIB).

repeater

(Optional) Keyword to specify the rptrHealth, rptrGroupChange, and rptrResetEvent traps from RFC 1516 (the SNMP-REPEATER-MIB).

auth

(Optional) Keyword to specify the authenticationFailure trap from RFC 1157.

vtp

(Optional) Keyword to specify the VTP from the CISCO-VTP-MIB.

ippermit

(Optional) Keyword to specify the IP Permit Denied access from the CISCO-STACK-MIB.

vmps

(Optional) Keyword to specify the vmVmpsChange trap from the CISCO-VLAN-MEMBERSHIP-MIB.

config

(Optional) Keyword to specify the sysConfigChange trap from the CISCO-STACK-MIB.

entity

(Optional) Keyword to specify the entityMIB trap from the ENTITY-MIB.

stpx

(Optional) Keyword to specify the STPX trap.

rcvr_addr

IP address or IP alias of the system to receive SNMP traps.

rcvr_community

Community string to use when sending authentication traps.

Default

The default is SNMP traps are disabled.

Command Type

Switch command.

Command Mode

Privileged.

Usage Guidelines

An IP permit trap is sent when unauthorized access based on the IP permit list is attempted.

Use the show snmp command to verify the appropriate traps were configured.

Examples

This example shows how to enable SNMP chassis traps:

Console> (enable) set snmp trap enable chassis
SNMP chassis alarm traps enabled.
Console> (enable) 
 

This example shows how to enable all traps:

Console> (enable) set snmp trap enable
All SNMP traps enabled.
Console> (enable) 
 

This example shows how to disable SNMP chassis traps:

Console> (enable) set snmp trap disable chassis
SNMP chassis alarm traps disabled.
Console> (enable) 
 

This example shows how to add an entry in the SNMP trap receiver table:

Console> (enable) set snmp trap 192.122.173.42 public
SNMP trap receiver added.
Console> (enable) 
Related Commands

clear ip permit
set ip permit
show ip permit
show port counters
show snmp
test snmp trap

set span

Use the set span commands to configure and display SPAN.

set span disable [dest_mod/dest_port | all]
set span {src_mod/src_ports | src_vlans | sc0} {dest_mod/dest_port} [rx | tx | both] [inpkts
    {enable | disable}] [learning {enable | disable}] [multicast {enable | disable}]
    [filter vlans...] [create]

Syntax Description

disable

Keyword to disable SPAN.

dest_mod

(Optional) Monitoring module (SPAN destination).

dest_port

(Optional) Monitoring port (SPAN destination).

all

(Optional) Keyword to disable all SPAN sessions.

src_mod

Monitored module (SPAN source).

src_ports

Monitored ports (SPAN source).

src_vlans

Monitored VLANs (SPAN source).

sc0

Keyword to specify the inband port is a valid source.

rx

(Optional) Keyword to specify that information received at the source (ingress SPAN) is monitored.

tx

(Optional) Keyword to specify that information transmitted from the source (egress SPAN) is monitored.

both

(Optional) Keyword to specify that information both transmitted from the source (ingress SPAN) and received (egress SPAN) at the source are monitored.

inpkts enable

(Optional) Keywords to enable the receiving of normal inbound traffic on the SPAN destination port.

inpkts disable

(Optional) Keywords to disable the receiving of normal inbound traffic on the SPAN destination port.

learning enable

(Optional) Keywords to enable learning for the SPAN destination port.

learning disable

(Optional) Keywords to disable learning for the SPAN destination port.

multicast enable

(Optional) Keywords to enable monitoring multicast traffic (egress traffic only).

multicast disable

(Optional) Keywords to disable monitoring multicast traffic (egress traffic only).

filter vlans

(Optional) Keyword and variable to monitor traffic on selected VLANs on source trunk ports.

create

(Optional) Keyword to create a SPAN port.

Default

The default is SPAN is disabled, no VLAN filtering, multicast is enabled, input packets are disabled, nd learning is enabled.

Command Type

Switch command.

Command Mode

Privileged.

Usage Guidelines

After SPAN is enabled, system defaults are used if no parameters were ever set. If you changed parameters, these are stored in NVRAM, and the new parameters are used.

Use a network analyzer to monitor ports.

If you specify multiple SPAN source ports, the ports can belong to different VLANs.

A maximum of two rx or both SPAN sessions and four tx SPAN sessions can exist simultaneously. If a remote SPAN station is used, the maximum number of rx or both SPAN sessions is one.

Use the inpkts keyword with the enable option to allow the SPAN destination port to receive normal incoming traffic in addition to the traffic mirrored from the SPAN source. Use the disable option to prevent the SPAN destination port from receiving normal incoming traffic.

You can specify an MSM port as the SPAN source port. However, you cannot specify an MSM port as the SPAN destination port.

When you enable the inpkts option, a warning message notifies you that the destination port does not join STP and may cause loops if this option is enabled.

When you configure multiple SPAN sessions, the destination module number/port number must be known to index the particular SPAN session.

If you do not specify the keyword create and you have only one session, the session will be overwritten. If a matching destination port exists, the particular session will be overwritten (with or without specifying create). If you specify the keyword create and there is no matching destination port, the session will be created.

Examples

This example shows how to configure SPAN so that both transmit and receive traffic from port 1/1 (the SPAN source) is mirrored on port 2/1 (the SPAN destination):

Console> (enable) set span 1/1 2/1
Enabled monitoring of Port 1/1 transmit/receive traffic by Port 2/1
Console> (enable)
 

This example shows how to set VLAN 522 as the SPAN source and port 2/1 as the SPAN destination:

Console> (enable) set span 522 2/1
Enabled monitoring of VLAN 522 transmit/receive traffic by Port 2/1
Console> (enable) 
 

This example shows how to set VLAN 522 as the SPAN source and port 3/12 as the SPAN destination. Only transmit traffic is monitored. Normal incoming packets on the SPAN destination port are allowed:

Console> (enable) set span 522 2/12 tx inpkts enable
SPAN destination port incoming packets enabled.
Enabled monitoring of VLAN 522 transmit traffic by Port 2/12
Console> (enable) 
 

This example shows how to set port 3/2 as the SPAN source and port 2/2 as the SPAN destination:

Console> (enable) set span 3/2 2/2 tx create
Enabled monitoring of port 3/2 transmit traffic by Port 2/1
Console> (enable)
 

This example shows what happens if you try to enter the set span disable command (without the destination module number/port number defined) and multiple SPAN sessions are defined:

Console> (enable) set span disable
Multiple active span sessions. Please specify span destination to disable.
Console> (enable) 
Related Commands

clear config
show span

set spantree backbonefast

Use the set spantree backbonefast command to enable or disable the spanning-tree Backbone Fast Convergence feature.

set spantree backbonefast {enable | disable}

Syntax Description

enable

Keyword to enable Backbone Fast Convergence.

disable

Keyword to disable Backbone Fast Convergence.

Default

The default is Backbone Fast Convergence is disabled.

Command Type

Switch command.

Command Mode

Privileged.

Usage Guideline

For Backbone Fast Convergence to work, you must enable it on all switches in the network.

Example

This example shows how to enable Backbone Fast Convergence:

Console> (enable) set spantree backbonefast enable
Backbonefast enabled for all VLANs.
Console> (enable) 
Related Command

show spantree

set spantree disable

Use the set spantree disable command to disable the spanning-tree algorithm for all VLANs or a specific VLAN.

set spantree disable [vlan | all]

Syntax Description

vlan

(Optional) Number of the VLAN.

all

(Optional) Keyword to specify all VLANs.

Default

The default is spanning tree is enabled.

Command Type

Switch command.

Command Mode

Privileged.

Example

This example shows how to disable the spanning-tree algorithm for VLAN 1:

Console> (enable) set spantree disable 1
VLAN 1 bridge spanning tree disabled.
Console> (enable) 
Related Commands

set spantree enable
show spantree

set spantree enable

Use the set spantree enable command to enable the spanning-tree algorithm for all VLANs or a specific VLAN.

set spantree enable [vlan | all]

Syntax Description

vlan

(Optional) Number of the VLAN.

all

(Optional) Keyword to specify all VLANs.

Default

The default is spanning tree is enabled.

Command Type

Switch command.

Command Mode

Privileged.

Example

This example shows how to activate the spanning-tree algorithm for VLAN 1:

Console> (enable) set spantree enable 1
VLAN 1 bridge spanning tree enabled.
Console> (enable) 
Related Commands

set spantree disable
show spantree

set spantree fwddelay

Use the set spantree fwddelay command to set the bridge forward delay for a VLAN.

set spantree fwddelay delay [vlan]

Syntax Description

delay

Number of seconds (4 to 30) for the bridge forward delay.

vlan

(Optional) Number of the VLAN; if a VLAN number is not specified, VLAN 1 is assumed.

Default

The default is the bridge forward delay is set to 15 seconds for all VLANs.

Command Type

Switch command.

Command Mode

Privileged.

Example

This example shows how to set the bridge forward delay for VLAN 100 to 16 seconds:

Console> (enable) set spantree fwddelay 16 100
Spantree 100 forward delay set to 16 seconds.
Console> (enable)
Related Command

show spantree

set spantree hello

Use the set spantree hello command to set the bridge hello time for a VLAN.

set spantree hello interval [vlan]

Syntax Description

interval

Number of seconds (1 to 10) the system waits before sending a bridge hello message (a multicast message indicating that the system is active).

vlan

(Optional) Number of the VLAN; if a VLAN number is not specified, VLAN 1 is assumed.

Default

The default is the bridge hello time is set to 2 seconds for all VLANs.

Command Type

Switch command.

Command Mode

Privileged.

Example

This example shows how to set the spantree hello time for VLAN 100 to 3 seconds:

Console> (enable) set spantree hello 3 100
Spantree 100 hello time set to 3 seconds.
Console> (enable)
Related Command

show spantree

set spantree maxage

Use the set spantree maxage command to set the bridge maximum aging time for a VLAN.

set spantree maxage agingtime [vlan]

Syntax Description

agingtime

Maximum number of seconds (6 to 40) that the system retains the information received from other bridges through Spanning-Tree Protocol.

vlan

(Optional) Number of the VLAN; if a VLAN number is not specified, VLAN 1 is assumed.

Default

The default configuration is 20 seconds for all VLANs.

Command Type

Switch command.

Command Mode

Privileged.

Example

This example shows how to set the maximum aging time for VLAN 1000 to 25 seconds:

Console> (enable) set spantree maxage 25 1000
Spantree 1000 max aging time set to 25 seconds.
Console> (enable)
Related Command

show spantree

set spantree portcost

Use the set spantree portcost command to set the path cost for a port.

set spantree portcost {mod_num/port_num} cost

Syntax Description

mod_num

Number of the module.

port_num

Number of the port on the module.

cost

Number from 0 to 65535 that indicates the cost of the path; 0 is low cost and 65535 is high cost.

Default

The default is portcost is 4.

Command Type

Switch command.

Command Mode

Privileged.

Usage Guideline

The Spanning-Tree Protocol uses port path costs to determine which port to select as a forwarding port. You should assign lower numbers to ports attached to faster media (such as full duplex) and higher numbers to ports attached to slower media. The possible range is from 0 to 65535.

Example

The following example shows how to set the port cost for port 12 on module 2 to 19:

Console> (enable) set spantree portcost 2/12 19
Spantree port 2/12 path cost set to 19.
Console> (enable) 
Related Command

show spantree

set spantree portfast

Use the set spantree portfast command to allow a port that is connected to a single workstation or PC to start faster when it is connected.

set spantree portfast {mod_num/port_num} {enable | disable}

Syntax Description

mod_num

Number of the module.

port_num

Number of the port on the module.

enable

Keyword to enable the spanning-tree port fast-start feature on the port.

disable

Keyword to disable the spanning-tree port fast-start feature on the port.

Default

The default is the port fast-start feature is disabled.

Command Type

Switch command.

Command Mode

Privileged.

Usage Guideline

When a port configured with the spantree portfast enable command is connected, the port immediately enters the spanning-tree forwarding state rather than going through the normal spanning-tree states such as listening and learning. Use this command on ports that are connected to a single workstation or PC only; do not use it on ports that are connected to networking devices such as hubs, routers, switches, bridges, or concentrators.

Example

This example shows how to enable the spanning-tree port fast-start feature on port 2 on module 1:

Console> (enable) set spantree portfast 1/2 enable
 
Warning: Spantree port fast start should only be enabled on ports connected to a single host. Connecting hubs, concentrators, switches, bridges, etc. to a fast start port can cause temporary spanning tree loops. Use with caution.
 
Spantree port 1/2 fast start enabled.
Console> (enable)
Related Command

show spantree

set spantree portpri

Use the set spantree portpri command to set the bridge priority for a spanning-tree port or TrCRF.

set spantree portpri {mod_num/port_num} | trcrf [priority | trcrf_priority]

Syntax Description

mod_num

Number of the module.

port_num

Number of the port on the module.

trcrf

Keyword to specify the number of the TrCRF for which you are setting the bridge priority.

priority

(Optional) Number that represents the cost of a link in a spanning-tree bridge. The priority level is from 0 (high) to 63 (low).

trcrf_priority

(Optional) Number that represents the cost of the TrCRF. The priority level is from 0 to 7, with 0 indicating high priority and 7, low priority.

Default

The default is all ports with bridge priority are set to 32.

Command Type

Switch command.

Command Mode

Privileged.

Example

This example shows how to set the priority of port 1 on module 4 to 63:

Console> (enable) set spantree portpri 4/1 63
Bridge port 4/1 priority set to 63.
Console> (enable)
Related Command

show spantree

set spantree portstate

Use the set spantree portstate command to manually set the state of a TrCRF.

set spantree portstate trcrf {block | forward | auto} [trbrf]

Syntax Description

trcrf

Number of the TrCRF for which you are manually setting the state.

block | forward | auto

Keywords to set the TrCRF to a blocked state (block), forwarding state (forward), or to have the Spanning-Tree Protocol determine the correct state automatically (auto).

trbrf

(Optional) Number of the parent TrBRF.

Default

There is no default configuration for this command.

Command Type

Switch command.

Command Mode

Privileged.

Usage Guidelines

Use this command only to set the port state when the TrCRF is in SRT mode and the TrBRF is running the IBM Spanning-Tree Protocol, or the TrCRF is in SRB mode and the TrBRF is running the IEEE Spanning-Tree Protocol.

When you enable Spanning-Tree Protocol, every switch in the network goes through the blocking state and the transitory states of listening and learning at power up. If properly configured, the ports then stabilize to the forwarding or blocking state. However, with TrBRFs and TrCRFs, there are two exceptions to this rule that require you to manually set the state of the logical ports of a TrBRF:

If either condition exists, use the set spantree portstate command to manually set the state of a TrCRF to blocked or forwarding mode or set the Spanning-Tree Protocol to determine the correct state automatically.

Example

This example shows the manual setting of TrCRF 900 to a forwarding state:

Console> (enable) set spantree portstate 900 forward
reserve_nvram : requested by block = 0
reserve_nvram : granted to block = 0
release_nvram : releasing block = 0
Console> (enable)
Related Command

show spantree

set spantree portvlancost

Use the set spantree portvlancost command to assign a lower path cost to a set of VLANs on a port.

set spantree portvlancost {mod_num/port_num} [cost cost] [vlan_list]

Syntax Description

mod_num

Number of the module.

port_num

Number of the port.

cost cost

(Optional) Keyword to indicate the path cost. The portvlancost applies only to trunk ports.

vlan_list

(Optional) If you do not list a VLAN explicitly, the VLANs listed in prior invocations of this command are affected. If no cost is listed explicitly, and previous cost values are specified in prior invocations, then the portvlancost is set to 1 less than the current port cost for a port. However, this may not assure load balancing in all cases.

Default

The default is portvlancost is 3.

Command Type

Switch command.

Command Mode

Privileged.

Usage Guideline

The value specified is used as the path cost of the port for the specified set of VLANs. The rest of the VLANs have a path cost equal to the port path cost, set via the set spantree portcost command (if not set, the value is the default path cost of the port).

Examples

These examples show various ways to use the set spantree portvlancost command:

Console> (enable) set spantree portvlancost 2/10 cost 25 1-20
Cannot set portvlancost to a higher value than the port cost, 10, for port 2/10.
Console> (enable)
 
Console> (enable) set spantree portvlancost 2/10 1-20
Port 2/10 VLANs 1-20 have a path cost of 9.
Console> (enable)
 
Console> (enable) set spantree portvlancost 2/10 cost 4 1-20
Port 2/10 VLANs 1-20 have path cost 4.
Port 2/10 VLANs 21-1000 have path cost 10.
Console> (enable)
 
Console> (enable) set spantree portvlancost 2/10 cost 6 21
Port 2/10 VLANs 1-21 have path cost 6.
Port 2/10 VLANs 22-1000 have path cost 10.
Console> (enable) 
 

These examples show how to use the set spantree portvlancost command without explicitly specifying cost:

Console> (enable) set spantree portvlancost 1/2
Port 1/2 VLANs 1-1005 have path cost 3100.
Console> (enable)
 
Console> (enable) set spantree portvlancost 1/2 21
Port 1/2 VLANs 1-20,22-1005 have path cost 3100.
Port 1/2 VLANs 21 have path cost 3099.
Console> (enable) 
Related Command

show spantree

set spantree portvlanpri

Use the set spantree portvlanpri command to set the port priority for a subset of VLANs in the trunk port.

set spantree portvlanpri {mod_num/port_num} priority [vlans]

Syntax Description

mod_num

Number of the module.

port_num

Number of the port.

priority

Number that represents the cost of a link in a spanning-tree bridge. The priority level is from 0 to 63, with 0 indicating high priority and 63 indicating low priority.

vlans

(Optional) VLANs that use the specified priority level.

Default

The default is the port VLAN priority is set to 0, with no VLANs specified.

Command Type

Switch command.

Command Mode

Privileged.

Usage Guidelines

Use this command to add VLANs to a specified port priority level. Subsequent calls to this command do not replace VLANs that are already set at a specified port priority level.

This feature is not supported for the MSM.

The set spantree portvlanpri command applies only to trunk ports. If you enter this command, you see this message:

Port xx is not a trunk-capable port
Example

This example shows how to set the port priority for module 1, port 2, on VLANs 21 to 40:

Console> (enable) set spantree portvlanpri 1/2 16 21-40
Port 1/2 vlans 3,6-20,41-1000 using portpri 32
Port 1/2 vlans 1-2,4-5,21-40 using portpri 16
Console> (enable)
Related Commands

clear spantree portvlancost
show spantree

set spantree priority

Use the set spantree priority command to set the bridge priority for a VLAN.

set spantree priority bridge_priority [vlan]

Syntax Description

bridge_priority

Number representing the priority of the bridge. The priority level is from 0 to 65535, with 0 indicating high priority and 65535, low priority.

vlan

(Optional) Number of the VLAN. If you do not specify a VLAN number, VLAN 1 is used.

Default

The default is the bridge priority is set to 32768.

Command Type

Switch command.

Command Mode

Privileged.

Usage Guideline

This feature is not supported for the MSM.

Example

This example shows how to set the bridge priority of VLAN 1 to 4096:

Console> (enable) set spantree priority 4096
VLAN 1 bridge priority set to 4096.
Console> (enable)
Related Command

show spantree

set spantree root

Use the set spantree root command to set the primary or secondary root for specific VLANs or for all VLANs of the switch.

set spantree root [secondary] [vlan_list] [dia network_diameter] [hello hello_time]

Syntax Description

secondary

(Optional) Keyword to designate this switch as a secondary root, should the primary root fail.

vlan_list

(Optional) Number of the VLAN. If you do not specify a VLAN number, VLAN 1 is used.

dia network_diameter

(Optional) Keyword to specify the maximum number of bridges between any two points of attachment of end stations; valid values are from 1 through 7.

hello hello_time

(Optional) Keyword to specify in seconds, the duration between the generation of configuration messages by the root switch.

Default

If the secondary keyword is not specified, the default is to make the switch the primary root.

The default value of the network diameter is 7.

If not specified, the current value of hello_time from the NVRAM is used.

Usage Guidelines

This command is run on backbone or distribution switches.

You can run the secondary root many times to create backup switches in case of a root failure.

The secondary command reduces the bridge priority value to 16384.

This command increases path costs to a value greater than 3000.

Command Type

Switch command.

Command Mode

Privileged.

Examples

This example shows how to use the set spantree root command:

Console> (enable) set spantree root 1-10 dia 4
VLANs 1-10 bridge priority set to 8192
VLANs 1-10 bridge max aging time set to 14 seconds.
VLANs 1-10 bridge hello time set to 2 seconds.
VLANs 1-10 bridge forward delay set to 9 seconds.
Switch is now the root switch for active VLANs 1-6.
Console> (enable) 
 

This example shows that setting the bridge priority to 8192 was not sufficient to make this switch the root. So, the priority was further reduced to 7192 (100 less than the current root switch) to make this switch the root switch. However, reducing it to this value did not make it the root switch for active VLANs 16 and 17.

Console> (enable) set spantree root 11-20.
VLANs 11-20 bridge priority set to 7192
VLANs 11-10 bridge max aging time set to 20 seconds.
VLANs 1-10 bridge hello time set to 2 seconds.
VLANs 1-10 bridge forward delay set to 13 seconds.
Switch is now the root switch for active VLANs 11-15,18-20.
Switch could not become root switch for active VLAN 16-17.
Console> (enable) 
 
 
Console> (enable) set spantree root secondary 22,24 dia 5 hello 1
VLANs 22,24 bridge priority set to 16384.
VLANs 22,24 bridge max aging time set to 10 seconds.
VLANs 22,24 bridge hello time set to 1 second.
VLANs 22,24 bridge forward delay set to 7 seconds.
Console> (enable) 
Related Command

show spantree

set spantree uplinkfast

Use the set spantree uplinkfast command to enable fast switchover to alternate ports when the root port fails. This command applies to a switch, not to a WAN.

set spantree uplinkfast {enable | disable} [rate station_update_rate] [all-protocols off | on]

Syntax Description

enable

Keyword to enable fast switchover.

disable

Keyword to disable fast switchover.

rate

(Optional) Keyword to specify the number of multicast packets transmitted per 100 ms when an alternate port is chosen after the root port goes down.

station_update_rate

(Optional) Number of multicast packets transmitted per 100 ms when an alternate port is chosen after the root port goes down.

all-protocols

(Optional) Keyword to specify whether or not to generate multicast packets for all protocols (IP, IPX, AppleTalk, and Layer 2 packets).

off

(Optional) Keyword to turn off the all-protocols feature.

on

(Optional) Keyword to turn on the all-protocols feature.

Default

The default station_update_rate is 15 packets per 100 ms.

Command Type

Switch command.

Command Mode

Privileged.

Usage Guidelines

The set spantree uplinkfast enable command has the following results:

If you run set spantree uplinkfast enable on a switch that has this feature already enabled, only the station update rate is updated. The rest of the parameters are not modified.

If you run set spantree uplinkfast disable on a switch, the UplinkFast feature is disabled but the switch priority and port cost values are not reset to the factory defaults. To reset the values to the factory defaults, enter the clear spantree uplinkfast command.

The default station_update_rate value is 15 packets per 100 ms, which is equivalent to a 1 percent load on a 10-Mbps Ethernet. If this value is specified as 0, the generation of these packets is turned off.

You do not have to turn on the all-protocols feature on Catalyst 6000 family switches that have both the UplinkFast and protocol filtering features enabled. The all-protocols feature should be used only on Catalyst 6000 family switches that have uplinkfast but do not have protocol filtering; upstream switches in the network use protocol filtering. Since the switch with uplinkfast does not have protocol filtering, you must enter the all-protocols option to inform the uplinkfast task whether or not to generate multicast packets for all protocols.

Examples

This example shows how to enable spantree UplinkFast and specify the number of multicast packets transmitted to 40 packets per 100 ms:

Console> (enable) set spantree uplinkfast enable rate 40
VLANs 1-1000 bridge priority set to 49152.
The port cost and portvlancost of all ports increased to above 3000.
Station update rate set to 40 packets/100ms.
uplinkfast turned on for bridge.
Console> (enable) 
 

This example shows how to disable spantree UplinkFast:

Console> (enable) set spantree uplinkfast disable
Uplinkfast disabled for switch. 
Use clear spantree uplinkfast to return stp parameters to default.
Console> (enable) clear spantree uplink
This command will cause all portcosts, portvlancosts, and the 
bridge priority on all vlans to be set to default.
Do you want to continue (y/n) [n]? y
VLANs 1-1005 bridge priority set to 32768.
The port cost of all bridge ports set to default value.
The portvlancost of all bridge ports set to default value.
uplinkfast disabled for bridge.
Console> (enable) 
 

This example shows how to turn on the all-protocols feature:

Console> (enable) set spantree uplinkfast enable all-protocols on
uplinkfast update packets enabled for all protocols.
uplinkfast already enabled for bridge.
Console> (enable)
 

This example shows how to turn off the all-protocols feature:

Console> (enable) set spantree uplinkfast enable all-protocols off
uplinkfast all-protocols field set to off.
uplinkfast already enabled for bridge.
Console> (enable)
Related Command

show spantree


hometocprevnextglossaryfeedbacksearchhelp
Posted: Fri Dec 31 11:00:18 PST 1999
Copyright 1989-1999©Cisco Systems Inc.