IBM Books

8371 Interface Configuration


The CONFIG Process (CONFIG - Talk 6) and Commands

This chapter describes the CONFIG process configuration and operational commands. It includes the following sections:


What is CONFIG?

The Configuration process (CONFIG) is a second-level process of the device user interface. Using CONFIG commands, you can:

Note:Refer to the chapter "Migrating to a New Code Level" in 8371 Networking Multilayer Ethernet Switch Installation and Planning Guide for information about migrating to a new code level.

CONFIG lets you display or change the configuration information stored in the device's nonvolatile configuration memory. Changes to system and protocol parameters do not take effect until you reload the device software. (For more information, refer to the OPCON reload command in "What is the OPCON Process?").
Note:You must enter the write command to save the changes in the device's flash memory.

The CONFIG command interface is made up of levels that are called modes. Each mode has its own prompt. For example, the prompt for the SNMP protocol is SNMP config>.

If you want to know the process and mode you are communicating with, press Enter to display the prompt. Some commands in this chapter, such as the network and protocol commands, allow you to access and exit the various levels in CONFIG. See Table 13 for a list of the commands you can issue from the CONFIG process.

Automatic Configuration

When the switch is booted, the following interfaces are allocated:

Table 12. Interfaces Added at Boot Time
Slot Port Device Type Interface Number
0 1-16 10/100MB Ethernet 0-15
1 1-8 10/100MB Ethernet 16-23
2 1-8 10/100MB Ethernet 24-31
3 1-4 LAG 32-35
1 1-2 ATM* 36-37
2 1-2 ATM* 38-39
3 5-29 LEC 40-63
Note:* Only 2 ATM ports are supported at one time. You can have 4 independent configurations of ATM ports, but only 2 are active at any one time.

When a feature card is hot-swapped into the switch, interface numbers are assigned from the above table. Feature cards can be added and removed to and from the feature card slots. However, the card being swapped must have been present at boot time, and only the same type of card may be swapped with the one being removed.

Dynamic Activation of a LEC

When a LEC is activated, the LEC must be associated with an ATM interface. The following default configuration values are associated with the LEC**:

ELAN Name
ELAN1

ESI
Set to MAC address stored in flash memory for this interface value

LES ATM Address
set to use autoconfig via the LECS

ATM Interface
36

ELAN Type
Ethernet

Bridging
Enabled

Selector
2
Note:**These values guarantee that the box comes up with a known configuration. However, attempting to configure a LEC using all default values will probably fail. You need to provide network-specific information when configuring the LEC. See "Configuring and Monitoring LAN Emulation Clients" for LEC configuration detail.

Quick Configuration

Quick Configuration (Quick Config) provides a minimal set of commands that allow you to configure bridging protocols and routing protocols present in the device load. You can also configure an SNMP community with WRITE_READ_TRAP access. This is useful during initial setup because the configuration program uses SNMP SET commands to transfer the configuration.

Quick Config complements the existing configuration process by offering a shortcut. This shortcut allows you to configure the minimum number of parameters for these bridging protocols and routing protocols without having to exit and enter the different configuration processes. The other parameters are set to selected defaults.

Quick Config operates as follows:

Quick Config sets a number of default parameters based upon how you answer the configuration questions. What cannot be configured with Quick Config can be configured using Config after exiting Quick Config.

You cannot delete Quick Config information from within Quick Config. However, you can correct information either by exiting and returning to Quick Config, or by entering the reload command as a response to some Quick Config questions.

Manual Entry Into Quick Config Mode

You might want to run Quick Config manually to demonstrate the device's capabilities or to reconfigure dynamically to perform benchmark tests without having to learn the device's operating system commands.

To enter Quick Config, type qconfig at the Config> prompt.

Exiting from Quick Config Mode

To exit Quick Config, restart by entering r from any prompt. Follow the queries until you enter no and then enter q to quit. The router returns to either the Config (only)> or the Config> prompt.

Configuring User Access

The device configuration process allows for a maximum of 50 user names, passwords, and levels of permission. Each user needs to be assigned a password and level of permission. There are three levels of permission: Administration, Operation, and Monitoring.

Technical Support Access

If you are the system administrator, when you add a new user for the first time, you are asked if you want to add Technical Support access. If you answer yes, Technical Support is granted the same access privileges that you have as system administrator.

The password for this account is automatically selected by the software and is known by your service representative. This password can be changed using the change user command; however, if you do change the password, customer service cannot provide remote support. For additional information on the use of the change user command, see "Change".

Resetting Interfaces

Occasionally, you might need to change the configuration of a network interface along with its bridging and routing protocols without restarting the device. The reset command allows you to disable a network interface and then enable it using new interface, bridging and routing configuration parameters.

The interface, protocols and features configuration parameters are changed using the CONFIG process (talk 6) commands. The talk 6 commands affect the contents of the configuration memory. The configuration changes are activated by issuing the GWCON process (talk 5) reset command.

To reset an interface:

  1. Access the CONFIG process (talk 6).
  2. Use the net command and other commands to change configuration parameters.
  3. Use the protocol and feature commands to change the interface-based configuration parameters.
  4. Exit the CONFIG process by pressing Ctrl-P.
  5. Access the GWCON process (talk 5).
  6. Use the reset command to reset the interface and the protocols and features on the interface.

Example:

  * configuration                                                          
  Config> net 0                                                    
  ATM User Configuration                                           
  ATM Config> le-client                                            
  ATM LAN Emulation Clients Configuration                          
  LE Client config> config 6                                       
                                                                   
  . . . change ATM LAN Emulation Client parameters . . .           
                                                                   
  Ethernet Forum Compliant LEC Config> exit                      
  LE Client config> exit                                           
  ATM Config> exit
                                                 
                                                                                                                         
Note:When using the configuration program, do the following to make configuration changes to existing interfaces:
  1. Make the configuration changes for the interface on the device
  2. Enter the reset command to reset interface, protocol and feature parameters
  3. Retrieve the configuration using the configuration program
  4. Save the retrieved configuration into the configuration program database

Entering and Exiting CONFIG

To enter the CONFIG process from OPCON and obtain the CONFIG prompt, enter the configuration command. Alternatively, you can enter the OPCON talk command and the PID for CONFIG. The PID for CONFIG is 6.

* configuration

or

* talk 6

The console displays the CONFIG prompt (Config>). If the prompt does not appear, press the Enter key again.

To exit CONFIG and return to the OPCON prompt (*), enter the intercept character. (The default is Ctrl-P .)


CONFIG Commands

This section describes each of the CONFIG commands. Each command includes a description, syntax requirements, and an example. The CONFIG commands are summarized in Table 13.

After accessing the CONFIG environment, enter the configuration commands at the Config> prompt.

Table 13. CONFIG Command Summary
Command Function
? (Help) Displays all the commands available for this command level or lists the options for specific commands (if available). See "Getting Help".
 Add   Adds a user to the device. 
 Boot   Enters Boot CONFIG command mode. 
 Change   Changes a user's password or a user's parameter values associated with this interface. Also changes a slot/port of an interface. 
 Clear   Clears configuration information. Forces a re-boot for re-autoconfig. See Table 7
 Disable   Disables command completion, login from a remote console, system memory dumping and rebooting, or a specified interface. 
 Enable   Enables command completion, login from a remote console, system memory dumping and rebooting, or enables a specified interface. 
 Event   Enters the Event Logging System configuration environment. 
 Feature   Provides access to configuration commands for independent device features outside the usual protocol and network interface configuration processes. 
 List   Displays system parameters, hardware configuration, a complete user  list.
 Network   Enters the configuration environment of the specified network. 
 Patch   Modifies the device's global configuration. 
 Performance   Provides a snapshot of the main processor utilization statistics. 
 Protocol   Enters the command environment of the specified protocol. 
 Set  Sets system-wide parameters for buffers, host name, inactivity timer, packet size, prompt level, number of spare interfaces, dump parameters, location, and contact person.
 Time   Keeps track of system time and displays it on the console. 
 Unpatch   Restores patch variables to default values. 

Add

Use the add command to add user-access.

Syntax:

add
user . . .

user user_name
Gives a user access to the device. You can authorize up to 50 users to access the device. Each user_name is eight characters and is case-sensitive.

When the first user is added, console login is automatically enabled. Each user added must be assigned one of the permission levels defined in the table below.

When users are added, set login authentication to local. Otherwise a remote server must be used.

Table 14. Access Permission
Permission Level Description
Administrator (A) Displays configuration and user information, adds/modifies/deletes configuration and user information. The Administrator can access any device function.
Operator (O) Views device configuration, views statistics, runs potentially disruptive tests, dynamically changes device operation, and restarts the device. Operators cannot modify the permanent device configuration. All actions can be undone with a system restart.
Monitor (M) Views device configuration and statistics but cannot modify or disrupt the operation of the device.
Tech Support Allows your service representative to gain access to the device if a password is forgotten. Cannot be assigned to users.
Note:To add a user, you must have administrative permission. You do not have to reinitialize the switch after adding a user.

Example:

add user John
Enter password:
Enter password again:
Enter permission (A)dmin, (O)perations, (M)onitor [A]?
Do you want to add Technical Support access? (Yes or [No]):

Enter password
Specifies the access password for the user. Limited to 80 alphanumeric characters and is case-sensitive.

Enter password again
Confirms the access password for the user.

Enter permission
Specifies the permission level for the user: A, O, or M.

Boot

Use the boot command to enter the Boot CONFIG command environment. For Boot CONFIG information, see "Using BOOT Config to Perform Change Management".

Syntax:

boot
 

Change

Use the change command to change your own password, or change user information.

Syntax:

 change 
user

user
Modifies the user information that was previously configured with the add user command.
Note:To change a user, you must have administrative permission.

Example:

change user
User name: []
Change password? (Yes or No)
Change permission? (Yes or [No])

Clear

Use the clear command to delete the device's configuration information from nonvolatile configuration memory.

Attention:  Use this command only after calling your service representative.

Syntax:

clear
all

arp

asrt

atm (Asynchronous Transfer Mode)

bgp

boot

device

els (Event Logging System Information)

hostname

ip

ipx

mpoa

ospf

prompt

qos

snmp

tcp/ip-host

time (Time of day information)

user

vlan

To clear a process from nonvolatile configuration memory, enter the clear command and the process name. To clear all information from configuration memory, except for device information, use the clear all command. To clear all information, including the device information, use the clear all command and then the clear device command.

The clear user command clears all user information except the device console login information. This is left as enabled (if it was configured as enabled) even though the default value is "disabled".

Notes:

  1. To clear user information, you must have administrative permission.

  2. There may be other items in the list, depending upon what is included in the software load.

Example: clear els

You are about to clear all Event Logging configuration information
Are you sure you want to do this (Yes or No):
Note:The previous message appears for any parameter configuration you are clearing.

Delete

Use the delete command to remove a user. To use the delete command, you must have administrative permission.

Syntax:

delete
user . . .

user user_name
Removes user access to the device for the specified user.

Disable

Use the disable command to disable command completion, login from a remote console, system memory dumping, rebooting, or a specified interface.

Syntax:

disable
command-completion

console-login

dump-memory . . .

interface . . .

reboot-system . . .

command-completion

Use the disable command-completion command to disable the automatic command completion function. See "Command Completion" for a discussion of the automatic command completion function.

console-login
Disables the user from being prompted for a user ID and password on the physical console. The default is disabled.

interface interface#
Causes the specified interface to be disabled after issuing the reload command. The default is enabled.

dump-memory
Disables the dumping of system memory to the installed hard disk when a serious error occurs.

reboot-system
Disables the rebooting of the system when a serious error occurs. This may be desirable if the network service personnel wish to troubleshoot the error on-line. System rebooting cannot be disabled unless memory dumping is also disabled. If you attempt to disable system rebooting while memory dumping is enabled, system rebooting is aborted and the following message is displayed:
  System reboot not disabled:  memory dumping must be disabled first

Enable

Use the enable command to enable command completion, login from a remote console, system memory dumping, rebooting, or a specified interface.

Syntax:

 enable 
command-completion

console-login

dump-memory . . .

interface . . .

reboot-system . . .

command-completion

Use the enable command-completion command to enable the automatic command completion function, which assists with the command syntax. See "Command Completion" for a discussion of the automatic command completion function.

console-login
Enables the user to be prompted for a user ID and password on the physical console. This is useful for security situations. If you do not configure any administrative users and you enable this feature, the following message appears:
Warning: Console login is disabled until an
administrative user is added.
Attention:Before enabling console login, save the configuration with console login disabled. If login authentication is set to a remote server using Radius or Tacacs+ and the device is unable to reach the authentication server, then access to the device is denied. By disabling the console login, a lock-out situation is prevented.

dump-memory
Enables the dumping of system memory to the target device specified by the set dump target command (described on page ***) if a serious error occurs. This may be desirable so that the state of the unit at the time of the error can be preserved for troubleshooting later. The dump memory function cannot be enabled unless system rebooting is enabled. If you attempt to enable the dump memory function while system rebooting is disabled, the dump memory function is not enabled and the following message is displayed:
System memory dump function not enabled:  rebooting must be enabled first

See the set dump enable-mode and set dump save-mode commands.

Example:

Config> enable dump 
 
Current System Dump Status: 
   System dump is currently disabled. 
   Number of existing dump files:  0 
 
Enable system memory dumping? [No]: Yes 
 
Current System Dump Status: 
   System dump is currently enabled. 
   Number of existing dump files:  0
Note:If you enter this command and a hard drive is not available, you will receive a message indicating that the drive is unavailable.

interface interface#
Causes the interface to be enabled after issuing the reload command.

reboot-system
Enables the rebooting of the system when a serious error occurs.

Event

Use the event command to enter the Event Logging System (ELS) environment so that you can define the messages that will appear on the console. Refer to "Using the Event Logging System (ELS)" for information about ELS.

Syntax:

event
 

Feature

Use the feature command to access configuration commands for specific device features outside of the protocol and network interface configuration processes.

Syntax:

feature
[feature# or feature-short-name]

All IBM 8371 features have commands that are executed by:

The procedure for accessing these processes is the same for all features. The following information describes the procedure.

Enter a question mark after the feature command to obtain a listing of the features available for your software release.

To access a feature's configuration prompt, enter the feature command followed by the feature number or short name. Table 15 lists available feature numbers and names.

Table 15. IBM 8371 Feature Numbers and Names

Feature
Number



Feature
Short Name



Accesses the following
feature configuration process


6 QoS Quality of Service
17 Self Learning IP  
18 RMON  

Once you access the configuration prompt for a feature, you can begin entering specific configuration commands for the feature. To return to the CONFIG prompt, enter the exit command at the feature's configuration prompt.

List

Use the list command to display configuration information for all network interfaces, or configuration information for the device.

Syntax:

list
configuration

devices

named-profile

patches . . .

users . . .

configuration
Displays configuration information about the device.

Example: list configuration

Hostname: [none]
Maximum packet size: [autoconfigured]
Maximum number of global buffers: [autoconfigured]
Number of spare interfaces: 0
Console inactivity timer (minutes): 0
Physical console login: disabled
Command Completion: enabled
Contact person for this node: [none]
Location of this node: [none]
 
Configurable Protocols:
Num Name  Protocol
11  SNMP   Simple Network Management Protocol
23  ASRT   Adaptive Source Routing Transparent Enhanced Bridge
24  HST    TCP/IP Host Services
29  MPOA   Multi-Protocol Over ATM
 
Configurable Features:
Num Name  Feature
6   QOS    Quality of Service
17  Self   Self Learning IP
18  RMON   Remote Network Monitor
 
119168 bytes of configuration memory free

devices [device or devicerange]
Displays the relationship between an interface number and the hardware interface. You can also use this command to check that a device was added correctly issuing the add command.

Example: list devices

 
Ifc 0     1-port 10/100 Ethernet             Slot: 0   Port: 1 
Ifc 1     1-port 10/100 Ethernet             Slot: 0   Port: 2 
Ifc 2     1-port 10/100 Ethernet             Slot: 0   Port: 3 
Ifc 3     1-port 10/100 Ethernet             Slot: 0   Port: 4 
Ifc 4     1-port 10/100 Ethernet             Slot: 0   Port: 5 
Ifc 5     1-port 10/100 Ethernet             Slot: 0   Port: 6 
Ifc 6     1-port 10/100 Ethernet             Slot: 0   Port: 7 
Ifc 7     1-port 10/100 Ethernet             Slot: 0   Port: 8 
Ifc 8     1-port 10/100 Ethernet             Slot: 0   Port: 9 
Ifc 9     1-port 10/100 Ethernet             Slot: 0   Port: 10
Ifc 10    1-port 10/100 Ethernet             Slot: 0   Port: 11
Ifc 11    1-port 10/100 Ethernet             Slot: 0   Port: 12
Ifc 12    1-port 10/100 Ethernet             Slot: 0   Port: 13
Ifc 13    1-port 10/100 Ethernet             Slot: 0   Port: 14
Ifc 14    1-port 10/100 Ethernet             Slot: 0   Port: 15
Ifc 15    1-port 10/100 Ethernet             Slot: 0   Port: 16
Ifc 16    1-port 10/100 Ethernet             Slot: 1   Port: 1 
Ifc 17    1-port 10/100 Ethernet             Slot: 1   Port: 2 
Ifc 18    1-port 10/100 Ethernet             Slot: 1   Port: 3 
Ifc 19    1-port 10/100 Ethernet             Slot: 1   Port: 4 
Ifc 20    1-port 10/100 Ethernet             Slot: 1   Port: 5 
Ifc 21    1-port 10/100 Ethernet             Slot: 1   Port: 6 
Ifc 22    1-port 10/100 Ethernet             Slot: 1   Port: 7 
Ifc 23    1-port 10/100 Ethernet             Slot: 1   Port: 8 
Ifc 24    1-port 10/100 Ethernet             Slot: 2   Port: 1 
Ifc 25    1-port 10/100 Ethernet             Slot: 2   Port: 2 
Ifc 26    1-port 10/100 Ethernet             Slot: 2   Port: 3 
Ifc 27    1-port 10/100 Ethernet             Slot: 2   Port: 4 
Ifc 28    1-port 10/100 Ethernet             Slot: 2   Port: 5 
Ifc 29    1-port 10/100 Ethernet             Slot: 2   Port: 6 
Ifc 30    1-port 10/100 Ethernet             Slot: 2   Port: 7 
Ifc 31    1-port 10/100 Ethernet             Slot: 2   Port: 8 
Ifc 32    Link Aggregation                   Slot: 3   Port: 1 
Ifc 33    Link Aggregation                   Slot: 3   Port: 2 
Ifc 34    Link Aggregation                   Slot: 3   Port: 3 
Ifc 35    Link Aggregation                   Slot: 3   Port: 4 
Ifc 36    ATM                                Slot: 1   Port: 1 
Ifc 37    ATM                                Slot: 1   Port: 2 
Ifc 38    ATM                                Slot: 2   Port: 1 
Ifc 39    ATM                                Slot: 2   Port: 2 
 
Ifc 40    ATM Ethernet LAN Emulation       
Ifc 41    ATM Ethernet LAN Emulation       
Ifc 42    ATM Ethernet LAN Emulation       
Ifc 43    ATM Ethernet LAN Emulation       
Ifc 44    ATM Ethernet LAN Emulation       
Ifc 45    ATM Ethernet LAN Emulation       
Ifc 46    ATM Ethernet LAN Emulation       
Ifc 47    ATM Ethernet LAN Emulation       
Ifc 48    ATM Ethernet LAN Emulation       
Ifc 49    ATM Ethernet LAN Emulation       
Ifc 50    ATM Ethernet LAN Emulation       
Ifc 51    ATM Ethernet LAN Emulation       
Ifc 52    ATM Ethernet LAN Emulation       
Ifc 53    ATM Ethernet LAN Emulation       
Ifc 54    ATM Ethernet LAN Emulation       
Ifc 55    ATM Ethernet LAN Emulation       
Ifc 56    ATM Ethernet LAN Emulation       
Ifc 57    ATM Ethernet LAN Emulation       
Ifc 58    ATM Ethernet LAN Emulation       
Ifc 59    ATM Ethernet LAN Emulation       
Ifc 60    ATM Ethernet LAN Emulation       
Ifc 61    ATM Ethernet LAN Emulation       
Ifc 62    ATM Ethernet LAN Emulation       
Ifc 63    ATM Ethernet LAN Emulation       
Config>

patches
Displays the values of patch variables that have been entered using the patch command.

Example:

list patches
Patched variable             Value
 
mosheap-lowmark              20
 

users
Displays the users configured to access the system.

Example:

list users
USER           PERMISSION
joe            operations
mary           administrative
peter          monitor

vpd
Displays the hardware and software vital product data.

Network

Use the network command to enter the network interface configuration environment for supported networks. Enter the interface or network number as part of the command. (To obtain the interface number, use the CONFIG list device command.) The appropriate configuration prompt (for example, TKR Config>) will be displayed. See the network interface configuration chapters in this book for complete information on configuring your types of network interfaces.

Syntax:

network
interface#

Notes:

  1. If you change a user-configurable parameter, you may use the GWCON reset interface command, or you may reload the device for the change to take effect. To do so, enter the reload command at the OPCON prompt (*).

  2. Not all network interfaces are user-configurable. For interfaces that you cannot configure, you receive the message: That network is not configurable.

Patch

Use the patch command for modifying the device's global configuration. Patch variables are recorded in nonvolatile configuration memory and take effect immediately; you do not have to wait for the next restart of the device. This command should be used only for handling uncommon configurations. Anything that you commonly configure should still be handled by using the specific configuration commands. The following is a list of the current patch variables documented and supported for this release.

Syntax:

patch
bgp-subnets

mosheap-lowmark

bgp-subnets new value
If you want the BGP speaker to advertise subnet routes to its neighbors, set new value to 1. The default is 0.

mosheap-lowmark new value
This parameter specifies the percentage of free MOS heap memory, at which the device notifies the operator that an out-of-memory error is imminent. This notification allows the operator to take action to free up MOS heap memory before the device receives an error and stops.

When the operator receives notification, the operator can reconfigure the device and then reboot, minimizing the outage to the network. Specifying 0 for this parameter suppresses this warning.

Valid Values: 0 to 100

Default Value: 10

Note:You must specify the complete name of the patch variable that you want to change. You cannot use an abbreviated syntax for the patch name.

Performance

Use the performance command at the Config> prompt to enter the configuration environment for performance. See "Configuring and Monitoring Performance" for more information.

performance

Protocol

Use the protocol command at the Config> prompt to enter the configuration environment for the protocol software installed in the device.

Syntax:

protocol
[prot# or prot_name]

The protocol command followed by the desired protocol number or short name lets you enter a protocol's command environment. After you enter this command, the prompt of the specified protocol appears. From the prompt, you can enter commands specific to that protocol. To return to Config>, enter the exit command.

Notes:

  1. To see the names and numbers of the protocols in your software load, at the Config> prompt, enter list configuration.

  2. When you change a user-configurable parameter, you may be able to use the protocol's GWCON reset command, or you may have to restart the device for the change to take effect. To do so, enter the reload command at the OPCON prompt (*).

    The changes you make through CONFIG are kept in a configuration database in nonvolatile memory and are recalled when you restart the device.

Qconfig

Use the qconfig command to initiate Quick Config. Quick Config allows you to configure parameters for bridging and routing protocols without entering separate configuration environments.

Syntax:

qconfig
 

Set

Use the set command to configure various system-wide parameters.

Syntax:

set
contact-person . . .

data-link . . .

down-notify . . .

dump enable-mode

dump save-mode

dump target

global-buffers

hostname

inactivity-timer

input-low-water

location . . .

packet-size

prompt

receive-buffers

spare-interfaces

contact-person sysContact
Sets the name or identification of the contact person for this managed SNMP node. There is a limit of 80 characters for the sysContact name length.

This variable is for information purposes only and has no effect on device operation. It is useful for SNMP management identification of the system.

down-notify interface# # of seconds
Allows the user to specify the number of seconds before declaring an interface as being down. The normal maintenance packet interval is 3 seconds, and it takes four maintenance failures to declare the interface as down.

The set down-notify command is used primarily when tunneling LLC traffic over an IP network using OSPF. If an interface goes down, OSPF cannot detect it fast enough because of the length of time that it takes for an interface to be declared down. Therefore, LLC sessions would begin to timeout. You can set the down-notify timer to a lower value, allowing OSPF to sense that an interface is down quicker. This enables an alternate route to be chosen more quickly, which will prevent the LLC sessions from timing out.
Note:If the set down-notify command is executed on one end of a serial link, the same command must be performed at the other end of the link or the link may not come up and stay up.

Interface#
The number of the interface you are configuring.

# of seconds
The down notification time value that specifies the maximum time that will elapse before a down interface is marked as such. Large values will cause the device to ignore transient connection problems, and smaller values will cause the device to react more quickly. The range of values is 1 to 300 seconds and the default is 0, which sets the 3-second period. Setting the down notification time to 0 will restore the default time for that interface.

The list devices command will show the down notification time setting for any interface that has the default value overridden.

dump target
Specifies the location where the system memory image information will be written. Valid targets are the local hard disk, if one is present, or a remote host on a LAN.

If the target is a network, then IP and TFTP parameters of both the local LAN interface and the remote host are required. An additional parameter determines whether the file will be sent by TFTP as compressed or uncompressed data.

When the system dump file is sent by TFTP to the remote host, it will be written as multiple files, which must first be concatenated. For example, if the remote file was specified as /tmp/dump_to_host, and remote files are sent as compressed. The files written on the remote workstation are:

Depending on the total size of the dump, there may be additional files, named as:

In order to decompress and view the dump information, the files must be combined as follows into a single file (note that order is critical):

/tmp> cat dump_to_host0.cmp dump_to_host0.cm1 dump_to_host0.cm2 dump_to_host0.cm3 > dump_to_host0_cat.cmp

As a result, the combined file dump_to_host0_cat.cmp will contain a complete system memory dump image.

If the file was sent by TFTP as uncompressed, the file extensions are .unc, .un1, .un2, and .un3 instead of .cmp, .cm1, .cm2, and .cm3. The uncompressed files must also be concatenated to create a complete system memory dump image. For Example:

/tmp>cat dump_to_host0.unc dump_to_host0.un1 dump_to_host0.un2 dump_to_host0.un3 > dump_to_host0_cat
Note:The output file, dump_to_host0_cat. does not require a file extension because the file is not compressed.

global-buffers max#
Sets the maximum number of global packet buffers, which are the packet buffers used for locally originated packets. The default is to autoconfigure for the maximum number of buffers (up to 10000). To restore the default, set the value to 0. To display the setting for global-buffers, use the list configuration command.

hostname name
Adds or changes the device name. The device name is for identification only; it does not affect any device addresses. The name must be less than 78 characters and is case sensitive.

inactivity-timer #_of_min
Changes the setting of the Inactivity Timer. The Inactivity Timer logs out a user if the remote or physical console is inactive for the period of time specified in this command. This command affects only consoles that require login. The default setting of 0 turns the inactivity timer off, indicating that no logoff is performed, no matter how long a console remains inactive.

input-low-water interface# low_ #_of_receive_buffers
Allows you to configure an interface's low threshold for receive buffers. When the current number of receive buffers for an interface is less than the interface's low threshold, the packet is eligible for flow control (dropping) if the packet is queued on an output queue that has reached its high threshold (fair) value. See the description of the GWCON queue command for more details on flow control.

Lowering the low threshold value will make it less likely that packets from this interface will be dropped when sent on congested networks. However, lowering the value may negatively affect performance if underruns occur because the receive buffer queue is empty. Raising the value has the opposite effect. To determine if underruns are occurring, use the GWCON interface command and specify the interface number. To determine if packets from this interface are being dropped because the low threshold has been reached, use the GWCON (Talk 5) error command and look at the Input Flow Drop counter value for the interface.

The range of values is 1 to 255. The default is both product-specific and device-specific. The low threshold should be less than the requested number of receive buffers. Specifying a value of 0 restores the autoconfigured default.

Use the GWCON (Talk 5) buffer and queue commands to show the low threshold setting.

Interface# is the number of the interface you are configuring. Low_#_of_receive_buffers is the low threshold value.

location sysLocation
Sets the physical location of an SNMP node. There is a limit of 80 characters for the sysLocation name length. This variable is for information purposes only and has no effect on device operation. It is useful for SNMP management identification of the system.

packet-size max_packet_size_in_bytes
Establishes or changes the maximum size for global buffers and receive buffers. If you specify a value of 0 as the maximum packet size, the size of receive buffers for an interface is based on that interface's configured packet size and the packet size of global buffers are autoconfigured. If you specify a non-zero value, the configured value is used as the global buffer packet size and any interfaces that have a configured packet size that is larger than the maximum packet size will use the maximum packet size for their receive buffers. A value of 0 (for autoconfigure) is the default.
Attention:Use this command only under direct instructions from your service representative. Never use it to reduce packet size - only to increase it.

prompt user-defined-name
Adds a user-defined name as a prefix to all operator prompts, replacing the hostname.

The user-defined-name can be any combination of characters, numbers, and spaces up to 80 characters. Special characters may be used to request additional functions as described in Table 16.

Example:

set prompt
What is the new MOS prompt [y]? AnyHost 99
AnyHost 99 Config>

Table 16. Additional Functions Provided by the Set Prompt Level Command
Special Characters Function Provided by the Set Prompt Level Command
$n Displays the hostname. This is useful when you want the hostname included in the prompt. For example:
Config> set prompt
What is the new MOS prompt [y]? $n
hostname:: Config>
$t Displays the time. For example:
Config> set prompt.
What is the new MOS prompt [y]? $t
02:51:08[GMT-300] Config>
$d Displays the current date-month-year. For example:
Config> set prompt.
What is the new MOS prompt [y]? $d
26-Feb-1997 Config>
$v Displays the software VPD information in the following format: program-product-name Feature xxxx Vx.x PTFx RPQx
$e Erases one character after this combination within the user-defined prompt.
$h Erases one character before this combination within the user-defined prompt.
$_ Adds a carriage return to the user-defined prompt.
$$ Displays the $.
Note:You can combine these commands. For example:
Config> set prompt
What is the new MOS prompt [y]? $n::$d
hostname::26-Feb-1997 Config>

receive-buffers interface# max#
Adjusts the number of private receive buffers for most interfaces to increase the receive performance of an interface and to reduce flow control drops when the router is forwarding many packets from a fast interface to a slow interface. The range of values is 5 to 1000. To restore the default, specify a value of 0. Not all device types allow the maximum number of receive buffers to be configured or support up to 1000 receive buffers. Use Table 17 to determine the default and maximum values for each device type. This command does not enforce the maximum values shown in Table 17. It allows you to configure a maximum value that is not supported by a device. The effect of this command is shown by the GWCON buffer command. If you configure a valid maximum value, this value appears in the Input Req column of the GWCON buffer command output. If you configure a maximum value that is not supported by the device, the GWCON buffer command shows the default number of receive buffers in the Input Req column and a GW subsystem ELS message is logged.

Table 17. Default and Maximum Settings for Interfaces
Interface Default Maximum
ATM 80 1000
10/100 Mbps Ethernet 64 1000

Time

Use the time command to set the system clock and date, set the clock after a reboot, and to display the values on the user console. These values can then be used to time-stamp ELS messages.

Syntax:

time
host . . .

list

offset

set . . .

sync . . .

host IP_address
Sets the IP address of the RFC 868-compliant host that will be used as the time source. This is the address of a host which will respond to an empty datagram on UDP port 37 with a datagram containing the current time.

list
Displays all configured time-related parameters. This includes the current time (if set) and the source of the time (operator or IP address from which time was last received).
Example: time list
05:20:27  Wednesday December 7, 1994
Set by: operator
Time Host:  131.210.4.1
Sync Interval: 10 seconds GMT
Offset:  -300 minutes

offset minutes
Defines the time zone, in minutes, offset from GMT (Greenwich Mean Time). Note that values west of GMT are negative. For example, EST is 5 hours earlier than GMT, so the command would be time offset -300.

Valid values: -720 to 720

Default value: 0

set <year month date hour minute second>
Prompts you to set the current time. If you do not specify the entire time in the command, you are prompted for the remaining values. You can change the date as shown in the following example.
Example: time set
year [1996] 1997
month [12]?
date [6]? 7
hour [11]? 12
minute [3]?
second [2]?

sync seconds
Sets the period, in seconds, at which the device will poll the time host for the current time.

Unpatch

Use the unpatch command to restore the values of the patch variables entered with the patch command to their default values. See the patch command in "Patch" for details.

Syntax:

unpatch
variable_name
Note:You must specify the complete name of the patch variable to be restored.


[ Top of Page | Previous Page | Next Page | Table of Contents | Index ]