Nvidia Mlnx-Os User Manual
Nvidia Mlnx-Os User Manual
2
Using the “no” Command Form.............................................................. 39
Parameter Key.................................................................................. 40
CLI Pipeline Operator Commands ........................................................... 41
Secure Shell (SSH) ................................................................................. 45
Adding a Host and Providing an SSH Key ................................................... 45
Retrieving Return Codes When Executing Remote Commands .......................... 45
Web Interface Overview .......................................................................... 46
Password Hardening ........................................................................... 46
Changing Default Password ................................................................... 46
About Web UI ................................................................................... 48
Setup Menu ..................................................................................... 48
System Menu.................................................................................... 50
Security Menu .................................................................................. 50
Ports Menu ...................................................................................... 51
Status Menu ..................................................................................... 51
IB SM Mgmt Menu .............................................................................. 52
IB Router Menu ................................................................................. 53
UI Commands ....................................................................................... 53
CLI Session ...................................................................................... 53
Web Interface .................................................................................. 77
System Management..........................................................................87
Management Interfaces ........................................................................... 87
Configuring Management Interfaces with Static IP Addresses........................... 87
Configuring IPv6 Address on the Management Interface ................................. 88
Dynamic Host Configuration Protocol (DHCP) ............................................. 88
Default Gateway ............................................................................... 88
Configuring Hostname via DHCP (DHCP Client Option 12) ............................... 89
Management Interface Commands .......................................................... 89
Control Plane Policing (CoPP) ............................................................... 117
Chassis Management..............................................................................131
System Health Monitor ....................................................................... 132
Power Management ........................................................................... 134
Monitoring Environmental Conditions...................................................... 136
USB Access ..................................................................................... 137
3
Unit Identification LED....................................................................... 138
High Availability (HA)......................................................................... 138
System Reboot................................................................................. 141
Viewing Active Events ........................................................................ 142
Chassis Management Commands............................................................ 143
UNBREAKABLE-LINK® Adapter and Switch Technology ......................................166
LLR Mode ....................................................................................... 166
LLR Negotiation ............................................................................... 166
LLR Status ...................................................................................... 167
UNBREAKABLE-LINK® Switch Commands .................................................. 167
Upgrade/Downgrade Process....................................................................168
Important Pre-OS Upgrade Notes ........................................................... 168
Upgrading Operating System Software .................................................... 168
Upgrading HA Groups ......................................................................... 171
Upgrading MLNX-OS Software on Modular Switches ..................................... 171
Deleting Unused Images ..................................................................... 172
Downgrading OS Software ................................................................... 173
Upgrading System Firmware ................................................................ 176
Software Management Commands ......................................................... 178
Configuration Management......................................................................185
Saving a Configuration File .................................................................. 185
Loading a Configuration File ................................................................ 186
Restoring Factory Default Configuration .................................................. 186
Managing Configuration Files ............................................................... 187
Automated Periodic Configuration File Backup .......................................... 189
Configuration Management Commands.................................................... 190
mDNS................................................................................................214
mDNS Commands.............................................................................. 215
Virtual Machine....................................................................................215
Configuring Virtual Machine ................................................................. 215
Virtual Machine Commands.................................................................. 217
Network Management Interfaces ......................................................... 233
SNMP ................................................................................................233
Standard MIBs.................................................................................. 233
4
Private MIBs .................................................................................... 234
Proprietary Traps.............................................................................. 235
Configuring SNMP ............................................................................. 236
Resetting SNMPv3 Engine ID ................................................................. 236
Configuring an SNMPv3 User................................................................. 237
Configuring SNMP Notifications (Traps or Informs) ...................................... 238
SNMP SET Operations ......................................................................... 239
Additional Readings and Use Cases......................................................... 244
JSON API............................................................................................244
Authentication ................................................................................ 244
Sending the Request.......................................................................... 247
JSON Request Format ........................................................................ 247
JSON Response Format ....................................................................... 249
Supported Commands ........................................................................ 251
JSON Examples ................................................................................ 251
JSON Request Using WebUI .................................................................. 255
Additional Reading and Use Cases.......................................................... 257
Network Management Interface Commands ..................................................257
SNMP ............................................................................................ 258
JSON API........................................................................................ 274
Virtualization ................................................................................ 276
Limiting the Container’s Resources ............................................................276
Memory Resources Allocation Protocol .................................................... 276
CPU Resource Allocation Protocol .......................................................... 277
Upgrade Ramifications ...........................................................................277
Changing Docker Storage Driver ............................................................ 277
Docker Containers Commands ..................................................................278
docker .......................................................................................... 278
docker login.................................................................................... 279
docker logout .................................................................................. 279
commit ......................................................................................... 280
copy-sdk ........................................................................................ 281
remove image ................................................................................. 281
exec ............................................................................................. 282
5
label ............................................................................................ 283
load ............................................................................................. 283
pull .............................................................................................. 284
save ............................................................................................. 284
shutdown ....................................................................................... 285
start............................................................................................. 285
image upload .................................................................................. 287
file image upload ............................................................................. 288
show docker ................................................................................... 288
show docker containers ...................................................................... 289
show docker images .......................................................................... 291
show docker ps ................................................................................ 291
show docker labels ........................................................................... 292
show docker login............................................................................. 293
show docker stats............................................................................. 293
Telemetry, Monitoring, and Debuggability .............................................. 295
Logging .............................................................................................295
Monitor ......................................................................................... 295
Remote Logging ............................................................................... 295
Logging Protocol .............................................................................. 296
Logging Commands ........................................................................... 296
Link Diagnostic Per Port..........................................................................317
Link Diagnostic Commands .................................................................. 318
Signal Degradation Monitoring ..................................................................320
Effective-BER Monitoring .................................................................... 321
Configuring Signal Degradation Monitoring ............................................... 321
Signal Degradation Monitoring Commands ................................................ 322
Event Notifications ...............................................................................323
Supported Event Notifications and MIB Mapping ......................................... 323
SNMP Trap Notification....................................................................... 325
Terminal Notifications........................................................................ 325
Email Notifications ........................................................................... 326
Command Event Notifications .............................................................. 327
Buffer Histograms Monitoring ...................................................................341
6
Buffer Histograms and Thresholds Commands............................................ 341
Statistics and Alarms .............................................................................355
Commands ..................................................................................... 355
Management Information Bases (MIBs) ........................................................372
Calculating of entPhysicalIndex in the Entity MIB ....................................... 372
Examples ....................................................................................... 374
User Management, Authentication, & Security......................................... 376
User Management & Security ...................................................................376
User Accounts.................................................................................. 376
Authentication, Authorization, and Accounting (AAA) .................................. 376
User Re-authentication ...................................................................... 377
RADIUS .......................................................................................... 377
TACACS+ ........................................................................................ 377
LDAP ............................................................................................ 378
System Secure Mode.......................................................................... 378
User Management and Security Commands ............................................... 380
Cryptographic (X.509, IPSec) and Encryption ................................................417
System File Encryption....................................................................... 417
Cryptographic and Encryption Commands ................................................ 418
InfiniBand Switching........................................................................ 429
Node Name.........................................................................................429
Node Name Commands....................................................................... 429
Fabric ...............................................................................................430
Fabric Commands ............................................................................. 430
IB Router ...........................................................................................432
Configuring IB Router......................................................................... 433
Subnet Prefix Checking ...................................................................... 435
IB Router Commands ......................................................................... 436
InfiniBand Interface ..............................................................................439
Transceiver Information...................................................................... 439
High Power Transceivers ..................................................................... 440
Forward Error Correction .................................................................... 440
Break-Out Cables ............................................................................. 440
InfiniBand Interface Commands ............................................................ 443
7
Subnet Manager ...................................................................................457
Partitions ....................................................................................... 458
Adaptive Routing .............................................................................. 459
Scatter Ports ................................................................................... 459
GUID Routing Order........................................................................... 460
Bulk Update Mode ............................................................................ 460
SM Commands ................................................................................. 460
Subnet Manager High Availability...............................................................563
Joining, Creating or Leaving an InfiniBand Subnet ID ................................... 564
MLNX-OS Management Centralized Location ............................................. 564
High Availability Node Roles................................................................. 565
Configuring MLNX-OS SM HA Centralized Location ....................................... 565
Creating and Adding Systems to an InfiniBand Subnet ID ............................... 565
Restoring Subnet Manager Configuration.................................................. 566
SM HA Commands ............................................................................. 568
Appendixes................................................................................... 572
Appendix: Enhancing System Security According to NIST SP 800-131A ...................572
Web Certificate ............................................................................... 572
SNMP ............................................................................................ 573
HTTPS........................................................................................... 574
Code Signing ................................................................................... 575
SSH .............................................................................................. 575
LDAP ............................................................................................ 576
Appendix: Splunk Integration with NVIDIA Products .........................................577
Getting Started with Splunk................................................................. 577
Switch Configuration ......................................................................... 578
Adding a Task .................................................................................. 578
Retrieving Data from TCP and UDP Ports .................................................. 579
SNMP Input to Poll Attribute Values and Catch Traps.................................... 581
Appendix: Show Commands Not Supported By JSON API....................................584
Document Revision History ................................................................ 588
8
Welcome to MLNX-OS Documentation
NVIDIA® MLNX-OS® operating system, enables the management and configuration of NVIDIA's
InfiniBand switch system platforms.
MLNX-OS provides a full suite of management options, including support for UFM® (Unified Fabric
Manager), SNMPv1, 2, 3, and web user interface (Web UI). In addition, it incorporates a familiar
industry-standard CLI, which enables administrators to easily configure and manage the system.
These pages provide information about the scope, organization, and command line interface of
MLNX-OS as well as configuration examples.
Software Download
For common questions about the Enterprise Account please see the following webpage:
nvid.nvidia.com/NvidiaUtilities/#/needHelp
Technical Support
Customers who purchased NVIDIA products directly from NVIDIA are invited to contact us through the
following methods:
• E-mail: [email protected]
• Enterprise Support page: https://www.nvidia.com/en-us/support/enterprise
Customers who purchased NVIDIA M-1 Global Support Services, please see your contract for details
regarding Technical Support.
Customers who purchased NVIDIA products through an NVIDIA-approved reseller should first seek
assistance through their reseller.
A list of the changes made to the User Manual are provided in User Manual Revision History.
9
Overview
Intended Audience
These pages are intended for network administrators who are responsible for configuring and
managing NVIDIA’s switch platforms.
Related Documentation
The following table lists the documents referenced in this User Manual.
Document Name Description
System Hardware User This document contains hardware descriptions, LED assignments, and hardware
Manual specifications, among other things
Switch Product Release Please look up the relevant switch system/series release note file
Notes
Terminology
Term Description
ARP
Address Resolution Protocol. A protocol that translates IP addresses into MAC addresses for
communication over a local area network (LAN).
CLI
Command Line Interface. A user interface in which you type commands at the prompt.
DCBX
Domain Name System. A hierarchical naming system for devices in a computer network.
DHCP
The Dynamic Host Configuration Protocol (DHCP) is an automatic configuration protocol
used on IP networks.
Modular switch A high density InfiniBand chassis switch system.
DNS
Domain Name System. A hierarchical naming system for devices in a computer network.
Fabric The use of a set of tools (APIs) to configure, discover, and manage and a group of devices
management organized as a connected fabric.
10
Term Description
FTP/TFTP/sFTP
File Transfer Protocol (FTP) is a standard network protocol used to transfer files from one
host to another over a TCP-based network, such as the Internet.
Gateway A network node that interfaces with both InfiniBand and Ethernet, using different network
protocols.
GID Global Identifier. A 128-bit number used to identify a Port on a network adapter (see
below), a port on a Router, or a Multicast Group.
GUID Globally Unique Identifier. A 64-bit number that uniquely identifies a device or component
in a subnet.
HA High Availability. A system design protocol that provides redundancy of system components,
thus enables overcoming single or multiple failures in minimal downtime.
Host A computer platform executing an Operating System which may control one or more
network adapters.
IB InfiniBand
LID Local Identifier. A 16 bit address assigned to end nodes by the subnet manager. Each LID is
unique within its subnet.
LLDP Link Layer Discovery Protocol. A vendor neutral link layer protocol used by network devices
to advertise their identify, capabilities and for neighbor discovery.
MAC A Media Access Control address (MAC address) is a unique identifier assigned to network
interfaces for communications on the physical network segment. MAC addresses are used
for numerous network technologies and most IEEE 802 network technologies including
Ethernet.
MTU Maximum Transfer Unit. The maximum size of a packet payload (not including headers)
that can be sent /received from a port.
Network Adapter A hardware device that allows for communication between computers in a network.
RADIUS
Remote Authentication Dial In User Service. A networking protocol that enables AAA
centralized management for computers to connect and use a network service.
RDMA Remote Direct Memory Access. Accessing memory in a remote side without involvement of
the remote CPU.
SA Subnet Administrator (SA) is the interface for querying and manipulating subnet
management data.
SCP Secure Copy or SCP is a means of securely transferring computer files between a local and
a remote host or between two remote hosts. It is based on the Secure Shell (SSH) protocol.
SM Subnet Manager. An entity that configures and manages the subnet, discovers the network
topology, assign LIDs, determines the routing schemes and sets the routing tables. There is
only one master SM and possible several slaves (Standby mode) at a given time. The SM
administers switch routing tables thereby establishing paths through the fabric.
SNMP Simple Network Management Protocol. A network protocol for the management of a
network and the monitoring of network devices and their functions.
NTP Network Time Protocol. A protocol for synchronizing computer clocks in a network.
SSH Secure Shell. A protocol (program) for securely logging in to and running programs on
remote machines across a network. The program authenticates access to the remote
machine and encrypts the transferred information through the connection.
syslog A standard for forwarding log messages in an IP network.
11
Term Description
TACACS+ Terminal Access Controller Access-Control System Plus. A networking protocol that enables
access to a network of devices via one or more centralized servers. TACACS+ provides
separate AAA services.
System Features
Feature Detail
• FTP
File management • TFTP
• SCP
• SNMP v1,v2c,v3
Network management interfaces • JSON
Security • SSH
• Telnet
• RADIUS
• TACACS+
12
InfiniBand Features
Feature Detail
• OpenSM
Subnet • Partitions
manager • High availability
13
Getting Started
The procedures described in this page assume that you have already installed and powered on your
switch according to the instructions in the Hardware Installation Guide, which was shipped with the
product.
Due to California Senate Bill No. 327,starting from software version 3.8.2000, Admin and
Monitor passwords will need to be typed in manually—no automatic passwords will be
created by default.
When the reset button is held for 15 seconds, the management module is reset and the
password is deleted. You will then be able to enter without a password and make a new
password for the user admin.
Any account created with admin privileges can change all passwords of other user accounts,
including other user accounts with admin privileges.
14
Make sure to connect to the console RJ-45 port of the switch and not to the MGT
port.
DHCP is enabled by default over the MGT port. Therefore, if you have configured
your DHCP server and connected an RJ-45 cable to the MGT port, simply log in using
the designated IP address.
This step may be skipped if the DHCP option is used and an IP is already configured
for the MGT port.
Parameter Setting
... .
This terminal is not active for input or output while booting.
Boot Menu .
-------------------------------------------------------------------
0: <image #1>
1: <image #2>
-------------------------------------------------------------------
The boot menu features a countdown timer. It is recommended to allow the timer to run out
by not selecting any of the options.
15
4. Login as admin and use admin as password. If the machine is still initializing, you might not
be able to access the CLI until initialization completes. As an indication that initialization is
ongoing, a countdown of the number of remaining modules to be configured is displayed in
the following format: “<no. of modules> Modules are being configured”.
5. Go through the Switch Management configuration wizard.
IP configuration by DHCP:
Wizard Session Display (Example) Comments
Do you want to use the wizard for initial You must perform this configuration the first time
configuration? yes
you operate the switch or after resetting the
switch to the factory defaults. Type “yes” and
then press <Enter>.
Step 1: Hostname? [switch-1] If you wish to accept the default hostname, then
press <Enter>. Otherwise, type a different
hostname and press <Enter>.
Step 2: Use DHCP on mgmt0 interface? [yes]
Perform this step to obtain an IP address for the
switch. (mgmt0 is the management port of the
switch.)
- If you wish the DHCP server to assign the IP
address, type “yes” and press <Enter>.
If you type “no” (no DHCP), then you will be asked
whether you wish to use the “zeroconf”
configuration or not. If you enter “yes” (yes
Zeroconf), the session will continue as shown in
the "IP zeroconf configuration" table.
If you enter “no” (no Zeroconf), then you need to
enter a static IP, and the session will continue as
shown in the "Static IP configuration" table.
Step 3: Enable IPv6 [yes]
Perform this step to enable IPv6 on management
ports. The default is "yes" (enabled).
If you enter “no” (no IPv6), then you will
automatically be referred to Step 5.
Step 4: Enable IPv6 autoconfig (SLAAC) on mgmt0
Perform this step to enable stateless address
interface? [no]
autoconfig on external management port. The
default is "no" (disabled).
If you wish to enable it, type “yes” and press
<Enter>.
Step 5: Use DHCPv6 on mgmt0 interface? [yes] Perform this step to enable DHCPv6 on the MGMT0
interface.
Step 6: Update time? Perform this step to change the time configured.
Press <enter> to leave the current time.
Step 7: Enable password hardening? [yes]
Perform this step to enable/disable password
hardening on your machine. If enabled, new
passwords will be checked upon configured
restrictions. The default is "yes" (enabled).
If you wish to disable it, enter “no”.
16
Wizard Session Display (Example) Comments
Step 8: Admin password (Must be typed)?
To avoid illegal access to the machine, please type
<new_password>
a password and then press <Enter>.
Starting from the 3.8.2000 release, the user must
type in the admin password upon initial
configuration. Due to Senate Bill No. 327, this
stage is required and cannot be skipped.
Step 9: Confirm admin password? <new_password> Confirm the password by re-entering it. Note that
password characters are not printed.
Step 10: Monitor password (Must be typed)?
To avoid illegal access to the machine, please type
<new_password>
a password and then press <Enter>.
Starting from the 3.8.2000 release, the user must
type in the admin password upon initial
configuration. Due to Senate Bill No. 327, this
stage is required and cannot be skipped.
Step 11: Confirm monitor password?
Confirm the password by re-entering it. Note that
<new_password>
password characters are not printed.
You have entered the following information:
The wizard displays a summary of your choices and
Hostname: <switch name>
Use DHCP on mgmt0 interface: yes then asks you to confirm the choices or to re-edit
Enable IPv6: yes them.
Enable IPv6 autoconfig (SLAAC) on mgmt0 Either press <Enter> to save changes and exit, or
interface: yes
Enable DHCPv6 on mgmt0 interface: no enter the configuration step number that you wish
Update time: <current time> to return to.
Enable password hardening: yes To run the command “configuration jump-start”
Admin password (Enter to leave unchanged):
(CHANGED) you must be in Config mode.
To change an answer, enter the step number to
return to.
Otherwise hit <enter> to save changes and exit.
Choice: <Enter>
Configuration changes saved.
To return to the wizard from the CLI, enter the
“configuration jump-start” command
from configuration mode. Launching CLI...
<switch name> [standalone: master] >
17
Wizard Session Display (Example) Comments
Step 2: Use DHCP on mgmt0 interface? [yes]
Perform this step to obtain an IP address for the
switch. (mgmt0 is the management port of the
switch.)
If you wish the DHCP server to assign the IP
address, type “yes” and press <Enter>.
If you type “no” (no DHCP), then you will be asked
whether you wish to use the “zeroconf”
configuration or not. If you enter “yes” (yes
Zeroconf), the session will continue as shown in
the IP zeroconf configuration" table.
If you enter “no” (no Zeroconf), then you need to
enter a static IP, and the session will continue as
shown in the "Static IP configuration" table.
Step 3: Enable IPv6 [yes]
Perform this step to enable IPv6 on management
ports.
If you wish to enable IPv6, type “yes” and press
<Enter>.
If you enter “no” (no IPv6), then you will
automatically be referred to Step 5.
Step 4: Enable IPv6 autoconfig (SLAAC) on mgmt0
Perform this step to enable StateLess address
interface
autoconfig on external management port.
If you wish to enable it, type “yes” and press
<Enter>.
If you wish to disable it, enter “no”.
Step 5: Use DHCPv6 on mgmt0 interface? [yes] Perform this step to enable DHCPv6 on the MGMT0
interface.
Step 6: Admin password (Press <Enter> to leave
To avoid illegal access to the machine, please type
unchanged)? <new_password>
a password and then press <Enter>.
Step 7: Confirm admin password? <new_password>
Confirm the password by re-entering it.
(this step only happens if you change the Note that password characters are not printed.
password)
18
Wizard Session Display (Example) Comments
You have entered the following information:
The wizard displays a summary of your choices and
Hostname: <switch name>
Use DHCP on mgmt0 interface: yes then asks you to confirm the choices or to re-edit
Enable IPv6: yes them.
Enable IPv6 autoconfig (SLAAC) on mgmt0 Either press <Enter> to save changes and exit, or
interface: yes
Enable DHCPv6 on mgmt0 interface: yes enter the configuration step number that you wish
Admin password (Enter to leave unchanged): to return to.
(CHANGED) To run the command “configuration jump-start”
HA Chassis IP address: 10.6.166.200
HA Chassis Management IP netmask: 255.255.255.0 you must be in Config mode.
HA Chassis IPv6 address:
fdfd:fdfd:7:145::1000:4814
HA Chassis Management IPv6 masklen: 33
To change an answer, enter the step number to
return to.
Otherwise hit <enter> to save changes and exit.
Choice: <Enter>
Configuration changes saved.
To return to the wizard from the CLI, enter the
“configuration jump-start” command
from configuration mode. Launching CLI...
<switch name> [standalone: master] >
Static IP configuration:
Wizard Session Display (Example)
Do you want to use the wizard for initial configuration? y
Step 1: Hostname? [switch-112126]
Step 2: Use DHCP on mgmt0 interface? [yes] n
Step 3: Use zeroconf on mgmt0 interface? [no]
Step 4: Primary IP address? 192.168.10.4
Mask length may not be zero if address is not zero (interface mgmt0)
Step 5: Netmask? [0.0.0.0] 255.255.255.0
Step 6: Default gateway? 192.168.10.1
Step 7: Primary DNS server?
Step 8: Domain name?
Step 9: Enable IPv6? [yes] yes
Step 10: Enable IPv6 autoconfig (SLAAC) on mgmt0 interface? [no] no
Step 11: Update time? [yyyy/mm/dd hh:mm:ss]
Step 12: Enable password hardening? [yes] yes
Step 13: Admin password (Enter to leave unchanged)?
You have entered the following information:
Hostname: switch-112126
Use DHCP on mgmt0 interface: no
Use zeroconf on mgmt0 interface: no
Primary IP address: 192.168.10.4
Netmask: 255.255.255.0
Default gateway: 192.168.10.1
Primary DNS server:
Domain name:
Enable IPv6: yes
Enable IPv6 autoconfig (SLAAC) on mgmt0 interface: no
Update time: yyyy/mm/dd hh:mm:ss
Enable password hardening: yes
Admin password (Enter to leave unchanged): (unchanged)
To change an answer, enter the step number to return to.
Otherwise hit <enter> to save changes and exit.
Choice:
Configuration changes saved.
To return to the wizard from the CLI, enter the “configuration jump-start” command from configure
mode. Launching CLI...
<hostname>[standalone: master] >
19
IP zeroconf configuration:
Wizard Session Display (Example)
Configuration wizard
Hostname: switch-112126
Use DHCP on mgmt0 interface: no
Use zeroconf on mgmt0 interface: yes
Default gateway: 192.168.10.1
Primary DNS server:
Domain name:
Enable IPv6: yes
Enable IPv6 autoconfig (SLAAC) on mgmt0 interface: yes
Update time: yyyy/mm/dd hh:mm:ss
Enable password hardening: yes
Admin password (Enter to leave unchanged): (unchanged)
Choice:
To return to the wizard from the CLI, enter the “configuration jump-start”
command from configure mode. Launching CLI...
<hostname> [standalone: master] >
20
Wizard Session Display (Example)
Configuration wizard
To return to the wizard from the CLI, enter the “configuration jump-start”
command from configure mode. Launching CLI...
<hostname> [standalone: master] >
6. Check the mgmt0 interface configuration before attempting a remote (for example, SSH)
connection to the switch. Specifically, verify the existence of an IP address.
Rx:
11700449 bytes
55753 packets
0 mcast packets
0 discards
0 errors
0 overruns
0 frame
Tx:
5139846 bytes
28452 packets
21
0 discards
0 errors
0 overruns
0 carrier
0 collisions
1000 queue len
NVIDIA Switch
Please read and accept the End User License Agreement located at:
https://www.mellanox.com/related-docs/prod_management_software/MLNX-OS_EULA.pdf
switch >
22
Starting the Web User Interface (WebUI)
To start a WebUI connection to the switch platform, follow the steps below:
WebUI access is enabled by default. To disable web access, run the command “no web
http enable” or “no web https enable” on the CLI.
1. Set up an Ethernet connection between the switch and a local network machine using a
standard RJ-45 connector.
2. Open a web browser that is Firefox, Chrome, Internet Explorer, or Safari.
3. Type the IP address of the switch or its DNS name in the following format: https://
<switch_IP_address>.
4. Log into the switch (default user name is admin, password admin).
23
6. The Welcome popup appears. After reading through the content, click OK to continue.
To reach the OS documentation, click on the links under the Documentation heading.
The link under What’s New takes leads to the Changes and New Features section of the switch
OS Release Notes. You may also tick the box to not show this popup again. To see this window
again, click “Product Documents” on the upper right corner of the WebUI.
24
Zero-touch Provisioning
Zero-Touch Provisioning (ZTP) automates initial configuration of switch systems at boot time. It
helps minimize manual operation and reduce customer initial deployment cost. ZTP allows for
automatic upgrade of the switch with a specified OS image, setting up initial configuration
database, and to load and run a container image file.
The initial configuration is applied using a regular text file. The user can create such a configuration
file by editing the output of a “show running-config” command.
Only a textual configuration file is supported.
The user-defined docker image can be used by customers to run their own applications in a
sandbox on their platform. They can therefore also be used for automating initial
configuration.
Only one docker container can be launched in ZTP.
Running DHCP-ZTP
There is no explicit command to enable ZTP. It is enabled by default. Disabling it is performed by a
user-initiated configuration save (using the command “configuration write”). The only way to re-
enable ZTP is to run a “reset factory” command, clearing the configuration of the switch and
rebooting the system.
ZTP is based on DHCP. For ZTP to work, the software enables DHCP by default on all its management
interfaces. The switch OS requests option 66 (tftp-server-name) and 67 (bootfile-name) from the
DHCPv4 server or option 58 (bootfile-url) from the DHCPv6 server, and waits for the DHCP responses
containing file URLs. The DHCP server must be configured to send back the URLs for the software
image, configuration file, and docker container image via these two options. Option 66 would
25
contain the URL prefix to the location of the files, option 67 would contain the name of files, and
option 58 would contain the complete URLs of files. The format of these two options is a string list
separated by commas. The list items are placed in a fixed order:
The item value can be empty, but the comma shall not be omitted.
To have DHCP server discern the proper files based on switch-specific information, the OS must
provide identifying information for the server to classify the switches. In addition, the OS attaches
option 43 (vendor-specific information) and option 60 (vendor class identifier) in DHCPv4 requests
and option 17 (vendor-opts) in DHCPv6. Option 60 is set as string “Mellanox” and options 17 and 43
contain the following specific sub-options:
• System Model
• Chassis Part Number
• Chassis Serial Number
• Management MAC
• System Profile
• MLNX-OS Release Version
DHCP_VENDOR_ENCAPSULATED_SUBOPTION_TLV_TYPE_MODEL 1
DHCP_VENDOR_ENCAPSULATED_SUBOPTION_TLV_TYPE_PARTNUM 2
DHCP_VENDOR_ENCAPSULATED_SUBOPTION_TLV_TYPE_SERIAL 3
DHCP_VENDOR_ENCAPSULATED_SUBOPTION_TLV_TYPE_MAC 4
DHCP_VENDOR_ENCAPSULATED_SUBOPTION_TLV_TYPE_PROFILE 5
DHCP_VENDOR_ENCAPSULATED_SUBOPTION_TLV_TYPE_RELEASE 6
Upon receiving such DHCP requests from a client, the server should be able to map the switch-
specific information to the target file URLs according to predefined rules.
Once the OS receives the URLs from the DHCP server, it executes ZTP as follows:
If the software image URL is not specified, this step is skipped. Otherwise:
a. Perform disk space cleanup if necessary and fetch the image if it does not exist locally
b. Resolve the image version:
c. If it is already installed on active partition, proceed to step 2
d. If it is installed on a standby partition, switch partition and reboot
e. If it is not installed locally, install it and switch to the new image and then reboot
f. If a reboot occurs, ZTP performs step 1 again and no image upgrade will occur
If configuration file URL is not specified, skip this step. Otherwise:
a. Fetch the configuration file
b. Apply the configuration file
Skip these steps if a docker image file URL is not specified. Otherwise:
a. Fetch the docker image file
b. Load the docker image
c. Clean up the docker images with the same name and different tag.
d. Start the container based on the image
e. Remove the downloaded docker image file
26
While performing file transfer via HTTP, the same information as DHCP option 43 is
expected to be carried in a HTTP GET request. This switch software supports the following
proprietary HTTP headers:
• MlnxSysProfile
• MlnxMgmtMac
• MlnxSerialNumber
• MlnxModelName
• MlnxPartNumber
• MlnxReleaseVersion
If some sort of failure occurs, the switch waits a random number of seconds between 1 and 20 and
reattempts the operation. The switch attempts this up to 10 times.
ZTP progress is printed to terminals including console and active SSH sessions.
#<CHASSIS_MASTER>
chassis ha bip 10.7.146.34 /24
#</CHASSIS_MASTER>
27
DHCPv4 Configuration Example
The following is a URL configuration example for ISC DHCPv4 server:
host master {
hardware ethernet E4:1D:2D:5B:72:80;
fixed-address 3.1.2.13;
option tftp-server-name "scp://<user>:<password>@3.1.3.100/ztp/,scp://
<user>:<password>@3.1.3.100/ztp/,scp://
<user>:<password>@3.1.3.100/ztp/";
option bootfile-name "image-X86_64-3.6.4612.img, switch-1.conf, ubuntu.img.gz";
}
host master {
......
option dhcp6.bootfile-url "scp://<user>:<password>@[2000::1]/ztp/image-X86_64-
3.6.4612.img, scp://<user>:<password>@[2000::1]/ztp/
switch.conf, scp://<user>:<password>@[2000::1]/ztp/
ubuntu.img.gz";
}
host master {
......
option dhcp6.bootfile-url "scp://<user>:<password>@[2000::1]/ztp/image-X86_64-
23.01.0100.img, scp://<user>:<password>@[2000::1]/ztp/
switch.conf, scp://<user>:<password>@[2000::1]/ztp/
ubuntu.img.gz";
}
ZTP Commands
no zero-touch suppress-write
no zero-touch suppress-write
28
Syntax Description N/A
Default Enabled
Configuration Mode config
History
3.6.5000
3.9.2400: Added note
Example switch (config) # no zero-touch suppress-write
show zero-touch
Related Commands
Notes • When ZTP is active, “configuration write” is suppressed because it may
interfere with ZTP operation. Therefore, after running “no zero-touch
suppress-write” if “configuration write” is performed, then ZTP is disabled
as a consequence of the database save.
• To automatically save the configuration at the end of applying a
configuration via ZTP, append the following two commands to the end of the
config files. The first command will turn off the ZTP suppress-write, then
the configuration write command should work.
• no zero-touch suppress-write
• configuration write
zero-touch abort
zero-touch abort
Default Enabled
History 3.6.5000
switch (config) # zero-touch abort
Example Zero-touch failed [Zero-touch is aborted by operator]
Zero-touch provisioning will be aborted
Notes
29
show zero-touch
show zero-touch
Default N/A
History 3.6.5000
switch (config) # show zero-touch
Zero-Touch status:
Example Active: yes
Status: Waiting for zero-touch start
Suppress-write: no
Configured by zero-touch: no
Configuration changed after zero-touch: no
Notes
Licenses
The software package can be extended with premium features. Installing a license allows you to
access the specified premium features
This section is relevant only to switch systems with an internal management capability.
30
switch (config) # license install <license key>
Make sure that the “Valid” and “Active” fields both indicate “yes”.
5. Save the configuration to complete the license installation. Run:
If you do not save the installation session, you will lose the license at the next
system start up.
3. Enter your license key(s) in the text box. If you have more than one license, please enter
each license in a separate line. Click “Add Licenses” after entering the last license key to
install them.
If you wish to add another license key in the future, you can simply enter it in the
text box and click “Add Licenses” to install it.
31
4. All installed licenses should now be displayed.
If you do not save the installation session, you will lose the installed licenses at the
next system boot.
32
-----------------------------------------------------------------------------
Module Part Number Serial Number Asic Rev. HW Rev.
-----------------------------------------------------------------------------
CHASSIS MSB7800-ES2F MT1602X17464 N/A A1
MGMT MSB7800-ES2F MT1602X17464 0 A1
FAN1 MTEF-FANF-A MT1602X16943 N/A A3
FAN2 MTEF-FANF-A MT1602X16944 N/A A3
FAN3 MTEF-FANF-A MT1602X16956 N/A A3
FAN4 MTEF-FANF-A MT1602X16957 N/A A3
PS1 MTEF-PSF-AC-A MT1601X09908 N/A A3
3. Provide your authorized NVIDIA reseller with the chassis serial number for your system.
4. Once you receive the license key, you can install the license as described in the previous
pages.
License Commands
33
license delete
Default N/A
History 3.4.1100
switch (config) # license delete <license-number>
Example
Related Commands
license install
show licenses
Notes Before deleting a license from a switch which is configured to a system profile other
than its default, the user must first disable all interfaces and then return the switch to
its default system profile.
license install
license install<license-number>
Default N/A
History 3.4.1100
switch (config) # licenses install <license-key>
Example
Related Commands
license delete
show licenses
Notes
34
show licenses
show licenses
Related Commands
license delete
license install
Notes
For each license, the following is displayed:
• A unique ID which is a small integer
• The text of the license key as it was added
• Whether or not it is valid and active
• Which feature(s) it is activating
• A list of all licensable features specifying whether or not it is currently activated
by a license
35
User Interfaces
The following pages provide information on the interfaces available for to manage and validate the
status of the system.
• LED Indicators
• Command Line Interface (CLI)
• Secure Shell (SSH)
• Web Interface Overview
• UI Commands
LED Indicators
For information regarding LED indicators, go to the link of the relevant ASIC:
• SN2000 system LED indicators
• SN3000 system LED indicators
• SN4000 system LED indicators
MLNX-OS is equipped with an industry-standard command line interface (CLI). The CLI is accessed
through SSH or Telnet sessions or directly through the console port on the front panel, if it exists.
CLI Modes
The CLI can be in one of various modes. Each of the modes makes available a certain group (or
level) of commands for execution. The following are some of the CLI configuration modes:
Configuration Mode Description
Standard When the CLI is launched, it begins in Standard mode. This is the most restrictive
mode and only has commands to query a restricted set of state information. Users
cannot take any actions that directly affect the system, nor can they change any
configuration.
Enable The "enable" command moves the user to Enable mode. This mode offers commands
to view all state information and take actions, such as rebooting the system, but it
does not allow any configurations to be changed. The commands accessible in this
mode are a superset of those in Standard mode.
36
Configuration Mode Description
Config The "configure terminal" command moves the user from Enable mode to Config
mode. Config mode is allowed only for user accounts with the “admin” role or
capabilities. This mode has a full, unrestricted set of commands to view anything,
take any action, and change any configuration. Its commands are a superset of
those in Enable mode. To return to Enable mode, enter the command "exit" or "no
configure".
Note that moving directly between Standard and Config mode is not possible.
Config interface Config Interface Management mode is a configuration mode for management
management interface mgmt0, mgmt1, and loopback.
Any command mode Several commands, such as “show” commands, can be applied within any context.
Syntax Conventions
To help identify the different parts of a CLI command, the following table explains conventions of
presenting the syntax of commands.
Syntax Description Example
Convention
[ ] Square Indicate optional parameters. Only one parameter out of the [destination-ip |
brackets parameters listed with in the brackets can be used—the user destination-port |
cannot have a combination of the parameters unless stated destination-mac]
otherwise.
{ } Braces Indicate alternatives or variables that are required for the [mode {active | on |
parameter in square brackets. passive}]
Do not use the angled or square brackets, vertical bar, or braces in command lines. This
guide uses these symbols only to show the different entry types.
CLI commands and options are in lowercase and are case-sensitive.
For example, when entering the enable command, "enable" must be all in lowercase; it
cannot be ENABLE or Enable. Text entries created are also case-sensitive.
37
Getting Help
Context-sensitive help may be requested at any time by pressing “?” in the command line. This will
show a list of choices for the word that is currently selected or, if nothing has been typed yet, will
show a list of top-level commands.
For example, typing "?" in the command line in Standard mode, will provide a link of the following
available commands.
switch > ?
cli Configure CLI shell options
enable Enter enable mode
exit Log out of the CLI
help View description of the interactive help system
no Negate or clear certain configuration options
show Display system configuration or statistics
slogin Log into another system securely using ssh
switch Configure switch on system
telnet Log into another system using telnet
terminal Set terminal parameters
traceroute Trace the route packets take to a destination
switch >
Typing a legal string and then pressing “?” without a space character before it, will provide either a
description of the command that was typed so far or the possible command/parameter completions.
Typing “?” after a space character and “<cr>” is shown, means that, so far, a complete command
has been typed. Pressing Enter (carriage return) will execute the command.
?
show ?
show c?
show clock?
show clock ?
show interfaces ? (from enable mode)
switch # c<tab>
clear cli configure
switch # c
This signifies that there are three commands that start with the letter “c”: "clear", "cli", and
"configure".
38
Prompt and Response Conventions
The prompt always begins with the hostname of the system. What follows depends on what
command mode the user is in. To demonstrate by example, assuming the machine name is “switch”,
the prompts for each of the modes are:
Commands entered do not print any response and simply show the command prompt after pressing
<Enter>.
If an error is encountered while executing a command, the response will begin with “%”, followed
by a description of the error.
39
Auto-logout: disabled
Paging: enabled
Progress tracking: enabled
Prefix modes: enabled
...
// 4. Re-enable auto-logout after 15 minutes
switch (config) # cli session auto-logout 15
// 5. Display the final CLI session options
switch (config) # show cli
CLI current session settings:
Maximum line size: 8192
Terminal width: 157 columns
Terminal length: 60 rows
Terminal type: xterm
Auto-logout: 15 minutes
Paging: enabled
Progress tracking: enabled
Prefix modes: enabled
...
Parameter Key
This page provides a key to the meaning and format of angle-bracketed parameters in the
commands that are listed in this document.
Parameter Description
<ifname> An interface name (e.g., “mgmt0”, “mgmt1”, “lo” (loopback), and so forth).
<log level> A syslog logging severity level. Possible values, from least to most severe, are as follows:
“debug”, “info”, “notice”, “warning”, “error”, “crit”, “alert”, “emerg”.
<GUID> Globally unique identifier. A number that uniquely identifies a device or component.
<MAC address> A MAC address. The segments may be 8 bits or 16 bits at a time, and may be delimited by
“:” or “.” (e.g., “11:22:33:44:55:66”, “1122:3344:5566”, “11.22.33.44.55.66”, or
“1122.3344.5566”).
<netmask> A netmask (e.g., “255.255.255.0”) or mask length prefixed with a slash (e.g., “/24”). Both
examples express the same information in different formats.
<network An IPv4 network prefix specifying a network. Used in conjunction with a netmask to
prefix> determine which bits are significant. e.g., “192.168.0.0”.
<regular An extended regular expression as defined by the “grep” in the main page. (The value
expression> provided here is passed on to “grep -E”.)
<node id> ID of a node belonging to a cluster. This is a numerical value greater than zero.
40
Parameter Description
<TCP port> A TCP port number in the full allowable range [0...65535].
<URL> A normal URL, using any protocol that wget supports, including HTTP, HTTPS, FTP, SFTP, and
TFTP or a pseudo-URL specifying an scp file transfer. The scp pseudo-URL format is scp://
username:password@hostname/path/filename.
Note that the path is an absolute path. Paths relative to the user's home directory are not
currently supported. Because the implementation of FTP does not support authentication,
use SCP or SFTP for that.
Note also that omitting “:password” part, may require entering the password in a follow-up
prompt, where it can be typed in securely (without the characters being echoed). This
prompt will occur if the “cli default prompt empty-password” setting is true; otherwise, the
CLI will assume that no password is desired. Including the “:” character, will be taken as an
explicit declaration that the password is empty and no prompt will appear.
The MLNX-OS CLI supports filtering “show” commands to display lines containing or excluding
certain phrases or characters. To filter the outputs of the “show” commands use the following
format:
switch (config) # <show command> | {include | exclude} <extended regular expression> [<ignore-case>] [next <lines>]
[prev <lines>]
The filtering parameters are separated from the show command they filter by a pipe character
(“|”). Quotation marks may be used to include or exclude a string including space, and multiple
filters can be used simultaneously as shown in the example below.
switch (config) # <show command> | {include <extended regular expression>} [<ignore-case>] [next <lines>] [prev
<lines>] | exclude <extended regular expression> [<ignore-case>] [next <lines>] [prev <lines>]]
Example:
41
CLI Monitoring Option “watch”
MLNX-OS
Running this command displays a show-command output that is updated at a time interval specified
by the “interval” parameter (2 seconds is the default).
The “diff” parameter highlights the differences between each iteration of the command.
For example running the command “show power | watch diff interval 1” yields something similar to
the following:
-----------------------------------------------------------------------
Module Device Sensor Power Voltage Current Feed Status
[Watts] [Watts] [Amp]
-----------------------------------------------------------------------
PS1 power-mon input 85.00 230.00 0.38 AC OK
PS2 power-mon - - - - - FAIL
With the highlighted black blocks indicating the change that has occurred between one iteration of
the command from one second to the next.
switch (config) # <show command> | {include | exclude} <extended regular expression> | watch [diff] [interval <1-10
0 secs>]
Example:
It is possible to count the number of lines in an output of a “show” command by using the following
command:
Example:
42
Date: 2020/05/25
Time zone: UTC (Etc/UTC)
UTC offset: same as UTC
# show clock | count
4
Running the command displays an output of the “show” command in JSON syntax structure instead
of its regular format. See the following as an example:
The “json-print” option cannot be used together with filtering (“include” and “exclude”) and/or
monitoring (“watch”).
CLI Shortcuts
The following table presents the available keyboard shortcuts on the MLNX-OS CLI.
Key Description
Combination
Ctrl-d If cursor is in the middle of the line, delete one character forward
If cursor is at the end of the line, show autocomplete options for current word or word
fragment
If cursor at an empty line, same as Esc
43
Key Description
Combination
Ctrl-l Clear screen and show line at the top of terminal window
44
Secure Shell (SSH)
It is recommended not to use more than 50 concurrent SSH sessions.
To add entries to the global known-hosts configuration file and its SSH value, do the following.
1. Change to Config mode.
2. Add an entry to the global known-hosts configuration file and its SSH value.
RSA2 and a DSA2 host keys are generated by default. The RSA2 key can be used as
SSH server and client, while DSA2 key can only be used as SSH client.
When the switch is a server, use RSA key to connect to the device.
When the switch is a client (e.g., downloading image or uploading logs), RSA key is
recommended. DSA key is only for legacy devices and has been deprecated by
OpenSSH starting with the 7.0 release.
45
ssh <username>@<hostname> cli -h '"enable" "show interfaces brief"'
The MLNX-OS package equipped with web-based GUI that accepts input and provides output by
generating webpages that can be viewed by the user using a web browser.
The maximum allowed number of WebUI session is 225. Trying to open new sessions beyond
this limitation is rejected.
Password Hardening
Upon initial login through the web interface, if the initial login was not completed through the CLI
the following prompt will appear (by default, password hardening is enabled).
46
1. Login as admin.
2. If the following screen appears (this screen will appear if default password was never
changed), type in a new password ("admin" may be reused as the new password).
3. Only after successfully changing the admin password (this must be done first), change the
monitor password. If the password is not changed, all pages (besides the logout page) will be
locked.
4. After successfully changing the monitor password, the home page may be accessed and the
system may be used.
5. Click on the home page link or wait 5 seconds until the countdown reaches 0 and the page is
redirected automatically.
Warning: Entering the monitor user before the default password is changed will block the
system (all pages besides the logout page will be blocked).
47
About Web UI
The web interface makes available the following perspective tabs:
• Setup
• System
• Security
• Ports
• Status
• IB SM Management
• IB Router
Make sure to save your changes before switching between menus or submenus. Click the
“Save” button to the right of “Save Changes?”.
Setup Menu
The Setup menu makes available the following submenus (listed in order of appearance from top to
bottom):
Submenu Title Description
Interfaces Obtains the status of, configures, or disables interfaces to the fabric.
Thus, you can: set or clear the IP address and netmask of an
interface; enable DHCP to dynamically assign the IP address and
netmask; and set interface attributes such as MTU, speed, duplex,
etc.
48
Submenu Title Description
Routing Configures, removes or displays the default gateway, and the static
and dynamic routes
Login Messages Edits the login messages: Message of the Day (MOTD), Remote Login
message, and Local Login message
Address Resolution Adds static and dynamic ARP entries, and clears the dynamic ARP
cache
SNMP Configures SNMP attributes, SNMP admin user, and trap sinks
Email Alerts Configures the destination of email alerts and the recipients to be
notified
XML gateway Provides an XML request-response protocol to get and set hardware
management information
Logging Sets up system log files, remote log sinks, and log formats
49
Submenu Title Description
Date and Time Configures the date, time, and time zone of the switch system
System Menu
The System menu makes available the following sub-menus (listed in order of appearance from top
to bottom):
Submenu Title Description
Modules Displays a graphic illustration of the system modules. By moving the mouse
over the ports in the front view, a pop-up caption is displayed to indicate
the status of the port. The port state (active/down) is differentiated by a
color scheme (green for active, gray/black for down). By moving the
mouse over the rear view, a pop-up caption is displayed to indicate the
leaf part information.
Inventory Displays a table with the following information about the system modules:
module name, type, serial number, ordering part number and ASIC
firmware version
Power Management Displays a table with the following information about the system power
supplies: power supply name, power, voltage level, current consumption,
and status. A total power summary table is also displayed providing the
power used, the power capacity, and the power available.
OS Upgrade Displays the installed OS images (and the active partition), uploads a new
image, and installs a new image
Reboot Reboots the system. Make sure that you save your configuration prior to
clicking reboot.
Security Menu
The Security menu makes available the following submenus (listed in order of appearance from top
to bottom):
Submenu Title Description
50
Submenu Title Description
Ports Menu
The Ports menu displays the port state and enables some configuration attributes of a selected port.
It also enables modification of the port configuration. A graphical display of traffic over time (last
hour or last day) through the port is also available.
Submenu Title Description
Status Menu
The Status menu makes available the following submenus (listed in order of appearance from top to
bottom):
51
Submenu Title Description
Summary Displays general information about the switch system and the OS
image, including current date and time, hostname, uptime of
system, system memory, CPU load averages, etc.
Profile and Capabilities Displays general information about the switch system capabilities
such as the enabled profiles (e.g IB/ETH) and their corresponding
values
What Just Happened Displays and configures What Just Happened packet drop reasons
Power Supplies Provides a graphical display of one of the switch’s power supplies
voltage level over time (1 hour)
Fans Provides a graphical display of fan speeds over time (1 hour). The
display is per fan unit within a fan module.
CPU Load Provides a graphical display of the management CPU load over time
(1 hour)
Logs Displays the system log messages. It is possible to display either the
currently saved system log or a continuous system log.
Alerts Displays a list of the recent health alerts and enables the user to
configure health settings
IB SM Mgmt Menu
The IB SM Mgmt menu makes available the following submenus (listed in order of appearance from
top to bottom):
52
Submenu Description
Title
Summary Displays the local Subnet Manager (SM) status (running time, failures, etc)
Base SM Manages basic SM configuration (enabling SM, priority level, and restoring initial configuration)
Advanced Manages basic SM configuration (enabling SM, priority level, and restoring initial configuration)
SM
Expert SM Configures security and GUID based prefixes (m_key, sm_key, sa_key, etc), and manages special
SM attributes that should not be changed except by expert users of the Subnet Manager who
understand the risks of manipulating these attributes.
Partitions Manages partition keys (sets removes or displays the partition keys)
Basic Qos Configures basic QoS attributes such as default QoS settings, and VL arbitration low and high
entries. It also displays and manages SL-to-VL mappings.
IB Router Menu
The IB Router menu makes available the following sub-menus (listed in order of appearance from
top to bottom):
Submenu Title Description
UI Commands
CLI Session
• CLI Session
• cli clear-history
53
• cli default
• cli max-sessions
• cli session
• terminal
• terminal sysrq enable
• show cli
• show cli max-sessions
• show cli num-sessions
• Banner
• banner login
• banner login-local
• banner login-remote
• banner logout
• banner logout-local
• banner logout-remote
• banner motd
• show banner
• SSH
• ssh server enable
• ssh server host-key
• ssh server listen
• ssh server login attempts
• ssh server login timeout
• ssh server login record-period
• ssh server min-version
• ssh server ports
• ssh server security strict
• ssh server security strict
• ssh server x11-forwarding
• ssh client global
• ssh client user
• slogin
• show ssh client
• show ssh server
• show ssh server host-keys
• show ssh server login record-period
• Remote Login
• telnet
• telnet-server enable
• show telnet-server
• Web Interface
• web auto-logout
• web cache-enable
• web client cert-verify
• web client ca-list
• web enable
• web http
54
• web httpd
• web https
• web https ssl renegotiation enable
• web https ssl secure-cookie enable
• web proxy auth authtype
• web proxy auth basic
• web session timeout
• web session renewal
• show web
This section displays all the relevant commands used to manage CLI session terminal.
cli clear-history
cli clear-history
Default N/A
History
3.1.0000
switch (config) # cli clear-history
Example
Related Commands show cli
Notes
cli default
55
Syntax Description auto-logout Configures keyboard inactivity timeout for automatic logout. Range
is 0-35791 minutes. Setting the value to 0 or using the no form of
the command disables the auto-logout.
prompt empty- Prompts for a password if none is specified in a pseudo-URL for SCP.
password
Default N/A
History
3.1.0000
switch (config) # cli default prefix-modes enable
Example
Related Commands show cli
Notes
cli max-sessions
56
Syntax Description number Range: 3-30
Default 30 sessions
History
3.5.0200
switch (config) # cli max-sessions 40
Example
Related Commands show terminal
Notes
cli session
Syntax Description minutes Configures keyboard inactivity timeout for automatic logout.
Range: 0-35791 minutes
Setting the value to 0 or using the no form of the command
disables the auto logout.
prefix-modes Configures the prefix modes feature of CLI and enables prefix
enable modes for current session.
terminal length Sets the number of lines for the current terminal.
Range: 5-999
terminal resize Resizes the CLI terminal settings (to match the actual terminal
window).
57
terminal-type Sets terminal type. Valid options are:
• ansi
• console
• dumb
• linux
• unknown
• vt52
• vt100
• vt102
• vt220
• xterm
Default N/A
History
3.1.0000
3.8.2100: Removed "prefix-modes show-config" option and terminal type vt320
switch (config) # cli session auto-logout
Example
Related Commands show terminal
Notes The "minutes" attribute can be configured from the CLI shell only.
terminal
terminal {length <number of lines> | resize | type <terminal type> | width <number
of characters>}
no terminal type
Syntax Description length Sets the number of lines for this terminal.
Range: 5-999
resize Resizes the CLI terminal settings (to match with real terminal).
58
width Sets the width of this terminal in characters.
Range: 34-999
Default N/A
History
3.1.0000
switch (config) # terminal length 500
Example
Related Commands show terminal
Notes
Default Disabled
History
3.4.3000
3.9.3100: Updated command to be disabled by default
switch (config) # terminal sysrq enable
Example
Related Commands show terminal
Notes
show cli
show cli
59
Syntax Description N/A
Default N/A
History
3.1.0000
switch (config) # show cli
CLI current session settings:
Example Maximum line size: 8192
Terminal width: 171 columns
Terminal length: 38 rows
Terminal type: xterm
X display setting: (none)
Auto-logout: disabled
Paging: enabled
Progress tracking: enabled
Prefix modes: disabled
Notes
Default N/A
History
3.5.0200
switch (config) # show cli max-sessions
Example Maximum number of CLI sessions: 5
Related Commands
60
Notes
Default N/A
History
3.5.0200
switch (config) # show cli num-sessions
Example Current number of CLI sessions: 40
Related Commands
Notes
Banner
banner login
History
3.5.0200
switch (config) # banner login Example
Example
Related Commands show banner
61
Notes If more than one word is used (there is a space) quotation marks should be added
(i.e., “xxxx xxxx”).
banner login-local
Default ""
History
3.1.0000
banner login-remote
3.1.0000
62
Example switch (config) # banner login-remote Example
banner logout
Sets system logout banner (for both local and remote logins).
The no form of the command resets the banner to its default value.
Syntax Description string Text string
Default ""
Configuration Mode config
History
3.1.0000
banner logout-local
63
Notes • The logout-local refers to the serial connection banner
• If more than one word is used (there is a space) quotation marks should be
added (i.e., “xxxx xxxx”).
banner logout-remote
banner motd
64
show banner
show banner
Switch Login:
NVIDIA MLNX-OS Switch Management
Logout: Goodbye
Related Commands banner login banner login-local banner login-remote banner logout banner logout-local
banner logout-remote banner motd
Notes
SSH
3.1.0000
Example switch (config) # ssh server enable
65
ssh server host-key
private-key Sets new private-key for the host keys of the specified type.
public-key Sets new public-key for the host keys of the specified type.
generate Generates new RSA and DSA host keys for SSH.
Default SSH keys are locally generated
Configuration Mode config
History
3.1.0000
3.4.2300: Added notes
3.9.0300: Removed RSAv1
3.9.1000: Added a note
Example switch (config) # ssh server host-key dsa2 private-key
Key: ***********************************************
Confirm: ***********************************************
Enables the listen interface restricted list for SSH. If enabled, and at least one non-
DHCP interface is specified in the list, the SSH connections are only accepted on
those specified interfaces.
The no form of the command disables the listen interface restricted list for SSH.
When disabled, SSH connections are not accepted on any interface.
Syntax Description enable
Enables SSH interface restrictions on access to this system.
interface Adds interface to SSH server access restriction list. Possible
interfaces are “lo”, and “mgmt0”.
Default SSH listen is enabled
66
Configuration Mode config
History
3.1.0000
Example switch (config) # ssh server listen enable
3.1.0000
3.5.1000: Increased minimum number of attempts
3.9.0900: Added notes
Example switch (config) # ssh server login attempts 5
67
Configuration Mode config
History
3.5.0200
Example switch (config) # ssh server login timeout 130
Configures the amount of days for counting the number of successful logins.
The no form of the command disabled this function.
Syntax Description Days
Range: 1-30 days
Default: 1 day
Default Disabled
Configuration Mode config
History
3.9.0300
3.9.0500: Changed "SSH server login record-period" default value to 1 day
Example switch (config) # ssh server login record-period 1
Related Commands show ssh server login record-period show ssh server
Notes
Sets the minimum version of the SSH protocol that the server supports.
The no form of the command resets the minimum version of SSH protocol supported.
Syntax Description version
Possible versions are 1 and 2
Default 2
Configuration Mode config
History
3.1.0000
Example switch (config) # ssh server min-version 2
68
Notes
3.1.0000
Example switch (config) # ssh server ports 22
Default N/A
Configuration Mode config
History
3.3.5060
3.6.4000
3.9.0300: Updated notes
Example switch (config) # ssh server security strict
69
Notes
The following ciphers are disabled for SSH when strict security is enabled:
• aes256-cbc
• aes192-cbc
• aes128-cbc
• [email protected]
• 3des-cbc
Default N/A
Configuration Mode config
History
3.1.0000
Example switch (config) # ssh server tcp-forwarding enable
Default Disabled
Configuration Mode config
History
3.1.0000
Example switch (config) # ssh server x11-forwarding enable
Related Commands
Notes
70
ssh client global
3.1.0000
Example switch (config) # ssh client global host-key-check no
switch (config) # ssh client global known-host "72.30.2.2 ssh-rsa
AAAAB3NzaC1yc2EAAAAB....f2CyXFq4pzaR1jar1Vk="
Related Commands
show ssh client
Notes
ssh client user <username> {authorized-key sshv2 <public key> | identity <key type>
{generate | private-key [<private key>] | public-key [<public key>]} | known-host
<known host> remove}
no ssh client user admin {authorized-key sshv2 <public key ID> | identity <key type>}
Adds an entry to the global known-hosts configuration file, either by generating new
key, or by adding manually a public or private key.
The no form of the command removes a public key from the specified user's
authorized key list, or changes the key type.
Syntax Description username The specified user must be a valid account on the system.
Possible values for this parameter are “admin”, “monitor”,
“xmladmin”, and “xmluser”.
authorized-key Adds the specified key to the list of authorized SSHv2 RSA or
sshv2 <public key> DSA public keys for this user account. These keys can be used to
log into the user's account.
71
identity <key type> Sets certain SSH client identity settings for a user, dsa2 or rsa2.
generate Generates SSH client identity keys for specified user.
private-key Sets private key SSH client identity settings for the user.
public-key Sets public key SSH client identity settings for the user.
known-host Removes host from user's known host file.
<known host>
remove
Default No keys are created by default
Configuration Mode config
History
3.1.0000
Example switch (config) # ssh client user admin known-host 172.30.1.116 remove
Related Commands
show ssh client
Notes If a key is being pasted from a cut buffer and was displayed with a paging program,
it is likely that newline characters have been inserted, even if the output was not
long enough to require paging. One can specify “no cli session paging enable” before
running the “show” command to prevent the newlines from being inserted.
slogin
Invokes the SSH client. The user is returned to the CLI when SSH finishes.
Syntax Description slogin options
-p -o flags (option allowed flags):
-c
-L AdressFamily
-l BatchMode
-m CheckHostIP
-R Cipher
-o Ciphers
ConnectTimeout
-1 ForwardAgent
-2 ForwardX11
-4 ForwardX11Trusted
-6 HostKeyAlgorithms
-g KexAlgorithms
-q LogLevel
-V MACs
-v Port
-x PubkeyAcceptedKeyTypes
-X PubkeyAuthentication
-Y StrictHostKeyChecking
-y TCPKeepAlive
-a User
-A VerifyHostKeyDNS
vrf_name There are no restrictions on the VRF name, as long as the VRF exists
in the switch.
72
Default N/A
Configuration Mode config
History
3.1.0000
3.10.1000: Updated the slogin options
Example switch (config) # slogin 192.168.10.70
The authenticity of host '192.168.10.70 (192.168.10.70)' can't be established.
RSA key fingerprint is 2e:ad:2d:23:45:4e:47:e0:2c:ae:8c:34:f0:1a:88:cb.
Are you sure you want to continue connecting (yes/no)? yes
Related Commands
Notes For more information about slogin options see the following: linux.die.net/man/1/
ssh
3.1.0000
Example switch (config) # show ssh client
SSH client Strict Hostkey Checking: ask
Related Commands
Notes
73
History
3.1.0000
3.4.0000: Updated example
3.5.0200: Added SSH login timeout and max attempts
3.6.6000: Updated example
3.9.0300: Updated example—removed RSA v1 and added SSH server login record-
period
3.9.0500: Changed "SSH server login record-period" default period to 1 day
Example switch (config) # show ssh server
SSH server configuration:
SSH server enabled: yes
Server security strict mode: no
Minimum protocol version: 2
TCP forwarding enabled: yes
X11 forwarding enabled: no
SSH login timeout: 120
SSH login max attempts: 6
SSH server login record-period: 1
SSH server ports: 22
Related Commands
Notes
3.1.0000
3.6.6000: Updated example
3.9.0300: Updated example—removed RSA v1
74
Example switch (config) # show ssh server host-keys
SSH server configuration:
SSH server enabled: yes
Server security strict mode: no
Minimum protocol version: 2
TCP forwarding enabled: yes
X11 forwarding enabled: no
SSH login timeout: 120
SSH login max attempts: 6
SSH server ports: 22
Host Keys:
RSA v2 host key: "kebo-2100-1 ssh-rsa AAAAB3Nza<...>KE5"
DSA v2 host key: "kebo-2100-1 ssh-dss AAAAB3Nza<...>/s="
Displays the amount of days for counting the number of successful logins.(Default:
30 days)
Syntax Description N/A
Default Disabled
Configuration Mode Any command mode
History
3.9.0300
3.9.0500: Changed "SSH server login record-period" default value to 1 day
Example
switch (config) # show ssh server login record-period
SSH server login record-period: 1
Related Commands ssh server login record-period
Notes
Remote Login
telnet
telnet
75
Default N/A
Configuration Mode config
History
3.1.0000
Example switch (config) # telnet
telnet>
telnet-server enable
telnet-server enable
no telnet-server enable
3.1.0000
Example switch (config) # telnet-server enable
Related Commands
telnet-server
show telnet-server
Notes
show telnet-server
show telnet-server
3.1.0000
Example switch (config) # show telnet-server
Telnet server enabled: yes
76
Related Commands
telnet-server
show telnet-server
Notes
Web Interface
web auto-logout
Related Commands
show web
Notes The no form of the command does not automatically log users out due to inactivity.
web cache-enable
web cache-enable
no web cache-enable
77
Related Commands
show web
Notes
Default N/A
History 3.2.3000
switch (config) # web client cert-verify
Example
Related Commands
Notes
Default default-ca-list
78
History 3.2.3000
switch (config) # web client ca-list default-ca-list
Example
Related Commands
Notes
web enable
web enable
no web enable
Default enable
History 3.1.0000
3.8.1000—Added note
web http
Syntax Description enable Enables HTTP access to the web-based management console.
port-number Sets a port for HTTP access.
79
redirect Enables redirection to HTTPS. If HTTP access is enabled, this
specifies whether a redirect from the HTTP port to the HTTPS port
should be issued to mandate secure HTTPS access.
• HTTP is disabled
Default • HTTP TCP port is 80
• HTTP redirect to HTTPS is disabled
History 3.1.0000
switch (config) # web http enable
Example
web httpd
Enables the listen interface restricted list for HTTP and HTTPS.
The no form of the command disables the HTTP server listen ability.
Syntax Description enable Enables Web interface restrictions on access to this system.
interface Adds interface to Web server access restriction list (i.e., mgmt0,
<ifName> mgmt1).
• Listening is enabled
Default • All interfaces are permitted.
History 3.1.0000
switch (config) # web httpd listen enable
Example
Notes If enabled, and if at least one of the interfaces listed is eligible to be a listen
interface, then HTTP/HTTPS requests will only be accepted on those interfaces.
Otherwise, HTTP/HTTPS requests are accepted on any interface.
80
web https
History 3.1.0000
81
web https ssl renegotiation enable
History 3.6.8008
switch (config) # web https ssl renegotiation enable
Example
Notes
Default Enabled
History 3.6.8008
switch (config) # web https ssl secure-cookie enable
Example
Notes
82
web proxy auth authtype
History 3.1.0000
switch (config) # web proxy auth authtype basic
Example
Notes
Syntax Description password Sets plaintext password for HTTP basic authentication with web
proxy
username Sets username for HTTP basic authentication with web proxy
Default N/A
History 3.1.0000
switch (config) # web proxy auth basic password 57R0ngP455w0rD
Example
83
Related Commands show web
web enable
Notes
Default 2 hr 30 min
History 3.1.0000
switch (config) # web session timeout 180
Example
Related Commands
Notes
Default 30 min
History 3.1.0000
switch (config) # web session renewal 20
Example
84
Related Commands
Notes
show web
show web
Default N/A
History 3.6.6000
3.6.8008—Updated example
switch (config) # show web
Web User Interface:
Example Web interface enabled: yes
Web caching enabled: no
HTTP enabled: no
HTTP port: 80
HTTP redirect to HTTPS: no
HTTPS enabled: yes
HTTPS port: 443
HTTPS ssl-ciphers: TLS1.2
HTTPS ssl-renegotiation: no
HTTPS ssl-secure-cookie: yes
HTTPS certificate name: default-cert
Listen enabled: yes
Listen Interfaces:
No interface configured.
Inactivity timeout: 1 hr
Session timeout: 2 hr 30 min
Session renewal: 30 min
85
Notes
86
System Management
The following pages provide information on configuring general management features on the
system.
• Management Interfaces
• Chassis Management
• UNBREAKABLE-LINK® Adapter and Switch Technology
• Upgrade/Downgrade Process
• Configuration Management
• mDNS
• Virtual Machine
Management Interfaces
Management interfaces are used in order to provide access to switch management user interfaces
(e.g. CLI, WebUI). NVIDIA switches support out-of-band (OOB) dedicated interfaces (e.g. mgmt0,
mgmt1) and in-band dedicated interfaces. In addition, most NVIDIA switches feature a serial port
that provides access to the CLI only.
On switch systems with two OOB management ports, both of them may be configured on the same
VLAN if needed. In this case, ARP replies to the IP of those management interfaces is answered from
either of them.
2. Disable setting IP addresses using the DHCP using the following command:
87
Configuring IPv6 Address on the Management Interface
1. Enable IPv6 on this interface. Run:
For all other systems (and software versions) DHCP is disabled by default.
If a user connects through SSH, runs the wizard and turns off DHCP, the connection is
immediately terminated as the management interface loses its IP address.
Default Gateway
To configure manually the default gateway, use the “ip route” command, with “0.0.0.0” as prefix
and mask. The next-hop address must be within the range of one of the IP interfaces on the system.
88
Configuring Hostname via DHCP (DHCP Client Option 12)
This feature, also known as the DHCP Client Option 12, is enabled by default and assigns the switch
system a hostname via DHCP as long as network manager configures hostname to the management
interfaces’ (i.e. mgmt0, mgmt1) MAC address. If a network manager configures the hostname
manually through any of the user interfaces, the hostname is not retrieved from the DHCP server.
Getting the hostname through DHCP is enable by default and will change the switch
hostname if the hostname is not set by the user. Therefore, if a switch is part of an HA
cluster the user would need to make sure the HA master has the same HA node names as
the DHCP server.
• Interface
• interface
• ip address
• ip default-gateway
• alias
• mtu
• duplex
• speed
• dhcp
• dhcp hostname
• shutdown
• zeroconf
• comment
• ipv6 enable
• ipv6 address
• ipv6 dhcp primary-intf
• ipv6 dhcp stateless
• ipv6 dhcp client enable
• ipv6 dhcp client renew
• show interfaces mgmt0
89
• show interfaces mgmt0 brief
• show interfaces mgmt0 configured
• Hostname Resolution
• hostname
• ip name-server
• ip domain-list
• ip/ipv6 host
• ip/ipv6 map-hostname
• show hosts
• Routing
• IP route
• ipv6 default-gateway
• show ip/ipv6 route
• show ipv6 default-gateway
• Network to Media Resolution (ARP & NDP)
• ipv6 neighbor
• clear ipv6 neighbors
• show ipv6 neighbors
• DHCP
• ip dhcp
• show ip dhcp
• IP Diagnostic Tools
• ping
• traceroute
• tcpdump
Interface
interface
lo Loopback interface.
90
Default N/A
History
3.1.0000
switch (config)# interface mgmt0
switch (config interface mgmt0)#
Example
Notes
ip address
Default 0.0.0.0/0
History
3.1.0000
switch (config interface mgmt0)# ip address 10.10.10.10 255.255.255.0
Example
Notes If DHCP is enabled on the specified interface, then the DHCP IP assignment will hold
until DHCP is disabled
91
ip default-gateway
Default N/A
History
3.1.0000
3.8.1000: Updated Command & Syntax description
switch (config interface mgmt0)# ip default-gateway mgmt1
Example
Related Commands
Notes
alias
Adds an additional IP address to the specified interface. The secondary address will
appear in the output of “show interface” under the data of the primary interface
along with the alias.
The no form of the command removes the secondary address to the specified
interface.
Syntax Description index A number that is to be aliased to (associated with) the secondary
IP.
Default N/A
92
History
3.1.0000
switch (config interface mgmt0)# alias 2 ip address 9.9.9.9 255.255.255.255
Example
mtu
mtu <bytes>
no mtu <bytes>
Default 1500
History
3.6.3004
switch (config interface mgmt0)# mtu 1500
Example
Notes
duplex
duplex <duplex>
no duplex
93
Syntax Description duplex Sets the duplex mode of the interface. The following are the
possible values:
• half—half duplex
• full—full duplex
• auto—auto duplex sensing (half or full)
Default auto
History
3.1.0000
switch (config interface mgmt0)# duplex auto
Example
speed
speed <speed>
no speed
Syntax Description speed Sets the speed of the interface. The following are the possible
values:
• 10—fixed to 10Mbps
• 100—fixed to 1000Mbps
• 1000—fixed to 1000Mbps
• auto—auto speed sensing (10/100/1000Mbps)
Default auto
History
3.1.0000
switch (config interface mgmt0)# speed auto
Example
94
• Setting the speed to “auto” also sets the duplex to “auto”
Notes • Setting the speed to one of the manual settings (generally “10”, “100”, or
“1000”) also sets the duplex to a manual setting which is determined by
querying the interface to find out its current auto-detected state
dhcp
dhcp [renew]
no dhcp
Syntax Description renew Forces a renewal of the IP address. A restart on the DHCP client for
the specified interface will be issued.
Default Could be enabled or disabled (per part number) manufactured with 3.2.0500
History
3.1.0000
3.9.1900: Added note
switch (config interface mgmt0)# dhcp
Example
dhcp hostname
dhcp hostname
no dhcp hostname
Default Enabled
95
Configuration Mode config interface management
History
3.5.1000
switch (config interface mgmt0)# dhcp hostname
Example
shutdown
shutdown
no shutdown
Default no shutdown
History
3.1.0000
switch (config interface mgmt0)# no shutdown
Example
Notes
96
zeroconf
zeroconf
no zeroconf
Default no zeroconf
History
3.1.0000
switch (config interface mgmt0)# zeroconf
Example
comment
comment <comment>
no comment
Syntax Description comment A free-form string that has no semantics other than being
displayed when the interface records are listed.
Default no comment
History
3.1.0000
switch (config interface mgmt0)# comment my-interface
Example
Related Commands
97
Notes
ipv6 enable
ipv6 enable
no ipv6 enable
History
3.1.0000
switch (config interface mgmt0)# ipv6 enable
Example
ipv6 address
Configures IPv6 address and netmask to this interface, static or autoconfig options
are possible.
The no form of the command removes the given IPv6 address and netmask or
disables the autoconfig options.
Syntax Description IPv6 address/ Configures a static IPv6 address and netmask.
netmask
Format example: 2001:db8:1234::5678/64.
98
autoconfig Enables IPv6 stateless address auto configuration (SLAAC) for this
interface. An address will be automatically added to the interface
based on an IPv6 prefix learned from router advertisements,
combined with an interface identifier.
History
3.1.0000
switch (config interface mgmt0)# ipv6 fe80::202:c9ff:fe5e:a5d8/64
Example
Default N/A
History
3.1.0000
99
switch (config)# ipv6 dhcp primary-intf mgmt0
Example
Notes
Default N/A
History
3.1.0000
switch (config)# ipv6 dhcp stateless
Example
100
Configuration Mode config interface management
History
3.7.11xx
3.9.1900: Added note
switch (config interface mgmt0)# ipv6 dhcp client enable
Example
Default N/A
History
3.7.11xx
switch (config interface mgmt0)# ipv6 dhcp client renew
Example
Notes
Default N/A
101
Configuration Mode Any command mode
History
3.1.0000
3.6.8008: Updated example
3.9.1900: Updated example—added new output option of "no (Static IP is
configured)"
switch (config)# show interfaces mgmt0
Example Interface mgmt0 status:
Comment :
Admin up : yes
Link up : yes
DHCP running : no (Static IP is configured)
IP address : 10.12.67.33
Netmask : 255.255.255.128
IPv6 enabled : yes
Autoconf enabled: no
Autoconf route : yes
Autoconf privacy: no
DHCPv6 running : no (Static IP is configured)
IPv6 addresses : 2
IPv6 address:
1::1/64
fe80::7efe:90ff:fe65:dea8/64
Speed : UNKNOWN
Duplex : full
Interface type : ethernet
Interface source: bridge
Bonding master : vrf_vrf-default
MTU : 1500
HW address : 7C:FE:90:65:DE:A8
Rx:
13840892 bytes
58605 packets
0 mcast packets
2 discards
0 errors
0 overruns
0 frame
Tx:
3796 bytes
38 packets
0 discards
0 errors
0 overruns
0 carrier
0 collisions
1000 queue len
Related Commands
Notes
102
Syntax Description N/A
Default N/A
History
3.1.0000
3.6.8008: Updated example
switch (config)# show interfaces mgmt0 brief
Example Interface mgmt0 status:
Comment :
Admin up : yes
Link up : yes
DHCP running : yes
IP address : 10.12.67.33
Netmask : 255.255.255.128
IPv6 enabled : yes
Autoconf enabled: no
Autoconf route : yes
Autoconf privacy: no
DHCPv6 running : yes (but no valid lease)
IPv6 addresses : 1
IPv6 address:
fe80::268a:7ff:fe53:3d8e/64
Related Commands
Notes
Default N/A
103
History
3.1.0000
3.5.1000: Updated example with “DHCP Hostname”
3.6.8008: Updated example
Related Commands
Notes
Hostname Resolution
hostname
hostname <hostname>
no hostname
History
3.1.0000
3.6.3004: Added support for the character “.”
switch (config)# hostname my-switch-hostname
Example
104
• Hostname may contain letters, numbers, periods (‘.’), and hyphens (‘-’), in
Notes any combination
• Hostname may be 1-63 characters long
• Hostname may not begin with a hyphen
• Hostname may not contain other characters, such as “%”, “_” etc.
• Hostname may not be set to one of the valid logging commands (i.e. debug-
files, fields, files, format, level, local, monitor, receive, trap)
• Changing the hostname stamps a new HTTPS certificate
ip name-server
History
3.1.0000
switch (config)# ip name-server 9.9.9.9
Example
Notes
ip domain-list
ip domain-list <domain-name>
no ip domain-list <domain-name>
105
Configuration Mode config
History
3.1.0000
switch (config)# ip domain-list mydomain.com
Example
Notes
ip/ipv6 host
History
3.1.0000
switch (config)# ip host my-host 2.2.2.2
switch (config)# ipv6 host my-ipv6-host 2001::8f9
Example
Notes
ip/ipv6 map-hostname
Maps between the currently-configured hostname and the loopback address 127.0.0.1.
The no form of the command clears the mapping.
106
Default IPv4 mapping is enabled by default
IPv6 mapping is disabled by default
History
3.1.0000
switch (config)# ip map-hostname
Example
show hosts
show hosts
Default N/A
History
3.1.0000
3.8.1000: Updated example
107
switch (config)# show hosts
Example Hostname: switch1
Name servers:
10.7.77.192 dynamic (DHCP on mgmt0)
10.7.77.135 dynamic (DHCP on mgmt0)
10.198.0.169 dynamic (DHCP on mgmt0)
(*) 10.211.0.124 dynamic (DHCP on mgmt0)
Domain names:
mtl.labs.mlnx dynamic (DHCP on mgmt0)
(*) Inactive due to system limits on name servers and domain names.
Related Commands
Notes
Routing
IP route
nexthop- The IPv4 or IPv6 address of the next hop router for this route
address
108
Default N/A
History
3.1.0000
switch (config)# ip route 20.20.20.0 255.255.255.0 mgmt0
Example
Notes
ipv6 default-gateway
Default N/A
History
3.1.0000
3.2.0500: Removed IPv4 configuration option
switch (config)# ipv6 default-gateway ::1
Example
109
show ip/ipv6 route
Syntax Description static Filters the table with the static route entries
Default N/A
History
3.1.0000
Example
Related Commands
ip route
Notes
Syntax Description static Displays the static configuration of the default gateway
Default N/A
110
History
3.1.0000
switch (config)# show ipv6 default-gateway
Active default gateways:
Example 172.30.0.1 (interface: mgmt0)
switch (config)# show ipv6 default-gateway static
Configured default gateway: 10.10.10.10
Notes The configured IPv4 default gateway will not be used if DHCP is enable
IPv4 network use Address Resolution Protocol (ARP) to resolve IP address to MAC address, while IPv6
network uses Network Discovery Protocol (NDP) that performs basically the same as ARP.
ipv6 neighbor
Default N/A
History
3.1.0000
switch (config)# ipv6 neighbor 2001:db8:701f::8f9 mgmt0 00:11:22:33:44:55
Example
111
• ARP is used only with IPv4. In IPv6 networks, Neighbor Discovery Protocol
Notes (NDP) is used similarly.
• Use The no form of the command to remove static entries. Dynamic entries
can be cleared via the “clear ipv6 neighbors” command.
Default N/A
History
3.1.0000
3.6.4110: Updated command
switch (config)# clear ipv6 neighbors
Example
Syntax Description static Filters only the table of the static entries.
Default N/A
History
3.1.0000
112
Example
Notes
DHCP
ip dhcp
Syntax Description yield-to-static Does not allow you to install a default gateway from DHCP if there
is already a statically configured one.
Default Disabled
History
3.1.0000
switch (config)# ip dhcp default-gateway yield-to-static
Example
113
Related Commands show ip dhcp
dhcp [renew]
show ip dhcp
show ip dhcp
Default N/A
History
3.1.0000
3.6.5000: Updated example
switch (config)# show ip dhcp
----------------------------------------
Example Interface DHCP DHCP Valid
Enabled Running lease
----------------------------------------
dummy0 no no no
lo no no no
mgmt0 yes yes yes
mgmt1 no no no
mgmts0 no no no
mgmts1 no no no
vif1 no no no
Notes
114
IP Diagnostic Tools
ping
ping [-LRUbdfnqrvVaA] [-c count] [-i interval] [-w deadline] [-p pattern] [-s
packetsize] [-t ttl] [-I interface or address] [-M mtu discovery hint] [-S sndbuf] [-T
timestamp option ] [-Q tos ] [hop1 ...] destination
Default N/A
History
3.1.0000
switch (config)# ping 172.30.2.2
PING 172.30.2.2 (172.30.2.2) 56(84) bytes of data.
Example 64 bytes from 172.30.2.2: icmp_seq=1 ttl=64 time=0.703 ms
64 bytes from 172.30.2.2: icmp_seq=2 ttl=64 time=0.187 ms
64 bytes from 172.30.2.2: icmp_seq=3 ttl=64 time=0.166 ms
64 bytes from 172.30.2.2: icmp_seq=4 ttl=64 time=0.161 ms
64 bytes from 172.30.2.2: icmp_seq=5 ttl=64 time=0.153 ms
64 bytes from 172.30.2.2: icmp_seq=6 ttl=64 time=0.144 ms
...
--- 172.30.2.2 ping statistics ---
6 packets transmitted, 6 received, 0% packet loss, time 5004ms
rtt min/avg/max/mdev = 0.144/0.252/0.703/0.202 ms
Notes
traceroute
traceroute [-46dFITUnrAV] [-f first_ttl] [-g gate,...] [-i device] [-m max_ttl] [-N
squeries] [-p port] [-t tos] [-l flow_label] [-w waittime] [-q nqueries] [-s src_addr] [-
z sendwait] host [packetlen]
115
-I Uses ICMP ECHO for tracerouting
-T Uses TCP SYN for tracerouting
-U Uses UDP datagram (default) for tracerouting
-n Does not resolve IP addresses to their domain names
-r Bypasses the normal routing and send directly to a host on an
attached network
-A Performs AS path lookups in routing registries and print results
directly after the corresponding addresses
-V Prints version info and exit
-f Starts from the first_ttl hop (instead from 1)
-g Routes packets through the specified gateway (maximum 8 for IPv4
and 127 for IPv6)
-i Specifies a network interface with which to operate
-m Sets the max number of hops (max TTL to be reached). Default is
30.
-N Sets the number of probes to be tried simultaneously (default is
16)
-p Uses destination port. It is an initial value for the UDP destination
port (incremented by each probe, default is 33434), for the ICMP
seq number (incremented as well, default from 1), and the
constant destination port for TCP tries (default is 80).
-t Sets the TOS (IPv4 type of service) or TC (IPv6 traffic class) value
for outgoing packets
-l Uses specified flow_label for IPv6 packets
-w Sets the number of seconds to wait for response to a probe
(default is 5.0). Non-integer (float point) values allowed too.
-s Uses source src_addr for outgoing packets.
-q Sets the number of probes per each hop. Default is 3.
-z Sets minimal time interval between probes (default is 0). If the
value is more than 10, then it specifies a number in milliseconds,
else it is a number of seconds (float point values allowed too).
Default N/A
config
Configuration Mode
History
3.1.0000
Example
116
Related Commands ping
Notes
tcpdump
tcpdump [-aAdDeflLnNOpqRStuUvxX] [-c count] [-C file_size] [-E algo:secret] [-F file]
[-i interface] [-M secret] [-r file] [-s snaplen] [-T type] [-w file] [-W filecount] [-y
datalinktype] [-Z user] [-D list possible interfaces] [expression]
Invokes standard binary, passing command line parameters straight through. Runs in
foreground, printing packets as they arrive, until the user hits Ctrl+C.
Syntax Description N/A
Default N/A
config
Configuration Mode
History
3.1.0000
switch (config)# tcpdump
......
Example 09:37:38.678812 IP 192.168.10.7.ssh > 192.168.10.1.54155: P 1494624:1494800(176)
ack 625 win 90
<nop,nop,timestamp 5842763 858672398>
09:37:38.678860 IP 192.168.10.7.ssh > 192.168.10.1.54155: P 1494800:1495104(304)
ack 625 win 90
<nop,nop,timestamp 5842763 858672398>
...
9141 packets captured
9142 packets received by filter
0 packets dropped by kernel
Related Commands
Notes
Control Plane Policing or Policies (CoPP) ensures the CPU and control plane are not over-utilized
which is essential for the robustness of the switch. CoPP limits the number of control plane
packets. Onyx implements several CoPP mechanisms:
• ACLs may be used to limit the rate of packets or bytes of a certain type, including L3 control
packets (L2 control packets are forwarded to the CPU before the ACL)
• Policers on traffic going to the CPU—these policers are configured by Onyx and cannot be
modified by the user
• IP filter tables limit the traffic to the CPU coming in from the management ports
117
IP Table Filtering
IP table filtering is a mechanism that allows the user to apply actions to a specific control packet
flow identified by a certain flow key.
This mechanism is used in order to protect switch control traffic against attacks. For example, it
could allow traffic coming from a specific trusted management subnet only, block the SNMP UDP
port from receiving traffic, and force ping rate to be lower than a specific threshold.
Each IP table rule is defined by key, priority, and action:
• Key—the key is a combination of physical port and layer 3 parameters (e.g. SIP, DIP, SPORT,
DPORT, etc.), and other fields. Each part of the key, can be set to a specific value or masked.
• Priority—each rule in the IP table is assigned a priority, and the rule with the highest priority
whose key matches the packet executes the action.
• Action—the action describes the behavior of packets which match the key. The action type
may be drop, accept, rate limit, etc.
An IP-table rule is bound to an IP interface that can be a management out-of-band interface, VLAN
interface, or router port interface. Once bound, all traffic received (ingress rule) or transmitted
(egress rule) in this direction is being verified with all bounded rules.
Once a match was found, the rule action is executed. If no match is found, the default policy of the
chain shall apply.
IP table rules get a lower priority than ACL mechanism.
In the rare case that IP filter is used while the input policy is "drop" (i.e., ip filter chain
input policy drop) and an NTP server or an InfiniBand switch with SM HA enabled is used,
then the following rule needs to be added that allows src-ip 127.0.0.1 (which is a
requirement for any clustered application (e.g., sm-ha) and NTP):
ip filter chain input rule append tail target accept dup-delete source-addr 127.0.0.1 /32
2. Append filtering rules to the list or set a specific rule number, select a target, and (optional)
any additional filter conditions. For example, run:
118
switch (config)# ip filter chain input rule append tail target rate-limit 2 protocol udp
switch (config)# ip filter chain input rule set 2 target drop protocol icmp in-intf mgmt1
switch (config)# ip filter chain output rule append tail target drop protocol icmp
IPv4 configuration:
Chain 'input' Policy 'accept':
Rule 1:
Target : rate-limit 2 pps
Protocol : udp
Source : all
Destination : all
Interface : all
State : any
Other Filter: -
Rule 2:
Target : drop
Protocol : icmp
Source : all
Destination : all
Interface : mgmt1 (ingress)
State : any
Other Filter: -
Chain 'output' Policy 'accept':
Rule 1:
Target : drop
Protocol : icmp
Source : all
Destination : all
Interface : all
State : any
Other Filter: -
switch (config) # ip filter chain input rule modify 3 target reject-with icmp6-adm-prohibited source-addr 10::0 /
126
switch (config) # ip filter chain input rule 2 set target drop protocol tcp dest-port 22 in-intf mgmt1
119
Rate-Limit Rule Configuration
Using a rate-limit target allows to create a rule to limit the rate of certain traffic types. The limit is
specified in packets per second (pps) and can be anywhere between 1-1000 pps. When enabled, the
system takes the user specified rate and converts it into units of 1/10000 of a second. Therefore,
any value greater than 100 can have a slight difference when the rule is displayed using the show
command.
Unlike other rules which are a match type of rule, limiting packets should be followed by a rule that
drops additional packets of the same “type”. Alternatively, this can be implicitly achieved by setting
the chain policy to “drop” so that it drops packets not processed by matching rules. Otherwise, no
effect of the rule is observed as the remaining traffic simply gets accepted.
Rate-limit is implemented with an average rate and a burst-limit. Rate values are specified
in pps and take a range from 1-1000 pps. For rate values in the range 1-100, the burst value
is set equal to the rate value. For rate values in the range 101-1000, the burst limit is set to
100.
IP table filtering is enabled and Firewall default IP filter rules are applied.
• To reset/apply default rules on system, run the command “ip filter reset-to-default-rules”
• To enable IP Filter, run the command “ip filter enable”
• To list the default firewall rules, run the command “show ip filter”
• Note when touching a default rule (delete/move/modify) all IP Filter rules will be reflected
on “show running-config”, to restore default rules, run the command “ip filter reset-to-
default-rules”
• Restoring factory default configuration will reset the default rules and enable the feature
• ip filter chain prerouting-mangle rule append tail target drop in-intf mgmt0 protocol tcp conntrack
new tcp-op-mss mss-not-in-range 536:65535 not-dest-port 22
120
• ip filter chain input rule append tail target accept in-intf lo
• ip filter chain input rule append tail target drop in-intf mgmt0 dest-addr 127.0.0.0 /8
• ip filter chain input rule append tail target accept in-intf mgmt0 state established,related
• ip filter chain input rule append tail target drop in-intf mgmt0 protocol tcp tcp-op syn match-not-syn
state new
• ip filter chain input rule append tail target drop in-intf mgmt0 fragment enable
• ip filter chain input rule append tail target drop in-intf mgmt0 protocol tcp tcp-op flags all
• ip filter chain input rule append tail target drop in-intf mgmt0 protocol tcp tcp-op flags none
• ip filter chain input rule append tail target accept in-intf mgmt0 protocol tcp tcp-op flags reset rate-
limit 2/second burst-limit 2",
• ip filter chain input rule append tail target drop in-intf mgmt0 state invalid
• ip filter chain input rule append tail target accept in-intf mgmt0 protocol tcp state new rate-limit 50/
second burst-limit 50
• ip filter chain input rule append tail target drop in-intf mgmt0 protocol tcp state new tcp-op syn
match-not-syn not-dest-port 22
• ip filter chain input rule append tail target drop in-intf mgmt0 recent name "portscan" recent rcheck-
sec 86400
• ip filter chain input rule append tail target none in-intf mgmt0 recent name portscan recent remove
• ip filter chain input rule append tail target none in-intf mgmt0 protocol tcp dest-port 22 conntrack
new recent set
• ip filter chain input rule append tail target drop in-intf mgmt0 protocol tcp dest-port 22 conntrack
new recent update-sec 60 recent hitcount 10
• ip filter chain input rule append tail target none in-intf mgmt0 protocol tcp dest-port 443 conntrack
new recent set
• ip filter chain input rule append tail target drop in-intf mgmt0 protocol tcp dest-port 443 conntrack
new recent update-sec 60 recent hitcount 10
• ip filter chain input rule append tail target none in-intf mgmt0 protocol udp dest-port 161 conntrack
new recent set
• ip filter chain input rule append tail target drop in-intf mgmt0 protocol udp dest-port 161 conntrack
new recent update-sec 60 recent hitcount 25
• ip filter chain input rule append tail target accept in-intf mgmt0 protocol tcp conntrack new rate-
limit 60/second burst-limit 20
• ip filter chain input rule append tail target accept in-intf mgmt0 protocol tcp dest-port 22 conntrack
new,established
• ip filter chain input rule append tail target accept in-intf mgmt0 protocol tcp dest-port 443 conntrack
new,established
• ip filter chain input rule append tail target accept in-intf mgmt0 protocol tcp dest-port 179 conntrack
new,established
• ip filter chain input rule append tail target accept in-intf mgmt0 protocol udp dest-port 68 conntrack
new,established
• ip filter chain input rule append tail target accept in-intf mgmt0 protocol udp dest-port 122 conntrack
new,established
• ip filter chain input rule append tail target accept in-intf mgmt0 protocol udp dest-port 161 conntrack
new,established
• ip filter chain input rule append tail target accept in-intf mgmt0 protocol udp dest-port 6306
conntrack new,established
• ip filter chain input rule append tail target accept in-intf mgmt0 protocol udp dest-port 69 conntrack
new,established
• ip filter chain input rule append tail target accept in-intf mgmt0 protocol udp dest-port 389 conntrack
new,established
• ip filter chain input rule append tail target accept in-intf mgmt0 protocol tcp dest-port 389 conntrack
new,established
• ip filter chain input rule append tail target accept in-intf mgmt0 protocol udp dest-port 1812-1813
conntrack new,established
• ip filter chain input rule append tail target accept in-intf mgmt0 protocol udp dest-port 49 conntrack
new,established
• ip filter chain input rule append tail target accept in-intf mgmt0 protocol tcp dest-port 49 conntrack
new,established
• ip filter chain input rule append tail target accept in-intf mgmt0 protocol udp source-port 53
conntrack new,established
121
• ip filter chain input rule append tail target accept in-intf mgmt0 protocol tcp source-port 53
conntrack new,established
• ip filter chain input rule append tail target accept in-intf mgmt0 protocol udp dest-port 500 conntrack
new,established
• ip filter chain input rule append tail target accept in-intf mgmt0 protocol udp dest-port 4500
conntrack new,established
• ip filter chain input rule append tail target accept in-intf mgmt0 protocol udp dest-port 1293
conntrack new,established
• ip filter chain input rule append tail target accept in-intf mgmt0 protocol tcp dest-port 1293
conntrack new,established
• ip filter chain input rule append tail target accept in-intf mgmt0 protocol udp dest-port 1707
conntrack new,established
• ip filter chain input rule append tail target accept in-intf mgmt0 protocol tcp dest-port 1707
conntrack new,established
• ip filter chain input rule append tail target accept protocol udp dest-port 3786 conntrack
new,established in-intf lo
• ip filter chain input rule append tail target accept protocol udp dest-port 33000 conntrack
new,established in-intf lo
• ip filter chain input rule append tail target accept in-intf mgmt0 protocol icmp
• ip filter chain input rule append tail target accept dup-delete source-port 5353 dest-port 5353 in-intf
mgmt0 protocol udp conntrack new,established
• ip filter chain input rule append tail target logging in-intf mgmt0
• ip filter chain output rule append tail target drop out-intf mgmt0 state invalid
• ip filter chain output rule append tail target accept out-intf mgmt0
• ip filter chain logging rule append tail target nflog in-intf mgmt0 rate-limit 1/minute logging-options
prefix "IPTables-Dropped-<Domain>: " logging-options group 3
• ip filter chain logging rule append tail target drop in-intf mgmt0
Enables IP filtering.
The no form of the command disables IP filtering.
Default ip Enabled
ip6 Disabled
122
History 3.5.1000
3.10.3000 IP Filter is enabled by default
switch (config) # ip filter enable
Example
Related Commands
Notes It is recommended to run this command only after configuring all of the IP table
filter parameters.
Configures default policy for a specific chain (if no rule matches this default policy
action shall apply).
The no form of the command resets default policy for a specific chain.
Syntax Description chain_name Selects a chain for which to add or modify a filter:
• input – input chain or ingress interfaces
• output – output chain or egress interfaces
History 3.5.1000
switch (config) # ipv6 filter chain input policy accept
Example
Related Commands
Notes
123
ip filter chain rule target | ipv6 filter chain rule target
{ip | ipv6} filter chain <chain_name> rule <oper> target <target> [<param>]
no {ip | ipv6} filter chain <chain_name> rule {<number> | all}
• accept – allows the packets that match the rule into the
target management plane
• drop – drops packets that match the rule
• rate-limit – allows with rate limiting in packets per sec (PPS)
• reject-with – drops the packet and replies with an ICMP error
message
124
• protocol <if_name> – matches a specific protocol
param4 • tcp
(cont.) • udp
• icmp
• all
• not-protocol <protocol> – does not match a specific protocol
• tcp
• udp
• icmp
• all
• source-addr <ip> – matches a specific source address range
• not-source-addr <ip> – does not match a specific source address
range
• source-port <port(s)> – matches a specific source port or port
range
• not-source-port <port(s)> – does not match a specific source port
or port range
• state – matches packets in a particular state. Possible values:
• established – packet associated with an established connection
which has seen traffic in both directions
• related – packet that starts a new connection but is related to an
existing connection
• new – packet that starts a new, unrelated connection
• A combination can be entered separated by commas
Default N/A
Configuration config
Mode
History 3.5.1000
switch (config) # ipv6 filter enable chain input rule append tail target drop state
related protocol all dup-delete
Example
Related Commands
• The source and destination ports may each be either a single number, or a range
Notes specified as “<low>-<high>”. For example: “10-20” would specify ports 10
through 20 (inclusive).
• The port parameter only works in conjunction with TCP and UDP
• Setting a “positive” rule removes any corresponding “not-” rules, and vice-versa
• The “state” parameter is a classification of the packet relative to existing
connections
• If TCP or UDP are selected for the “protocol” parameter, source and/or
destination ports may be specified. If ICMP is selected, these options are either
ignored, or an error is produced.
125
Syntax Description N/A
Default Disabled
History 3.5.1000
switch (config) # ip filter options include-bridges
Example
Related Commands
Notes
ip filter reset-to-default-rules
ip filter reset-to-default-rules
Deletes all configured IP filter rules and add the default rules defined in the user
manual under section "IP Table Filtering Default Rules", above.
Default N/A
Related Commands
Notes
show ip filter
show ip filter
126
Default N/A
History 3.6.6000
Example switch (config) # show ip filter
Related Commands
Notes
Default N/A
History 3.6.6000
127
Destination : 1.1.1.0/24
Interface : all
Example State : any
Other Filter: -
Related Commands
Notes
Default N/A
History 3.6.6000
switch (config) # show ip filter configured
Example Packet filtering for IPv4: enabled
IPv4 configuration:
Chain 'input' Policy 'accept':
Rule 1:
Target : accept
Protocol : all
Source : all
Destination : 1.1.1.0/24
Interface : all
State : any
Other Filter: -
Related Commands
128
Notes
Default N/A
History 3.6.6000
switch (config) # show ipv6 filter
Example Packet filtering for IPv6: enables
Related Commands
Notes
129
Default N/A
History 3.6.6000
switch (config) # show ipv6 filter all
Example Packet filtering for IPv6: enables
Related Commands
Notes
Default N/A
History 3.6.6000
130
switch (config) # show ipv6 filter configured
Example Packet filtering for IPv6: enables
IPv6 configuration:
Chain 'input' Policy 'accept':
Rule 1:
Target : accept
Protocol : all
Source : all
Destination : 1.1.1.0/24
Interface : all
State : any
Other Filter: -
Related Commands
Notes
Chassis Management
The chassis manager provides the user access to the following information:
Accessible Parameters Description
Additionally, it monitors:
• AC power to the PSUs
• DC power out from the PSUs
• Chassis failures
131
System Health Monitor
The system health monitor scans the system to decide whether or not the system is healthy. When
the monitor discovers that one of the system's modules (leaf, spine, fan, or power supply) is in an
unhealthy state or returned from an unhealthy state, it notifies the users through the following
methods:
• System logs—accessible to the user at any time as they are saved permanently on the system
• Status LEDs—changed by the system health monitor when an error is found in the system and
is resolved
• Email/SNMP traps—notification on any error found in the system and resolved
Re-Notification on Errors
When the system is in an unhealthy state, the system health monitor notifies the user about the
current unresolved issue every X seconds. The user can configure the re-notification gap by running
the “health notif-cntr <counter>” command.
<fan_name> speed A chassis fan speed is Email, fan LED and Check the fan and “<fan_name> has
is below minimal below minimal system status LED replace it if been restored to its
range threshold: set red, log alert, required normal state”
SNMP.
15% of maximum speed
Fan <fan_number> A spine fan speed is Email, fan LED and Check the fan and “Fan speed
speed in spine below minimal system status LED replace it if <fan_number> in
number threshold: set red, log alert, required spine number
<spine_number> is SNMP <spine_number> has
below minimal 30% of maximum speed been restored to its
range normal state”
<fan_name> is A chassis fan is not Email, fan LED and Check fan “<fan_name> has
unresponsive responsive on the system status LED connectivity and been restored to its
switch system set red, log alert, replace it if normal state”
SNMP required
Fan <fan_number> A spine fan is not Email, fan LED and Check fan “Fan <fan_number>
in spine number responsive on the system status LED connectivity and in spine number
<spine_number> is switch system set red, log alert, replace it if <spine_number> has
unresponsive SNMP required been restored to its
normal state”
132
Alert Message Scenario Notification Recovery Action Recovery
Indicator Message
<fan_name> is not A chassis fan is missing Email, fan LED and Insert a fan unit “<fan_name> has
present system status LED been restored to its
set red, log alert, normal state”
SNMP
Fan <fan_number> A spine fan is missing Email, fan LED and Insert a fan unit “Fan <fan_number>
in spine number system status LED in spine number
<spine_number> is set red, log alert, <spine_number> has
not present. SNMP been restored to its
normal state”
Insufficient Insufficient number of Email, fan LED and Plug in additional “The system
number of working working fans in the system status LED fans or change currently has
fans in the system system set red, log alert, faulty fans sufficient number of
SNMP working fans”
Power Supply The power supply Email, power Check the power “Power Supply
<ps_number> voltage is out of range. supply LED and connection of the <ps_number>
voltage is out of system status LED PS voltage is in range”
range set red, log alert,
SNMP
Power supply A power supply unit Email, power Check chassis fans “Power supply
<ps_number> temperature is higher supply LED and connections. On <ps_number>
temperature is too than the maximum system status LED switch systems, temperature is back
hot threshold of 70 Celsius set red, log alert, check system fan to normal”
on the switch system SNMP connections.
Power Supply A power supply is Email, system Connect power “Power supply has
<number> is malfunctioning or status and power cable or replace been removed” or
unresponsive disconnected supply LED set red, malfunctioning PS “PS has been
log alert, SNMP restored to its
normal state”
Unit/leaf/spine One of the voltages on Email, system Check leaf “Unit voltage is in
voltage is out of the switch system is status LED set red, connectivity range”
range below minimal log alert, SNMP
threshold or higher
than the maximum
threshold - both
thresholds are 15% of
the expected voltage
133
Alert Message Scenario Notification Recovery Action Recovery
Indicator Message
ASIC temperature An ASIC unit Email, system Check the fan’s “ASIC temperature is
is too hot temperature is higher status LED set red, system back to normal”
than the maximum log alert, SNMP
threshold of 105
Celsius on switch
systems
Power Management
MLNX-OS offers power redundancy configurations and monitoring for modular switch systems.
Modular switch systems have the following redundancy configuration modes:
• “combined”—no power supply is reserved. The redundancy is not enabled.
• “ps-redundant”—one power supply unit is redundant to the rest. The system can work with
one less power supply unit.
• “grid-redundant”—the power supplies are split into two logical power supply grids, first half
of the PSUs belongs to grid A and the second half to grid B. The systems can work with only
one grid. When using grid-redundancy mode the power budget is calculated according to the
minimum power budget between the grids. This mode is available on CS75xx chassis systems.
During switch initialization, or hot-plugging of switch components, MLNX-OS enables and/or
disables switch components according to the available power budget.
In case of an insufficient-power mode, the order in which the FRUs are turned ON is first spines
(1,2,3...max) and then the leafs (1,2,3...max), while the order of the FRUs in case of turning them
OFF is first the spines (max...3) and then the leafs (max...1). The management modules are not
affected.
134
Power cycle is needed after changing power redundancy mode on a modular switch system.
proprietary power saving feature to be utilized to economize the power usage of the fabric. LWR
may be used to manually or automatically configure a certain connection between
NVIDIA switch
systems to lower the width of a link from 4X operation to 1X based on the traffic flow.
When “show interfaces” is used, a port’s speed appears unchanged even when only one lane
is active.
135
Switch-A Configuration Switch-B Configuration Behavior
It is possible to power down or power up modules in a chassis by using the commands “power
enable” and “no power enable”.
1. Run the command “show power” to get a list of modules that are available to power up or down.
2. To power down a desired module, run:
4. Using the ”show power” command it is possible to see the power consumption of the system and also
the power consumption by power supply unit.
136
MGMT acdc-monitor1 1.05V LAN 1.50 1.51 OK 1.72 1.27
MGMT ASICVoltMonitor1 Asic 1.2V 1.20 1.21 OK 1.38 1.02
MGMT ASICVoltMonitor1 Asic 3.3V 3.30 3.31 OK 3.79 2.80
MGMT ASICVoltMonitor2 Vcore SX 0.95 0.96 OK 1.09 0.81
MGMT ASICVoltMonitor2 Asic 1.8V 1.80 1.81 OK 2.07 1.53
MGMT acdc-monitor2 3.3V Switch IB 3.30 3.36 OK 3.79 2.80
PS1 power-mon vout 12V 12.00 12.07 OK 13.80 10.20
4. Display the voltage current and status of each module in the system. Run:
USB Access
The OS can access USB devices attached to switch systems. USB devices are automatically
recognized and mounted upon insertion. To access a USB device for reading or writing a file, you
need to provide the path to the file on the mounted USB device in the following format:
scp://username:password@hostname/var/mnt/usb1/<file name>
While username and password are the admin username and password and hostname is the IP of the
switch.
Examples:
• To fetch an image from a USB device, run the command:
• To save log file (my-logfile) to a USB device under the name “test_logfile” using the command
“logging files”, run:
• To safely remove the USB and to flush the cache, after writing (log files, for example) to a
USB, use the “usb eject” command:
137
Unit Identification LED
The unit identification (UID) LED is a hardware feature used as a means of locating a specific switch
system in a server room.
The master node is the only node that has access to chassis components such as
temperature, inventory and firmware.
The CPU role of the current management node can be recognized by following one these methods:
• Running the command “show chassis ha”
138
switch (config) # show chassis ha
2-node HA state:
Box management IPv4: 10.7.146.44/24
Box management IPv6: fdfd:fdfd:7:145::1033:47fd/64
interface : mgmt0
local role : master
local slot : 1
other state : not-present
reset count : 0
• Check the LEDs in the management modules as displayed in the figure below
• Go to the WebUI → System → Modules page and see the information on the LEDs
When a CPU in not responding to an internal communication with the other CPU, the non responding
CPU will be reset by the other CPU. Each time a CPU resets, a counter is incremented. After 5 resets
a CPU is considered malfunctioned and will be shut down.
Or check the system page in the WebUI, the management figure will be grayed out.
To enable the malfunctioned CPU, first replace it and run “chassis ha reset other”.
Box IP (BIP) centralized management infrastructure enables you to configure and monitor the
system. The BIP continues to function even if one of the management blades dies. Box IP is defined
by running the command “chassis ha bip <board IP address>”. The created BIP is used as the master
IP’s alias. For example:
System Configuration
System configuration changes should be performed by the master using the BIP otherwise they are
overridden by the master configuration.
139
Chassis HA is based on database replication enabling the entire master configuration to be
replicated to the slave. Data such as chassis configuration is replicated. However, run time
information such as time, logs, active user lists, is not copied. Additionally, node specific
configuration information such as host name and IP address is not copied.
Chassis HA requires connectivity of both management modules (mgmt0, mgmt1) in the same
broadcast domain.
The SM commands are only visible to the SM HA master in a modular system. This is node
would display "master" in its CLI prompt.
If the node shows "slave" or "unknown", the node is not the "master" and thus would not be
able to use the IB SM commands.
"unknown" indicates that mgmt0 is not LinkUp and is not assigned a valid IPv4 address. On
modular systems, the mgmt0 interface on all installed management modules must be:
• LinkUp
• With a valid IPv4 address
• In the same L2 broadcast domain
Even if only one module is installed, it must have a mgmt0 interface that is LinkUp and with
a valid IPv4 address.
Takeover Functionally
Management CPU functional takeover takes up to 20-30 seconds. However, when plugging in a
module, you need to wait for approximately 3 minutes before making any other hardware change.
During the takeover process, the Master LED status is differentiated by a color scheme. To verify the
system’s status, run the “show chassis ha” command on both managements.
If the CPU malfunctions, the system resets it 5 times in an attempt to solve the issue. If the CPU is
not activated after the reset, the system powers it off as well as its attached spine. Once the CPU is
powered off, the user should replace the malfunctioned CPU module. To power on the CPU and the
attached spine, plug the module in, log into the Master CPU and run the “chassis ha power enable
other” command.
Although the LEDs are functional during the takeover, wait for approximately 3 minutes
before making any other hardware change.
Master example:
140
reset count : 0
Slave example:
Not following these instructions may result in some errors in the log. These errors may be
safely ignored.
System Reboot
Rebooting 1U Switches
To reboot a 1U switch system, run:
NVIDIA high end management modular switch systems support redundant management modules.
Chassis HA reduces downtime as it assures continuity of the work even when a management module
dies. Chassis HA management allows the systems administrator to associate a single IP address with
the appliance. Connecting to that IP address allows the user to change and review the system’s
chassis parameters regardless of the active management module.
141
Viewing Active Events
Onyx supports viewing all active events on the system. The following events may be observed with
the command “show system hardware events”.
Event Name Description
Ethernet Family
Invalid Ethertype Packet has an unknown Ethertype (0x05DC < ethertype <
0x600)
IP Routing Family
Ingress Router interface is disabled Ingress packet has been dropped because incoming L3
interface is admin down
Mismatched IP (UC DIP over MC/BC Mac) Packet MAC is multicast/broadcast but destination IP is
unicast
142
MC RPF check failure Multicast RPF check failure
Egress Router interface is disabled Egress packet has been dropped because outgoing L3
interface is admin/oper is down
Tunnel Family
• Chassis Management
• clear counters
• health
• led uid
• power enable
• system manage inband-ib
• power redundancy-mode
• system profile
• usb eject
• show asic-version
• show bios
• show cpld
• show fan
• show health-report
• show inventory
• show leds
• show memory
• show module
• show power
• show power consumers
• show protocols
• show resources
• show system capabilities
• show system manage inband-ib
• show system profile
• show system type
• show temperature
• show version
143
• show version concise
• show voltage
• Chassis High Availability
• chassis ha bip
• chassis ha
• chassis ha power enable other
• show chassis ha
• chassis ha bipv6
Chassis Management
clear counters
Default N/A
History 3.2.3000
3.6.4000: Added note
switch (config) # clear counters
Example
Related Commands
health
Syntax Description max-report- Sets the length of the health report (number of line entries)
len <length> Range: 10-2048
144
re-notif-cntr Health control changes notification counter in seconds
<counter> Range: 120-7200
Default max-report-len: 50
re-notif-cntr:
History 3.1.0000
switch (config) # health re-notif-cntr 125
Example
Notes
led uid
Syntax Description module Specifies the module whose UID LED to configure
Default N/A
History 3.6.1002
3.6.2002:
Added modular switch support
switch (config) # led MGMT uid on
Example
Related Commands
• On 1U switch systems, the module parameter can only be MGMT
Notes
• On modular switch systems, the module parameter may be MGMT#, L#, S# (e.g.
MGMT1, L01, S01)
145
power enable
Default N/A
146
switch (config) # system manage inband-ib
Example
power redundancy-mode
grid-redundant N+N – the alarm threshold will be set to a level, indicating when the
power availability falls below power that can support N+N scheme
ps-redundant N+1 – the alarm threshold will be set to a level, indicating when the
power availability falls below power that can support N+1 scheme
Default N/A
Related Commands
• The difference between the modes sets the threshold for power supply
Notes redundancy failure. It does not change any power supply configuration.
• This command is not applicable for 1U or blade systems.
system profile
147
Syntax Description ib-single-switch Enables InfiniBand switch profile
All network interfaces link protocol set to InfiniBand
split-ready Enables the system to reboot in split enable mode with capability to
configure 2x the number of ports exposed to IB utilities.
Note: This parameter is available only on Quantum-based systems.
148
3.1.0000
History 3.2.1100: Added “vpi-single-switch” option
3.3.4100: Added SX6036G3.3.4302Added system profile ib-no-adaptive-routing-single-
switch
3.6.1002: Added system profile “ib num-of-swids”
3.6.6162: Added system profile “num of adaptive routing”
3.7.0020: Added system profile “ib split-ready” for 1U systems
3.8.1100: Updated syntax description for the parameter "adaptive-routing-groups"
3.9.0300: Added system profile “ib split-ready” for modular systems
3.9.2000: Updated note
usb eject
usb eject
Default N/A
History 3.1.0000
switch (config) # usb eject
Example
Related Commands
149
Notes Applicable only for systems with USB interface.
show asic-version
show asic-version
Default N/A
History 3.1.0000
3.4.2008: Updated example
Related Commands
Notes
show bios
show bios
Default N/A
History 3.3.4150
switch (config) # show bios
BIOS version : 4.6.5
Example BIOS subversion : Official AMI Release
BIOS release date : 07/02/2021
Related Commands
150
Notes
show cpld
show cpld
Default N/A
History 3.1.0000
3.3.4302: Updated example
3.10.1000: Updated example to reflect the part number (PN) field
3.10.1100: Updated example to reflect Version Minor
Example switch (config) # show cpld
----------------------------------------------------------------------------
Name Type Version Version Minor PN
----------------------------------------------------------------------------
Cpld1 CPLD_TOR 9 1 0x0078
Cpld2 CPLD_SWB_UNIFIED 3 3 0x0128
Cpld3 CPLD_LED 1 0 0x00d1
Related Commands
Notes
show fan
show fan
Default N/A
History 3.1.0000
151
Example switch (config) # show fan
-----------------------------------------------------
Module Device Fan Speed Status
(RPM)
-----------------------------------------------------
FAN1 FAN F1 6297.00 OK
FAN1 FAN F2 5421.00 OK
FAN2 FAN F1 6355.00 OK
FAN2 FAN F2 5378.00 OK
FAN3 FAN F1 6183.00 OK
FAN3 FAN F2 5421.00 OK
FAN4 FAN F1 6268.00 OK
FAN4 FAN F2 5399.00 OK
PS1 FAN F1 10336.00 OK
PS2 FAN - - NOT PRESENT
Related Commands
Notes
show health-report
show health-report
Default N/A
History 3.1.0000
3.3.0000: Output update
switch (config) # show health-report
========================
Example | ALERTS CONFIGURATION |
========================
Re-notification counter (sec):[3600]
Report max counter: [50]
========================
| HEALTH REPORT |
========================
No Health issues file
Notes
152
show inventory
show inventory
Default N/A
History 3.1.0000
3.4.1604: Removed CPU module output from example
3.5.1000: Removed Type column from example
3.6.1002: Updated example
Example
Related Commands
Notes
show leds
Syntax Description module Specifies the module whose LED status to display
Default N/A
153
History 3.6.1002
3.6.2002: Updated example
Related Commands
Notes
show memory
show memory
Default N/A
History 3.1.0000
3.7.1000: Updated example
Example
154
switch (config) # show memory
-----------------------------------------------------------------------
Memory Space Total Used Free Used+B/C Free-B/C
-----------------------------------------------------------------------
Physical 15848 MB 2849 MB 12999 MB 3854 MB 11994 MB
Swap 0 MB 0 MB 0 MB
Related Commands
Notes
show module
show module
Default N/A
History 3.1.0000
3.3.0000: Added “Is Fatal” column
3.4.2008: Updated command output
3.4.3000: Updated command output and added note
Related Commands
Notes The Status column may have one of the following values: error, fatal, not-present,
powered-off, powered-on, ready.
155
show power
show power
Default N/A
History 3.1.0000
3.5.1000: Updated example
Example
switch (config) # show power
----------------------------------------------------------------------------------
Module Device Sensor Power Voltage Current Capacity Feed Status
[Watts] [Volts] [Amp] [Watts]
----------------------------------------------------------------------------------
PS1 power-mon input 32.25 12.11 1.26 800.00 DC OK
PS2 power-mon input 46.56 12.13 2.33 800.00 DC OK
Related Commands
Notes
Default N/A
History 3.1.0000
3.5.1000: Updated example
Example
156
switch (config) # show power consumers
-------------------------------------------------------------------------
Module Device Sensor Power Voltage Current Status
[Watts] [Volts] [Amp]
-------------------------------------------------------------------------
MGMT CURR_MONITOR 12V 52.96 11.71 4.52 OK
PS1 power-mon input 252.00 12.00 20.25 OK
PS2 power-mon input 280.00 12.03 23.25 OK
Related Commands
Notes
show protocols
show protocols
Default N/A
History 3.2.3000
3.3.4550: Updated example
3.6.1002: Updated example
Infiniband enabled
sm enabled
router disabled
Related Commands
Notes
show resources
show resources
157
Default N/A
History 3.1.0000
switch (config) # show resources
Total Used Free
Example Physical 2027 MB 761 MB 1266 MB
Swap 0 MB 0 MB 0 MB
Number of CPUs: 1
CPU load averages: 0.11 / 0.23 / 0.23
CPU 1
Utilization: 5%
Peak Utilization Last Hour: 19% at 2012/02/15 13:26:19
Avg. Utilization Last Hour: 7%
Related Commands
Notes
Default N/A
History 3.1.0000
3.3.0000: Added gateway support
3.6.1002: Updated example
3.7.0000: Updated example
Notes
158
show system manage inband-ib
Default N/A
History 3.8.1000
switch (config) # show system manage inband-ib
Manage inband-ib: no
Example
Default N/A
History
3.2.0000
3.7.0000: Updated example
Profile : ib
Number of SWIDs : 1
Adaptive Routing : yes
Adaptive Routing Groups : 2048
IB Routing : no
159
Notes
Default N/A
History
3.5.1000
Related Commands
Notes
show temperature
show temperature
Default N/A
History 3.1.0000
160
Example switch (config) # show temperature
---------------------------------------------------------
Module Component Reg CurTemp Status
(Celsius)
---------------------------------------------------------
MGMT SIB2 T1 32.00 OK
MGMT Board AMB temp T1 23.50 OK
MGMT Ports AMB temp T1 27.50 OK
MGMT CPU package Sensor T1 27.00 OK
MGMT CPU Core Sensor T1 18.00 OK
MGMT CPU Core Sensor T2 27.00 OK
PS1 power-mon T1 22.50 OK
Related Commands
Notes
show version
show version
Default N/A
History 3.1.0000
Related Commands
Notes
161
show version concise
Displays concise version information for the currently running system image.
Default N/A
History 3.1.0000
Example
switch (config) # show version concise
X86_64 3.6.4006 2017-07-03 16:17:39 x86_64
Related Commands
Notes
show voltage
show voltage
Default N/A
History 3.1.0000
3.3.5006: Updated example
Example
162
switch (config) # show voltage
============================================================================================
Module Power Meter Reg Expected Actual Status High Low
Voltage Voltage Range Range
============================================================================================
MGMT BOARD_MONITOR USB 5V sensor 5.00 5.15 OK 5.55 4.45
MGMT BOARD_MONITOR Asic I/O sensor 2.27 2.11 OK 2.55 1.99
MGMT BOARD_MONITOR 1.8V sensor 1.80 1.79 OK 2.03 1.57
MGMT BOARD_MONITOR SYS 3.3V sensor 3.30 3.28 OK 3.68 2.92
MGMT BOARD_MONITOR CPU 0.9V sensor 0.90 0.93 OK 1.04 0.76
MGMT BOARD_MONITOR 1.2V sensor 1.20 1.19 OK 1.37 1.03
MGMT CPU_BOARD_MONITOR 12V sensor 12.00 11.67 OK 13.25 10.75
MGMT CPU_BOARD_MONITOR 12V sensor 2.50 2.46 OK 2.80 2.20
MGMT CPU_BOARD_MONITOR 2.5V sensor 3.30 3.26 OK 3.68 2.92
MGMT CPU_BOARD_MONITOR SYS 3.3V sensor 3.30 3.24 OK 3.68 2.92
MGMT CPU_BOARD_MONITOR SYS 3.3V sensor 1.80 1.79 OK 2.03 1.57
MGMT CPU_BOARD_MONITOR 1.8V sensor 1.20 1.24 OK 1.37 1.03
Related Commands
Notes
chassis ha bip
Default 0.0.0.0
History 3.1.0000
switch (config) # chassis ha bip 192.168.10.100
Example
163
chassis ha
Default N/A
History 3.1.0000
switch (config) # chassis ha reset other
Example
History 3.1.0000
switch (config) # chassis ha power enable other
Example
164
show chassis ha
show chassis ha
History 3.1.0000
switch (config) # show chassis ha
2-node HA state:
Example Box management IPv4: 10.7.146.44/24
Box management IPv6: fdfd:fdfd:7:145::1033:47fd/64
interface : mgmt0
local role : master
local slot : 1
other state : ready
reset count : 0
chassis ha bipv6
History 3.8.1200
switch (config) # chassis ha bipv6 fdfd:fdfd:7:145::1033:47fd /64
Example
165
Notes
NVIDIA adapter, switch, and interconnect products support a unique UNBREAKABLE-LINK® technology
that ensures the network links stay connected (operational) even in a bad connectivity environment.
MLNX-OS offers PHY profile configuration for InfiniBand interfaces. PHY profile includes Link Level
Retransmission (LLR) configuration. A PHY profile is bound to any InfiniBand interface.
Link Level Retransmission (LLR) is used on signal integrity marginal systems to decrease and/or
eliminate the impact of physical errors on the system’s performance.
LLR transmitter breaks the transmitted Layer 2 data stream into Cells and adds a CRC checksum to
each cell.
LLR receiver checks the Cell CRC, in case there is no CRC errors, it forwards the cell and
acknowledges the peer.
LLR is a NVIDIA proprietary feature and will only work with NVIDIA-to-NVIDIA ports.
LLR is not operational for cables longer then 30m.
LLR Mode
The following LLR modes are applicable per port per speed:
• disable—no LLR
• enable—the port becomes passive, only if it got a request to use LLR it activates, otherwise it
remains disabled
• enable-request—the port becomes active, it keeps sending LLR requests to the peer
LLR Negotiation
Both ports on the link perform LLR discovery and negotiation. In order the LLR to be in active state
on the link, the following should apply:
• One port must be configured with LLR “enable-request” on the specified speed.
• The other port (peer) may be configured with LLR “enable-request” or “enable” on the same
specified speed
166
If both the local port and remote port configured with LLR “enabled” the LLR
negotiation will not be activated—the ports will remain in LLR in-active state.
LLR Status
LLR status is a port parameter that states the current state of the LLR.
• Active—LLR is operationally running
• In-Active—LLR is not running
Default N/A
History 3.2.0500
switch (config) # show interfaces ib llr
-----------------------------
Example Interface LLR status
-----------------------------
IB1/1 Inactive
IB1/2 Inactive
IB1/3 Inactive
IB1/4 Inactive
IB1/5 Inactive
IB1/6 Inactive
IB1/7 Inactive
IB1/8 Inactive
IB1/9 Inactive
IB1/10 Inactive
IB1/11 Inactive
IB1/12 Inactive
IB1/13 Inactive
...
Related Commands
Notes
167
Upgrade/Downgrade Process
The following pages provide information on upgrading and downgrading the operating system version
on the device.
168
2. Display the currently available image (.img file).
Partition 1:
<old_image>
Partition 2:
<old_image>
3. Delete the image listed under “Images available to be installed” prior to fetching the new
image. Use the command “image delete” for this purpose.
When deleting an image, it is recommended to delete the file, but not the partition,
so as to not overload system resources.
5. Display the available images again and verify that the new image now appears under “Images
available to be installed”.
To recover from image corruption (e.g., due to power interruption), there are two
installed images on the system. See the commands “image boot next” and “image
boot location” for more information.
Partition 1:
<old_image>
Partition 2:
<old_image>
169
Image signing: trusted signature always required
Admin require signed images: yes
Partition 2:
<old_image>
Last boot partition: 1
Next boot partition: 1
After software reboot, the software upgrade will also automatically upgrade the
firmware version.
On systems with dual management, the software must be upgraded on both the host
and the device modules.
170
In order to upgrade the system on dual management system, refer to “Upgrading
MLNX-OS Software on Modular Switches”.
When performing an upgrade from the WebUI, make sure that the image being
upgraded to is not already located in the system (i.e., fetched from the CLI).
Upgrading HA Groups
If fallback is ever necessary in an HA group, all cluster nodes must have the same OS version
installed and they must be immediately reloaded.
2. Upgrade standby node in the HA group according to steps 1-10 in "Upgrading Operating
System Software".
3. Wait until all standby nodes have rejoined the group.
In situations of heavy CPU load or noisy network, it is possible that another node
assumes the role of cluster master before all standby nodes have rejoined the group.
If this happens, you may stop waiting and proceed directly to step 4.
4. Upgrade the master node in the HA group according to steps 1-10 in "Upgrading Operating
System Software".
Modular switches feature dual management modules.
show chassis ha
2. Upgrade the chassis master according to steps 1-8 in “Upgrading Operating System Software”.
Please DO NOT reboot!
3. Upgrade the second management module according to steps 1-8 in “Upgrading Operating
System Software”. Please DO NOT reboot!
171
4. Reset the slave management module. In the master management module, run:
5. After invoking the command above, please reboot the master management immediately.
Run:
show chassis ha
If the reset count is not equal to either 0 or 1, power cycle the system.
7. Verify all the systems are back online as members of the IB subnet ID. Run:
Using a modular switch with different software versions on its two management
boards is not supported.
When replacing a management board the software running on the replacement board
must be aligned with the version of the software running on the other management
board.
Installed images:
Partition 1:
version: image-X86_64-3.6.5000.img
Partition 2:
version: image-X86_64-3.6.5000.img
Last boot partition: 1
Next boot partition: 1
172
switch (config) # image delete image-X86_64-3.9.1302.img
When deleting an image, it is recommended to delete the file, but not the partition,
so as to not overload system resources.
Downgrading OS Software
Prior to downgrading software, please make sure the following prerequisites are met.
1. Log in to the switch via the CLI using the console port.
2. Backup configuration by following these steps.
a. Disable paging of CLI output.
Downloading Image
1. Log in to your system to obtain its product number.
2. Log in to MyMellanoxand download the relevant MLNX-OS version to your system type
3. Log in to your system via the CLI.
4. Change to Config mode.
5. Delete all previous images from the Images available to be installed prior to fetching the new
image.
6. Fetch the desired software image.
173
Downgrading Image
The procedure described below assumes that booting and running is done from Partition 1
and the downgrade procedure is performed on Partition 2.
174
There are two installed images on the system. Therefore, if one of the images gets
corrupted (due to power interruption, for example), in the next reboot the image
will go up from the second partition.
If you are downgrading to an older software version which has never been run yet on
the switch, use the following command sequence as well.
7. Reload.
The system saves a backup configuration file when upgrading from an older software version to a
newer one. If the system returns to the older software partition, it uses this backup configuration
file.
All configuration changes done with the new software are lost when returning to the older
software version.
There are 2 instances where the backup configuration file does not exist:
• The user has run “reset factory” command, which clears all configuration files in the system
• The user has run “configuration switch-to” to a configuration file with different name then
the backup file
Note that the configuration file becomes empty if the system is downgraded to a software
version which has never been installed yet.
To allow switching partition to the older software version for the 2 aforementioned cases only,
follow the steps below.
1. Run the following command.
175
3. Save the configuration.
Upon rebooting your switch system after updating the OS software, the OS compares its default
firmware version with the currently programmed firmware versions on all the switch modules(leafs
and spines on modular-class switches, or simply the switch card on modular switch systems).
If one or more of the switch modules is programmed with a firmware version other than the default
version, then the OS automatically attempts to burn the default firmware version instead.
If a firmware update takes place, then the login process is delayed a few minutes.
To verify that the firmware update was successful, log into your switch and run the command “show
asic-version” (can be run in any mode). This command lists all of the switch modules along with
their firmware versions. Make sure that all the firmware versions are the same and match the
default firmware version. If the firmware update failed for one or more modules, then the following
warning is displayed.
Some subsystems are not updated with a default firmware.
If you detect a mismatch in firmware version for one or more modules of the switch system,
please contact your assigned field application engineer.
This section is applicable to modular switch systems only.
If you insert a switch spine or leaf with a firmware version other than the default version of MLNX-
OS, an automatic firmware update process takes place immediately to the inserted module only.
176
The firmware update may take a few minutes. It is recommended not to run any commands
until the firmware update completes.
During firmware upgrade internal link status (up/down) notifications may be sent.
To verify that the firmware update was successful, run the command “show asic-version” (can be
run in any mode). Check that the firmware version of the inserted switch spine or leaf has the
default firmware version.
If you detect a firmware version mismatch for the newly inserted module, please contact
your assigned field application engineer.
To perform an automatic firmware update by the OS for a different switch firmware version without
changing the OS version, import the firmware package as described below. The OS sets it as the new
default firmware and performs the firmware update automatically as described in the previous
subsections.
177
2. Change default firmware on the management modules using the command image default-
chip-fw.
3. Verify that both master and slave have successfully installed the new firmware. The following
message should be displayed:
Default firmware <fw> updated. Please save configuration and reboot for new FW to take effect.
• image boot
• boot next
• boot system
• image default-chip-fw
• image delete
• image fetch
• image install
• image move
• image options
• show bootvar
• show images
image boot
Specifies the default location where the system should be booted from.
Syntax Description location-ID Specifies the default destination location. There can be up to 2
images on the system. The possible values are 1 or 2.
next Sets the boot location to be the next once after the one currently
booted from, thus avoiding a cycle through all the available
locations.
Default N/A
Configuration Mode config
History
3.1.0000
Example
switch (config) # image boot location 2
178
boot next
Sets the default setting for next boot. Normally, if the system fails to apply the
configuration on startup (after attempting upgrades or downgrades, as appropriate),
it will reboot to the other partition as a fallback.
The no form of the command tells the system not to do that, only for the next boot.
Default N/A
History 3.2.0506
boot system
179
Syntax Description location Specifies location from which to boot system
• 1—installs to location 1
• 2—installs to location 2
next Boots system from next location after one currently booted
Default N/A
History 3.2.0506
Notes
image default-chip-fw
Related Commands
show asic-version
show images
Notes
image delete
180
Syntax Description image-name Specifies the image name
Default N/A
Configuration Mode config
History
3.1.0000
Example
switch (config) # image delete <filename>.img
Related Commands
show images
Notes
image fetch
Related Commands
show images
181
Notes • Please delete the previously available image, prior to fetching the new image
• The path to the file in the case of TFTP depends on the server configuration.
Therefore, it may not be an absolute path but a relative one.
• See “Upgrading Operating System Software” page
image install
Default N/A
Configuration Mode config
History
3.1.0000
Example
switch (config) # image install X86_64 3.6.5000 2017-07-26 06:54:12 x86_64
Step 1 of 4: Verify Image
100.0%
[################################################################]
Step 2 of 4: Uncompress Image
100.0%
[################################################################]
Step 3 of 4: Create Filesystems
100.0%
[################################################################]
Step 4 of 4: Extract Image
100.0%
[################################################################]
switch (config) #
Related Commands
show images
Notes • The image cannot be installed on the “active” location (the one which is
currently being booted)
• On a two-location system, the location is chosen automatically if no location is
specified
image move
182
Syntax Description src-image-name
Specifies the current image name
dest-image- Specifies the new image name
name
Default N/A
Configuration Mode config
History
3.1.0000
Example
switch (config) # image move image1.img image2.img
Related Commands
show images
Notes
image options
Related Commands
show images
Notes
The parameter “serve all” affects not only the files currently present, but also any
files that are later downloaded. It only applies to image files, not the installed
images, which are not themselves in a downloadable format.
After running “serve all” the URLs where the images will be available are:
• http://<HOSTNAME>/system_images/<FILENAME>
• https://<HOSTNAME>/system_images/<FILENAME>
183
show bootvar
show bootvar
Related Commands
Notes
show images
show images
184
Example
switch (config)# show images
Installed images:
Partition 1:
X86_64 3.6.4110-12 2017-07-26 06:54:12 x86_64
Partition 2:
X86_64 3.6.4006 2017-07-03 16:17:39 x86_64
Last boot partition: 1
Next boot partition: 1
webimage.tbz
X86_64 3.6.4071-12 2017-07-26 06:54:12 x86_64
Related Commands
show images
Notes
Configuration Management
• To save the configuration to a user-specified file without making the new file the active
configuration file, run:
• To save the configuration to a user-specified file and make the new file the active
configuration file, run:
185
switch (config) # configuration write to myconf
• To display the available configuration files and the active file, run:
switch >
switch > enable
switch # configure terminal
switch (config) # configuration switch-to myconfig
switch (config) #
On modular switch systems with dual management modules, load the configuration file according to
the following:
1. Power cycle the system.
2. Load the configuration on the top CPU that serves as the chassis master according to the
procedure described above.
If the configuration file is loaded on a different CPU than the SM HA master (SM HA
master that servers the VIP), the SM configuration is overwritten.
If the system configuration ever becomes corrupted it is suggested to restore the factory
default configuration.
a. Connect to a remote console/serial connection.
b. Remove the slave management module.
c. Run "reset factory":
Please wait for reboot to complete before moving to the next step.
186
d. Log in as “admin” and start running the Configuration Wizard.
e. Insert the slave management module.
f. Remove the master management module.
A takeover will occur changing the Slave management module role to Master.
g. Repeat Step 3 on the new Master management module.
h. Insert the other management module. No takeover will occur at this stage.
i. Power cycle the system.
BIN configuration files are not human readable. Additionally, these files are encrypted and contain
integrity verification preventing them from being edited and used.
• To create a new BIN configuration file, do the following:
A newly created BIN configuration file is always empty and is not created from the
running-config.
187
A binary configuration file uploaded from the switch is encrypted and has integrity
verification. If the file is modified in any manner, the fetch to the switch fails.
Text configuration files are text-based and editable. It is similar in form to the output of the
command “show running-config expanded”.
• To create a new text-based configuration file, do the following:
A newly created text configuration file is always created from the running-config.
• To apply a text-based configuration file, do the following:
188
Automated Periodic Configuration File Backup
Automated Backup
Automated configuration file backup feature can be used to upload the active configuration file on
every “configuration write".
• To set the remote URL to upload the configuration file to, run the following:
This will upload the active configuration file on every “configuration write."
This will disable the feature. It will not upload the active configuration file after each
“configuration write."
189
4. Enable the job.
• File System
• debug generate dump
• file debug-dump
• file stats
• file tcpdump
• file eula upload
• file open-source-licenses upload
• file help-docs upload
• reload
• reset factory
• configuration new factory
• configuration new factory keep-docker
• show files debug-dump
• show files stats
• show files system
• show files tcpdump
• Configuration Files
• configuration audit
• configuration auto-upload
• configuration copy
• configuration delete
• configuration fetch
• configuration jump-start
• configuration merge
• configuration move
• configuration new
• configuration revert
• configuration switch-to
• configuration text fetch
• configuration text file
• configuration text generate
• configuration upload
• configuration write
• write
• show configuration
• show configuration auto-upload
• show running-config
• show running-config interface
190
File System
file debug-dump
file debug-dump {delete {<filename> | all | latest} | email {<filename> | latest} | upload
{<filename> | latest} <URL>}
191
URL The URL to the remote host. Supported URL formats: HTTP,
HTTPS, FTP, TFTP, SCP and SFTP.
Example: scp://username[:password]@hostname/path/
filename
Default N/A
Configuration config
Mode
History 3.1.0000
file stats
upload Uploads a stats report file. Supported URL formats: HTTP, HTTPS,
<filename> FTP, TFTP, SCP and SFTP.
<URL> Example: scp://username[:password]@hostname/path/filename
Default N/A
History 3.1.0000
192
Example switch (config) # file stats move memory-1.csv memory-2.csv
Notes
file tcpdump
upload Uploads the specified tcpdump output file to the specified URL.
<filename> Supported URL formats: HTTP, HTTPS, FTP, TFTP, SCP and SFTP.
<URL> Example: scp://username[:password]@hostname/path/filename.
Default N/A
History 3.1.0000
Notes
193
URL URL or scp://username[:password]@hostname/path/filename
Default N/A
Configuration config
Mode
History 3.4.1100
Related license
Commands
Notes N/A
Default N/A
Configuration config
Mode
History 3.9.3100
Related license
Commands
Notes N/A
194
file help-docs upload
Default N/A
History 3.4.1100
Notes
reload
Syntax Description force Forces an immediate reboot of the system even if the system is
immediate busy.
halt Shuts down the system.
nonconfirm
Reboots the system without asking about unsaved changes.
Default N/A
History 3.1.0000
195
Related Commands reset factory
Notes
reset factory
Syntax Description keep-all-config Preserves all configuration files including licenses. Removes the
logs, stats, images, snapshots, history, and known hosts.
The user is prompted for confirmation before honoring this
command, unless confirmation is disabled with the command: “no
cli default prompt confirm-reset”.
keep-config- Reset to the factory defaults of the current RoCE config group: no-
group roce, lossless, lossy or semi-lossless.
<label name>
Default N/A
History 3.1.0000
196
switch (config) # reset factory
Warning - confirming will cause system reboot.
Example Type 'YES' to confirm reset: YES
Resetting and rebooting the system -- please wait...
...
Default N/A
History 3.7.1102
Notes
Creates new file with only factory defaults except docker current configuration.
Default N/A
197
Configuration Mode config
History 3.7.1102
switch (config) # no configuration new my_file factory keep-docker
Example
Syntax Description filename Displays a summary of the contents of a particular debug dump file.
Default N/A
History 3.1.0000
==================================================
==================================================
Output of 'uname -a':
==================================================
Notes
198
show files stats
Syntax Description filename Display the contents of a particular statistics report file.
Default N/A
History 3.1.0000
Notes
Default N/A
History 3.1.0000
Related Commands
Notes
199
show files tcpdump
Default N/A
History 3.1.0000
Related Commands
Notes
Configuration Files
configuration audit
Default 1000
History 3.1.0000
Notes
200
configuration auto-upload
Default N/A
History 3.9.0500
Notes If this feature is set, after every configuration write it will upload the active
configuration file to the configured remote URL.
configuration copy
Default N/A
History 3.1.0000
Related Commands
201
• This command does not affect the current running configuration
Notes • The active configuration file may not be the target of a copy. However, it
may be the source of a copy in which case the original remains active.
configuration delete
Default N/A
History 3.1.0000
configuration fetch
Default N/A
History 3.1.0000
202
• The downloaded file should not override the active configuration file, using
Notes the <name> parameter
• If no name is specified for a configuration fetch, it is given the same name
as it had on the server
• No configuration file may have the name “active”
configuration jump-start
configuration jump-start
Default N/A
History 3.1.0000
configuration merge
Merges the “shared configuration” from one configuration file into the running
configuration.
Name of file from which to merge settings.
Syntax Description filename
203
Default N/A
History 3.1.0000
Related Commands
• No configuration files are modified during this process
Notes • The configuration filename must be a non-active configuration file
configuration move
Default N/A
History 3.1.0000
204
configuration new
Creates a new configuration file under the specified name. The parameters specify
what configuration, if any, to carry forward from the current running
configuration.
History 3.1.0000
configuration revert
Syntax Description factory Creates new file with only factory defaults.
keep-basic Keeps licenses and host keys.
keep- Keeps configuration necessary for connectivity (interfaces, routes,
connect and ARP).
saved Reverts running configuration to last saved configuration.
Default N/A
205
3.1.0000
History
switch (config) # configuration revert saved
Example
configuration switch-to
Loads the configuration from the specified file and makes it the active configuration
file.
Default N/A
History 3.1.0000
3.6.1002 | Added “no-reboot” option
206
configuration text fetch
Fetches a text configuration file (list of CLI commands) from a specified URL.
Syntax Description apply Applies the file to the running configuration (i.e. executes the
commands in it). This option has the following parameters:
• discard—does not keep downloaded configuration text file
after applying it to the system
• fail-continue—if applying commands, continues execution
even if one of them fails
• overwrite—if saving the file and the filename already exists,
replaces the old file
• verbose—displays all commands being executed and their
output instead of just those that get errors
overwrite Downloads the file and saves it using the same name it had on the
server. This option has the following parameters:
• apply—applies the downloaded configuration to the running
system
• filename—specifies filename for saving downloaded text file
Default N/A
History 3.2.1000
Related Commands
Notes
207
Syntax Description filename Specifies the filename.
<file>
verbose Displays all commands being executed and their output, instead of
just those that get errors.
upload <URL> Supported types are HTTP, HTTPS, FTP, TFTP, SCP and SFTP.
For example: scp://username[:password]@hostname/path/
filename
reboot Write the configuration and reboot after successful execution.
Default N/A
History 3.1.0000
3.9.0300 | Added ability to apply reboot
Notes
208
file Generates from inactive saved configuration.
<filename>
upload <URL> Supported types are HTTP, HTTPS, FTP, TFTP, SCP and SFTP.
For example: scp://username[:password]@hostname/path/
filename.
Default N/A
History 3.1.0000
Example switch (config) # configuration text generate file initial.prev save example
Notes
configuration upload
Default N/A
History 3.1.0000
3.9.0500 | Added timestamp option
209
configuration write
Syntax Description local Saves the running configuration locally (same as “write memory
local”).
no-switch Saves the running configuration to this file but keep the current
one active.
Default N/A
History 3.1.0000
Notes
write
Syntax Description memory Saves running configuration to the active configuration file. It is the
same as “configuration write”.
local Saves the running configuration only on the local node. It is the
same as “configuration write local”.
Default N/A
210
History 3.1.0000
Example
switch (config) # write terminal
##
## Running database "initial"
## Generated at 2014/05/27 10:05:16 +0000
## Hostname: switch
##
##
## Network interface configuration
##
interface mgmt0 comment ""
interface mgmt0 create
interface mgmt0 dhcp
interface mgmt0 display
interface mgmt0 duplex auto
interface mgmt0 mtu 1500
no interface mgmt0 shutdown
interface mgmt0 speed auto
no interface mgmt0 zeroconf
##
## Local user account configuration
##
username a** capability admin
no username a** disable
username a** disable password
......
Related Commands
show running-config
configuration write
Notes
show configuration
Displays a list of CLI commands that will bring the state of a fresh system up to
match the current persistent state of this system.
211
Default N/A
History 3.1.0000
3.3.5006 | Removed “running full” and “full” parameters
Example
switch (config) # show configuration
##
## Active saved database "newcon"
## Generated at 20114/05/25 10:18:52 +0000
## Hostname: switch-3cc29c
##
##
## Network interface configuration
##
interface mgmt0 comment ""
interface mgmt0 create
interface mgmt0 dhcp
interface mgmt0 display
interface mgmt0 duplex auto
interface mgmt0 mtu 1500
no interface mgmt0 shutdown
interface mgmt0 speed auto
no interface mgmt0 zeroconf
Related Commands
Notes
Default N/A
History 3.9.0500
Example
switch (config) # show configuration auto-upload
Auto-upload settings:
Enabled: yes
Remote url: scp://[email protected]/tmp/conf1
Password : ******
Related Commands
configuration auto-upload remote-url
212
Notes If this feature is set. After every configuration write, it will upload the active
configuration file to the configured remote URL.
show running-config
Default N/A
History 3.1.0000
Related Commands
213
• + <string> : <string> exists only in running-config, but not in the saved
Notes filename (or active config file if no <filename> is specified)
• - <string> : <string> does not exist in running-config, but exists in the saved
filename (or active config file if no <filename> is specified)
• ! <string> : <string> exists in both running-config and the saved filename, but
it is out of order. This should not impact the user, but may impact scripts or
applications that are parsing the output of the command
Default N/A
History 3.8.1000
3.8.3000 Updates command
switch (config) # show running-config interface lo 1
interface loopback 1
Example interface loopback 1 ip address 1.1.10.10/32 primary
Related Commands
Notes
mDNS
Multicast DNS (mDNS) protocol is used by the SM HA to deliver control information between the
InfiniBand nodes via the management interface. To block sending mDNS traffic from the
management interface run the command “no ha dns enable”.
214
mDNS Commands
ha dns enable
ha dns enable
no ha dns enable
Related Commands
Notes
Virtual Machine
A virtual machine (VM) on a switch is added to allow additional OS to run on top of the switch. The
VM OS can connect through mgmt0 interface to the switch system’s management interface. In
addition, the VM is also connected to the out-of-band network. This allows it to communicate
through the network and to control the switch management software.
The number of VMs that may run on a system is user-configurable and also relies on resource
availability.
The number of configurable VMs is limited to 4.
215
The example below installs Ubuntu 14 and defines 3GB storage with 512MB memory
(default) using the first core of the switch system (default) through mgmt0 interface
(default) with an auto-generated MAC (default).
2. Create a VM.
switch (config virtual-machine host my-vm) # storage create disk size-max 3000
100.0% [#################################################################]
Created empty virtual disk volume 'vdisk001.img' in pool 'default'
Device attached to drive number 1.
switch (config virtual-machine host my-vm) #
7. Switch to a different terminal, and run the following command to connect VNC viewer to the
VM:
8. Continue VM installation from the VNC prompt.
216
Status: running Architecture: x86_64
VCPU used: 12 min 27.440 sec Number of VCPUs: 1
Boot order: cdrom, hd Memory size: 512 MB
Consoles: text, graphics
Storage:
IDE bus, drive 1: default/vdisk001.img (3000 MB capacity)
IDE bus, drive 2: default/ubuntu-14.04-server-amd64.iso (564 MB capacity) READ-ONLY
Interfaces:
1: on bridge 'mgmt0' address unknown (MAC 52:54:00:2f:89:69)
USB stick with supported VM image should be supplied to the user
1. Insert the USB stick (supplied) to the USB port of your switch system.
2. Decide on a name for the VM (e.g., “my_vm”).
3. Decide on the network configuration of the VM.
• Use DHCP or alternately use static IP definitions
• Assign a MAC address or alternately use the default MAC address
4. Launch the full installation of the VM with the network definitions of your choice.
virtual-machine enable
virtual-machine enable
no virtual-machine enable
History 3.4.0000
switch (config) # virtual-machine enable
Example
Related Commands
Notes
217
virtual-machine host
Default N/A
History 3.4.0000
switch (config)# virtual-machine host my-vm
switch (config virtual-machine host my-vm)#
Example
Related Commands
Notes
arch
Default x86_64
History 3.4.0000
switch (config virtual-machine host my-vm)# arch i386
Example
Related Commands virtual-machine
Notes
218
comment
comment <string>
no comment
Default N/A
History 3.4.0000
switch (config virtual-machine host my-vm)# comment “example VM”
Example
Related Commands virtual-machine
Notes To configure a multi-word string, the string must be placed within quotation marks
console
Syntax Description connect Connects to the text console unless specified otherwise:
• graphics—connects to the X11 graphical (VNC) console
• text—connects to the text console
History 3.4.0000
switch (config virtual-machine host my-vm)# console connect text
Example
219
Related Commands
virtual-machine
ssh server x11-forwarding enable
Notes • To exit the text console press Ctrl-6 (or Ctrl-Shift-6)
• If the guest OS is not configured to receive input from a serial console
(ttyS0), the VM console becomes unresponsive when connected to.
• To view the graphical console, X display must be enabled. There are two
options to activate it, the command “vncviewer -via admin@<switchIP>
127.0.0.1:<VNC display num>” (which is run from an external Linux host) and
the command “ssh server x11-forwarding enable” (which is run from within
the switch and requires that you log out and log back in again using ssh -X ).
The latter command weakens the switch security, therefore, it is
recommended to opt for the second option. The VNC display num parameter
may be procured by running the command “show virtual-machine <vm-name>
detail”.
install
Installs an operating system onto this VM (temporarily attach a CD and boot from it).
connect-console Connects to the console during installation. The types may be:
<console-type> • text—text console
• graphics—graphical console
Default N/A
220
Configuration Mode config virtual machine host
History 3.4.0000
switch (config virtual-machine host my-vm)# install cdrom pool usb file <image>
Example
Related Commands virtual-machine
Notes The default pool from which the system installs the ISO image is the /var/ partition
in the switch
install-from-usb
default- The IP address of the default gateway to configure for the installed
gateway VM
Default N/A
History 3.6.2002
switch (config virtual-machine host my-vm)# install-from-usb
100.0% [##############################################################]
Example VM host my-vm MAC is: aa:bb:cc:dd:ee:ff
switch (config virtual-machine host my-vm)#
Notes USB stick supplied must be inserted into the USB port of the switch system prior to
running this command
221
interface
Default N/A
History 3.4.0000
switch (config virtual-machine host my-vm)# interface 1 model virtio
Example
Related Commands virtual-machine
Notes
memory
memory <MB>
Default 512MB
222
History 3.4.0000
switch (config virtual-machine host my-vm)# memory 1024
Example
Related Commands virtual-machine
power
Syntax Description cycle Powers the VM down and then on again immediately
connect-console Connects to the console after power-on. The types may be:
<console-type> • text—text console
• graphics—graphical console
on Powers on VM
Default N/A
History 3.4.0000
switch (config virtual-machine host my-vm)# power cycle force
Example
Related Commands virtual-machine
Notes
storage create
Creates a new storage device for the VM, with an automatically assigned name.
223
Syntax Description create disk Creates a new virtual disk image for this VM.
Default N/A
History 3.4.0000
switch (config virtual-machine host my-vm)# storage create disk size-max 2000
Example
Related Commands virtual-machine
Notes
storage device
Modifies existing storage device, or create a new one with a specific name.
The no form of the command removes a storage device from the VM.
Syntax Description device Modifies existing storage device, or creates a new one with a
specific name.
224
source Specifies where the data for this volume resides
Default N/A
History 3.4.0000
switch (config virtual-machine host my-vm)# storage create disk bus ide
Example
Related Commands virtual-machine
Notes
vcpus
Default N/A
History 3.4.0000
switch (config virtual-machine host my-vm)# vcpus count 1
Example
Related Commands
Notes
225
virtual-machine volume fetch url
Default N/A
History 3.4.0000
switch (config) # virtual-machine volume fetch scp://username[:password]@hostname/
path/filename
Example
Related Commands
Notes
virt volume file <name> {create disk size-max <MB> | move {new-name <new-name>
| pool <pool-name> new-name <new-name>} | upload <upload-url>}
no virt volume file <volume-name>
226
pool <pool- Specifies a storage pool for the copy.
name> new-
name
<filename>
upload <upload-
url> Uploads this volume file to a remote host.
Supported format: ftp, tftp, scp and sftp are supported
(e.g., scp://username[:password]@hostname/path/filename).
Default N/A
Configuration Mode config virtual machine host
History 3.4.0000
Example switch (config) # virt volume file my-vm_file create cdrom extract cdrom1
Related Commands
Notes
Default N/A
History 3.4.0000
switch (config) # show virtual-machine configured
Virtualization enabled: yes
Example Virtual machines: 2 configured
Virtual networks: 0 configured
Related Commands
Notes
227
Default N/A
History 3.4.0000
switch (config) # show virtual-machine host my-vm
VM 'my-vm'
Example Status :shut off
Architecture :x86_64
VCPU used :0 sec
Number of VCPUs :1
Boot order :hd, cdrom
Memory size :512 MB
Consoles :text, graphics
Storage:
IDE bus, drive 1: default/vdisk002.img (3000 MB capacity)
Interfaces:
1: on bridge 'mgmt0' address unknown (MAC 52:54:00:a4:45:ae)
Related Commands
Notes If the command is run in the middle of an installation, the following banner appears:
Default N/A
History 3.4.0000
Example
228
switch (config) # show virtual-machine host my-vm configured
VM 'my-vm'
Auto-power :on
Architecture :x86_64
Boot order :hd, cdrom
Number of VCPUs :1
Consoles: text, graphics
Memory size :512 MB
Storage:
IDE bus, drive 1: default/vdisk002.img (3000 MB capacity)
Interfaces:
Interface 1:
on bridge 'mgmt0'(MAC 52:5400A4:45:AE)
Storage:
IDE bus, drive 1
Source pool: default
Source file: vdisk001.img (3000 MB capacity)
Mode: read-write
Interfaces:
Interface 1
Name: vif1
MAC address: 52:54:00:2f:89:69
Model: realtek-8139
Bound to: bridge 'mgmt0'
Related Commands
Notes
Default N/A
History 3.4.0000
Example
229
switch (config) # show virtual-machine host my-vm detail
VM 'my-vm'
Status :shut off
UUID :c4c587fc-c394-5112-9cb2-8102b2ae861a
Text console :enabled
Device :N/A
Graphics console :enabled
VNC display num :N/A
Boot order :hd, cdrom
Architecture :x86_64
Memory size :512 MB
Features :ACPI, APIC
Number of VCPUs :1
State of individual VCPUs unavailable when VM is powered off
Storage:
IDE bus, drive 1
Source pool: default
Source file: vdisk001.img (3000 MB capacity)
Mode: read-write
Device type: disk
Read requests: N/A
Read bytes: N/A
Write requests: N/A
Write bytes: N/A
Interfaces:
Interface 1
Name: vif2
MAC address: 52:54:00:a8:ba:f3
Model: realtek-8139
Bound to: bridge 'mgmt0'
IP address:
RX bytes: 0
TX bytes: 0
RX packets: 0
TX packets: 0
RX errors: 0
TX errors: 0
RX drop: 0
TX drop: 0
Related Commands
Notes
Default N/A
History 3.4.0000
230
switch (config) # show virtual-machine host my_host install
Example Install status for VM 'my_host':
Install in progress, begun 9 minutes 11 seconds ago.
Previous install:
Completed : 2018/09/12 14:08:45.041
Install status: FAILED
Failure reason: canceled by user
Related Commands
Notes
Default N/A
History 3.4.0000
Counters:
RX bytes: 0 TX bytes: 0
RX packets: 0 TX packets: 0
RX errors: 0 TX errors: 0
RX drop: 0 TX drop: 0
Related Commands
Notes
231
show virtual-machine storage
Related Commands
Notes
232
Network Management Interfaces
SNMP
Simple Network Management Protocol (SNMP), is a network protocol for the management of a
network and the monitoring of network devices and their functions. SNMP supports asynchronous
event (trap) notifications and queries.MLNX-OS supports:
• SNMP versions v1, v2c and v3
• SNMP trap notifications
• Standard MIBs
• Private MIBs
Standard MIBs
The following table presents the supported textual conventions and conformance MIBs:
MIB Standard
INET-ADDRESS-MIB RFC-4001
SNMPV2-CONF
IANAifType-MIB
IANA-ADDRESS-FAMILY-NUMBERS-MIB
IGMP-STD-MIB RFC2933 (See IGMP-STD-MIB Information section)
The following table presents the supported chassis and switch MIBs:
MIB Standard Comments
233
MIB Standard Comments
Private MIBs
MIB Description
234
MIB Description
Proprietary Traps
The following private traps are supported by the
MLNX-OS
MELLANOX-EFM-MIB:
Trap Action Required
internalBusError N/A
cpuUtilHigh N/A
diskSpaceLow Clean images and sysDump files using the commands “image
delete” and “file debug-dump delete”.
lowPowerRecover N/A
insufficientFansRecover N/A
insufficientPowerRecover N/A
235
For additional information refer to MELLANOX-EFM-MIB.
For event-to-MIB mapping, please refer to “Supported Event Notifications and MIB
Mapping”.
Configuring SNMP
Activate the SNMP server on your switch by running:
Community strings are case sensitive.
Modular switches require SNMP timeout configuration on the agent of 60 seconds.
Resetting SNMP engine ID is not supported on modular switch systems.
Switch systems shipped with an OS versions older than 3.6.6102 have all had the exact same SNMPv3
engine ID. Going forward, however, all switch systems will ship with a system-specific engine ID.
Upgrading the OS version to 3.6.6102 or higher does not automatically change the current engine ID.
That can be done through one of the following methods after performing the software upgrade:
• Changing a switch system’s profile
• Running “reset factory”
• Using the command “snmp-server engineID reset” (for more details, please see the procedure
below)
To reset SNMP engine ID using “snmp-server engineID reset”:
236
Prerequisites:
If any of the following SNMP configurations exist, please delete/disable them and re-enable/
reconfigure them only after SNMP engine ID reset is performed:
1. Make sure SNMP is disabled. Run:
Procedure:
1. Check existing engine ID:
switch (config) # snmp-server user [role] v3 prompt auth <hash type> priv <privacy type>
Where:
• user role—admin
• auth type—md5 or sha or sha224 or sha256 or sha384 or sha512
• priv type—des or aes-128 or 3des or aes-192 or aes-256 or aes-192-cfb or aes-256-cfb
2. Enter authentication password and its confirmation.
3. Enter privacy password and its confirmation:
switch (config) # snmp-server user admin v3 prompt auth md5 priv des
Auth password: ********
Confirm: ********
Privacy password: ********
Confirm: ********
237
snmpwalk -v3 -l authPriv -a MD5 -u admin -A “<Authentication password>” -x DES -X “<privacy password>”
<system ip> SNMPv2-MIB::system
2. Configure SNMP host with the desired arguments (IP Address, SNMP version, authentication
methods). More than one host can be configured. Each host may have different attributes.
Run:
switch (config) # snmp-server host 10.134.47.3 traps version 3 user my-username auth sha my-password
10.134.47.3
Enabled: yes
Port: 162 (default)
Notification type: SNMP v3 trap
Username: my-username
Authentication type: sha
Privacy type: aes-128
Authentication password: (set)
Privacy password: (set)
238
To print event notifications to the terminal (SSH or CONSOLE) refer to “Monitor”.
For the SNMPv1 traps or informs, by default, the "agent address" field is set to the IP
address of the "mgmt0" interface. In the case that "source interface" is configured to the
same VRF which is used for SNMPv1 traps or informs, the IP address of the source interface
is used for "agent address" field. In other cases (e.g., if source interface might be
configured in some other VRF), "127.0.0.1" is used for the "agent address".
3. Make sure SNMP communities are enabled (they are enabled by default). Make sure
“(DISABLED)” does not appear beside “Read-only communities” / “Read-write communities”.
Run:
Read-only communities:
public
Read-write communities:
my-community-name
239
switch (config) # snmp-server user myuser v3 auth sha <password1> priv aes-128 <password2>
It is possible to use other configuration options not specified in the example above.
Please refer to the command “snmp-server user” for more information.
2. Make sure the username is enabled for SET access and has admin capability level. Run:
The OS supports the OIDs for SET operation listed in the following table which are expanded upon in
the following subsections.
OID Name OID
mellanoxConfigDBCmdFilename 1.3.6.1.4.1.33049.12.1.1.2.2.0
mellanoxConfigDBCmdStatus 1.3.6.1.4.1.33049.12.1.1.2.4.0
mellanoxConfigDBCmdStatusString 1.3.6.1.4.1.33049.12.1.1.2.5.0
mellanoxConfigDBCmdUri 1.3.6.1.4.1.33049.12.1.1.2.1.0
mellanoxPowerCycleCmdStatus 1.3.6.1.4.1.33049.10.1.1.2.2.0
mellanoxPowerCycleCmdStatusString 1.3.6.1.4.1.33049.10.1.1.2.3.0
240
OID Name OID
mellanoxSWUpdateCmdUri 1.3.6.1.4.1.33049.11.1.1.2.2.0
mellanoxSWUpdateCmdExecute 1.3.6.1.4.1.33049.11.1.1.2.3.0
mellanoxSWUpdateCmdStatus 1.3.6.1.4.1.33049.11.1.1.2.4.0
mellanoxSWUpdateCmdStatusString 1.3.6.1.4.1.33049.11.1.1.2.5.0
mellanoxSWActivePartition 1.3.6.1.4.1.33049.11.1.1.3.0.0
mellanoxSWNextBootPartition 1.3.6.1.4.1.33049.11.1.1.4.0.0
The OS allows the user to use test the notification mechanism via SNMP SET. Sending a SET request
with the designated OID triggers a test trap.
Prerequisites:
1. Enable SET operations by following the instructions in “Enabling SNMP SET”.
2. Configure host to which to send SNMP notifications.
3. Set a trap receiver in the MIB browser.
Procedure:
1. Send a SET request to the switch IP with the OID 1.3.6.1.4.1.33049.2.1.1.1.6.0.
2. Make sure the test trap is received by the aforementioned trap receiver (OID:
1.3.6.1.4.1.33049.2.1.2.13).
The OS supports setting system hostname using an SNMP SET request as described in SNMPv2-MIB
(sysName, OID: 1.3.6.1.2.1.1.5.0).
The restrictions on setting a hostname via CLI also apply to setting a hostname through SNMP. Refer
to the command “hostname” for more information.
The OS supports power cycling its systems using an SNMP SET request as described in MELLANOX-
POWER-CYCLE MIB.
Power cycle command is issued via the OID mellanoxPowerCycleCmdExecute. The following options
are available:
• Reload—saves any unsaved configuration and reloads the switch
241
• Reload discard—reboots the system and discards of any unsaved changes
• Reload force—forces an expedited reload on the system even if it is busy without saving
unsaved configuration (equals the CLI command reload force)
• Reload slave—reloads the slave management on dual management systems (must be executed
from the master management module)
On modular switch systems, it is advised to connect via the BIP to make sure
commands are executed from the master management.
The OS supports making configuration changes on its systems using SNMP SET requests. Configuration
requests are performed by setting several values (arguments) and then executing a command by
setting the value for the relevant operation.
It is possible to set the parameters and execute the commands on the same SNMP request or
separate them to several SET operations. Upon executing a command, the values of its arguments
remain and can be read using GET commands.
For example, when performing a fetch (download) operation, an immediate error can occur when
the given URL is invalid. A delayed error can occur if the download process fails due to network
connectivity issues.
242
command. The filename parameter indicates what configuration file on the switch to upload
(same as the CLI command configuration text generate file <filename> upload).
• ConfigWrite—saves active configuration to a filename on the switch as given in the filename
parameter. In case filename is “active”, active configuration is saved to the current saved
configuration (same as the CLI command configuration write).
• BinaryDelete—deletes a binary based configuration file
• TextDelete—deletes a text based configuration file
The OS supports upgrading its software using an SNMP SET request as described in MELLANOX-SW-
UPDATE MIB.
The software upgrade command is issued via the OID mellanoxSWUpdateCmdExecute. The following
options are available:
• Update—fetches the image from a specified URI (equivalent to the command “image fetch”
followed by “image install”)
The image to update from is defined by the OID mellanoxSWUpdateCmdUri. The restrictions
on the URI are identical to what is supported in the CLI command “image fetch”.
• Set-Next—changes the image for the next boot equivalent to the CLI command “image boot”)
The partition from which to boot is defined by the OID mellanoxSWUpdateCmdSetNext. The
parameters for this OID are as follows:
• 0—no change
• 1—partition 1
• 2—partition 2
• 3—next partition (default)
The OS supports displaying information of switch ports, LAG ports, MLAG ports and VLAN interfaces
on all systems via SNMP interface. This feature is enabled by default. The interface information is
available in the ifTables, ifXTable and mellanoxIfVPITable.
Additionally, traps for interface up/down, and internal link suboptimal speed are enabled. It is
possible to enable one or both of these traps.
Interface up/down traps are sent whenever there is a change in the interface’s operational state.
These traps are suppressed for internal links when the internal link’s speed does not match the
configured speed of the link (mismatch condition).
243
Additional Readings and Use Cases
For more information about this feature and its potential applications, please refer to the following
community posts:
• Getting Started with SNMP MIBs
• HowTo Use SNMP SET
JSON API
JavaScript Object Notation (JSON) is a machine-to-machine data-interchange format which is
supported in MLNX-OS CLI.
The JSON API allows executing CLI commands and receiving outputs in JSON format which can be
easily parsed by the calling software.
Authentication
The JSON API protocol runs over HTTP/HTTPS and uses the existing web authentication mechanism.
In order to access the system via HTTP/HTTPS, an HTTP/HTTPS client is needed to send POST
requests to the system.
HTTPS access to the web-based management console needs to be enabled using the
command “web https enable” to allow POST requests.
The HTTPS client must first be authenticated by sending a POST request to the following URL:
https://<ip-address>/admin/launch?script=rh&template=json-request&action=json-login
The POST request content should contain the following data (may also be saved as a file) in a JSON
format:
{
"username": "<user name>",
"password": "<user password>"
}
After a successful login, a session ID (cookie) is returned to be used for other HTTPS requests in the
system.
Authentication Example
Before sending JSON HTTPS request, the user must first authenticate.
244
Create a JSON format file that contains the relevant login credentials. For example, add this
content to a file called "post.json":
{
"username": "admin",
"password": "admin"
}
Run the following from your server’s shell to create a login session ID in the file: cookiejar.
Upon a successful login, you will receive a reply similar to the following:
{
"status": "OK",
"status_message": "Successfully logged-in"
}
The session ID can now be used in all other JSON HTTPS requests to the system.
{
"status": "ERROR",
"status_message": "<Invalid username or password | Please provide username and password>"
}
You may also log in and execute commands in the same JSON request. In this case, the JSON file
must be in the following format:
{
"username": "<user name>",
"password": "<user password>",
"commands | cmd": ["<cli command 1>", "<cli command 2>"] | "<cli command>",
"execution_type": "sync | async"
}
For example:
{
"username": "admin",
"password": "admin",
"cmd": "show fan"
}
If login is successful, the JSON API response appears. Otherwise, login failure response is presented.
This section provides support for changing the default password through JSON API.
Expected Input
• To change the initial password, the payload will be as follows:
245
{
"username": "admin",
"password": "admin",
"initial_admin_password": "admin",
"initial_monitor_password": "monitor"
}
Expected Outputs
• Admin and Monitor passwords cannot be changed because they have already been changed:
{
"status": "ERROR",
"status_message": " ‘admin’ password was already set & ‘monitor’ password was already set"
}
{
"status_message": " <‘admin’ password was updated successfully> & <‘monitor’ password was updated
successfully> "
}
{
"status": "OK",
"status_message": "’admin’ password was updated successfully & ‘monitor’ password was updated successfully"
}
• One of the passwords of either Admin or Monitor was changed, while the other remained the
same:
{
"status": "<ERROR|OK>",
"status_message": " < Initial password for the ‘admin’ password was already set | ‘admin’ password was
updated successfully> "
}
• When the payload does not have initial passwords, check change-password nodes to see if
there is no updated password return in this JSON payload:
{
"status": "ERROR",
"status_message": “Please set the default password for ‘admin’ account by using initial password
parameters”
}
When there is no issue with the login, flow will proceed without needing this step.
246
1. Performs a POST operation on URL (the request should contain the session cookie):
[switch_ip]/script=rh&template=json-request&action=json-logout
2. The switch will remove the session and return the following JSON in the response text (in
case of error, content will be relevant to the error):
{
"status": "OK",
"status_message": "Successfully logged-out"
}
3. Make sure there is no cookie. A request with an invalid cookie will respond that the cookie is
invalid.
Logout Example
After the request is handled in the system the HTTPS client receives a JSON response with an
indication of the request execution result. If there is data resulting from the request, it is returned
as part of the response.
See “JSON Response Format” for the reply format.JSON requests may also be sent using the WebUI.
For more information on using the WebUI with JSON, please refer to “JSON Request Using WebUI”.
JSON execution requests are HTTPS POST requests that contain CLI commands to be executed in the
system.
247
"cmd": "<CLI command to execute>"
}
Example:
{
"cmd": "show interfaces ethernet 1/1"
}
{
"commands":["<CLI cmd 1>", "<CLI cmd 2>", … , <CLI cmd n>]
}
Example:
{
"commands":
[
"show interfaces ethernet 1/1",
"show interfaces ethernet 1/2"
]
}
In case of a multiple command request, the execution of the commands is done in the order they
appear in the execution list. Note that the execution of a multiple command request will be
stopped upon first failure. That is, in case the execution of one of the commands fails, none of the
remaining commands will be executed.
Execution Types
Synchronous requests will wait for a JSON response from the system. The synchronous request has a
defined wait time after which the user will receive a timeout response. The timeout for a
synchronous request is configurable by the user and is 30 seconds by default (see the CLI
command “json-gw synchronous-request-timeout”).
Asynchronous requests will return immediately after sending the request with a reply containing a
“job_id” key. The user can use the given job ID to later query for request status and execution
results. Queries for asynchronous request results are guaranteed to be accessible up to 60 seconds
after the request has been completed. After the result has been successfully queried it will be
deleted and will no longer be accessible (even if the result is not 60 seconds old).
To specify the execution type, the user needs to add the following key to the JSON execution
request:
"execution_type":"<async|sync>"
Example:
{
"execution_type":"async",
"cmd": "show interfaces ethernet 1/1"
}
248
JSON Query Requests
JSON Query requests are HTTPS GET requests that contain a job ID parameter. Using a query
request, the user can get information on the current execution state of an ongoing request or the
execution results of a completed request. To send a query request, the user should add the
following parameters to the JSON URL:
job_id=<job number>
Example:
https://<switch-ip-address>/admin/launch?script=json&job_id=<job number>
Set commands normally do not return any data or output. If a set command does return an
output, it will be displayed in the “status_message” field.
The HTTPS POST response format structure is a JSON object consisting of 4 name-value pairs as
follows:
{
"executed_command": "<CLI command that was executed>",
"status" = "<OK|ERROR>",
"status_message" = "<information on the status received>",
"data" = {the information that was asked for in the request}
}
Example:
{
“executed_command”: “show interfaces ethernet 1/1
"status": "OK",
"status_message": "",
"data":
249
{
"speed": "40GbE",
"admin_state": "up"
}
}
The HTTPS response format structure is a JSON object consisting of a list of JSON results. Each JSON
structure in the list is structured the same as in the single command execution response (see
the previous section).
However, the status field can contain in this case an additional value, “ABORTED”, in case a
previous command failed. This status value indicates that the command has not been executed at
all in the system.
{
"results": [
{
"executed_command": "<…>",
"status": "<OK|ERROR|ABORTED>",
"status_message": "<…>",
"data": {…}
},
{
"executed_command": "<…>",
"status": "<OK|ERROR|ABORTED>",
"status_message": "<…>",
"data": {…}
},
…
{
"executed_command": "<…>",
"status": "<OK|ERROR|ABORTED>",
"status_message": "<…>",
"data": {…}
}
]
}
Example:
{
"results": [
{
"executed_command": "show interfaces ethernet 1/1",
"status": "OK",
"status_message": ""
"data": {"speed":"40GbE", "admin_state":"up"}
},
{
"executed_command": "show interfaces ethernet 1/100",
"status": "ERROR",
"status_message": "wrong interfaces name",
"data": ""
},
{
"executed_command": "show interfaces ethernet 1/2",
"status": "ABORTED",
"status_message": "",
"data": ""
}
]
}
Response to a query request can be of two types. In case the request completes its execution, the
response will be similar to the single/multiple command response format, depending on the format
250
of the request, and will display the execution results.
In case the execution is not complete yet, the response format will be similar to the single
command response format. However, the status field will contain in this case the value “PENDING”
to indicate that the request is still in progress. In addition, the “executed_command” field will
contain the current request command being handled by the system.
Example:
{
"executed_command": "show interfaces ethernet 1/1",
"status": "PENDING",
"status_message": "",
"data":""
}
Response to an asynchronous request is similar to the HTTPS response format of the single command
response. However, an additional unique field will be added, “job_id”, containing the job id number
for querying the request later. The value of the job_id key is of type string.
Example:
{
"executed_command": ""
"status": "OK"
"status_message": ""
"data": ""
"job_id": "2754930426"
}
Supported Commands
• Show commands
• Set commands—all non-interactive CLI set commands are supported
JSON Examples
The following examples use curl (a common tool in Linux systems) to send HTTPS POST requests to
the system.
Single Command
251
Request (save it to a file named req.json):
When the system finishes processing the request, the user will receive a response similar to the
following:
{
"status": "OK",
"executed_command": "show system profile",
"status_message": "",
"data": {
"Profile": "ib",
"Adaptive Routing": "yes",
"Number of SWIDs": "1"
}
}
Multiple Commands
This example sends a request to change an interface description and then queries for its status.
When the system finishes processing the request, the user will receive a response similar to the
following:
{
"results": [
{
"status": "OK",
"executed_command": "interfaces ib 1/1 description test description",
"status_message": "",
"data": ""
},
{
"status": "OK",
"executed_command": "show interfaces ib 1/1 status",
"status_message": "",
"data": {
"IB1/1": [
{
"Description": "test description",
"Speed": "56.0 Gbps",
"Logical port state": "Initialize",
"Physical port state": "LinkUp",
"Current line rate": "56.0 Gbps",
"IB Subnet": "infiniband-default"
}
]
}
}
]
252
}
This example sends an asynchronous request to change an interface description and then queries for
its status.
{"execution_type":"async",
"commands": ["interfaces ib 1/1 description test description",
"show interfaces ib 1/1 status"]}
{
"executed_command": "",
"status": "OK",
"status_message": "",
"data": "",
"job_id": "91329386"
}
This example sends a request to query for a job ID received from a previous execution request.
The request is a an HTTPS GET operation to the JSON URL with the “job_id” parameter.
If the system is still processing the request, the user receives a response similar to the following:
{
"executed_command": " interfaces ib 1/1 description test description ",
"status": "PENDING",
"status_message": "",
"data": ""
}
If the system is done processing the request, the user receives a response similar to the following:
{
"results": [
{
"status": "OK",
"executed_command": "interfaces ib 1/1 description test description",
253
"status_message": "",
"data": ""
},
{
"status": "OK",
"executed_command": "show interfaces ib 1/1 status",
"status_message": "",
"data": {
"IB1/1": [
{
"Description": "test description",
"Speed": "fdr",
"Logical port state": "Initialize",
"Physical port state": "LinkUp",
"Current line rate": "56.0 Gbps",
"IB Subnet": "infiniband-default"
}
]
}
}
]
}
General Error
Error response:
{
"status": "ERROR",
"executed_command": "",
"status_message": "Handle request failed. Reason:\nIllegal JSON structure found in given JSON data.
\nExpecting , delimiter: line 1 column 95 (char 94)",
"data": ""
}
This example sends a multiple command request where one command fails.
{
"execution_type": "sync",
"commands": [ "interfaces ib 1/1 speed sdr",
"interfaces ib 1/200 speed sdr",
"interfaces ib 1/3 speed sdr"]
}
254
Send the request:
Error response:
{
"results": [
{
"status": "OK",
"executed_command": "interfaces ib 1/1 speed sdr",
"status_message": "",
"data": ""
},
{
"status": "ERROR",
"executed_command": "interfaces ib 1/200 speed sdr",
"status_message": "% 1st interface does not exist",
"data": ""
},
{
"status": "ABORTED",
"executed_command": "interfacesib 1/3 speed sdr",
"status_message": "",
"data": ""
}
]
}
WebUI also allows users to send JSON HTTPS POST and GET requests.
Log into the WebUI, go to the “Setup” tab, and select “JSON API” from the left side menu.
This section is displayed only if JSON API is enabled using the command “json-gw enable”.
The JSON response is then shown in the “JSON Response” box below.
The HTTPS method (HTTPS POST in this instance) and the URL used to send the request will be
displayed next to the “HTTPS Method” and “URL” field respectively.
255
To Query an Asynchronous JSON Request
1. Choose “Query asynchronous job status”.
2. Type the job ID in the “Job ID” text box.
3. Press “Query Status”.
The JSON response is then shown in the “JSON Response” box below.
The HTTPS method (HTTPS GET in this instance) and the URL used to send the request will be
displayed next to the “HTTPS Method” and “URL” field respectively.
256
Additional Reading and Use Cases
For more information about this feature and its potential applications, please refer to the following
community post:
• Getting Started With JSON API
• SNMP
• snmp-server auto-refresh
• snmp-server cache enable
• snmp-server community
• snmp-server contact
• snmp-server enable
• snmp-server engineID reset
• snmp-server enable mult-communities
• snmp-server enable notify
• snmp-server enable set-permission
• snmp-server host disable
• snmp-server host informs
• snmp-server host traps
• snmp-server listen
257
• snmp-server notify
• snmp-server port
• snmp-server user
• show snmp
• show snmp auto-refresh
• show snmp engineID
• show snmp set-permission
• show snmp user
• show interfaces ib internal notification
• JSON API
• json-gw enable
• json-gw synchronous-request-timeout
• show json-gw
SNMP
snmp-server auto-refresh
Default Enabled
Interval—60 seconds
History
3.2.3000
3.4.1100: Added “time” parameter and updated notes
switch (config) # snmp-server auto-refresh interval 120
Example
258
• When configuring an interval lower than 60 seconds, the following warning
Notes message appears asking for confirmation: “Warning: this configuration may
increase CPU utilization, Type 'YES' to confirm: YES
• When disabling SNMP auto-refresh, information is retrieved no more than
once every 60 seconds just like SNMP tables that do not have an auto-refresh
mechanism
Default Enabled
History
3.7.0000
switch (config) # snmp-server cache enable
Example
snmp-server community
259
History
3.1.0000
Example switch (config) # snmp-server community private rw
snmp-server contact
3.1.0000
Example switch (config) # snmp-server contact my-name
snmp-server enable
snmp-server enable
no snmp-server enable
260
History
3.1.0000
switch (config) # snmp-server enable
Example
Notes
History
3.6.6102
switch (config) # snmp-server engienID reset
Example
Notes Changing system profile or performing “reset factory...” causes the engine ID to
change to the new node-unique one.
261
History
3.1.0000
switch (config) # snmp-server enable mult-communities
Example
Notes
History
3.1.0000
switch (config) # snmp-server enable notify
Example
Notes SNMP traps are only sent if there are trap sinks configured with the “snmp-server
host...” command, and if these trap sinks are themselves enabled.
262
Default SNMP MIBs are all given permission for SET requests by default
History
3.6.3004
switch (config) # snmp-server enable set-permission MELLANOX-SW-UPDATE
Example
Notes
Default N/A
History
3.1.0000
switch (config) # snmp-server host 10.10.10.10 disable
Example
Notes
263
snmp-server host informs
Send SNMP v2c informs to this host with the default trap community.
The no form of the commands removes a host from which SNMP traps should be sent.
Syntax
Description
IP address IPv4 or IPv6 address.
priv- Plaintext password to use for privacy. If not specified, then auth-password is
password used.
264
Default community—public
UDP port—162
version—3
Configuration config
Mode
History
3.2.1050
switch (config) # snmp-server host 1.1.1.1 informs version 3 engineID
0x800041da04643265363932653432303135 user test auth md5 password priv aes-128 password
Example
Notes
Send SNMP v2c traps to this host with the default trap community.
The no form of the commands removes a host from which SNMP traps should be sent.
265
Syntax Description
ip-address IPv4 or IPv6 address.
priv-password Plaintext password to use for privacy. If not specified, then auth-
password is used.
Default community—public
UDP port—162
version—3
History
3.1.0000
switch (config) # snmp-server host 1.1.1.1 informs version 3 user test auth md5
password priv aes-128 password
Example
266
Related Commands show snmp
snmp-server enable
snmp-server host informs version 3
Notes
snmp-server listen
Syntax Description enable Enables SNMP interface restrictions on access to this system
ifName Adds an interface to the “listen” list for SNMP server. For example:
“mgmt0”, “mgmt1”
Default N/A
History
3.1.0000
switch (config) # snmp listen enable
Example
Notes If enabled, and if at least one of the interfaces listed is eligible to be a listen
interface, then SNMP requests will only be accepted on those interfaces. Otherwise,
SNMP requests are accepted on any interface.
snmp-server notify
Syntax Description community Sets the default community for traps sent to hosts which do not
have a custom community string set
267
event Specifies which events will be sent as traps
History
3.1.0000
3.2.1050: Changed traps to notify
switch (config) # snmp-server community public
Example
snmp-server port
Default 161
History
3.1.0000
switch (config) # snmp-server port 1000
Example
Notes
268
snmp-server user
History
3.1.0000
3.7.0000
3.8.1000: Syntax updated
switch (config) # snmp-server user admin v3 enable
Example
269
• The username chosen here may be anything that is valid as a local UNIX
Notes username (alphanumeric, plus '-', '_', and '.'), but these usernames are
unrelated to, and independent of, local user accounts. That is, they need not
have the same capability level as a local user account of the same name.
Note that these usernames should not be longer than 31 characters, or they
will not work.
• The hash algorithm specified is used both to create digests of the
authentication and privacy passwords for storage in configuration, and also in
HMAC form for the authentication protocol itself
• There are three variants of the command, which branch out after the “v3”
keyword. If “auth” is used next, the passwords are specified in plaintext on
the command line. If “encrypted” is used next, the passwords are specified
encrypted (hashed) on the command line. If “prompt-pass” is used, the
passwords are not specified on the command line the user is prompted for
them when the command is executing. If “priv” is not specified, only the auth
password is prompted for. If “priv” is specified, the privacy password is
prompted for; entering an empty string for this prompt will result in using the
same password specified for authentication.
• AES privacy type encryption using the newest algorithm, which means we use
aes-blumenthal. For more information see http://www.snmp.com/eso/
esoConsortiumMIB.txt.
• No more than 30 SNMPv3 users are allowed in the database
show snmp
Default N/A
History
3.1.0000
3.6.8008—Updated example
270
switch (config) # show snmp
Example SNMP enabled : no
SNMP port : 161
System contact : Test
System location: Boston
Read-only communities:
public
Read-write communities:
good
Listen Interfaces:
Interface: mgmt0
Notes
Default N/A
History
3.1.0000
3.6.6000: Updated example
3.7.0000: Updated example
switch (config) # show snmp auto-refresh
SNMP auto refresh:
Example Auto-refresh enabled: yes
Refresh interval (sec): 60
Cache enabled: yes
Auto-Refreshed tables:
ifTable
ifXTable
mellanoxIfVPITable
Notes
271
show snmp engineID
Default N/A
History
3.6.6102
switch (config) # show snmp engineID
Local SNMP engineID: 0x80004f4db1dd435e80accf4a4d4d3031
Example
Notes
Default N/A
History
3.6.3004
switch (config) # show snmp set-permission
---------------------------------------------
Example MIB Name Set Enable
---------------------------------------------
MELLANOX-CONFIG-DB-MIB yes
MELLANOX-EFM-MIB yes
MELLANOX-POWER-CYCLE yes
MELLANOX-SW-UPDATE no
RFC1213-MIB no
272
Notes
Default N/A
History
3.1.0000
3.6.8008: Updated example
switch (config) # show snmp user
User name: Hendrix
Example Enabled overall: yes
Authentication type: sha
Privacy type: des
Authentication password: (set)
Privacy password: (set)
Require privacy: yes
SET access:
Enabled: yes
Capability level: admin
Notes
Default N/A
History 3.3.4318
273
3.4.3000 Updated example
switch (config) # show interfaces ib internal notification
==========================
Example Internal links information
==========================
State change enabled : yes
Speed mismatch enabled : yes
Periodic notifications : 6 (hours)
Notes
JSON API
json-gw enable
json-gw enable
no json-gw enable
History
3.6.3004
switch (config) # json-gw enable
Example
Notes
json-gw synchronous-request-timeout
274
Syntax Description timeout-value Define a timeout value for synchronous JSON requests
Range: 0-4294967295
History
3.6.3004
switch (config) # json-gw synchronous-request-timeout 100
Example
Notes
show json-gw
show json-gw
Default N/A
History
3.6.3004
3.6.4000: Updated example
switch (config) # show json-gw
Example JSON Gateway enabled: yes
Synchronous request timeout: 30
JSON API version: 1.0
Notes
275
Virtualization
MLNX-OS allows the user to run their own applications on a Linux docker image embedded in the
switch software. The container is a pure application sandbox with resource isolation of both memory
and compute from the system code/NOS.
Docker container implementation in the OS enhances its VM support to provide a new set of
capabilities:
• Network traffic access
Docker containers are implemented in the OS in the same name-space as the network devices
allowing the software to send and receive packets from the switch ports by opening a
standard Linux socket over the network devices and using an IP address assigned to the
device via the legacy management interface (e.g., JSON over HTTP).
The container implementation does not limit the container developer from calling
the SDK to set parameters. However this is strongly discouraged as it may cause
unexpected system behavior where the OS and the container application manage the
same resources.
• Query the Linux tables provisioned by OS such as neighbor cache, routing tables, L3
interfaces attributes etc.
To set the amount of memory allocated to the container, run the following command:
276
switch (config) # docker start imagename latestver containername init memory 25 label newlabel privileged sdk
network docker usb-mount
To set up limitations or regulate the containers access to CPU resources, run the following
command:
docker start imagename latestver containername init cpus 0.2 label new_label privileged sdk network
Upgrade Ramifications
It is possible to move containers from the current version to the updated one by executing the
following steps:
Before upgrade:
1. Save the container as an image—run the command: “docker commit <container_name>
<new_image_name> <new_image_version>”. For example: docker commit my_name
my_image my_version. You can see the new image by running: “show docker images”.
2. Save the image—run the command: “docker save <image_name> <image_version> <file_name-
optional>”. For example: docker save my_image my_version.
3. Upload the image—save the image to a local repository by running: “image upload
<image_file_name> <destination_path>”. For example: image upload
277
my_image_my_version.img.gz scp://username:password@fit150/auto/my_dir. The
<image_file_name> is presented after clicking tab-tab.
After upgrade:
1. Start docker—run the “no docker shutdown” command.
2. Fetch the restored image—run the “image fetch <file_name>” command. For example: image
fetch scp://username:password@fit150/auto/my_dir/my_image_my_version.img.gz
3. Load the image—run the “docker load <image_file_name>” command. For example: docker
load my_image_my_version.img.gz
4. Start a container with the defined image—now that the image with all the content from the
container is available in the new environment, start a container with this image. Run the
command: “docker start <image_name> <image version> <docker_name> <starting_point>|
privileged | label | memory | cpus | usb-mount”. For example: docker start my_image
my_version new_container now
After an upgrade operation there is a need to rerun copy-sdk command (in case in use).
docker
Default N/A
History
3.6.2940
3.9.2300—Added log-level
option
278
switch (config) # docker
Example
Related Commands
Notes
docker login
server
The "server" field is not mandatory. In case it is not
present, the docker will try to login into docker hub
repository.
Default N/A
History 3.9.1600
switch (config) # docker login abcd 1234
Example
Notes
docker logout
279
Syntax Description N/A
Default N/A
History 3.9.1600
switch (config) # docker logout
Example
Related Commands
• There is no need to provide username as only a single user can be connected to
Notes a specific server in any given time
commit
Syntax Description container- Name of the running container to commit (limited to 180 characters)
name
Default N/A
History 3.6.2940
3.6.8008: Added new character limitation for container-name
switch (config docker) # commit mycontainer test latest
Example
Related Commands
Notes
280
copy-sdk
copy-sdk
The command provides access to the switch SDK APIs giving applications running on
docker access to the switch hardware.
Default N/A
Related Commands
• Copying SDK files to a USB mounted folder is not allowed
Notes • After an upgrade operation there is a need to rerun copy-sdk command (in
case in use).
remove image
Default N/A
History 3.6.3520
3.6.2940
switch (config docker) # remove image test latest
Example
281
Notes
exec
Syntax Description container- Name of the running container to commit (limited to 180 characters)
name
Default N/A
History 3.6.3520
3.6.2940
switch (config docker) # exec mycontainer "ls -la"
Example
Notes
282
label
Default N/A
History 3.6.4110
switch (config docker) # label new_label
Example
Related Commands
Notes
load
load <image-name>
Default N/A
History 3.6.2940
switch (config docker) # load test
Example
Notes
283
pull
pull <image-name>[:<version>]
Default N/A
History 3.6.2940
switch (config docker) # pull test
Using default tag: latest
Example latest: Pulling from library/test
45a2e645736c: Pull complete
Digest:
sha256:c577af3197aacedf79c5a204cd7f493c8e07ffbce7f88f7600bf19c688c38799
Status: Downloaded newer image for test:latest
Notes
save
Default N/A
History 3.6.2940
3.6.8008: Updated command syntax
284
switch (config docker) # save busybox latest my_image
Example Saving and compressing image: busybox version: latest
this could take a while...
Notes After the file is created, the filename gets appended a *.gz suffix.
shutdown
shutdown
no shutdown
Default N/A
History 3.6.2940
switch (config docker) # no shutdown
Example
Notes
start
285
image-version Version of the image to start.
cpus Sets how much of the available CPU resources a container can use
(e.g., “cpus 1.5” guarantees at most one and a half of the
available CPUs for the container).
memory Sets the maximum amount of memory the container can use in
MB.
The minimum amount of memory to configure is 4MB.
usb-mount Enables USB mount to the docker container.
host-trust Allows SSH operation from within the container to localhost
without the need to supply password.
logging-facility- Available Parameters: auth, authpriv daemon, ftp, kern, local0,
level local1, local2, local3, local4, local5, local6, local7, lpr, mail,
news, syslog, user, uucp
env-string Up to 16 user-defined environment variables. User-defined
environment variable are separated by a comma (e.g.,
key1=value1,key2=value2)
Default N/A
286
History
3.6.2940
3.6.3520: Added “privileged” parameter
3.6.8008: Added the options “now-and-data-path-ready” and “now-and-init”, new
character limitation for container-name, and updated the description of the
parameter “memory”
switch (config) # docker start imagename latestver containername init cpus 0.2
memory 25
image upload
upload_url FTP, TFTP, SCP and SFTP are supported (e.g., scp://
username[:password]@hostname-or-ip/path/filename)
Default N/A
History 3.6.2940
switch (config) # image upload centos.img.gz scp://
username:[email protected]/var/www/html/<image_name>
Example
Related Commands
287
Notes
upload_url FTP, TFTP, SCP and SFTP are supported (e.g., scp://
username[:password]@hostname/path/filename)
Default N/A
History 3.6.2940
switch (config) # file image upload centos.img.gz scp://
username:[email protected]/var/www/html/<image_name>
Example
Related Commands
Notes
show docker
show docker
Default N/A
3.9.2000
288
Example switch (config) # show docker
Dockers state: started
Docker log-level: warn
Related Commands
Notes
Default N/A
History 3.6.8008
3.8.1000: Updated example
3.9.2000: Updated example, adding host-trust option
3.9.2300: Updated example, adding "user-defined variables" and "log-facility" fields
289
switch (config) # show docker containers
cont_example:
Example image : busybox
version : latest
status : running
start point : data-path-ready
cpu limit : 0.2
memory limit: 10m
labels : -
privileges : network, sdk
usb mount : enabled
host trust : admin
log-facility: kern
user-defined variables:
name1: value1
name2: value2
another_container:
image : busybox
version : latest
status : -
start point : init
cpu limit : 0.2
memory limit: 10m
labels : my_label
privileges : network, sdk
usb mount : disabled
host trust : admin
log-facility: kern
user-defined variables:
name1: value1
name2: value2
OS_SYSTEM_TYPE : MSB7700
OS_VERSION : 3.9.2300
3 OS_DOCKERD_VRF_CONTEXT : vrf-default
OS_DOCKERD_LINUX_VRF_CONTEXT: vrf_vrf-default
user-defined variables:
name1: value1
name2: value2
OS_SYSTEM_TYPE : MSB7700
OS_VERSION : 3.9.2300
OS_DOCKERD_VRF_CONTEXT : vrf-default
OS_DOCKERD_LINUX_VRF_CONTEXT: vrf_vrf-default
Related Commands
290
• If a container is already started, the status field displays its current status
Notes • If a container is configured to run on the next boot, the start point field
displays when it will start
• If there is a mismatch between the configuration of a running container and
its next-boot configuration, two entries for the container are shown with
both of the configurations
• For running containers, environment variables that are automatically passed
to docker container are revealed (i.e., OS_SYSTEM_TYPE, OS_VERSION,
OS_DOCKERD_VRF_CONTEXT, OS_DOCKERD_LINUX_VRF_CONTEXT)
• If no user-defined variables were configured, "user-defined variables" field is
hidden
Default N/A
History 3.6.3520
3.6.2940: Updated example
Example
switch (config) # show docker images
-------------------------------------------------------------
Image Version Created Size
-------------------------------------------------------------
ubuntu latest Less than a secon 117MB
d ago
ubuntu-sdk v1 41 seconds ago 215MB
Related Commands
Notes
show docker ps
show docker ps
291
Default N/A
History 3.6.3520
3.6.2940: Updated example
Example
switch (config) # show docker ps
---------------------------------------------------------------------------------
Container Image:Version Created Status
---------------------------------------------------------------------------------
my_ubuntu_app ubuntu:latest 56 seconds ago Up 50 seconds
Related Commands
Notes This command is available only after Linux dockers are enabled (“no
dockers shutdown”)
Default N/A
History 3.6.4110
switch (config) # show docker labels
Storage label : label_name1
Example configured containers list : cont_name2
active containers list : cont_name1
Related Commands
Notes
292
show docker login
Default N/A
History 3.9.1600
switch (config) # show docker login
Example Servers:
https://index.docker.io/v1/
nvcr.io
Notes
Default N/A
History 3.6.8008
2.9.2300: Added example
switch (config) # show docker stats
----------------------------------------------------------------------------------
Example ------
Container CPU % Memory Memory Memory % Block
Block Pids
Usage Limit IN
OUT
----------------------------------------------------------------------------------
------
container1 0.00% 952K 1000M 0.09% 0B
0B 1
293
Related Commands
Notes This command is available only after Linux dockers are enabled (“no
dockers shutdown”)
294
Telemetry, Monitoring, and Debuggability
• Logging
• Link Diagnostic Per Port
• Signal Degradation Monitoring
• Event Notifications
• Buffer Histograms Monitoring
• Statistics and Alarms
• Management Information Bases (MIBs)
Logging
Monitor
To print logging events to the terminal, set the modules or events you wish to print to the terminal.
For example, run: o–
These commands print system events in severity “notice”, and “sx-sdk” module notifications in
severity “warning” to the screen. For example, in case of interface-down event, the following gets
printed to the screen:
switch (config) #
Wed Jul 10 11:30:42 2013: Interface IB1/17 changed state to DOWN
Wed Jul 10 11:30:43 2013: Interface IB1/18 changed state to DOWN
To see a list of the events, refer to “Supported Event Notifications and MIB Mapping”.
Remote Logging
To configure remote syslog to send syslog messages to a remote syslog server:
1. Set remote syslog server.
295
switch (config) # logging <IP address/hostname> filter <"include"/"exclude"> <regex>
switch (config) # logging <IP address/hostname> trap override class <class name> priority <level>
Logging Protocol
A feature that provides the ability to choose the protocol to use for sending syslog messages to a
remote host: UDP (default) or TCP. See "logging protocol" command.
Logging Commands
logging
Default N/A
History
3.1.1000
Role admin
switch (config) # logging 1.1.1.1
Example switch (config) # no logging 1.1.1.1
Related Commands
Notes This command is configurable. If “configuration write” is executed, the remote host
will still receive messages after reload.
296
logging port
History
3.6.2002
3.8.1000—Updated command syntax
Notes
logging trap
Enables (by setting the syslog IPv4 address/IPv6 address/hostname) sending logging
messages, with ability to filter the logging messages according to their classes.
The no form of the command stops sending messages to the remote syslog server.
Syntax Description syslog IPv4 syslog IPv4 address/IPv6 address/hostname of the remote syslog
address/IPv6 server
address/ Hostname is limited to 64 characters
hostname
297
• none—disables the logging locally and remotely
log-level • 0 - emerg—system is unusable (emergency)
• 1 - alert—alert notification, action must be taken
immediately
• 2 - crit—critical condition
• 3 - err—error condition
• 4 - warning—warning condition
• 5 - notice—normal, but significant condition
• 6 - info—informational condition
• 7 - debug—debug level messages
class Sets or removes a per-class override on the logging level. All classes
which do not have an override set will use the global logging level
set with “logging local <log level>”. Classes that do have an override
will do as the override specifies. If “none” is specified for the log
level, the software will not log anything from this class. Classes
available:
• iss-modules—protocol stack
• mgmt-back—system management back-end
• mgmt-core—system management core
• mgmt-front—system management front-end
• mlx-daemons—management daemons
• sx-sdk—switch SDK
History
3.6.2002
3.8.1000—Updated command syntax
Notes
logging debug-files
298
Syntax Description delete {current Deletes certain debug-log files.
| oldest} • current—deletes the current active debug-log file
• oldest—deletes some of the oldest debug-log files
upload URL Supported formats: HTTP, HTTPS, FTP, TFTP, SCP and SFTP (e.g.:
scp://username[:password]@hostname/path/filename)
Default N/A
History 3.3.4150
3.9.0900: Added "no logging debug-files rotation criteria" command
switch (config) # logging debug-files delete current
Example
Related Commands
Notes
299
logging events enable
Default N/A
Configuration config
Mode
History
3.6.6000
3.9.0900: Added note
Related
Commands
Increase in the enabled events groups will generate a log message of the form:
Jan 8 14:15:24 switch statsd[4404]: [statsd.NOTICE]: (StatsLog) Interface Eth1/9: 398
Notes 0598 packets dropped due to Rx invalid tag discards packets
Jan 8 14:15:24 switch statsd[4404]: [statsd.NOTICE]: (StatsLog) Interface Eth1/9: 398
0599 packets dropped due to Rx discard packets by vlan filter
Jan 8 14:42:44 switch statsd[4404]: [statsd.NOTICE]: (StatsLog) cpu-rate-limiter
DISCARD_LAYERS_2_3: 7767087 packets dropped by CPU rate-limiter
Configures number of events after which the system begins to generate events to the
log file.
The no form of the command resets this parameter to its default value.
300
protocols Sets threshold for protocol related events
events Number of events after which the system begins to generate events
to the log file. Range: 0-4294967295.
History 3.6.6000
switch (config) # logging events interfaces error-threshold 45
Example
Related Commands
Notes
Default:
interfaces—5 minutes
protocols—1 minute
Default N/A
301
Configuration Mode config
History
3.6.6000
Related Commands
Notes
Configures the number of allowed events per time window, and that window’s duration.
The no form of the command resets these parameters to their default values.
Syntax Description interfaces | protocols Logical groups with specified set of counters
302
switch (config) # logging events interfaces interval 120
Example
Related Commands
Notes The goal of this command is to restrict the number of events in the log. To achieve this
end, it is possible to specify the allowed number (parameter “count”) of messages per
period of time (parameter “window”).
logging fields
Specifies whether to include an additional field in each log message that shows the
number of seconds since the Epoch or not.
The no form of the command disallows including an additional field in each log
message that shows the number of seconds since the Epoch.
Syntax Description enable Specifies whether to include an additional field in each log message
that shows the number of seconds since the Epoch or not.
w-digit The whole-digits parameter controls the number of digits to the left
of the decimal point. Truncation is done from the left. Except for
the year, all of these digits are redundant with syslog's own date
and time.
Possible values: 1, 6, or all.
Default Disabled
History 3.1.0000
Example switch (config) # logging fields seconds enable
switch (config) # logging fields seconds whole-digits 1
Notes This is independent of the standard syslog date and time at the beginning of each
message in the format of “July 15 18:00:00”. Aside from indicating the year at full
precision, its main purpose is to provide subsecond precision.
303
logging files delete
Default CLI commands and audit message are set to notice logging level
History 3.1.0000
switch (config) # logging files delete current
Example
Notes
logging files rotation {criteria {frequency <freq> | size <size-mb>| size-pct <size-
percentage>} | force | max-number <number-of-files>}
no logging files rotation criteria
Syntax Description freq Sets rotation criteria according to time. Possible options are:
• Daily
• Weekly
• Monthly
304
force Forces an immediate rotation of the log files. This does not affect
the schedule of auto-rotation if it was done based on time: the next
automatic rotation will still occur at the same time for which it was
previously scheduled. Naturally, if the auto-rotation was based on
size, this will delay it somewhat as it reduces the size of the active
log file to zero.
number-of- The number of log files will be kept. If the number of log files ever
files exceeds this number (either at rotation time, or when this setting is
lowered), the system will delete as many files as necessary to bring
it down to this number, starting with the oldest.
Default 10 files are kept by default with rotation criteria of 5% of the log partition size
History
3.1.0000
3.9.0900:
• Added the command "no logging files rotation criteria"
• Changed default value size from 19.07 MB to 20 MB
Notes
Syntax Description current The current log file. The current log file will have the name
“messages” if you do not specify a new name for it in the upload
URL.
file-number An archived log file. The archived log file will have the name
“messages<n>.gz” (while “n” is the file number) if you do not
specify a new name for it in the upload URL. The file will be
compressed with gzip.
url Uploads URL path. Supported formats: FTP, TFTP, SCP, and SFTP. For
example: scp://username[:password]@hostname/path/filename.
305
Default 10 files are kept by default with rotation criteria of 5% of the log partition size
History 3.1.0000
switch (config) # logging files upload 1 scp://admin@scpserver
Example
Notes
Sends only log messages that match the input regex to a remote host specified by its
IP or hostname.
Default N/A
History 3.8.2000
Role admin
switch (config) # logging 1.1.1.1 filter include ERROR
Example
no logging
Notes This command is configurable. If “configuration write” is executed, the remote host
will still receive filtered messages after reload.
Sends only log messages that do not match the input regex to a remote host
specified by its IP or hostname.
306
Syntax Description N/A
Default N/A
History 3.8.2000
Role admin
switch (config) # logging 1.1.1.1 filter exclude ERROR
Example
no logging
Notes This command is configurable. If “configuration write” is executed, the remote host
will still receive filtered messages after reload.
no logging filter
Default N/A
History 3.8.2000
Role admin
switch (config) # no logging 1.1.1.1 filter
Example
no logging
Notes This command is configurable. If “configuration write” is executed, the remote host
will still receive filtered messages after reload.
307
logging format
Default standard
History 3.1.0000
switch (config) # logging format standard
Example
Notes
logging level
Sets the severity level at which CLI commands or the management audit message
that the user executes are logged. This includes auditing of both configuration
changes and actions.
Syntax Description cli commands Sets the severity level at which CLI commands which the user
executes are logged
audit mgmt Sets the severity level at which all network management audit
messages are logged
308
• none—disables the logging locally and remotely
log-level • 0 - emerg—system is unusable (emergency)
• 1 - alert—alert notification, action must be taken
immediately
• 2 - crit—critical condition
• 3 - err—error condition
• 4 - warning—warning condition
• 5 - notice—normal, but significant condition
• 6 - info—informational condition
• 7 - debug—debug level messages
Default CLI commands and audit message are set to notice logging level
History 3.1.0000
switch (config) # logging level cli commands info
Example
Notes
Syntax Description override Enables class-specific overrides to the local log level.
class Sets or removes a per-class override on the logging level. All classes
which do not have an override set will use the global logging level set
with “logging local <log level>”. Classes that do have an override will
do as the override specifies. If “none” is specified for the log level,
the software will not log anything from this class.
Classes available:
• debug-module—debug module functionality
• protocol-stack—protocol stack modules functionality
• mgmt-back—system management back-end components
• mgmt-core—system management core
• mgmt-front—system management front-end components
• mlx-daemons—management daemons
• sx-sdk—switch SDK
309
• none—disables the logging locally and remotely
log-level • 0 - emerg—system is unusable (emergency)
• 1 - alert—alert notification, action must be taken immediately
• 2 - crit—critical condition
• 3 - err—error condition
• 4 - warning—warning condition
• 5 - notice—normal, but significant condition
• 6 - info—informational condition
• 7 - debug—debug level messages
History 3.1.0000
3.3.4150: Added debug-module class and changed iss-modules to protocol-stack
switch (config) # logging local override class mgmt-front priority warning
Example
Notes
logging monitor
• none
priority-level • emerg
• alert
• crit
• err
• warming
• notice
• info
• debug
310
Configuration Mode config
History 3.3.4000
switch (config) # logging monitor events notice
Example
Related Commands
Notes
logging protocol
Sends log messages to specified host with the chosen protocol (TCP or UDP).
The no form of the command sets the protocol for sending log messages to a
remote host to the default (UDP).
Default UDP
History 3.8.2100
Role Admin
switch (config) # logging 1.1.1.1 protocol tcp
Example switch (config) # no logging 1.1.1.1 protocol
Related Commands
311
logging receive
logging receive
no logging receive
History 3.1.0000
switch (config) # logging receive
Example
Default Enabled
History 3.9.0900
switch (config) # logging mac masking
Example
312
Related Commands show logging
Notes If enabled, the first 2 bytes of MAC address output log will be masked. For example,
00:12:34:56:78:9a will be displayed as **:**:34:56:78:9a.
show log
Syntax Description continues Displays the last few lines of the current log file and then continues
to display new lines as they come in until the user hits Ctrl+C,
similar to LINUX “tail” utility
<file-number> Displays an archived log file, where the number may range from 1
up to the number of archived log files available
[not] matching The file is piped through a LINUX “grep” utility to only include lines
<reg-exp> either matching, or not matching, the provided regular expression
Default N/A
History 3.1.0000
3.3.4402: Updated example and added note
Example
switch (config) # show log matching "Executing|Action"
Jul 31 16:11:23 M2100-aj cli[26502]: [cli.NOTICE]: user : Executing command: enable
Jul 31 16:11:24 M2100-aj cli[26507]: [cli.NOTICE]: user : Executing command: enable
Jul 31 16:11:29 M2100-aj cli[26514]: [cli.NOTICE]: user : Executing command: enable
Jul 31 16:11:29 M2100-aj cli[26514]: [cli.NOTICE]: user : Executing command: show license
Jul 31 16:11:41 M2100-aj cli[26548]: [cli.NOTICE]: user : Executing command: enable
Jul 31 16:11:42 M2100-aj cli[26553]: [cli.NOTICE]: user : Executing command: enable
Jul 31 16:11:42 M2100-aj cli[26553]: [cli.NOTICE]: user : Executing command: conf termina
313
• When using a regular expression containing | (OR), the expression should be
Notes surrounded by quotes (“<expression>”), otherwise it is parsed as filter (PIPE)
command
• The command’s output has many of the options as the Linux “less” command.
These options allow navigating the log file and perform searches. To see help
for different option press “h” after running the “show log” command.
show logging
show logging
Default N/A
History 3.1.0000
3.8.2000: Updated example
3.9.0900: Updated example
Role Admin
Example switch (config) # show logging
Local logging level : notice
Override for class debug-module : notice
Default remote logging level : notice
Allow receiving of messages from remote hosts: no
Number of archived log files to keep : 10
Log rotation size threshold : 19.07 megabytes
Log rotation (debug) size threshold : 19.07 megabytes
Log format : standard
Subsecond timestamp field : disabled
MAC address masking : enabled
1.2.2.3:
log level : notice
Remote port: 33
314
Related Commands logging fields
logging files rotation
logging level
logging local
logging receive
logging <syslog IPv4 address/IPv6 address/hostname>
Notes
interfaces:
Admin mode : no
Interval : 5 minutes
Error threshold: 10
protocols:
Admin mode : no
Interval : 1 minute
Error threshold: 2
315
Notes
Default N/A
History 3.6.6000
switch (config) # show logging events interfaces source-counters
Example interfaces:
Counters: Rx discard packets, Rx error packets, Rx fcs errors, Rx undersize
packets, Rx oversize packets, Rx unknown control opcode, Rx symbol errors, Rx
discard packets by Storm Control, Tx discard packets, Tx error packets, Tx hoq
discard packets
Notes
Default N/A
History 3.1.0000
3.8.1000: Updated example
316
switch (config) # show logging
Local logging level: notice
Example Override for class debug-module: notice
Default remote logging level: notice
Remote syslog receiver: 1.2.3.4 (log level: notice)
Remote port: 514
Notes
When debugging a system, it is important to be able to quickly identify the root of a problem. The
Diagnostic commands enables an insight into the physical layer components where the user is able
to see information such as a cable status (plugged/unplugged) or if Auto-Negotiation has failed.
317
30—Port is closed, no backplane enabled speed over backplane channel
31—Port is closed, no passive protocol enabled over passive copper channel
32—Port is closed, no active protocol enabled over active channel
33—Port width is does not match the port speed enabled
34—Local speed degradation
35—Remote speed degradation
36—No Partner detected during force mode.
37—Partial link indication during force mode.
38—AN Failure—FEC mismatch during override
39—AN Failure—No HCD
40—VPI protocol don’t match
41—Port is closed, module can’t be set to the enabled rate
42—Bad SI, cable is configured to non optimal rate
1023—Info not available
MNG FW issues (1024—2047):
1024—Cable is unplugged/powered off
1025—Long Range for non MLNX cable/module .
1026—Bus stuck (I2C Data or clock shorted)
1027—bad/unsupported EEPROM
1028—part number list
1029—unsupported cable.
1030—module temperature shutdown
1031—Shorted cable
1032—Power Budget Exceeded
1033—Management force down the port
1034—Module is disabled by command
Default N/A
History 3.6.4000
318
Example switch (config) # show interfaces ib link-diagnostics
----------------------------------------------------------------------
Interface Code Status
----------------------------------------------------------------------
IB1/1 0 The port is Active.
IB1/2 0 The port is Active.
IB1/3 1024 Cable unplugged
IB1/4 1024 Cable unplugged
IB1/5 1024 Cable unplugged
IB1/6 1024 Cable unplugged
IB1/7 1024 Cable unplugged
IB1/8 1024 Cable unplugged
IB1/9 1024 Cable unplugged
IB1/10 1024 Cable unplugged
IB1/11 1024 Cable unplugged
IB1/12 1024 Cable unplugged
IB1/13 1024 Cable unplugged
IB1/14 1024 Cable unplugged
IB1/15 1024 Cable unplugged
IB1/16 1024 Cable unplugged
IB1/17 1024 Cable unplugged
IB1/18 1024 Cable unplugged
IB1/19 1024 Cable unplugged
IB1/20 1024 Cable unplugged
IB1/21 1024 Cable unplugged
IB1/22 1024 Cable unplugged
IB1/23 1024 Cable unplugged
IB1/24 1024 Cable unplugged
IB1/25 1024 Cable unplugged
IB1/26 1024 Cable unplugged
IB1/27 1024 Cable unplugged
IB1/28 1024 Cable unplugged
IB1/29 1024 Cable unplugged
IB1/30 1024 Cable unplugged
IB1/31 1024 Cable unplugged
IB1/32 1024 Cable unplugged
IB1/33 1024 Cable unplugged
IB1/34 1024 Cable unplugged
IB1/35 1 The port is closed by command.
IB1/36 2 Auto-Negotiation failure..
Related Commands
Notes
Default N/A
History 3.6.4000
319
switch (config) # show interfaces ib internal leaf 1 link-diagnostics
----------------------------------------------------------------------
Example Interface Code Status
----------------------------------------------------------------------
IB1/1/19 0 No issue was observed
IB1/1/20 0 No issue was observed
IB1/1/21 0 No issue was observed
IB1/1/22 0 No issue was observed
IB1/1/23 0 No issue was observed
IB1/1/24 0 No issue was observed
IB1/1/25 0 No issue was observed
IB1/1/26 0 No issue was observed
IB1/1/27 0 No issue was observed
IB1/1/28 0 No issue was observed
IB1/1/29 0 No issue was observed
IB1/1/30 0 No issue was observed
Related Commands
Notes
Default N/A
History 3.6.4000
switch (config) # show interfaces ib internal spine 3/1/1 link-diagnostics
-----------------------------------------------------------------------
Example Interface Code Status
-----------------------------------------------------------------------
IB3/1/1 0 No issue was observed
Related Commands
Notes
A system can monitor the Bit Error Rate (BER) in order to ensure a quality of the link. As long as BER
observed by the MACLRH layer is low enough, the rate of packet loss is low enough to allow
successful operation of the applications running on top of the network.
320
The system continuously monitors the link BER and compares it to BER limits, when limits are
crossed the system can generate an event indicating that link quality is degraded to the network
operator that can take preemptive actions or even disable the low quality link. The BER
configuration threshold for No-FEC and Post-FEC configured for 10^-10 will cause the trap to occur.
When Forward Error Correction (FEC) is enabled a network operator can choose to monitor an
amount of corrected errors by using the pre-FEC mode, or the amount of errors which the FEC failed
to correct (uncorrectable errors) by using the post-FEC mode, when FEC is used then every error
detected by the PHY will be monitored.
When link is disabled the system will keep it in shutdown state until the port is explicitly enabled
(Explicitly running “shutdown” and then “no shutdown” commands for that port).
Effective-BER Monitoring
Effective-BER is the BER that the MACLRH/Application layer observe. Errors monitored by the
Effective-BER may directly result in a packet drop. For links with no error correction, the Effective
BER is the BER received by port, and it is monitored based on the received Phy symbols. For links
with FEC, the Effective BER represents the rate of errors that the FEC decoder did not manage to
correct and were passed to the MACLRH layer. The Effective BER for FEC links is monitored using the
FEC decoder uncorrectable codewords data.
Signal degradation snmp event comes only when there is an alarm alert of BER limit cross
that is being sent only once. There is no SNMP alarm in case of cross down back to normal
threshold, nor in the second time in a row the BER is crossed above again. In order to get
another alarm on BER limit cross, it is needed to shutdown the interface and enable it again.
Please refer to “Email Notifications” for a general explanation on how to enable email
notifications for specific events.
321
Signal Degradation Monitoring Commands
signal-degrade
signal-degrade [no-shutdown]
no signal-degrade [no-shutdown]
Default Disabled
History 3.6.6102
switch (config interface ib 1/1) # signal-degrade
Example
show interfaces ib signal-degrade
Related Commands
Notes
Default N/A
History 3.6.6102
322
switch (config) # show interfaces ib signal-degrade
Example ---------------------------------------------------------------------------------
---------
Interface Physical port state Monitoring Action FEC type
---------------------------------------------------------------------------------
---------
IB1/1 LinkUp Disabled Shutdown no-fec/
post-fec
IB1/2 LinkUp Enabled Shutdown no-fec/
post-fec
IB1/3 Polling Disabled Shutdown no-fec/
post-fec
IB1/4 Polling Disabled Shutdown no-fec/
post-fec
IB1/5 Polling Disabled Shutdown no-fec/
post-fec
IB1/6 Polling Disabled Shutdown no-fec/
post-fec
IB1/7 Polling Disabled Shutdown no-fec/
post-fec
...
Related Commands
Event Notifications
The OS features a variety of supported events. Events are printed in the system log file and can,
optionally, be sent to the system administrator via email, SNMP trap or directly prompted to the
terminal.
323
Event Name Event Description MIB OID Comments
interface-down An interface’s link state has RFC1213: linkdown Supported for InfiniBand
changed to DOWN (SNMPv1) interfaces for 1U and blade
systems
interface-up An interface’s link state has RFC1213: linkup Supported for InfiniBand
changed to UP (SNMPv1) interfaces for 1U and blade
systems
send-test Send a test notification testTrap Run the CLI command “snmp-
server notify send-test”
324
Event Name Event Description MIB OID Comments
Terminal Notifications
To print events to the terminal, set the events you wish to print to the terminal. Run:
325
This command prints system events in the severity “notice” to the screen. For example, in case of
interface-down event, the following gets printed to the screen.
switch (config) #
Wed Jul 10 11:30:42 2013: Interface IB1/17 changed state to DOWN
Wed Jul 10 11:30:43 2013: Interface IB1/18 changed state to DOWN
switch (config) #
Email Notifications
To configure the OS to send you emails for all configured events and failures:
1. Set your mailhub to the IP address to be your mail client’s server – for example, Microsoft
Outlook exchange server.
326
Command Event Notifications
Default N/A
History
3.2.3000
Related Commands
Notes
327
Syntax Description event • process-crash – a process has crashed
• process-exit – a process unexpectedly exited
• liveness-failure – a process iss detected as hung
• cpu-util-high – CPU utilization has risen too high
• cpu-util-ok – CPU utilization has fallen back to normal
levels
• paging-high – paging activity has risen too high
• paging-ok – paging activity has fallen back to normal levels
• disk-space-low – filesystem free space has fallen too low
• disk-space-ok – filesystem free space is back in the normal
range
• memusage-high – memory usage has risen too high
• memusage-ok – memory usage has fallen back to acceptable
levels
• netusage-high – network utilization has risen too high
• netusage-ok – network utilization has fallen back to
acceptable levels
• disk-io-high – disk I/O per second has risen too high
• disk-io-ok – disk I/O per second has fallen back to
acceptable levels
• unexpected-cluster-join – node has unexpectedly joined the
cluster
• unexpected-cluster-leave – node has unexpectedly left the
cluster
• unexpected-cluster-size – the number of nodes in the
cluster is unexpected
• unexpected-shutdown – unexpected system shutdown
• interface-up – an interface’s link state has changed to up
• interface-down – an interface's link state has changed to
down
• user-login – a user has logged into the system
• user-logout – a user has logged out of the system
• health-module-status – health module status
• temperature-too-high – temperature has risen too high
• low-power – low power supply
• low-power-recover – low power supply recover
• insufficient-power – insufficient power supply
• power-redundancy-mismatch – power redundancy mismatch
• insufficient-fans – insufficient amount of fans in system
• insufficient-fans-recover – insufficient amount of fans in
system recovered
• asic-chip-down – ASIC (chip) down
• internal-bus-error – internal bus (I2C) error
• internal-link-speed-mismatch – internal links speed
mismatch
Default N/A
Configuration Mode config
History
3.2.3000
Related Commands
Notes
328
email autosupport ssl mode
Syntax Description none Does not use TLS to secure auto-support email.
tls Uses TLS over the default server port to secure auto-support email
and does not send an email if TLS fails.
tls-none Attempts TLS over the default server port to secure auto-support
email, and falls back on plaintext if this fails.
Default tls-none
History
3.2.3000
Related Commands
Notes
Default N/A
329
History
3.2.3000
Related Commands
Notes
Default default_ca_list
History
3.2.3000
Related Commands
Notes
email dead-letter
330
Syntax Description duration Example: “5d4h3m2s” for 5 days, 4 hours, 3 minutes, 2 seconds
History 3.1.0000
switch (config) # email dead-letter enable
Example
Related Commands show email
Notes
email domain
Sets the domain name from which the emails appear to come (provided that the
return address is not already fully-qualified). This is used in conjunction with the
system hostname to form the full name of the host from which the email appears to
come.
The no form of the command clears email domain override.
History 3.1.0000
switch (config) # email domain my_domain
Example
Related Commands show emails
Notes
331
email mailhub
Default N/A
History 3.1.0000
switch (config) # email mailhub 10.0.8.11
Example
Related Commands show email [events]
Notes
Sets the mail relay to be used for sending autosupport notification emails.
The no form of the command clears the mail relay to be used for sending
autosupport notification emails.
Default N/A
History 3.7.1000
switch (config) # email autosupport mailhub 10.10.10.1
Example
Related Commands show email
Notes
332
email autosupport recipient
Default N/A
History 3.7.1000
switch (config) # email autosupport recipient [email protected]
Example
Related Commands show email
Notes
email mailhub-port
Default 25
History 3.1.0000
switch (config) # email mailhub-port 125
Example
Related Commands show email
Notes
333
email notify event
334
Default No events are enabled
History 3.1.0000
switch (config) # email notify event process-crash
Example
Related Commands email autosupport event
show email
show email events
This does not affect auto-support emails. Auto-support can be disabled overall, but if
Notes it is enabled, all auto-support events are sent as emails.
Adds an email address from the list of addresses to which to send email notifications
of events.
The no form of the command removes an email address from the list of addresses to
which to send email notifications of events.
email-addr Email address of intended recipient.
Syntax Description
class Specifies which types of events are sent to this recipient.
info Sends informational events to this recipient.
failure Sends failure events to this recipient.
detail Sends detailed event emails to this recipient.
Default N/A
History 3.1.0000
switch (config) # email notify recipient [email protected]
Example
Related Commands show email
Notes
335
email return-addr
Sets the username or fully-qualified return address from which email notifications
are sent.
• If the string provided contains an “@” character, it is considered to be fully-
qualified and used as-is.
• Otherwise, it is considered to be just the username, and we append
“@<hostname>.<domain>”. The default is “do-not-reply”, but this can be
changed to “admin” or whatnot in case something along the line does not
like fictitious addresses.
Default N/A
History 3.1.0000
switch (config) # email return-addr user1
Example
Related Commands show email
Notes
email return-host
email return-host
no email return-host
History 3.1.0000
switch (config) # no email return-host
Example
336
Related Commands show email
This only takes effect if the return address does not contain an “@” character
Notes
email send-test
email send-test
History 3.1.0000
switch (config) # email send-test
Example
Related Commands show email [events]
Notes
tls Attempts to use TLS on the regular mailhub port, with STARTTLS. If
this fails, it gives up.
tls-none Attempts to use TLS on the regular mailhub port, with STARTTLS. If
this fails, it falls back on plaintext.
Default default-cert
History 3.2.3000
337
switch (config) # email ssl mode tls-none
Example
Notes
Default N/A
History 3.2.3000
switch (config) # email ssl cert-verify
Example
Specifies the list of supplemental certificates of authority (CA) from the certificate
configuration database that is to be used for verification of server certificates when
sending email using TLS, if any.
The no form of the command uses no list of supplemental certificates.
338
Default default-ca-list
History 3.2.3000
switch (config) # email ssl ca-list none
Example
Notes This command has no impact unless TLS is used, and certificate verification is
enabled.
show email
show email
Displays email configuration or events for which email should be sent upon.
N/A
Syntax Description
N/A
Default
History 3.1.0000
Example switch (config) # show email
Mail hub: 10.0.8.70
Mail hub port: 25
Domain override:
Return address: do-not-reply
Include hostname in return address: yes
Autosupport emails
Enabled: no
Recipient:
Mail hub:
Security mode: tls-none
Verify server cert: yes
Supplemental CA list: default-ca-list
Related Commands
339
Notes
History 3.1.0000
Example switch (config) # show email events
Failure events for which emails will be sent:
expected-shutdown: Expected system shutdown
process-crash: A process in the system has crashed
unexpected-shutdown: Unexpected system shutdown
Related Commands
Notes
340
Buffer Histograms Monitoring
As it is becoming increasingly complex to manage networks, and network administrators need more
tools to understand network behavior, it is necessary to provide basic information about network
performance, identify network bottlenecks, and provide information for the purposes of network
optimization and future planning.
Therefore, network administrators are required to constantly review network port behavior, record
port buffer consumption, and identify shortage in buffer resources and record flows which lead to
the excessive buffer consumption. MLNX-OS provides the following mechanisms to perform these
tasks:
• Sampling (histograms)—a network administrator can enable a sampling of the port buffer
occupancy, record occupancy changes over time, and provide information for different levels
of buffer occupancy, and amount of time the buffer has been occupied during the observation
period.
• Thresholds—thresholds may be enabled per port to record the network time when port buffer
occupancy crosses the defined threshold and when buffer occupancy drops below it.
• Flow recording—a record of the most active flows which cause an excessive usage of the port
buffers may be kept. Once enabled, the system may identify flow patterns and present a user
with a list of flows, based on which a network administrator can rearrange distribution of the
data flows in the network and minimize data loss.
protocol telemetry
Unhides telemetry config CLIs. The no form of the command hides telemetry config
CLIs.
Syntax Description N/A
Default Hidden
Configuration Mode config
History 3.6.3004
Example switch (config) # protocol telemetry
Related Commands
Notes
341
telemetry shutdown
telemetry shutdown
no telemetry shutdown
Disables the telemetry protocol, threshold detection, and histogram fetching for all
sampling enabled interfaces without changing any internal configuration.
The no form of the command enables telemetry protocol.
Default Disabled
History 3.6.3004
switch (config) # no telemetry shutdown
Example
Notes
telemetry sampling
Default N/A
History 3.6.3004
switch (config interface ib 1/1) # telemetry sampling
Example
Notes
342
telemetry sampling log
History 3.6.3004
switch (config) # telemetry sampling log 1000
Example
Notes
telemetry threshold
telemetry threshold
no telemetry threshold
Default false
History 3.6.4006
switch (config interface ib 1/1) # telemetry threshold
Example
Related Commands
Notes
343
telemetry threshold level
Syntax Description level Input range: 96-1000000 (in bytes and in increments of 96)
Default 69984
History 3.6.4006
switch (config interface ib 1/1) # telemetry threshold level 288
Example
Related Commands
Notes
Default Disabled
History 3.6.4006
switch (config) # telemetry threshold log
Example
Related Commands
Notes
344
telemetry threshold record
Default Disabled
History 3.6.6105
switch (config interfaces ib 1/2) # telemetry threshold record
Example
The command sets threshold events logging rate on per hour basis.
The no form of the command sets the logging rate back to default.
Default 100
History 3.6.4006
switch (config) # telemetry threshold syslog 400
Example
345
Related Commands
Notes
clear telemetry
Default N/A
History 3.6.5000
switch (config interface ib 1/12) # clear telemetry threshold level 288
Example
Related Commands
Notes
Default N/A
History 3.6.6105
Related Commands
346
Notes
Default N/A
History 3.6.6105
switch (config) # clear telemetry threshold record interface ib 1/34-1/36
Example
Notes
Default N/A
History 3.6.3004
3.9.0500 Updated example
switch (config) # stats export csv telemetry 1/1/4-ucast after 2020/03/16 10:54:58
before 2020/03/16 11:16:24
Example Generated report file: telemetry-20200316-111704.csv
347
Related Commands
Notes
Deletes the given .csv file created by “stats export” command to user directory.
Default N/A
History 3.6.3004
switch (config) # file stats telemetry delete telemetry-20171006-102158.csv
Example
Related Commands
Notes
Default N/A
History 3.8.1000
(config) # file stats telemetry delete latest
Example
348
Notes
Default N/A
History 3.8.1000
(config) # file stats telemetry delete all
Example
Notes
Default N/A
History 3.6.3004
Related Commands
349
Notes
Default N/A
History 3.8.1000
Notes
Syntax Description
Default N/A
History 3.8.1000
350
Related Commands file stats telemetry upload <file_name>
file stats telemetry upload latest
Notes
show telemetry
show telemetry
Syntax N/A
Description
Default N/A
Configuration config
Mode
History 3.6.4000
Example
switch (config) # show telemetry
Telemetry Status : Enabled
H/W Sampling Interval(nsec) : 512
S/W Sampling Interval(ms) : 1000
Threshold Logging : Disabled
Threshold Logging(rate per hour) : 100
--------------------------------------------------------------------------------------------
Interface Sampling Threshold Record Level (bytes)
--------------------------------------------------------------------------------------------
IB1/1 Disabled Enabled Enabled 100 (96)
IB1/2 Disabled Enabled Enabled 100 (96)
IB1/3 Disabled Disabled Disabled N/A
IB1/4 Disabled Disabled Disabled N/A
IB1/5 Disabled Disabled Disabled N/A
IB1/6 Disabled Disabled Disabled N/A
IB1/7 Disabled Disabled Disabled N/A
...
IB1/36 Disabled Disabled Disabled N/A
Related
Commands
Notes
351
show telemetry threshold record
Default N/A
History 3.6.4006
Example
switch (config) # show telemetry threshold record interface ib 1/11-1/12
----------------------------------------------------------------------------------------------------------
-------
Event-id Date Time Port Level Duration(100 usec) Repeated DestQP DLID SLID
Percent(%)
----------------------------------------------------------------------------------------------------------
-------
1 07/10/18 14:00:31 IB 1/11 69984 48749.77 1 2741 29 32
62.30
2 07/10/18 14:01:47 IB 1/11 69984 63936.16 1 2745 29 32
54.55
Default N/A
352
Configuration Mode Any command mode
History 3.6.3004
Example
switch (config) # show telemetry sampling interface ib 1/32
----------------------------------------------------------------------------------------------------------
---------------------------
Telemetry histogram: IB1/32
System-time Bin sizes (128 nsec tx buffer was occupied in
bytes range)
----------------------------------------------------------------------------------------------------------
---------------------------
02/09/17 <2976 35744 68512 101280 134048 166816 199584
232352 265120 265120<
12:19:03.41948 1883 8538 7802080 0 0 0 0 0
0 0
12:19:04.42107 830 9001 7802670 0 0 0 0 0
0 0
12:19:05.42249 96 9705 7802700 0 0 0 0 0
0 0
12:19:06.42388 32 9035 7803434 0 0 0 0 0
0 0
12:19:07.42573 80 9461 7802960 0 0 0 0 0
0 0
12:19:08.42761 160 9302 7803040 0 0 0 0 0
0 0
12:19:09.42915 304 9369 7802829 0 0 0 0 0
0 0
12:19:10.43071 96 8906 7803500 0 0 0 0 0
0 0
12:19:11.43215 463 8907 7803132 0 0 0 0 0
0 0
12:19:12.43369 256 8571 7803675 0 0 0 0 0
0 0
Related Commands
Notes If the requested entries are more than what the DB contains, it prints the amount
in the table.
Default N/A
History 3.6.3004
353
Example
switch (config) # show telemetry sampling interface ib 1/36 last 20
Legend:
2976 bytes - between 0 - 2976 of tx bytes buffer consumed
35744 bytes - between 2977 - 35744 of tx bytes buffer consumed
----------------------------------------------------------------------------------------------------------
---------------------------
Telemetry histogram: IB1/36
System-time Bin sizes (128 nsec tx buffer was occupied in
bytes range)
----------------------------------------------------------------------------------------------------------
---------------------------
02/09/17 <2976 35744 68512 101280 134048 166816 199584
232352 265120 265120<
12:19:03.41948 1883 8538 7802080 0 0 0 0 0
0 0
12:19:04.42107 830 9001 7802670 0 0 0 0 0
0 0
12:19:05.42249 96 9705 7802700 0 0 0 0 0
0 0
12:19:06.42388 32 9035 7803434 0 0 0 0 0
0 0
12:19:07.42573 80 9461 7802960 0 0 0 0 0
0 0
Related Commands
Notes If requested entries are more than what the DB contains, it prints the amount in the
table.
Displays all files created by the command “stats export csv telemetry”.
Default N/A
History 3.6.3004
354
Notes
Commands
Default N/A
History
3.1.0000
switch (config) # stats alarm cpu_util_indiv clear
Example
Related Commands show stats alarm
Notes
355
stats alarm enable
History
3.1.0000
switch (config) # stats alarm cpu_util_indiv enable
Example
Related Commands show stats alarm
Notes
356
Syntax Description alarm ID Alarms supported by the system, for example:
• cpu_util_indiv – average CPU utilization too high: percent
utilization
• disk_io – operating System Disk I/O per second too high:
kilobytes per second
• fs_mnt – free filesystem space too low: percent of disk
space free
• intf_util – network utilization too high: bytes per second
• memory_pct_used – too much memory in use: percent of
physical memory used
• paging – paging activity too high: page faults
• temperature – temperature is too high: degrees
single Does not repeat events: only sends one event whenever the alarm
changes state.
Default single
History
3.1.0000
switch (config) # stats alarm cpu_util_indiv event-repeat single
Example
Related Commands show stats alarm
Notes
357
Syntax Description alarm ID Alarms supported by the system, for example:
• cpu_util_indiv – average CPU utilization too high: percent
utilization
• disk_io – operating System Disk I/O per second too high:
kilobytes per second
• fs_mnt – free filesystem space too low: percent of disk
space free
• intf_util – network utilization too high: bytes per second
• memory_pct_used – too much memory in use: percent of
physical memory used
• paging – paging activity too high: page faults
• temperature – temperature is too high: degrees
falling Configures alarm for when the statistic falls too low
rising Configures alarm for when the statistic rises too high
History
3.1.0000
switch (config) # stats alarm cpu_util_indiv falling clear-threshold 10
Example
Related Commands show stats alarm
stats alarm <alarm ID> rate-limit {count <count-type> <count> | reset | window
<window-type> <duration>}
358
Syntax Description alarm ID Alarms supported by the system, for example:
• cpu_util_indiv – average CPU utilization too high: percent
utilization
• disk_io – operating System Disk I/O per second too high:
kilobytes per second
• fs_mnt – free filesystem space too low: percent of disk
space free
• intf_util – network utilization too high: bytes per second
• memory_pct_used – too much memory in use: percent of
physical memory used
• paging – paging activity too high: page faults
• temperature – temperature is too high: degrees
reset Set the count and window durations to default values for this
alarm
History
3.1.0000
switch (config) # stats alarm paging rate-limit window long 2000
Example
Related Commands show stats alarm
Notes
359
Syntax Description CHD CHD supported by the system, for example:
ID • cpu_util – CPU utilization: percentage of time spent
• cpu_util_ave – CPU utilization average: percentage of time spent
• cpu_util_day – CPU utilization average: percentage of time spent
• disk_device_io_hour – storage device I/O read/write statistics for the
last hour: bytes
• disk_io – operating system aggregate disk I/O average (KB/sec)
• fs_mnt_day – filesystem system usage average: bytes
• fs_mnt_month – filesystem system usage average: bytes
• fs_mnt_week – filesystem system usage average: bytes
• intf_day – network interface statistics aggregation: bytes
• intf_hour – network interface statistics (same as “interface” sample)
• intf_util – aggregate network utilization across all interfaces
• memory_day – average physical memory usage: bytes
• memory_pct – average physical memory usage
• paging – paging activity: page faults
• paging_day – paging activity: page faults
• ib_day
• ib_hour
Default N/A
History
3.1.0000
switch (config) # stats chd memory_day clear
Example
Related Commands show stats chd
Notes
360
Syntax Description chd-id CHD supported by the system, for example:
• cpu_util – CPU utilization: percentage of time spent
• cpu_util_ave – CPU utilization average: percentage of time
spent
• cpu_util_day – CPU utilization average: percentage of time
spent
• disk_device_io_hour – storage device I/O read/write
statistics for the last hour: bytes
• disk_io – operating system aggregate disk I/O average: KB/
sec
• fs_mnt_day – filesystem system usage average: bytes
• fs_mnt_month – filesystem system usage average: bytes
• fs_mnt_week – filesystem system usage average: bytes
• intf_day – network interface statistics aggregation: bytes
• intf_hour – network interface statistics (same as “interface”
sample)
• intf_util – aggregate network utilization across all interfaces
• memory_day – average physical memory usage: bytes
• memory_pct – average physical memory usage
• paging – paging activity: page faults
• paging_day – paging activity: page faults
• ib_day
• ib_hour
Default Enabled
History
3.1.0000
switch (config) # stats chd memory_day enable
Example
Related Commands show stats chd
Notes
stats chd <CHD ID> compute time {interval | range} <number of seconds>
361
Syntax Description CHD ID Possible IDs:
• cpu_util – CPU utilization: percentage of time spent
• cpu_util_ave – CPU utilization average: percentage of time
spent
• cpu_util_day – CPU utilization average: percentage of time
spent
• disk_device_io_hour – storage device I/O read/write
statistics for the last hour: bytes
• disk_io – operating system aggregate disk I/O average: KB/
sec
• fs_mnt_day – filesystem system usage average: bytes
• fs_mnt_month – filesystem system usage average: bytes
• fs_mnt_week – filesystem system usage average: bytes
• intf_day – network interface statistics aggregation: bytes
• intf_hour – network interface statistics (same as “interface”
sample)
• intf_util – aggregate network utilization across all interfaces
• memory_day – average physical memory usage: bytes
• memory_pct – average physical memory usage
• paging – paging activity: page faults
• paging_day – paging activity: page faults
• ib_day
• ib_hour
History
3.1.0000
switch (config) # stats chd memory_day compute time interval 120
Example
Related Commands show stats chd
Notes
362
stats export
Default N/A
History
3.7.1102
3.10.1000: Updated syntax description options
switch (config) # stats export csv memory
Example
Related Commands show stats sample
Notes
363
Syntax Description sample ID Possible sample IDs are:
• congested
• cpu_util – CPU utilization: milliseconds of time spent
• disk_device_io – storage device I/O statistics
• disk_io – operating system aggregate disk I/O: KB/sec
• fan - Fan speed
• fs_mnt_bytes – filesystem usage: bytes
• fs_mnt_inodes – filesystem usage: inodes
• interface – network interface statistics
• intf_util – network interface utilization: bytes
• memory – system memory utilization: bytes
• paging – paging activity: page faults
• power – power supply usage
• power-consumption
• temperature – modules temperature
• ib
Default N/A
History
3.1.0000
switch (config) # stats sample temperature clear
Example
Related Commands show stats sample
Notes
364
Syntax Description sample-id Possible sample IDs are:
• congested
• cpu_util – CPU utilization: milliseconds of time spent
• disk_device_io – storage device I/O statistics
• disk_io – operating system aggregate disk I/O: KB/sec
• fan – fan speed
• fs_mnt_bytes – filesystem usage: bytes
• fs_mnt_inodes – filesystem usage: inodes
• interface – network interface statistics
• intf_util – network interface utilization: bytes
• memory – system memory utilization: bytes
• paging – paging activity: page faults
• power – power supply usage
• power-consumption
• temperature – modules temperature
• ib
Default Enabled
History
3.1.0000
switch (config) # stats sample temperature enable
Example
Related Commands show stats sample
Notes
365
Syntax Description sample-id Sample name for which report file should be generated.
• congested
• cpu_util – CPU utilization: milliseconds of time spent
• disk_device_io – storage device I/O statistics
• disk_io – operating system aggregate disk I/O: KB/sec
• fan – fan speed
• fs_mnt_bytes – filesystem usage: bytes
• fs_mnt_inodes – filesystem usage: inodes
• interface – network interface statistics
• intf_util – network interface utilization: bytes
• memory – system memory utilization: bytes
• paging – paging activity: page faults
• power – power supply usage
• power-consumption
• temperature – modules temperature
• ib
History
3.7.1102
switch (config) # stats sample interface-ethernet interval 1
Example
Related Commands show stats sample
Notes
366
Syntax Description sample-id Sample name for which report file should be generated.
• congested
• cpu_util – CPU utilization: milliseconds of time spent
• disk_device_io – storage device I/O statistics
• disk_io – operating system aggregate disk I/O: KB/sec
• fan – fan speed
• fs_mnt_bytes – filesystem usage: bytes
• fs_mnt_inodes – filesystem usage: inodes
• interface – network interface statistics
• intf_util – network interface utilization: bytes
• memory – system memory utilization: bytes
• paging – paging activity: page faults
• power – power supply usage
• power-consumption
• temperature – modules temperature
• ib
max-entries
Number of records
Range: 1-1000
History 3.7.1102
switch (config) # stats sample interface-ethernet max-entries 1000
Example
Related Commands show stats sample
• Setting a new value will delete all sample history.
Notes • History does not persist after reboot.
stats clear-all
stats clear-all
Clears data for all samples, CHDs, and status for all alarms.
N/A
Syntax Description
N/A
Default
History 3.1.0000
367
switch (config) # stats clear-all
Example
Related Commands show stats sample
Notes
History 3.1.0000
switch (config) # show stats alarm
Alarm cpu_util_indiv (Average CPU utilization too high): ok
Example Alarm disk_io (Operating System Disk I/O per second too high): (disabled)
Alarm fs_mnt (Free filesystem space too low): ok
Alarm intf_util (Network utilization too high): (disabled)
Alarm memory_pct_used (Too much memory in use): (disabled)
Alarm paging (Paging activity too high): ok
Alarm temperature (Temperature is too high): ok
Notes
368
chd-id Available values:
Syntax Description • cpu_util_indiv – average CPU utilization too high: percent
utilization
• disk_io – operating System Disk I/O per second too high:
kilobytes per second
• fs_mnt – free filesystem space too low: percent of disk
space free
• intf_util – network utilization too high: bytes per second
• memory_pct_used – too much memory in use: percent of
physical memory used
• paging – paging activity too high: page faults
• temperature – temperature is too high: degrees
N/A
Default
History 3.1.0000
switch (config) # show stats chd disk_device_io_hour
Example CHD "disk_device_io_hour" (Storage device I/O read/write statistics for the last
hour: bytes):
Enabled: yes
Source dataset: sample "disk_device_io"
Computation basis: data points
Interval: 1 data point(s)
Range: 1 data point(s)
Notes
N/A
Syntax Description
N/A
Default
History 3.1.0000
369
switch (config) # show stats cpu
Example CPU 0
Utilization: 6%
Peak Utilization Last Hour: 16% at 2012/02/28 08:47:32
Avg. Utilization Last Hour: 8%
Related Commands
Notes
• ib
N/A
Default
History 3.1.0000
switch (config) # show stats sample fan
Sample "fan" (Fan speed):
Example Enabled: yes
Sampling interval: 1 minute 11 seconds
Related Commands
Notes
370
show stats sample data
• ib
History 3.7.1102
3.8.1000: Modified configuration mode & example
3.9.2000: Modified note and example
Example
371
switch (config) # show stats sample interface-ethernet data interface ethernet 1/1 max-samples 1
Sampling data for Interface ethernet counters:
Eth1/1:
------------------------------------------------------------------
Name Timestamp Value
------------------------------------------------------------------
Rx_packets 2000/12/25 10:27:53 0
Rx_unicast_packets 2000/12/25 10:27:53 0
Rx_multicast_packets 2000/12/25 10:27:53 0
Rx_broadcast_packets 2000/12/25 10:27:53 0
Rx_bytes 2000/12/25 10:27:53 0
Rx_discard_packets 2000/12/25 10:27:53 0
Rx_error_packets 2000/12/25 10:27:53 0
Rx_fcs_errors 2000/12/25 10:27:53 0
Rx_undersize_packets 2000/12/25 10:27:53 0
Rx_oversize_packets 2000/12/25 10:27:53 0
Rx_pause_packets 2000/12/25 10:27:53 0
Rx_unknown_control_opcode 2000/12/25 10:27:53 0
Rx_symbol_errors 2000/12/25 10:27:53 0
Rx_packets_of_64_bytes 2000/12/25 10:27:53 0
Rx_packets_of_65-127_bytes 2000/12/25 10:27:53 0
Rx_packets_of_128-255_bytes 2000/12/25 10:27:53 0
Rx_packets_of_256-511_bytes 2000/12/25 10:27:53 0
Rx_packets_of_512-1023_bytes 2000/12/25 10:27:53 0
Rx_packets_of_1024-1518_bytes 2000/12/25 10:27:53 0
Rx_packets_Jumbo 2000/12/25 10:27:53 0
Tx_packets 2000/12/25 10:27:53 0
Tx_unicast_packets 2000/12/25 10:27:53 0
Tx_multicast_packets 2000/12/25 10:27:53 0
Tx_broadcast_packets 2000/12/25 10:27:53 0
Tx_bytes 2000/12/25 10:27:53 0
Tx_discard_packets 2000/12/25 10:27:53 0
Tx_error_packets 2000/12/25 10:27:53 0
Tx_hoq_discard_packets 2000/12/25 10:27:53 0
Tx_pause_packets 2000/12/25 10:27:53 0
Tx_pause_duration 2000/12/25 10:27:53 0
Related Commands
• Filtering keyword depends on chosen <sample-id>.
Notes • Notice that this is a history of counters. Autocompletion and output can
contain information for groups (interfaces) that is not present anymore in the
system, and vice versa. If counters are not sampled, they will not appear in
the output.
• Output of collected information is implemented only for the following
samples:
• memory
• paging
• power
372
2. Device layer—a number identifying the specific device that is associated with the
module (e.g., ASIC on a leaf, fan on the management board, and so forth).
3. Sensor layer—a number identifying the specific sensor that is associated with the device
(e.g., fan sensors, temperature sensors, power sensors, and so forth).
Each layer is assigned a fixed position in the SNMP index number that represent it.
The physical entities in the system (other than port modules) use the following index schema:
1 2 3 4 5 6 7 8 9
Quantum systems use the following index schema for port modules and port module sensors:
1 2 3 4 5 6 7 8 9 10
Switch-IB, Switch-IB 2 use the following index schema for port modules and port module sensors:
1 2 3 4 5 6 7 8 9
Number Description
1 Chassis
373
Number Description
2 Management
3 Spine
4 Leaf
5 Fan
6 Power supply
7 BBU
8 x86 CPU
9 Port module
Physical entities—10 digits representation
1 Port module
Port module 9 digits representation is kept for backwards compatibility.
Examples
• entPhysicalIndex with value 401191311
• 9 digits representation.
• Layer 1 is “401”—“4” indicates a leaf (see module type breakdown table) and “01”
indicates leaf at index #1 (i.e., leaf 01)
• Layer 2 is “1913”—this is the identifier for one of the QSFP-ASIC in the system
• Layer 3 is “11”—this is the identifier for temperature sensor #1
• The description for this physical entity (appears in entPhysicalDescr column of the MIB)
would be: L01/QSFP-ASIC-1/T1
374
• The description for this physical entity (appears in entPhysicalDescr column of the MIB)
would be: FAN1/FAN/F1
375
User Management, Authentication, & Security
• User Management & Security
• Cryptographic (X.509, IPSec) and Encryption
User Accounts
There are two general user account types: admin and monitor. As admin, the user is privileged to
execute all the available operations. As monitor, the user can execute operations that display
system configuration and status, or set terminal settings.
User Role Default Password
admin admin
monitor monitor
376
• Accounting—the last level is accounting, which measures the resources a user consumes
during access. This includes the amount of system time or the amount of data a user has sent
and/or received during a session. Accounting is carried out by logging of session statistics and
usage information, and is used for authorization control, billing, trend analysis, resource
utilization, and capacity planning activities.
Authentication, authorization, and accounting services are often provided by a dedicated AAA
server, a program that performs these functions. Network access servers interface with AAA servers
using the Remote Authentication Dial-In User Service (RADIUS) protocol.
User Re-authentication
Re-authentication prevents users from accessing resources or perform tasks for which they do not
have authorization. If credential information (e.g., AAA server information like IP address, key, port
number, and so forth) that has been previously used to authenticate a user is modified, that user
gets immediately logged out and then asked to re-authenticate.
RADIUS
RADIUS (Remote Authentication Dial-In User Service), widely used in network environments, is a
client/server protocol and software that enables remote access servers to communicate with a
central server to authenticate dial-in users and authorize their access to the requested system or
service. It is commonly used for embedded network devices such as routers, modem servers,
switches and so on. RADIUS is currently the de-facto standard for remote authentication. It is
prevalent in both new and legacy systems.
TACACS+
TACACS (Terminal Access Controller Access Control System), widely used in network environments, is
a client/server protocol that enables remote access servers to communicate with a central server to
authenticate dial-in users and authorize their access to the requested system or service. It is
commonly used for providing NAS (Network Access Security). NAS ensures secure access from
remotely connected users. TACACS implements the TACACS Client and provides the AAA
(Authentication, Authorization, and Accounting) functionalities.
377
LDAP
LDAP (Lightweight Directory Access Protocol) is an authentication protocol that allows a remote
access server to forward a user's log-on password to an authentication server to determine whether
access can be allowed to a given system. LDAP is based on a client/server model. The switch acts as
a client to the LDAP server. A remote user (the remote administrator) interacts only with the switch,
not with the back-end server and database.
Each entry in the LDAP server is referenced by its Distinguished Name (DN). The DN consists of the
user-account name concatenated with the LDAP domain name. The following is an example DN
where the the user-account name is John:
uid=John,ou=people,dc=domain,dc=com
LDAP supports user membership in groups. If remote user is a member of admin or monitor group, it
will be logged with admin or monitor capabilities respectively.
Supported group names for mapping are as follows:
• admin
• monitor
In this mode the system supports Federal Information Processing Standards (FIPS) 140-2, Security
Requirements for Cryptographic Modules, which is a NIST (National Institute of Standards and
Technology) publication that specifies the requirement for system cypher functionality.
When this mode is activated, all the modules which are used by the system are verified to work in
compliance with the secure mode.
Note that if system fails to load in secure mode it is loaded in non-secure mode.
378
Prerequisites:
switch (config) # snmp-server user <username> v3 auth sha <password1> priv aes-128 <password2>
switch (config) # snmp-server host <ip-address> informs version 3 user <username> auth sha <password1> priv aes-128
<password2>
If a necessary prerequisite is not fulfilled the system does not activate secure mode and
issues an advisory message accordingly.
379
Secure mode is not supported on modular switch systems.
• User Accounts
• username
• show usernames
• show users
• show whoami
• password
• show password hardening
• AAA Methods
• aaa accounting
• aaa authentication login
• aaa authentication attempts fail-delay
• aaa authentication attempts track
• aaa authentication attempts lockout
• aaa authentication attempts class-override
• aaa authentication attempts reset
• clear aaa authentication attempts
• aaa authorization
• show aaa
• show aaa authentication attempts
• RADIUS
• radius-server
• radius-server host
380
• show radius
• TACACS+
• tacacs-server
• tacacs-server host
• show tacacs
• LDAP
• ldap enable
• ldap base-dn
• ldap bind-dn/bind-password
• ldap group-attribute/group-dn
• ldap nested-group-search
• ldap nested-group-depth
• ldap nested-group-count
• ldap host
• ldap hostname-check enable
• ldap login-attribute
• ldap port
• ldap referrals
• ldap scope
• ldap ssl
• ldap timeout
• ldap version
• show ldap
• show ldap crl
• System Secure Mode
• system secure-mode enable
• show system secure-mode
• show secure-boot-status
User Accounts
username
381
Syntax Description username Specifies a username and creates a user account. New users are
created initially with admin privileges but is disabled.
nopassword The next login of the user will not require password.
• 0—specifies a login password in cleartext
0|7 • 7—specifies a login password in encrypted text
password Specifies a password for the user in string form. If [0 | 7] was not
specified then the password is in cleartext.
382
History
3.1.0000
show usernames
show usernames
Default N/A
383
History
3.1.0000
3.8.1000 Updated example output
3.8.2000 Updated example output
Example
Notes
show users
Displays logged in users and related information such as idle time and what host
they have connected from.
Default N/A
History 3.1.0000
Example
384
Related Commands username
show usernames
Notes
show whoami
show whoami
Default N/A
History 3.1.0000
Notes
password
password [age expiration <days> | age warning <days> | history < length > | length
minimal <length> | length maximal < length > | username-password-match enable |
complexity-class <char class> | hardening enable]
Syntax Description age expiration Specifies validity period of any password configured.
<days> Range: 0-365 days (0=password will not expire)
Default: 365 days
age warning
<days> Specifies how many days before expiration a warning message
should be printed while logging in.
Range: 0-30 days (0 indicates that a warning message will not be
printed)
Default: 15 days
385
history < length >
Specifies how many passwords are saved per user. New password
will be compared to previous passwords and will not be allowed
if it is the same as an old one.
hardening enable Enable password restrictions. If enabled, all the above will be
checked upon every new password that is being configured.
Password that does not meet the requirements will be rejected.
The no form will disable any password restrictions and every
password will be allowed.
History 3.9.2000
Notes
386
show password hardening
Default N/A
History 3.9.2000
Password settings:
Password hardening : enabled
Min password length : 8 (characters)
Max password length : 64 (characters)
Character class : Lowercase, uppercase and digits
Password history length : 5
Different username and password: yes
Password aging : enabled
Expiration warning message : 15 (days)
Password age : 365 (days)
AAA Methods
aaa accounting
Default N/A
387
Configuration Mode config
History 3.1.0000
aaa authentication login default <auth method> [<auth method> [<auth method>
[<auth method> [<auth method>]]]]
no aaa authentication login
Default local
History 3.1.0000
3.7.1102—Updated notes
Example switch (config) # aaa authentication login default local radius tacacs+ ldap
388
Notes The order in which the methods are specified is the order in which the
authentication is attempted. It is recommended that “local” is one of the methods
selected.
Configures delay for a specific period of time after every authentication failure.
The no form of the command resets the fail-delay to its default value.
Default 0
History 3.5.0200
Related Commands
Notes
Syntax Description downcase Does not convert all usernames to lowercase (for authentication
failure tracking purposes only).
Default N/A
History 3.5.0200
389
Example switch (config) # aaa authentication attempts track enable
Related Commands
• This is required for the lockout functionality described below, but can also be
Notes used on its own for informational purposes.
• Disabling tracking does not clear any records of past authentication failures,
or the locks in the database. However, it does prevent any updates to this
database from being made: no new failures are recorded. It also disables
lockout, preventing new lockouts from being recorded and existing lockouts
from being enforced.
Syntax Description enable Enables locking out of user accounts based on authentication
failures.
This both suspends enforcement of any existing lockouts, and
prevents any new lockouts from being recorded. If lockouts are
later re-enabled, any lockouts that had been recorded previously
resume being enforced; but accounts which have passed the max-
fail limit in the meantime are NOT automatically locked at this
time. They would be permitted one more attempt, and then locked,
because of how the locking is done: lockouts are applied after an
authentication failure, if the user has surpassed the threshold at
that time.
Lockouts only work if tracking is enabled. Enabling lockouts
automatically enables tracking. Disabling tracking automatically
disables lockouts.
390
unlock-time Enables the auto-unlock of an account after a specified number of
seconds if a user account is locked due to authentication failures,
counting from the last valid login attempt.
Unlike the “max-fail” setting, this does take effect immediately for
all accounts.
If both unlock-time and lock-time are set, the unlock-time must be
greater than the lock-time.
Careful with disabling the unlock-time, particularly if you have
max-fail set to something, and have not overridden the behavior for
the admin (i.e. they are subject to lockouts also). If the admin
account gets locked out, and there are no other administrators who
can aid, the user may be forced to boot single-user and use the
pam_tallybyname command-line utility to unlock your account
manually. Even if one is careful not to incur this many
authentication failures, it makes the system more subject to DOS
attacks.
Default N/A
History 3.2.3000
Related Commands
Notes
Overrides the global settings for tracking and lockouts for a type of account.
The no form of the command removes this override and lets the admin be handled
according to the global settings.
Syntax Description admin Overrides the global settings for tracking and lockouts for the admin
account. This applies only to the single account with the username
“admin”. It does not apply to any other users with administrative
privileges.
no-lockout Prevents the admin user from being locked out though
authentication failure history is still tracked (if tracking is enabled
overall).
391
unknown Overrides the global settings for tracking and lockouts for unknown
accounts. The “unknown” class here contains the following
categories:
• Real remote usernames which simply failed authentication
• Mis-typed remote usernames
• Passwords accidentally entered as usernames
• Bogus usernames made up as part of an attack on the system
hash- Applies a hash function to the username and stores the hashed result
username in lieu of the original
no-track Does not track authentication for such users (which of course also
implies no-lockout)
Default N/A
History 3.2.3000
Related Commands
Notes
392
aaa authentication attempts reset
no-clear-history Leaves the history of login failures but unlocks the account
no-unlock Leaves the account locked but clears the history of login failures
Default N/A
History 3.2.3000
Example switch (config) # aaa authentication attempts reset user admin all
Related Commands
Notes
Default N/A
393
Configuration Mode config
History 3.2.3000
Example switch (config) # aaa authentication attempts reset user admin no-clear-history
Related Commands
Notes
aaa authorization
Syntax Description username Specifies what local account the authenticated user will be logged on
as when a user is authenticated (via RADIUS or TACACS+ or LDAP) and
does not have a local account. If the username is local, this mapping
is ignored.
order Sets the user mapping behavior when authenticating users via RADIUS
<policy> or TACACS+ or LDAP to one of three choices. The order determines
how the remote user mapping behaves. If the authenticated
username is valid locally, no mapping is performed. The setting has
the following three possible behaviors:
• local-only—maps all remote users to the user specified by the
command “aaa authorization map default-user <user name>”.
Any vendor attributes received by an authentication server are
ignored.
• remote-first—if a local-user mapping attribute is returned and
it is a valid local username, it maps the authenticated user to
the local user specified in the attribute. Otherwise, it uses the
user specified by the default-user command.
• remote-only—maps a remote authenticated user if the
authentication server sends a local-user mapping attribute. If
the attribute does not specify a valid local user, no further
mapping is tried.
394
Default Default user—admin
Map order—remote-first
Order fallback—server-err
History 3.1.0000
3.7.1000—Added “fallback” parameter
3.7.1000—Updated syntax
show aaa
show aaa
Default N/A
History 3.1.0000
3.7.0020—Example updated
395
Example switch (config) # show aaa
AAA authorization:
Default User: admin
Map Order: remote-first
Fallback on server-err: yes
Authentication method(s):
local
Accounting method(s):
tacacs+
Notes
status user Displays status of authentication failure tracking and lockouts for
specific user.
Default N/A
History 3.2.1000
3.5.0200—Updated example
Example
396
switch (config) # show aaa authentication attempts
Username Known Locked Failures Last fail time Last fail from
-------- ----- ------ -------- -------------- --------------
0Q72B43EHBKT8CB5AF5PGRX3U3B3TUL4CYJP93N(*) no no 1 2020/05/20 14:29:19 ttyS0
Related Commands
Notes
RADIUS
radius-server
Syntax Description secret Sets a secret key (shared hidden text string), known to the system
and to the RADIUS server.
History 3.1.0000
397
Related Commands aaa authorization
radius-server host
show radius
Notes Each RADIUS server can override those global parameters using the command “radius-
server host”.
radius-server host
radius-server host <IP address> [enable | auth-port <port> | key <secret> | prompt-
key | retransmit <retries> | timeout <seconds>| cipher <none | eap-peap> ]
no radius-server host <IP address> [auth-port | enable | cipher]
History 3.1.0000
3.8.1000—Updated command description, syntax description & example
398
Example switch (config) # radius-server host fe80::202:b3ff:fe1e:8329
switch (config) # radius-server host 40.40.40.40
show radius
show radius
Default N/A
History 3.1.0000
3.6.6000—Updated example
3.8.1000—Updated command description, syntax description & example
RADIUS defaults:
Key : ********
Timeout : 3
Retransmit : 1
RADIUS servers:
1.1.1.1:1812 :
Enabled : yes
Key : ********
Timeout : 3 (default)
Retransmit : 1 (default)
Cipher : none
40.40.40.40:1812:
Enabled : yes
Key : ********
Timeout : 3 (default)
Retransmit : 1 (default)
Notes
399
TACACS+
tacacs-server
Syntax Description secret Set a secret key (shared hidden text string), known to the system
and to the TACACS+ server.
History 3.1.0000
Notes Each TACACS+ server can override those global parameters using the command
“tacacs-server host”.
tacacs-server host
tacacs-server host <IP address> {enable | auth-port <port> | auth-type <type> | key
<secret> | prompt-key | retransmit <retries> | timeout <seconds>}
no tacacs-server host <IP address> {enable | auth-port}
400
enable Administrative enable for the TACACS+ server.
secret Sets a secret key (shared hidden text string), known to the system
and to the TACACS+ server.
prompt-key Prompts for key, rather than entering key on command line.
History 3.1.0000
401
• TACACS+ servers are tried in the order they are configured
Notes • A PAP auth-type similar to an ASCII login, except that the username and
password arrive at the network access server in a PAP protocol packet
instead of being typed in by the user, so the user is not prompted
• If the user does not specify a parameter for this configured TACACS+ server,
the configuration will be taken from the global TACACS+ server
configuration. Refer to the command “tacacs-server”.
show tacacs
show tacacs
Default N/A
History 3.1.0000
3.6.6000—Updated example
Notes
LDAP
ldap enable
402
Syntax Description force Enables LDAP in the specified VRF while setting all relevant LDAP
options to default.
History 3.9.2000
switch (config) # ldap vrf mgmt enable
Example
Related Commands
Notes If VRF mgmt exists, LDAP will be enabled on VRF mgmt. If there is no VRF mgmt,
LDAP will be enabled on the "default" VRF.
ldap base-dn
Sets the base distinguished name (location) of the user information in the schema of
the LDAP server.
The no form of the command resets the attribute to its default values.
Syntax Description string A case-sensitive string that specifies the location in the LDAP
hierarchy where the server should begin searching when it receives
an authorization request.
For example: “ou=users,dc=example,dc=com”, with no spaces.
Where:
• ou—Organizational unit
• dc—Domain component
• cn—Common name
• sn—Surname
Default ou=users,dc=example,dc=com
History 3.1.0000
403
Notes
ldap bind-dn/bind-password
Gives the distinguished name or password to bind to on the LDAP server. This can be
left empty for anonymous login (the default).
The no form of the command resets the attribute to its default values.
Syntax Description string A case-sensitive string that specifies distinguished name or password
to bind to on the LDAP server.
Default “”
History 3.1.0000
Notes For anonymous login, bind-dn and bind-password should be empty strings “”.
ldap group-attribute/group-dn
Sets the distinguished name or attribute name of a group on the LDAP server.
The no form of the command resets the attribute to its default values.
404
Default group-att: member
group-dn: “”
History 3.1.0000
ldap nested-group-search
ldap nested-group-search
no ldap nested-group-search
Default Disabled
History 3.10.2000
switch (config) # ldap nested-group-search
switch (config) # no ldap nested-group-search
Example
ldap nested-group-depth
Related Commands ldap nested-group-count
show ldap
Notes
405
ldap nested-group-depth
Default 3
History 3.10.2000
switch (config) # ldap nested-group-depth 6
switch (config) # no ldap nested-group-depth
Example
ldap nested-group-search
Related Commands ldap nested-group-count
show ldap
Notes
ldap nested-group-count
Default 1000
History 3.10.2000
switch (config) # ldap nested-group-count 500
switch (config) # no ldap nested-group-count
Example
ldap nested-group-depth
Related Commands ldap nested-group-search
show ldap
Notes
406
ldap host
History 3.1.0000
History 3.6.8008
407
switch (config) # ldap hostname-check enable
Example
Notes
ldap login-attribute
Sets the attribute name which contains the login name of the user.
The no form of the command resets this attribute to its default.
uid LDAP login name is taken from the user login username.
Default sAMAccountName
History 3.1.0000
Notes
ldap port
Sets the TCP port on the LDAP server to connect to for authentication.
The no form of the command resets this attribute to its default value.
408
Syntax Description port TCP port number
Default 389
History 3.1.0000
Notes
ldap referrals
ldap referrals
no ldap referrals
History 3.1.0000
Notes Referral is the process by which an LDAP server, instead of returning a result, will
return a referral (a reference) to another LDAP server which may contain further
information.
409
ldap scope
Specifies the extent of the search in the LDAP hierarchy that the server should make
when it receives an authorization request.
The no form of the command resets the attribute to its default value.
• one-level—searches the immediate children of the base dn
Syntax Description scope • subtree—searches at the base DN and all its children
Default subtree
History 3.1.0000
Notes
ldap ssl
ldap ssl {ca-list <options> | cert-verify | ciphers {all | TLS1.2} | crl-check {enable |
file fetch all [vrf <vrf-name>] <path>} | mode <mode> | port <port-number>}
no ldap ssl {cert-verify | ciphers | crl-check enable | mode | port}
410
Syntax Description options This command specifies the list of supplemental certificates of
authority (CAs) from the certificate configuration database that is to
be used by LDAP for authentication of servers when in TLS or SSL
mode.
The options are:
• default-ca-list—uses default supplemental CA certificate list
• none—no supplemental list, uses the built-in one only
crl-check file Fetches CRL from remote server. CRL must be a valid PEM file unless
fetch a proper message shown. Supported formats: SCP, HTTP, HTTPS, FTP,
and FTPS.
mode Sets the security mode for connections to the LDAP server.
• none—requests no encryption for the LDAP connection
• ssl—the SSL-port configuration is used, an SSL connection is
made before LDAP requests are sent (LDAP over SSL)
• start-tls—the normal LDAP port is used, an LDAP connection
is initiated, and then TLS is started on this existing
connection
port-number Sets the port on the LDAP server to connect to for authentication
when the SSL security mode is enabled (LDAP over SSL)
Default cert-verify—enabled
mode—none (LDAP SSL is not activated)
port-number—636
ciphers—all
History 3.1.0000
411
3.2.3000 Added ca-list argument
ldap timeout
Sets a global communication timeout in seconds for all LDAP servers to specify the
extent of the search in the LDAP hierarchy that the server should make when it
receives an authorization request.
The no form of the command resets the attribute to its default value.
Syntax Description timeout-bind Sets the global LDAP bind timeout for all LDAP servers.
timeout- Sets the global LDAP search timeout for all LDAP servers.
search
Default 5 seconds
History 3.1.0000
412
Related Commands show aaa
show ldap
Notes
ldap version
Default 3
History 3.1.0000
Notes
show ldap
show ldap
Default N/A
History 3.1.0000
413
3.4.0000 Updated example
LDAP servers:
No LDAP servers configured.
Notes
Default N/A
History 3.6.8008
414
switch (config) # show ldap crl
-----BEGIN CERTIFICATE-----
Example MIIDVzCSd......
-----END CERTIFICATE-----
Notes
Default Disabled
415
• Before enabling secure mode, the command performs the following
Notes configuration checks:
• NTP Key ID cannot be MD5 when secure mode is enabled
• SSH min-version cannot be 1 when enabling secure mode
• SSH security must be set to strict security
• SNMPv3 user auth cannot be md5 when enabling secure mode
• SNMPv3 user priv cannot be des when enabling secure mode
• SNMPv3 trap auth cannot be md5 when enabling secure mode
• SNMPv3 trap priv cannot be des when enabling secure mode
• Router BGP neighbor password cannot be set when enabling secure mode
• Router BGP peer-group password cannot be set when enabling with
secure mode
• User password hash cannot be MD5 when secure mode is enabled
Only if the check passes, secure mode is enabled on the switch system.
• When secure mode is enabled extra reboot may happen after next steps: install
new image and boot to newly installed image.
Default N/A
show secure-boot-status
show secure-boot-status
416
Default N/A
Related Commands
Notes This command is only available for NDR platforms and above
This page contains commands for configuring, generating and modifying x.509 certificates used in
the system. Certificates are used for creating a trusted SSL connection to the system.
Crypto commands also cover IPSec configuration commands used for establishing a secure
connection between hosts over IP layer which is useful for transferring sensitive information.
***IMPORTANT***
Encryption and decryption perform “reset factory keep-config” on the switch system
once configured. This means that sysdumps, logs, and images are deleted.
The key may be saved locally as well by using the parameter “local” instead of “usb”
but that configuration is less secure.
417
switch (config)# show crypto encrypt-data
Sensitive files encryption:
Status: enabled
Key location: usb
Cipher: aes256
Once encryption is enabled, reverting back to an older version while encrypted is not
possible. The command “no crypto encrypt-data” must be run before attempting to
downgrade to an older OS version.
crypto encrypt-data
Default N/A
418
Configuration Mode config
History 3.6.1002
Example
crypto ipsec ike {clear sa [peer {any | <IPv4 or IPv6 address>} local <IPv4 or IPv6
address>] | restart}
peer Clears security associations for the specified IKE peer (remote
peers are affected)
• all—clears security associations for all IKE peerings with a
specific local address (remote peers are affected)
• IPv4 or IPv6 address—clears security associations for
specific IKE peering with a specific local address (remote
peers are affected)
IPv4 or IPv6 Clears security associations for the specified IKE peering (remote
address peer is affected)
restart Restarts the IKE (ISAKMP) daemon (clears all IKE state, peers may
be affected)
Default N/A
419
Configuration Mode config
History 3.2.3000
switch (config)# crypto ipsec ike restart
Example
Notes
crypto ipsec peer local {enable | keying {ike negotiation {ikev1 | ikev2} | [auth
{ hmac-sha1 | hmac-sha256 | hmac-sha512 | aes-xcbc} | dh-group | disable |
encrypt { 3des-cbc| aes-cbc | aes-gcm} | exchange-mode | lifetime | local | mode
| peer-identity | pfs-group | preshared-key | prompt-preshared-key | transform-
set] | manual [auth | disable | encrypt | local-spi | mode | remote-spi]}}
420
keying Configures key management for this IPSec peering.
• auth—configures the authentication algorithm for this
IPSec peering
• disable—configures this IPSec peering administratively
disabled
• encrypt—configures the encryption algorithm for this
IPSec peering
• local-spi—configures the local SPI for this manual IPSec
peering
• mode—configures the peering mode for this IPSec peering
• remote-spi—configures the remote SPI for this manual
IPSec peering
Default N/A
History 3.2.3000
3.9.3100: Added support for IKEv2 and new ciphers
switch (config)# crypto ipsec peer 10.10.10.10 local 10.7.34.139 enable
Example
Default N/A
421
Configuration Mode config
History 3.2.3000
switch (config) # crypto certificate default-cert name test
Example
Designates the named certificate as the global default certificate role for
authentication of this system to clients.
The no form of the command reverts the default-cert name to “system-self-
signed” (the “cert-name” value is optional and ignored).
Default N/A
History 3.2.3000
switch (config) # crypto certificate default-cert name test
Example
422
crypto certificate generation
Syntax Description country-code Configures the default certificate value for country code with a
two-alphanumeric-character code or -- for none.
key-size-bits Configures the default certificate value for private key size
(private key length in bits—at least 1024, but 2048 is strongly
recommended)
organization Configures the default certificate value for the organization name
History 3.2.1000
3.3.4350: Added “hash-algorithm” parameter
3.6.4000: Added “days-valid” parameter
3.8.2100: Added "ca-valid" parameter
switch (config) # crypto certificate generation default hash-algorithm sha256
Example
Notes
423
crypto certificate name
generate self- Generates certificates. This option has the following parameters
signed which may be entered sequentially in any order:
• comment—specifies a certificate comment (free string)
• common-name—specifies the common name of the issuer
and subject (e.g. a domain name)
• country-code—specifies the country codwo-alphanumeric-
character country code, or “--” for none)
• days-valid—specifies the number of days the certificate is
valid
• email-addr—specifies the email address
• hash-algorithm—specifies the hashing function used for
signature algorithm.
Default value is SHA256.
• key-size-bits—specifies the size of the private key in bits
(private key length in bits - at least 1024 but 2048 is
strongly recommended)
• locality—specifies the locality name
• org-unit—specifies the organizational unit name
• organization—specifies the organization name
• serial-num—specifies the serial number for the certificate
(a lower-case hexadecimal serial number prefixed with
“0x”)
• state-or-prov—specifies the state or province name
• ca-valid—Specifies certificate CA Basic Constraints flag set
to TRUE/FALSE
424
regenerate Regenerates the named certificate using configured certificate
generation default values for the specified validity period
Default N/A
History 3.2.3000
3.3.4402: Added “hash-algorithm” parameter
3.6.4000: Added “days-valid” parameter
3.8.2100: Added "ca-valid" parameter
Notes
Syntax Description days-valid Specifies the number of days the certificate is valid
ca-valid Specifies certificate CA Basic Constraints flag set to TRUE/FALSE
Default N/A
History 3.2.1000
3.8.2100: Added the ca-valid option
switch (config) # crypto certificate system-self-signed regenerate days-valid 3
Example switch (config) # crypto certificate system-self-signed regenerate ca-valid false
Notes
425
show crypto certificate
Syntax Description ca-list Displays the list of supplemental certificates configured for the
global default system CA certificate role
Default N/A
History 3.2.1000
3.8.2100: Updated output
Example
426
switch (config) # show crypto certificate
Certificate with name 'system-self-signed' (default-cert)
Comment: system-generated self-signed certificate
Private Key: present
Serial Number: 0x546c935511bcafc21ac0e8249fbe0844
SHA-1 Fingerprint: fe6df38dd26801971cb2d44f62dbe492b6063c5f
Validity:
Starts: 2012/12/02 13:45:05
Expires: 2013/12/02 13:45:05
Subject:
Common Name: IBM-DEV-Bay4
Country: IS
State or Province:
Locality:
Organization:
Organizational Unit:
E-mail Address:
Issuer:
Common Name: IBM-DEV-Bay4
Country: IS
State or Province:
Locality:
Organization:
Organizational Unit:
E-mail Address:
X509 Extensions:
Basic Constraints:
CA: TRUE
Related Commands
Notes
show encrypt-data
Default N/A
History 3.6.1002
switch (config)# show crypto encrypt-data
Sensitive files encryption:
Example Status: enabled
Key location: usb
Cipher: aes256
Related Commands
Notes
427
show crypto ipsec
Default N/A
History 3.2.1000
switch (config)# show crypto ipsec
IPSec Summary
Example -------------
Crypto IKE is using pluto (Openswan) daemon.
Daemon process state is stopped.
Related Commands
Notes
428
InfiniBand Switching
The following pages provide information on configuring InfiniBand protocols and features.
• Node Name
• Fabric
• IB Router
• InfiniBand Interface
• Subnet Manager
• Subnet Manager High Availability
Node Name
ib nodename
ib nodename <guid> name <name>
no ib nodename <guid>
Default N/A
History 3.1.0000
switch (config) # ib nodename 00:00:00:00:60:04:03:30 name my-name
Example
Related Commands
Notes If an entry with the same GUID exists, the existing name will be replaced with a
new name.
429
show ib nodename
show ib nodename
Default N/A
History 3.1.0000
switch (config) # show ib nodename
GUID='00:00:00:00:60:04:03:30', name='my-name', discovered='no'
Example
Notes
Fabric
Fabric Commands
• Fabric Commands
• show guids
• show system guid
• show lids
show guids
show guids
Default N/A
430
Configuration Mode config
History 3.1.0000
Related Commands
Notes
Default N/A
History 3.1.0000
switch (config) # show system guid
00:02:C9:03:00:43:D9:00
Example
Related Commands
Notes
show lids
show lids
431
Syntax Description N/A
Default N/A
History 3.1.0000
Related Commands
Notes
IB Router
IB router provides the ability to send traffic between two or more IB subnets thereby potentially
expanding the size of the network to over 40k end-ports, enabling separation and fault resilience
between islands and IB subnets, and enabling connection to different topologies used by different
subnets.
The forwarding between the InfiniBand subnets is performed using GRH (global route header)
lookup.
IB router capabilities are supported only on SB7780 or SB7880 switch systems which come with the
following default configuration:
• L3 capabilities enabled
• 2 SWIDs, with interface 1/1 mapped to infiniband-default and interface 1/2 mapped to
infiniband-1
The DLID in the new LRH is built using simplified GID-to-LID mapping (where LID = 16 LSB bits of GID)
thereby not requiring to send for ARP query/lookup.
432
For this to work, the SM allocates an alias GID for each host in the fabric where the alias GID =
{subnet prefix[127:64], reserved[63:16], LID[15:0]}. Hosts should use alias GIDs in order to transmit
traffic to peers on remote subnets.
For more information on IB router architecture and functionality, please refer to the
community post “IB Router Architecture and Functionality”.
IB router requires HCA configuration such as SM, partition key, MPI, GID translation, and
more. To learn more about these configurations, please refer to the community post
“HowTo Configure IB Routers”.
Configuring IB Router
Prerequisites
1. Check system capabilities to make sure IB L3 is supported. Run:
433
switch (config) # show system capabilities
IB: Supported, L2, L3, Adaptive Routing
Max SM nodes: 2048
IB Max licensed speed: EDR
Note the number of SWIDs configured and that IB Routing is set to “yes”.
Configuring IB Router
1. Map an interface to a SWID. Run:
434
IB subnet Routing enabled
infiniband-default enabled
infiniband-1 enabled
switch (config) # show interfaces ib-subnet infiniband-default
infiniband-default state:
GUID : F4:52:14:03:00:6E:F2:8B
Alias GID : N/A
LID : 10
Subnet prefix : FE:C0:00:00:00:00:00:08
Physical state : LinkUp
Logical state : Active
L3 interface state : Up
IP to GID Resolution
1. Go to the following Github: https://github.com/Mellanox/ip2gid
2. Clone the Git repository
3. Compile and run on each node in the fabric
4. Change the device MAC address of the IPoIB device to be based on the alias GID and not the
GUID.
For example, # echo fec0:0000:0000:0003:0014:0500:0000:0001 > /sys/class/net/ib0/
set_mac
where fe:c0:00:00:00:00:00:02:00:14:05:00:00:00:00:01 is the alias GID given by the SM to
that node.
5. Add route using "ip route add" command to the relevant hosts.
# ifconfig ib0 12.0.3.1/24 --> set ip for ib0
# ip route add 12.0.1.0/24 via 12.3.0.250 --> adding route to hosts with 12.1.xxx.xxx IP
# ip route add 12.0.2.0/24 via 12.3.0.250 --> adding route to hosts with 12.2.xxx.xxx IP
When any of these commands is run, while the other two have already been issued, the value of the
subnet prefix is checked. If it is not valid, the current commit is rejected and the OpenSM state
does not change.
435
switch (config) # ib sm subnet-prefix-override
IB Router Commands
• Configuring IB Router
• Prerequisites
• Configuring IB Router
• IP to GID Resolution
• Subnet Prefix Checking
• IB Router Commands
• ib router
• ib router shutdown
• interface ib-subnet
• interface ib-subnet shutdown
• show ib router
• show interfaces ib-subnet
ib router
ib router
no ib router
Default N/A
History 3.6.0500
switch (config) # ib router
Example
Notes
436
ib router shutdown
ib router shutdown
no ib router shutdown
Disables IB router.
The no form of the command enables IB router.
Default Disabled
History 3.6.0500
switch (config) # no ib router shutdown
Example
Related Commands
interface ib-subnet
Default N/A
History 3.6.0500
switch (config) # interface ib-subnet infiniband-3
Example
Notes The maximum number of SWIDs depends on the number of SWIDs defined in the
profile
437
interface ib-subnet shutdown
Default Disabled
History 3.6.0500
switch (config) # no interface ib-subnet infiniband-3 shutdown
Example
Related Commands
Notes
show ib router
show ib router
Default N/A
History 3.6.0500
Example switch (config) # show ib router
Routing state: enabled
438
Related Commands
Notes
Default Disabled
History 3.6.0500
Example switch (config) # show interfaces ib-subnet infiniband-3
infiniband-3 state:
GUID : F4:52:14:03:00:6E:F2:8B
Alias GID : N/A
LID : 10
Subnet prefix : FE:C0:00:00:00:00:00:08
Physical state : LinkUp
Logical state : Active
L3 interface state : Up
Related Commands
Notes
InfiniBand Interface
Transceiver Information
MLNX-OS offers the option of viewing the transceiver information of a module or cable connected to
a specific interface. The information is a set of read-only parameters burned onto the EEPROM of
the transceiver by the manufacture. The parameters include identifier (connector type), cable type,
speed and additional inventory attributes.
439
switch (config) # show interfaces ib 1/36 transceiver
Slot 1 port 36 state
identifier : QSFP+
cable/module type : Passive copper, unequalized
infiniband speeds : SDR , DDR , QDR , FDR, HDR, NDR
vendor : Mellanox
cable length : 2m
part number : MC2207130-0A1
revision : A3
serial number : MT1324VS02215
The indicated cable length is rounded up to the nearest natural number.
If a high power transceiver (e.g. LR4) is inserted to a port that does not support it, the link does not
go up, and the following warning message is displayed: “Warning: High power transceiver is not
supported” when the command “show interfaces ib” is run.
Break-Out Cables
This feature is available only for Quantum and Quantum-2 based switch systems (including
modular systems).
To split a port in an externally managed 1U switch system, please refer to section “Using
mlxconfig to Split a Port in a Remotely Managed Switch” in the MFT documentation.
In-band management is blocked by default on MLNX-OS switches, but can be enabled via
the CLI command "system manage inband-ib". Once enabled, interaction between the
different sources of commands is possible. That is, you may split a port via MAD and display
the results on CLI, or split a port via CLI and query the result via MAD. Logically, it is similar
to having two CLI users.
440
The break-out cable is a unique NVIDIA capability, where a single physical quad-lane QSFP port is
divided into 2 dual-lane ports. It maximizes the flexibility of the end user to use the NVIDIA switch
with a combination of dual-lane and quad-lane interfaces according to the specific requirements of
its network. All system ports may be split into 2-lane ports and, on modular systems, only external
ports may be split. Splitting a port changes the notation of that port from x/y to x/y/z with “x/y”
indicating the previous notation of the port prior to the split and “z” indicating the number of the
resulting single-lane port (1,2). Each sub-physical port is then handled as an individual port. For
example, splitting port 5 into 2 lanes gives the following new ports: 1/5/1 & 1/5/2 and on modular
systems, splitting port 5 of device 1 on leaf 1 will give the following ports: 1/1/5/1 and 1/1/5/2.
For Quantum-2 based systems, there will be an additional hierarchy—the cage level, which, for
Quantum-2 systems, contains 2 physical ports.
Splitting the interface deletes all configuration on that interface.
In order to use this feature, the system’s profile must be configured to “ib split-ready” as
described in section “Changing System Profile to Allow for Split-Ready Configuration” using
the command “system profile”.
If system does not have split-ready configuration, change its profile to allow for it:
1. Change the system’s profile to “ib split-ready”. Run:
On modular systems, system’s profile need to be changed to “ib split-ready” for both
managements simultaneously.
441
Split Ready: yes
IB Routing: no
To split an interface:
1. Shut down the interface.
Examples:
or
The above examples were executed on 1U systems, but are available also for modular
systems.
442
switch (config interface ib 1/4/2) # shutdown
switch (config interface ib 1/4/2) # exit
2. From the first member of the split (1/4/1), change the module-type back to QSFP. Run:
For both split and unsplit operations, a “force” option may be utilized to allow the
operation without previously shutting down the ports.
The above examples were executed on 1U systems, but are available also for modular
systems.
• interface ib
• module-type
• interface ib port-type split-2
• mtu
• shutdown
• description
• speed
• op-vls
• width
• clear counters
• interface ib internal notification link-speed-mismatch
• interfaces ib internal notification link-state-change
• switchport access subnet
• show interfaces ib
• show interfaces ib status
• show interfaces ib internal
• show interfaces ib internal capabilities
• show interfaces ib internal llr
• show interfaces ib internal status
• show interfaces ib transceiver
• show interfaces ib transceiver diagnostics
• show interfaces ib transceiver raw
443
interface ib
Default N/A
History 3.1.0000
Notes Interface range (inf-range) option is not valid on modular switch systems
module-type
444
Related Commands show interfaces ib
Notes
Available only for systems configured with split-ready profile. See "Break-Out Cables"
section for more information.
Related Commands
Notes
Available only when split profile is configured.
mtu
mtu <frame-size>
no interface ib mtu
Configures the Maximum Transmission Unit (MTU) frame size for the interface.
The no form of the command returns the field value to its default.
Syntax Description frame-size
MTU size in bytes
Possible values: 256, 512 ,1K, 2K, 4K (K =1024)
Default 4096 bytes
Configuration Mode config interface ib
History 3.1.0000
3.9.3100 Added the no form of the command
Example switch (config interface ib 1/1) # mtu 4K
445
shutdown
shutdown
no shutdown
description
description <string>
no description
speed
446
Syntax Description port speed The following options are available:
• sdr—10.0Gb/s rate on 4 lane width
• ddr—20.0Gb/s rate on 4 lane width
• qdr—40.0Gb/s rate on 4 lane width
• fdr10—40.0Gb/s rate on 4 lane width
• fdr—56.0Gb/s rate on 4 lane width
• edr—100.0Gb/s rate on 4 lane width
• hdr—200.0 Gb/s rate on 4 lane width
• ndr—400.0 Gb/s rate on 4 lane width
op-vls
op-vls <value>
no op-vls
447
Related Commands how interfaces ib
Notes
width
width <value>
no width
Default 7
Configuration Mode config interface ib
History 3.1.0000
Example switch (config interface ib 1/1) # width 1
clear counters
clear counters
Default N/A
Configuration Mode config interface ib
History 3.1.0000
Example switch (config interface ib 1/1) # clear counters
448
interface ib internal notification link-speed-mismatch
449
force Applies configuration without the need to shutdown the interface
before running command
Default Unmapped
Configuration Mode config interface ib
History 3.6.0500
Example switch (config interface ib1/36) # switchport access subnet infiniband-1
Related Commands
Notes • Mapping an interface automatically enables it
• Remapping an interface resets all its configuration except for interface
description
• Unmapping an interface resets all its configuration except for interface
description
• An interface needs to be disabled before remapping/unmapping unless the
“force” parameter is used
show interfaces ib
Default N/A
Configuration Mode Any command mode
History 3.1.0000
3.4.1604 Updated example
3.6.1002 Updated example
3.6.6105 Updated example
3.9.1300 Updated output
3.9.3100 Updated field 'VL capabilities' to 'VL admin capabilities'
450
Example switch (config) # show interfaces ib 1/1
IB1/1 state:
Logical port state : Down
Physical port state : Polling
Current line rate : -
Supported speeds : sdr, ddr, qdr, fdr10, fdr, edr
Speed : -
Supported widths : 1X, 4X
Width : 4X
Max supported MTUs : 4096
MTU : 0
VL admin capabilities : VL0 - VL7
Operational VLs : -
Description :
IB Subnet : infiniband-default
Phy-profile : high-speed-ber
Width reduction mode : Not supported
Telemetry sampling : Disabled
Telemetry threshold : Disabled
Telemetry record : Disabled
Telemetry threshold level : N/A bytes
Rx:
Bytes : 0
Packets : 0
Errors : 0
Symbol errors : 0
VL15 dropped packets : 0
Tx:
Bytes : 0
Packets : 0
Wait : 0
Discarded packets : 0
Related Commands
Notes If a high power transceiver (e.g. LR4) is inserted to a port that does not support it,
the link will not go up, and the following warning message is displayed: “Warning:
High power transceiver is not supported” when the command “show interfaces ib” is
run. For more information, please refer to see “High Power Transceivers”.
Displays the status, speed and negotiation mode of the specified interface.
Syntax internal Internal interfaces
Description
leaf-ports filter to leaf-ports only
inf Interface number: <slot>/<port>
Default N/A
Configuration Any command mode
Mode
History 3.2.0500
3.4.1604 Updated example
3.6.1002 Updated example
451
Example switch (config) # show interfaces ib status
Interface Description IB Subnet Speed Current line rate
Logical port state Physical port state
--------- ----------- --------- --------- -----------------
------------------ -------------------
IB1/1 infiniband-1 fdr 56.0 Gbps
Active LinkUp
IB1/2 infiniband-2 fdr 56.0 Gbps
Active LinkUp
IB1/3 infiniband-default - - Down
Polling
IB1/4 infiniband-default - - Down
Polling
IB1/5 infiniband-default - - Down
Polling
IB1/6 infiniband-default - - Down
Polling
IB1/7 infiniband-default - - Down
Polling
IB1/8 infiniband-default - - Down
Polling
IB1/9 infiniband-default - - Down
Polling
IB1/10 infiniband-default - - Down
Polling
IB1/11 infiniband-default - - Down
Polling
...
Related
Commands
Notes
452
Example switch (config) # show interfaces ib internal spine 1/1/4
IB1/1/4 state:
Connected to slot/chip : 4/1
Connected to port : 19
Connected device active: 1
Error state : 0
Logical port state : Active
Physical port state : LinkUp
Current line rate : 56.0 Gbps
Supported speeds : sdr, ddr, qdr, fdr10, fdr
Speed : fdr
Supported widths : 1X, 4X
Width : 4X
Max supported MTUs : 4096
MTU : 4096
VL admin capabilities : VL0 - VL7
Operational VLs : VL0 - VL7
Description :
Phy-profile : high-speed-ber
Width reduction mode : disabled
Related Commands
Notes
IB1/1/26
LLR: FDR10, FDR,
Related Commands
Notes
453
Example switch (config) # show interfaces ib internal leaf 1/1/26 llr
----------------------------------
Interface LLR status
----------------------------------
IB1/1/26 Active
Related Commands
Notes
Related Commands
Notes
454
Related Commands
Notes • For a full list of the supported cables and transceivers, please refer to the
LinkX™ Cables and Transceivers page
• If a high power transceiver (e.g. LR4) is used, it will be indicated in the field
“cable/module type”
Displays cable channel monitoring and diagnostics info for this interface.
Syntax Description inf Interface number: <slot>/<port>
Default N/A
Configuration Mode Any command mode
History 3.6.2002
3.6.6000 Updated example
455
Example switch (config) # show interfaces ib transceiver diagnostics
Related Commands
Notes This example is for a QSFP transceiver
456
Configuration Mode Any command mode
History 3.6.1002
Example switch (config) # show interfaces ib 1/7 transceiver raw
IB1/7 raw transceiver data:
Related Commands
Notes
Subnet Manager
The InfiniBand Subnet Manager (SM) is a centralized entity running in the switch. The SM discovers
and configures all the InfiniBand fabric devices to enable traffic flow between those devices.
The SM applies network traffic related configurations such as Quality of Service (QoS), routing, and
partitioning of the fabric devices. You can view and configure the Subnet Parameters (SM) via the
CLI/WebUI menu. The embedded SM on the MLNX-OS can be used to manage fabrics up to 2048
nodes on x86 based systems.
The SM is used to discover and configure all the InfiniBand fabric devices to enable traffic flow
between those devices.
457
If rapid SM restarts are observed in what should be a quiet subnet, verify that all nodes
running SM in the same management domain are in the same IB subnet. If they are not, fix
the subnet.
Partitions
Partitioning enforces isolation among systems sharing an InfiniBand fabric. Partitioning is not related
to boundaries established by subnets, switches, or routers. Rather, a partition describes a set of end
nodes within the fabric that may communicate. Each port of an end node is a member of at least
one partition and may be a member of multiple partitions. A partition manager (part of the SM)
assigns partition keys (PKEYs) to each channel adapter port. Each PKEY represents a partition.
Reception of an invalid PKEY causes the packet to be discarded. Switches and routers may optionally
be used to enforce partitioning. In this case the partition manager programs the switch or router
with PKEY information and when the switch or router detects a packet with an invalid PKEY, it
discards the packet.
Fabric administration can assign certain Service Levels (SLs) for particular partitions. This allows the
SM to isolate traffic flows between those partitions, and even if both partitions operate at the same
QoS level, each partition can be guaranteed its fair share of bandwidth regardless of whether nodes
in other partitions misbehave or are over subscribed.
The default partition is created by the SM unconditionally (whether it was defined or not).
IP interface “ib0” is running under the default PKEY (0x7fff) and can be used for in-band
management connectivity to the system.
Configuring Partition
The partitions configuration is applicable and to be used only when the SM is enabled and
running on the system.
458
switch (config partition my-partition) # member all
Adaptive Routing
Adaptive routing (AR) allows optimizing data traffic flow. The InfiniBand protocol uses multiple
paths between any two points. Thus, when unexpected traffic patterns cause some paths to be
overloaded, AR can automatically move traffic to less congested paths according to the current
temporal state of the network.
The embedded SM over the switch does not support configuring adaptive routing. To use this
option in the fabric please use an external SM.
AR support is enabled by default on system profile “ib-single-switch”. To disable AR run either the
command “system profile ib-no-adaptive-routing-single-switch” or “system profile ib” with no-
adaptive-routing parameter.
The AR option needs to be enabled in the SM for it to take effect.
Scatter Ports
When assigning logical paths to physical links, the UpDn algorithm tries to map the same number of
paths per link to maximize use of the available bandwidth. This balancing is done statically, without
knowledge of actual workloads and traffic patterns. Path balancing decisions are made locally, at
each switch, without assuming anything about the physical topology. The resulting path assignments
may not be optimal for typical Clos/Fat Tree workloads.
A routing option called “scatter-ports” is available for MinHop and UpDn routing engines which
instructs the routing algorithm to randomize the local assignments of paths to links, which often
results in better link utilization. The scatter-ports option requires an integer argument, which is the
seed for the random number generator. It is recommended to use a prime number for the seed; a
seed of zero turns off randomization.
459
GUID Routing Order
GUID routing order list allows managing the order in which the SM processes the destination LIDs in
the calculations of output port as part of MinHop or Up/Down routing algorithms only.
The order of GUID appearance is important as destinations corresponding to GUIDs appearing earlier
in the routing list get precedence during the routing calculations over other destinations in the
fabric. This can improve load balancing towards a specific set of end ports (e.g. storage nodes or
other service nodes requiring high throughput).
When bulk update is disabled (default situation) every SM configuration is applied immediately.
When bulk is enabled, all SM configuration is saved internally and is not applied until this mode is
disabled.
Bulk mode is a non-persistent state. That is, if the switch is restarted, it boots up with this mode
disabled, and all the configuration changes which are saved before system restart are applied.
Show commands convey every configuration change even if it is not applied yet.
SM Commands
• General
• ib sm
• ib sm accum-log-file
• ib sm allow-both-pkeys
• ib sm babbling-policy
• ib sm connect-roots
• ib sm calculate-missing-routes
• ib sm drop-event-subscriptions
• ib sm enable-quirks
• ib sm exit-on-fatal
• ib sm force-link-speed
• ib sm force-log-flush
• ib sm guid2lid-cache
• ib sm honor-partitions
460
• ib sm hoq-lifetime
• ib sm ignore-other-sm
• ib sm ipv6-nsm
• ib sm lash
• ib sm leafhoq-lifetime
• ib sm leafvl-stalls
• ib sm lmc
• ib sm lmc-esp0
• ib sm log-flags
• ib sm log-max-size
• ib sm max-op-vls
• ib sm max-reply-time
• ib sm max-reverse-hops
• ib sm aguid_default_hop_limit
• ib sm max-wire-smps2
• ib sm m-key
• ib sm mkey-lease
• ib sm mkey-lookup
• ib sm mkey-protect-level
• ib sm msgfifo-timeout
• ib sm multicast
• ib sm no-client-rereg
• ib sm overrun-trigger
• ib sm packet-life-time
• ib sm phy-err-trigger
• ib sm polling-retries
• ib sm port-prof-switch
• ib sm reassign-lids
• ib sm reset-config
• ib sm root-guid
• ib sm routing-engines
• ib sm rtr-aguid-enable
• ib sm rtr-pr-flow-label
• ib sm rtr-pr-mtu
• ib sm rtr-pr-rate
• ib sm rtr-pr-sl
• ib sm rtr-pr-tclass
• ib sm sa-key
• ib sm single-thread
• ib sm sm-inactive
• ib sm sm-key
• ib sm sm-priority
• ib sm sm-sl
• ib sm sminfo-poll-time
• ib sm subnet-prefix
• ib sm subnet-prefix-override
• ib sm max-smps-timeout
461
• ib sm subnet-timeout
• ib sm sweep-interval
• ib sm sweep-on-trap
• ib sm transaction-retries
• ib sm use-heavy-sweeps
• ib sm use-ucast-cache
• ib sm vl-stalls
• ib sm virt
• ib sm virt-default-hop-limit
• ib sm virt-max-ports-in-process
• Show
• show ib sm
• show ib sm accum-log-file
• show ib sm babbling-policy
• show ib sm calculate-missing-routes
• show ib sm connect-roots
• show ib sm enable-quirks
• show ib sm exit-on-fatal
• show ib sm fdr10
• show ib sm force-link-speed
• show ib sm force-link-speed-ext
• show ib sm force-log-flush
• show ib sm guid2lid-cache
• show ib sm honor-partitions
• show ib sm hoq-lifetime
• show ib sm ignore-other-sm
• show ib sm ipv6-nsm
• show ib sm lash
• show ib sm leafhoq-lifetime
• show ib sm leafvl-stalls
• show ib sm lmc
• show ib sm lmc-esp0
• show ib sm log
• show ib sm log-flags
• show ib sm log-max-size
• show ib sm max-op-vls
• show ib sm max-ports
• show ib sm max-reply-time
• show ib sm max-reverse-hops
• show ib sm aguid-default-hop-limit
• show ib sm max-wire-smps
• show ib sm max-wire-smps2
• show ib sm mkey-lease
• show ib sm m-key
• show ib sm mkey-lease
• show ib sm mkey-lookup
• show ib sm mkey-protect-level
462
• show ib sm msgfifo-timeout
• show ib sm multicast
• show ib sm no-client-rereg
• show ib sm overrun-trigger
• show ib sm packet-life-time
• show ib sm phy-err-trigger
• show ib sm polling-retries
• show ib sm port-prof-switch
• show ib sm reassign-lids
• show ib sm root-guid
• show ib sm routing-engines
• show ib sm routing-info
• show ib sm rtr-aguid-enable
• show ib sm rtr-pr-flow-label
• show ib sm rtr-pr-mtu
• show ib sm rtr-pr-rate
• show ib sm rtr-pr-sl
• show ib sm sa-key
• show ib sm single-thread
• show ib sm sm-inactive
• show ib sm sm-key
• show ib sm sm-priority
• show ib sm sm-sl
• show ib sm sminfo-poll-time
• show ib sm subnet-prefix
• show ib sm subnet-prefix-override
• show ib sm subnet-timeout
• show ib sm sweep-interval
• show ib sm sweep-on-trap
• show ib sm transaction-retries
• show ib sm use-heavy-sweeps
• show ib sm use-ucast-cache
• show ib sm version
• show ib sm virt-default-hop-limit
• show ib sm virt-max-ports-in-process
• show ib sm vl-stalls
• Partitions
• ib partition
• pkey
• defmember
• member
• ipoib
• mtu
• rate
• scope
• sl
• show ib partition
463
• Quality of Service (SM)
• ib baseqos <port-type> high-limit
• ib baseqos max-vls
• ib baseqos sl2vl
• ib baseqos vlarb-high
• ib baseqos <port-type> vlarb-low <value>
• ib baseqos reset-config
• show ib baseqos
• ib qos
• ib qos level
• ib qos match-rule
• ib qos port-group
• ib qos ulp any
• ib qos ulp ipoib
• ib qos ulp <protocol-type>
• ib qos ulp srp
• show ib qos
• Scatter Ports
• ib sm scatter-ports
• show ib sm scatter-ports
• GUID Routing Order
• ib sm guid-routing-order add
• ib sm guid-routing-order delete
• ib sm guid-routing-order move
• ib sm guid-routing-order move-down
• ib sm guid-routing-order move-up
• no ib sm guid-routing-order
• ib sm guid-routing-order-no-scatter
• show ib sm guid-routing-order
• show ib sm guid-routing-order-no-scatter
• Bulk Update Mode
• ib sm bulk-update enable
• show ib sm bulk-update
• ibdiagnet
• ibdiagnet
• show ibdiagnet
• file ibdiagnet upload
• file ibdiagnet delete
464
General
ib sm
ib sm
no ib sm
Default Disabled
History 3.1.0000
switch (config) # ib sm
Example
Notes
ib sm accum-log-file
ib sm accum-log-file
no ib sm accum-log-file
Default Enabled
History 3.1.0000
switch (config) # ib sm accum-log-file
Example
Notes
465
ib sm allow-both-pkeys
ib sm allow-both-pkeys
no ib sm allow-both-pkeys
Enables having both full and limited membership on the same partition.
The no form of the command disables having both full and limited membership on
the same partition.
Default Disabled
History 3.4.1100
switch (config) # ib sm allow-both-pkeys
Example
Notes
ib sm babbling-policy
ib sm babbling-policy
no ib sm babbling-policy
Default Disabled
History 3.1.0000
switch (config) # no ib sm babbling-policy
Example
Notes If the babbling policy is enabled, and decides to close a babbling interface (one
which sends 129,130,131 traps, for example), the SM disables the port.
466
ib sm connect-roots
ib sm connect-roots
no ib sm connect-roots
Default Enabled
History 3.1.0000
switch (config) # ib sm connect-roots
Example
ib sm calculate-missing-routes
ib sm calculate-missing-routes
no ib sm calculate-missing-routes
Default Disabled
History 3.8.2000
467
switch (config) # ib sm calculate-missing-routes
switch (config) # show ib sm calculate-missing-routes
Example
ib sm calculate-missing-routes: enabled
switch (config) # no ib sm calculate-missing-routes
switch (config) # show ib sm calculate-missing-routes
ib sm calculate-missing-routes: disabled
Notes
ib sm drop-event-subscriptions
ib sm drop-event-subscriptions
no ib sm drop-event-subscriptions
Default Disabled
History 3.4.2008
switch (config) # ib sm drop-event-subscriptions
Example
Related Commands
Notes
ib sm enable-quirks
Default Disabled
History 3.1.0000
switch (config) # ib sm enable-quirks
Example
468
Related Commands show ib sm enable-quirks
Notes
ib sm exit-on-fatal
ib sm exit-on-fatal
no ib sm exit-on-fatal
Default Enabled
History 3.1.0000
switch (config) # ib sm exit-on-fatal
Example
Notes
ib sm force-link-speed
ib sm force-link-speed <speed-options>
no ib sm force-link-speed
469
Configuration Mode config
History 3.1.0000
ib sm force-log-flush
ib sm force-log-flush
no ib sm force-log-flush
Default Disabled
History 3.1.0000
switch (config) # ib sm force-log-flush
Example
Notes
470
ib sm guid2lid-cache
ib sm guid2lid-cache
no ib sm guid2lid-cache
Allows SM to use cached GUID-to-lid mapping data. When enabled, the SM honors
the cached GUID-to-lid mapping information if:
• It exists
• It is valid
• sm_reassign_lids is disabled
The no form of the command disallows use of cached GUID-to-lid mapping data.
Default Disabled
History 3.1.0000
switch (config) # ib sm guid2lid-cache
Example
Notes
ib sm honor-partitions
ib sm honor-partitions
no ib sm honor-partitions
Default Enabled
History 3.1.0000
switch (config) # no ib sm honor-partitions
Example
471
Related Commands show ib sm honor-partitions
• If partitioning is disabled (no_partition_enforcement=1), then no named
Notes partitions can be enabled
• If partitioning is enabled globally, the no_partition_enforcement changes
from 1 to 0, and all defined partitions with state enabled are instantiated
• If partitioning is globally disabled, all partitions are removed from the
subnet, but the state (enabled or disabled) associated with defined
partitions is not modified
ib sm hoq-lifetime
ib sm hoq-lifetime <time>
Sets the maximum time a frame can wait at the head of a switch-to-switch port
queue before it is dropped.
Syntax Description time The time is 4.096 uS * 2time. The range of time is 0 to 20. A time
of 20 means infinite, and the default value is 18 which translates
to about 1 second.
History 3.1.0000
switch (config) # ib sm hoq-lifetime 15
Example
Notes
ib sm ignore-other-sm
ib sm ignore-other-sm
no ib sm ignore-other-sm
Ignores all the rules governing SM elections and attempts to manage the fabric.
The no form of the command does not allow the SM to manage fabric if it loses the
election.
Default Disabled
472
History 3.1.0000
switch (config) # ib sm ignore-other-sm
Example
Notes
ib sm ipv6-nsm
ib sm ipv6-nsm
no ib sm ipv6-nsm
Default Disabled
History 3.1.0000
switch (config) # ib sm ipv6-nsm
Example
Notes
ib sm lash
start-vl <vl- Configures the starting VL for SM “lash” routing for mesh analysis
value> (assuming that lash routing is enabled)
473
Default do-mesh-analysis: Disabled
start-vl: 0
History 3.1.0000
switch (config) # ib sm lash do-mesh-analysis
Example
Notes
ib sm leafhoq-lifetime
ib sm leafhoq-lifetime <time>
Sets the maximum time a frame can wait at the head of a switch-to-CA_or_Router
port queue before it is dropped.
Syntax Description time The time is 4.096 uS * 2time. The range of time is 0 to 20. A time
of 20 means infinite, and the default value is 16 which translates
to about 268 millisecond.
History 3.1.0000
switch (config) # ib sm leafhoq-lifetime 8
Example
Notes
ib sm leafvl-stalls
ib sm leafvl-stalls <count>
474
Default 7
History 3.1.0000
switch (config) # ib sm leafvl-stalls 3
Example
Notes
ib sm lmc
ib sm lmc <mask>
Sets the LID Mask Control (LMC) value to be used on this subnet.
Default The default value is 0, which means that every port has exactly one unique LID.
History 3.1.0000
switch (config) # ib sm lmc 7
Example
Notes
ib sm lmc-esp0
ib sm lmc-esp0
no ib sm lmc-esp0
Sets the LMC for the subnet to be used for Enhanced Switch Port 0.
The no form of the command resets this parameter to its default.
Default Disabled
475
Configuration Mode config
History 3.1.0000
switch (config) # ib sm lmc-esp0
Example
Notes
ib sm log-flags
Syntax Description all Turns on all the flags that follow (error info verbose debug funcs
frames routing).
History 3.1.0000
switch (config) # ib sm log-flags error verbose funcs frames
Example
476
Related Commands show ib sm log-flags
• Every execution of this command replaces the current logging flags
Notes • The options “all” and “none” must be specified as the only parameter
ib sm log-max-size
ib sm log-max-size <size>
Default 20 MBytes
History 3.1.0000
ib sm max-op-vls
ib sm max-op-vls <count>
Default 4
History 3.1.0000
477
3.10.1000 Updated default value from 15 to 4
switch (config) # ib sm max-op-vls 4
Example
Notes
ib sm max-reply-time
ib sm max-reply-time <time>
Sets the maximum time the SM waits for a reply before the transaction times out.
History 3.1.0000
switch (config) # ib sm max-reply-time 500
Example
Notes
ib sm max-reverse-hops
ib sm max-reverse-hops <max-reverse-hops>
Sets the maximum number of hops from the top switch to an I/O node.
Default 0 hops
History 3.1.0000
switch (config) # ib sm max-reverse-hops 500
Example
478
Related Commands show ib sm max-reverse-hops
Notes
ib sm aguid_default_hop_limit
ib sm aguid-default-hop-limit <count>
no ib sm aguid-default-hop-limit
Configures the default value for hop limit returned in path records where either the
source or destination are alias an GUID.
The no form of the command resets the count to its default value.
Default 1
History 3.6.6102
switch (config) # ib sm aguid-default-hop-limit 3
Example
Notes
ib sm max-wire-smps2
ib sm max-wire-smps2 <count>
no
Syntax Description count Number of concurrent management packets. The value must be an
integer.
Default 4
History 3.1.0000
switch (config) # ib sm max-wire-smps 8
Example
479
Related Commands show ib sm max-wire-smps2
Notes
ib sm m-key
ib sm m-key <mkey>
no ib sm m-key
Default 00:00:00:00:00:00:00:00
History 3.1.0000
ib sm mkey-lease
ib sm mkey-lease <time>
no ib sm mkey-lease
480
Default 0
History 3.6.2002
switch (config) # ib sm mkey-lease 660
Example
show ib sm mkey-lease
Related Commands
Notes
ib sm mkey-lookup
ib sm mkey-lookup
no ib sm mkey-lookup
Default Enabled
History 3.6.2002
switch (config) # ib sm mkey-lookup
Example
Notes MKey lookup is a boolean value that controls how the SM finds the MKey of ports
ib sm mkey-protect-level
ib sm mkey-protect-level <level>
no ib sm mkey-protect-level
Controls what data is returned to a get_PortInfo MAD request when the MKey in the
request does not match the MKey on the port.
The no form of the command resets the parameter to its default value.
481
• 0—when PortInfo is “read”, the actual MKey is returned in
Syntax Description level port info data
• 1—when PortInfo is “read”, and the MKey in the MAD does not
match the MKey on the port, the MKey value in the returned
PortInfo data is set to 0
• 2—when PortInfo is “read”, and the MKey in the MAD does not
match the MKey on the port, no data is returned
Default 0
History 3.6.2002
switch (config) # ib sm mkey-protect-level 0
Example
Notes
ib sm msgfifo-timeout
ib sm msgfifo-timeout <time>
Sets the time value to be used by the subnet administrator to control when a BUSY
status is returned to a client.
Default 10 seconds
History 3.1.0000
switch (config) # ib sm msgfifo-timeout 50000
Example
Notes If there is more than one message in the SA queue, and it has been there longer than
time milliseconds, all additional incoming requests are immediately replied to with
BUSY status.
482
ib sm multicast
ib sm multicast
no ib sm multicast
Default Disabled
History 3.1.0000
switch (config) # ib sm multicast
Example
Notes
ib sm no-client-rereg
ib sm no-client-rereg
no ib sm no-client-rereg
Default disable
History 3.1.0000
switch (config) # ib sm no-client-rereg
Example
Notes
483
ib sm overrun-trigger
ib sm overrun-trigger <count>
Enables SMA to generate standard InfiniBand trap number 130 when the number of
local buffer overrun errors equals the count value, and the port’s SMA supports traps.
Default 8
History 3.1.0000
switch (config) # ib sm overrun-trigger 3
Example
Notes Refer to the InfiniBand Architecture Specification V1 r1.2.1, section 14.2.5.1 table
131: Traps.
ib sm packet-life-time
ib sm packet-life-time <time>
Syntax Description time The time is 4.096 uS * 2*<time>. Range: 0-20. A time of 20 means
infinite. The value 0x14 disables this mechanism.
History 3.1.0000
switch (config) # ib sm packet-life-time 20
Example
Notes
484
ib sm phy-err-trigger
ib sm phy-err-trigger <count>
Enables SMA to generate trap 129 when the number of local link integrity errors equals
the <count> value, and the port’s SMA supports traps.
Default 8
History 3.1.0000
switch (config) # ib sm phy-err-trigger 5
Example
Notes
ib sm polling-retries
ib sm polling-retries <value>
This variable defines the number of consecutive times an active SM must fail to
respond before it is declared dead.
Default 4
History 3.1.0000
switch (config) # ib sm polling-retries 8
Example
Notes The time between when the active SM fails and the time this SM declares it dead is:
(sm_sminfo_polling_timeout * value) milliseconds.
485
ib sm port-prof-switch
ib sm port-prof-switch
no ib sm port-prof-switch
Enables the counting of adapters, routers, and switches routed through links.
The no form of the command disables the counting of adapters, routers, and switches
routed through links.
Default Disabled
History 3.1.0000
switch (config) # ib sm port-prof-switch
Example
Notes
ib sm reassign-lids
ib sm reassign-lids
no ib sm reassign-lids
Controls the ability of the SM to reassign LIDs to nodes it finds already configured with a
valid LID.
The no form of the command disables the SM from reassigning LIDs to nodes it finds
already configured with a valid LID.
Default Disabled
History 3.1.0000
switch (config) # ib sm reassign-lids
Example
486
• If enabled (ib sm reassign-lids), the SM can, but is not required to, reassign the
Notes LID on a node with a pre-configured LID
• If disabled (no ib sm reassign-lids), the SM does not reassign LIDs
• There are times when the SM is required to reassign LIDs or the fabric cannot be
brought to a stable state, or a fabric option (like LMC) can not be fully applied
ib sm reset-config
ib sm reset-config
Default N/A
History 3.1.0000
switch (config) # ib sm reset-config
Example
Related Commands
Notes
ib sm root-guid
ib sm root-guid <guid>
no ib sm root-guid <guid>
Default N/A
History 3.1.0000
switch (config)# ib sm root-guid aa:bb:00:11:22:33:44:55
Example
487
Notes The list of root GIDs are relevant when IB SM is running on the switch, and the routing
algorithm is up-down or fat-tree.
ib sm routing-engines
Default None
History 3.1.0000
switch (config) # ib sm routing-engines none
Example
Notes Multiple routing engines can be specified separated by spaces so that specific ordering
of routing algorithms will be tried if earlier routing engines fail.
488
ib sm rtr-aguid-enable
ib sm rtr-aguid-enable <value>
no ib sm rtr-aguid-enable
Default 0
History 3.6.2002
switch (config) # ib sm rtr-aguid-enable 1
Example
Related Commands
Notes
ib sm rtr-pr-flow-label
ib sm rtr-pr-flow-label <value>
no ib sm rtr-pr-flow-label <value>
Default 0
Configuration config
Mode
History 3.6.2002
switch (config) # ib sm rtr-pr-flow-label 1
Example
Related Commands
489
Notes
ib sm rtr-pr-mtu
ib sm rtr-pr-mtu <value>
no ib sm rtr-pr-mtu <value>
Default 2K
Configuration config
Mode
History 3.6.2002
switch (config) # ib sm rtr-pr-mtu 2k
Example
Related Commands
Notes
ib sm rtr-pr-rate
ib sm rtr-pr-rate <value>
no ib sm rtr-pr-rate <value>
Syntax Description value Possible values: 2.5, 5, 10, 14, 20, 25, 40, 56, 100
Default 100
History 3.6.2002
switch (config) # ib sm rtr-pr-rate 5
Example
Related Commands
490
Notes
ib sm rtr-pr-sl
ib sm rtr-pr-sl <value>
no ib sm rtr-pr-sl <value>
Default 0
History 3.6.2002
switch (config) # rtr-pr-sl 0
Example
Related Commands
Notes
ib sm rtr-pr-tclass
ib sm rtr-pr-tclass <value>
no ib sm rtr-pr-tclass <value>
Default 0
History 3.6.2002
switch (config) # ib sm rtr-pr-tclass 1
Example
Related Commands
491
Notes
ib sm sa-key
ib sm sa-key <SA_Key>
Sets the SA_Key 64-bit value used by SA to qualify that a query is “trusted”.
Default 00:00:00:00:00:00:00:01
History 3.1.0000
switch (config) # ib sm sa-key 5
Example
Notes OpenSM version 3.2.1 and lower used the default value of “1” in host byte order. You
may need to change this value to inter-operate with older subnet managers.
ib sm single-thread
ib sm single-thread
no ib sm single-thread
Enables the Subnet Manager to use a single thread to service all requests.
The no form of the command enables SA to use multiple service threads.
History 3.1.0000
switch (config) # ib sm single-thread
Example
Notes
492
ib sm sm-inactive
ib sm sm-inactive
no ib sm sm-inactive
Configures the SM to start in the “inactive” SM state. This option can be used to run a
standalone system without the SM/SA function.
The no form of the command configures the SM to start in “init” SM state.
Default Disabled
History 3.1.0000
switch (config) # ib sm sm-inactive
Example
Notes
ib sm sm-key
ib sm sm-key <SM_Key>
Default 00:00:00:00:00:00:00:01
History 3.1.0000
switch (config) # ib sm sm-key 00:00:00:00:00:00:00:05
Example
Notes OpenSM version 3.2.1 and lower used the default value of “1” in host byte order. You
may need to change this value to inter-operate with older subnet managers.
493
ib sm sm-priority
ib sm sm-priority <priority>
Default 0
History 3.1.0000
switch (config) # ib sm sm-priority 1
Example
Notes If two or more active SMs have the same highest priority, the one with the lowest port
GUID manages the fabric.
ib sm sm-sl
ib sm sm-sl <sm-sl>
Default 0
History 3.1.0000
switch (config) # ib sm sm-sl 10
Example
494
ib sm sminfo-poll-time
ib sm sminfo-poll-time <time>
This variable controls the timeout between two polls of an active subnet manager.
Default 10 seconds
History 3.1.0000
switch (config) # ib sm sminfo-poll-time 15
Example
Notes
ib sm subnet-prefix
ib sm subnet-prefix <prefix>
no ib sm subnet-prefix <prefix>
Sets the SM “Subnet Prefix” used to create scope qualifiers for all elements managed
by the SM.
The no form of the command resets the subnet prefix to its default value.
Default FE:80:00:00:00:00:00:00
History 3.6.1002
Notes The default value is also the InfiniBand default for a locally administered subnet.
495
ib sm subnet-prefix-override
ib sm subnet-prefix-override
no ib sm subnet-prefix-override
Default Enabled
History 3.6.2002
switch (config) # ib sm subnet-prefix-override
Example
Notes
ib sm max-smps-timeout
ib sm max-smps-timeout <Timeout>
Default N/A
History 3.8.3000
switch (config) # ib sm max-smps-timeout 22
Example
Related Commands
Notes
496
ib sm subnet-timeout
ib sm subnet-timeout <time>
Sets the global per-port subnet timeout value (PortInfo:SubnetTimeOut). This value
also controls the maximum trap frequency in which no traps are allowed to be sent
faster than the subnet_timeout value.
Syntax Description time The actual timeout is 4.096 uS * 2*<time>. The range of time is 0-31
for this parameter which supports 32 discrete time values between 4
uS and about 2.4 hours.
History 3.1.0000
switch (config) # ib sm subnet-timeout 5
Example
Notes If the SMA generates a sequence of traps, the interval between successive traps should
not be smaller than <time>.
ib sm sweep-interval
ib sm sweep-interval <time>
no ib sm sweep-interval
Default 10 seconds
History 3.1.0000
switch (config) # ib sm sweep-interval 20
Example
Notes
497
ib sm sweep-on-trap
ib sm sweep-on-trap
no ib sm sweep-on-trap
Enables every TRAP received by the SM to initiate a heavy sweep in addition to the
processing required by the TRAP.
The no form of the command enables SM to use a combination of light and heavy sweeps
based on the type of TRAP and other internal states.
Default enable
History 3.1.0000
switch (config) # ib sm sweep-on-trap
Example
Notes More than 10 successive identical TRAPs disable the automatic sweep behavior until at
least one different TRAP has been received.
ib sm transaction-retries
ib sm transaction-retries <transaction-retries-count>
Default 3
History 3.1.0000
switch (config) # ib sm transaction-retries 10
Example
Notes
498
ib sm use-heavy-sweeps
ib sm use-heavy-sweeps
no ib sm use-heavy-sweeps
Default disable
History 3.1.0000
switch (config) # ib sm use-heavy-sweeps
Example
Notes
ib sm use-ucast-cache
ib sm use-ucast-cache
no ib sm use-ucast-cache
Default Disabled
History 3.1.0000
switch (config) # ib sm use-ucast-cache
Example
Notes
499
ib sm vl-stalls
ib sm vl-stalls <count>
Sets the number of sequential frame drops that cause a switch-to-switch port to enter
the VLStalled state.
Default 7
History 3.1.0000
switch (config) # ib sm vl-stalls 10
Example
Notes
ib sm virt
ignore IB SM ignores virtual ports and does not change their configuration
Default Ignore
History 3.4.2008
switch (config) # ib sm virt configure
Example
Related Commands
500
Notes
ib sm virt-default-hop-limit
ib sm virt-default-hop-limit <value>
no ib sm virt-default-hop-limit
Configures the default value for hop limit to be returned in path records.
The no form of the command resets this parameter to its default value.
Default 2
History 3.6.2002
switch (config) # ib sm virt-default-hop-limit 3
Example
Related Commands
Notes
ib sm virt-max-ports-in-process
ib sm virt-max-ports-in-process <value>
no ib sm virt-max-ports-in-process
Default 4
History 3.6.2002
switch (config) # ib sm virt-max-ports-in-process 5
Example
Related Commands
501
Notes
Show
show ib sm
show ib sm
Default N/A
History 3.1.0000
switch (config) # show ib sm
enable
Example
Related Commands ib sm
Notes
show ib sm accum-log-file
show ib sm accum-log-file
Default N/A
History 3.1.0000
switch (config) # show ib sm accum-log-file
enable
Example
Notes
502
show ib sm babbling-policy
show ib sm babbling-policy
Displays the ability of the SM to disable babbling ports (i.e., generating frequent traps).
Default N/A
History 3.1.0000
switch (config) # show ib sm babbling-policy
disable
Example
Notes
show ib sm calculate-missing-routes
Show ib sm calculate-missing-routes
Display option allowing SM to find and recalculate missing routes without creating credit-
loops
Default N/A
History 3.8.2000
switch (config) # ib sm calculate-missing-routes
switch (config) # show ib sm calculate-missing-routes
Example
ib sm calculate-missing-routes: enabled
switch (config) # no ib sm calculate-missing-routes
switch (config) # show ib sm calculate-missing-routes
ib sm calculate-missing-routes: disabled
Notes
503
show ib sm connect-roots
show ib sm connect-roots
Default N/A
History 3.1.0000
switch (config) # show ib sm connect-roots
true
Example
Related ib sm connect-roots
Commands
Notes
show ib sm enable-quirks
show ib sm enable-quirks
Default N/A
History 3.1.0000
switch (config) # show ib sm enable-quirks
disable
Example
Notes
504
show ib sm exit-on-fatal
show ib sm exit-on-fatal
Default N/A
History 3.1.0000
switch (config) # show ib sm exit-on-fatal
enable
Example
Notes
show ib sm fdr10
show ib sm fdr10
Default N/A
History 3.1.0000
switch (config) # show ib sm fdr10
SM use of fdr10 is off
Example
Related Commands
Notes
505
show ib sm force-link-speed
show ib sm force-link-speed
Default N/A
History 3.1.0000
3.4.1604 Updated Syntax Description, Example and Notes
switch (config) # show ib sm force-link-speed
Default: set to PortInfo:LinkSpeedSupported
Example
show ib sm force-link-speed-ext
show ib sm force-link-speed-ext
Default N/A
History 3.1.0000
3.4.1604 Updated Description and Example
switch (config) # show ib sm force-link-speed-ext
Negotiate: fdr edr
Example
506
Notes Possible outputs:
• Default: set to PortInfo:LinkSpeedExtSupported
• Disabled: extended link speed not in use
• Negotiate: <a list containing fdr, edr speeds>
show ib sm force-log-flush
show ib sm force-log-flush
Default N/A
History 3.1.0000
3.4.1604 Updated Description and Example
switch (config) # show ib sm force-log-flush
enable
Example
Notes
show ib sm guid2lid-cache
show ib sm guid2lid-cache
Displays whether or not the SM honors the cached GUID-to-LID mapping information.
Default N/A
History 3.1.0000
switch (config) # show ib sm guid2lid-cache
disable
Example
507
Notes
show ib sm honor-partitions
show ib sm honor-partitions
Default N/A
History 3.1.0000
switch (config) # show ib sm honor-partitions
disable
Example
Notes
show ib sm hoq-lifetime
show ib sm hoq-lifetime
Displays the maximum time a frame can wait at the head of a switch-to-switch port
queue before it is dropped.
Default N/A
History 3.1.0000
switch (config) # show ib sm hoq-lifetime
0x12 (About 1 second)
Example
Notes
508
show ib sm ignore-other-sm
show ib sm ignore-other-sm
Displays if the rules governing SM elections and attempt to manage the fabric on the
node are ignored by the SM.
Default N/A
History 3.1.0000
switch (config) # show ib sm ignore-other-sm
enable
Example
Notes
show ib sm ipv6-nsm
show ib sm ipv6-nsm
Displays the consolidation of IPv6 Solicited Node Multicast (SNM) group join requests.
Default N/A
History 3.1.0000
switch (config) # show ib sm ipv6-nsm
enable
Example
Notes
509
show ib sm lash
Default N/A
History 3.1.0000
switch (config) # show ib sm lash do-mesh-analysis
enable
Example
Notes
show ib sm leafhoq-lifetime
show ib sm leafhoq-lifetime
Displays the maximum time a frame can wait at the head of a switch-to-CA_or_Router
port queue before it is dropped.
Default N/A
History 3.1.0000
switch (config) # show ib sm leafhoq-lifetime
0x10 (About 268 mS)
Example
Notes
510
show ib sm leafvl-stalls
show ib sm leafvl-stalls
Default N/A
History 3.1.0000
switch (config) # show ib sm leafvl-stalls
7
Example
Notes
show ib sm lmc
show ib sm lmc
Default N/A
History 3.1.0000
switch (config) # show ib sm lmc
0x0
Example
Notes
511
show ib sm lmc-esp0
show ib sm lmc-esp0
Default N/A
History 3.1.0000
switch (config) # show ib sm lmc-esp0
enable
Example
Notes
show ib sm log
Syntax Description continuous Displays IB SM new event log messages as they arrive
not Displays IB SM new event logs that do not match a given regular
expression
matching Displays IB SM event log messages that match a given regular
expression
Default N/A
History 3.1.0000
512
switch (config) # show ib sm log
Jul 18 12:00:40 165863 [48026660] 0x03 -> OpenSM 3.3.13.MLNX_20121224_9b362db
Example Jul 18 12:00:40 168685 [48026660] 0x80 -> OpenSM 3.3.13.MLNX_20121224_9b362db
Jul 18 12:00:40 170789 [48026660] 0x02 -> osm_vendor_init: 1000 pending umads
specified
Jul 18 12:00:40 175696 [48026660] 0x80 -> Entering DISCOVERING state
Jul 18 12:00:40 249448 [48026660] 0x02 -> osm_vendor_bind: Binding to port
0x2c903008b0440
Jul 18 12:00:40 293959 [48026660] 0x02 -> osm_vendor_bind: Binding to port
0x2c903008b0440
Jul 18 12:00:40 296921 [48026660] 0x02 -> osm_vendor_bind: Binding to port
0x2c903008b0440
Jul 18 12:00:40 304702 [48026660] 0x02 -> osm_opensm_bind: Setting IS_SM on port
0x0002c903008b0440
Jul 18 12:00:40 399744 [4A85D4B0] 0x80 -> Entering MASTER state
Notes
show ib sm log-flags
show ib sm log-flags
Default N/A
History 3.1.0000
switch (config) # show ib sm log-flags
0x3 (error, info)
Example
Notes
show ib sm log-max-size
show ib sm log-max-size
Default N/A
513
History 3.1.0000
switch (config) # show ib sm log-max-size
50 MBytes
Example
Notes
show ib sm max-op-vls
show ib sm max-op-vls
Default N/A
History 3.1.0000
switch (config) # show ib sm max-op-vls
15
Example
Notes
show ib sm max-ports
show ib sm max-ports
Default N/A
History 3.1.0000
switch (config) # show ib sm max-ports
2048
Example
514
Notes
show ib sm max-reply-time
show ib sm max-reply-time
Default N/A
History 3.1.0000
switch (config) # show ib sm max-reply-time
200 milliseconds
Example
Notes
show ib sm max-reverse-hops
show ib sm max-reverse-hops
Default N/A
History 3.1.0000
switch (config) # show ib sm max-reverse-hops
0
Example
Notes
515
show ib sm aguid-default-hop-limit
show ib sm aguid-default-hop-limit
Default N/A
History 3.1.0000
switch (config) # show ib sm aguid-default-hop-limit
1
Example
Notes
show ib sm max-wire-smps
show ib sm max-wire-smps
Displays the maximal number of MADs the SM will have outstanding at one time to
count.
Syntax Description N/A
Default N/A
History 3.1.0000
switch (config) # show ib sm max-wire-smps
4
Example
Notes
516
show ib sm max-wire-smps2
show ib sm max-wire-smps2
Default N/A
History 3.1.0000
switch (config) # show ib sm max-wire-smps2
4
Example
Notes
show ib sm mkey-lease
show ib sm mkey-lease
Default N/A
History 3.1.0000
switch (config) # show ib sm mkey-lease
0 (no timeout)
Example
Notes
show ib sm m-key
show ib sm m-key
517
Syntax Description N/A
Default N/A
History 3.1.0000
3.6.2002 Updated Example
switch (config) # show ib sm m-key
11:33:55:77:99:aa:cc:ee
Example
Notes
show ib sm mkey-lease
show ib sm mkey-lease
Default N/A
History 3.6.2002
switch (config) # show ib sm mkey-lease
0 (No timeout)
Example
Notes
show ib sm mkey-lookup
show ib sm mkey-lookup
Displays whether the SM looks in file cache for unknown note MKeys.
Syntax Description N/A
Default N/A
518
Configuration Mode Any command mode
History 3.6.2002
switch (config) # show ib sm mkey-lookup
enable
Example
Notes
show ib sm mkey-protect-level
show ib sm mkey-protect-level
Default N/A
History 3.6.2002
switch (config) # show ib sm mkey-protect-level
0
Example
Notes
show ib sm msgfifo-timeout
show ib sm msgfifo-timeout
Displays the elapsed time in milliseconds before a frame at the head of Subnet Agent
queue causes an immediate BUSY state.
Syntax Description N/A
Default N/A
History 3.1.0000
519
switch (config) # show ib sm msgfifo-timeout
10.000 seconds
Example
Notes
show ib sm multicast
show ib sm multicast
Default N/A
History 3.1.0000
switch (config) # show ib sm multicast
enable
Example
Notes
show ib sm no-client-rereg
show ib sm no-client-rereg
Default N/A
History 3.1.0000
switch (config) # show ib sm no-client-rereg
enable
Example
Notes
520
show ib sm overrun-trigger
show ib sm overrun-trigger
Displays count of local buffer overrun errors for Infiniband trap 130.
Syntax Description N/A
Default N/A
History 3.1.0000
switch (config) # show ib sm overrun-trigger
3
Example
Notes
show ib sm packet-life-time
show ib sm packet-life-time
Default N/A
History 3.1.0000
switch (config) # show ib sm packet-life-time
0x14 (Infinite)
Example
Notes
show ib sm phy-err-trigger
show ib sm phy-err-trigger
Displays the number of local link integrity errors and the port’s SMA supports traps.
521
Syntax Description N/A
Default N/A
History 3.1.0000
switch (config) # show ib sm phy-err-trigger
5
Example
Notes
show ib sm polling-retries
show ib sm polling-retries
Displays the number of consecutive times an active SM must fail to respond before it is
declared dead.
Syntax Description N/A
Default N/A
History 3.1.0000
switch (config) # show ib sm polling-retries
8
Example
Notes
show ib sm port-prof-switch
show ib sm port-prof-switch
Displays whether or not the counting of adapters, routers, and switches through the
links is being done.
Syntax Description N/A
Default N/A
522
Configuration Mode Any command mode
History 3.1.0000
switch (config) # show ib sm port-prof-switch
true
Example
Notes
show ib sm reassign-lids
show ib sm reassign-lids
Displays the ability of the SM to reassign LIDs to nodes it finds already configured
with a valid LID.
Syntax Description N/A
Default N/A
History 3.1.0000
switch (config) # show ib sm reassign-lids
enable
Example
Notes
show ib sm root-guid
show ib sm root-guid
Default N/A
History 3.1.0000
523
switch (config)# show ib sm root-guid
AA:00:11:22:33:44:55
Example AA:00:11:22:33:44:56
AA:00:11:22:33:44:57
...
Notes The list of root GUIDs are relevant when IB SM is running on the switch, and the
routing algorithm is up-down or fat-tree.
show ib sm routing-engines
show ib sm routing-engines
Default N/A
History 3.1.0000
switch (config)# show ib sm routing-engines
none
Example
Notes
show ib sm routing-info
show ib sm routing-info
Default N/A
History 3.1.0000
switch (config)# show ib sm routing-info
Current routing engine minhop
Example
524
Related Commands
Notes
show ib sm rtr-aguid-enable
show ib sm rtr-aguid-enable
Default N/A
History 3.6.2002
switch (config)# show ib sm rtr-aguid-enable
0
Example
Notes
show ib sm rtr-pr-flow-label
show ib sm rtr-pr-flow-label
Default N/A
History 3.6.2002
switch (config)# show ib sm rtr-pr-flow-label
0
Example
525
show ib sm rtr-pr-mtu
show ib sm rtr-pr-mtu
Default N/A
History 3.6.2002
switch (config)# show ib sm rtr-pr-mtu
2K
Example
Notes
show ib sm rtr-pr-rate
show ib sm rtr-pr-rate
Default N/A
History 3.6.2002
switch (config)# show ib sm rtr-pr-rate
100
Example
Notes
show ib sm rtr-pr-sl
show ib sm rtr-pr-sl
526
Syntax Description N/A
Default N/A
History 3.6.2002
switch (config)# show ib sm rtr-pr-sl
0
Example
Notes
show ib sm sa-key
show ib sm sa-key
Default N/A
History 3.1.0000
switch (config)# show ib sm sa-key
00:00:00:00:00:00:00:05
Example
Notes
show ib sm single-thread
show ib sm single-thread
Default N/A
527
History 3.1.0000
switch (config)# show ib sm single-thread
enable
Example
Notes
show ib sm sm-inactive
show ib sm sm-inactive
Displays whether or not the SM starts in “inactive” rather than “init” SM state.
Syntax Description N/A
Default N/A
History 3.1.0000
switch (config)# show ib sm sm-inactive
enable
Example
Notes
show ib sm sm-key
show ib sm sm-key
Default N/A
History 3.63.1.0000
switch (config)# show ib sm sm-key
00:00:00:00:00:00:00:05
Example
528
Notes
show ib sm sm-priority
show ib sm sm-priority
Default N/A
History 3.1.0000
switch (config)# show ib sm sm-priority
1
Example
Notes If 2 or more active SMs have the same highest priority, the one with the lowest port
GUID will manage the fabric.
show ib sm sm-sl
show ib sm sm-sl
Default N/A
History 3.1.0000
switch (config)# show ib sm sm-sl
1
Example
Notes
529
show ib sm sminfo-poll-time
show ib sm sminfo-poll-time
Default N/A
History 3.1.0000
switch (config)# show ib sm sminfo-poll-time
15 milliseconds
Example
Notes
show ib sm subnet-prefix
show ib sm subnet-prefix
Displays the SM “Subnet Prefix” used to create scope qualifiers for all elements
managed by the SM.
Syntax Description N/A
Default N/A
History 3.1.0000
switch (config)# show ib sm subnet-prefix
FF:FF:FF:FF:FF:FF:FF:00
Example
Notes
530
show ib sm subnet-prefix-override
show ib sm subnet-prefix-override
Default N/A
History 3.1.0000
switch (config)# show ib sm subnet-prefix-override
disable
Example
Notes
show ib sm subnet-timeout
show ib sm subnet-timeout
Displays the global per-port subnet timeout value (PortInfo:SubnetTimeOut). This value
also controls the maximum trap frequency in which no traps are allowed to be sent
faster than the subnet_timeout value. The time is 4.096 uS * 2*time.
Syntax Description N/A
Default N/A
History 3.1.0000
switch (config)# show ib sm subnet-timeout
0x5 (About 131 uS)
Example
Notes
531
show ib sm sweep-interval
show ib sm sweep-interval
Default N/A
History 3.1.0000
switch (config)# show ib sm sweep-interval
20 seconds
Example
Notes
show ib sm sweep-on-trap
show ib sm sweep-on-trap
Displays whether or not a heavy sweep is initiated by the TRAP received by the SM.
Syntax Description N/A
Default N/A
History 3.1.0000
switch (config)# show ib sm sweep-on-trap
enable
Example
Notes
show ib sm transaction-retries
show ib sm transaction-retries
532
Syntax Description N/A
Default N/A
History 3.1.0000
switch (config)# show ib sm transaction-retries
3
Example
Notes
show ib sm use-heavy-sweeps
show ib sm use-heavy-sweeps
Default N/A
History 3.1.0000
switch (config)# show ib sm use-heavy-sweeps
disable
Example
Notes
show ib sm use-ucast-cache
show ib sm use-ucast-cache
Default N/A
533
History 3.1.0000
switch (config)# show ib sm use-ucast-cache
false
Example
ib sm use-ucast-cache
Related Commands
Notes
show ib sm version
show ib sm version
Default N/A
History 3.2.3000
switch (config)# show ib sm version
OpenSM5.2.0
Example
Related Commands
Notes
show ib sm virt-default-hop-limit
show ib sm virt-default-hop-limit
Default N/A
History 3.6.2002
switch (config)# show ib sm virt-default-hop-limit
2
Example
534
Notes
show ib sm virt-max-ports-in-process
show ib sm virt-max-ports-in-process
Default N/A
History 3.6.2002
switch (config)# show ib sm virt-max-ports-in-process
4
Example
Notes
show ib sm vl-stalls
show ib sm use-vl-stalls
Displays the number of sequential frame drops that cause a switch-to-switch port to
enter the VLStalled state.
Syntax Description N/A
Default N/A
History 3.1.0000
switch (config)# show ib sm vl-stalls
7
Example
Notes
535
Partitions
ib partition
Related Commands
Notes
pkey
Default N/A
History 3.2.0500
536
Related Commands
defmember
Default limited
History 3.2.0500
Notes This parameter can be overwritten for specific GUID, using the “member” command.
537
member
Default N/A
History 3.2.0500
Notes
538
ipoib
ipoib [force]
no ipoib [force]
Enables this partition to use IPoIB. As a result IPoIB multicast group will be created.
The no form of the command removes the use of IPoIB in this partition (it will not
appear in the partitions.conf file).
Default no IPoIB
History 3.2.0500
Notes The commands “rate”, “mtu”, “sl” and “scope” can be used only when the IPoIB
parameter is enabled.
mtu
Default 2K
539
History 3.2.0500
Notes IPoIB parameter on the partitions must be enabled in order to use this parameter
rate
Default 10Gb/s
History 3.2.0500
3.4.1100 Updated rate Syntax Description
540
scope
Default link-local
History 3.2.0500
sl
History 3.2.0500
541
switch (config partition my-partition) # sl 7
Example
show ib partition
Default N/A
History 3.2.0500
Related
Commands
Notes If bulk update mode is enabled, this command notifies the user that these changes may not
have been applied yet.
Sets the high-limit value for the indicated port type. Thus the system will send at least
4096 * <count> bytes from the high priority list before sending any from the low priority
list.
542
• ca—channel adapters
Syntax port-type • rtr—routers
Description • sw0—ports 0 only of the switches
• swe—external ports of the switches
Configuration config
Mode
History 3.1.0000
switch (config) # ib baseqos ca high-limit 255
Example
Notes A high-limit value of 255 means unlimited, and that makes it possible to starve the low
priority list.
ib baseqos max-vls
Configures the maximum number of VLs for the indicated port type.
• ca—channel adapters
Syntax Description port-type • rtr—routers
• sw0—ports 0 only of the switches
• swe—external ports of the switches
Default 15
Configuration config
Mode
History 3.1.0000
switch (config) # ib baseqos ca max-vls 15
Example
543
Related Commands show ib baseqos
Notes
ib baseqos sl2vl
ib baseqos <port-type> sl2vl {sl0 | sl0 sl1 | sl0 sl1 sl2 |...}
no ib baseqos <port-type> sl2vl
Configuration config
Mode
History 3.1.0000
switch (config) # show ib baseqos ca sl2vl
0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,7
Example switch (config) # ib baseqos ca sl2vl 10 10 10
switch (config) # show ib baseqos ca sl2vl
10,10,10,15,15,15,15,15,15,15,15,15,15,15,15,15
ib baseqos vlarb-high
544
VW[i] There are two possible options for this parameter:
• A single vector (1 ...15) in the format of “#:#”
separated by spaces, see example below.
• Format of “i#=X:Y” in order to change a specific entry
(see example below)
History 3.1.0000
switch (config) # show ib baseqos ca vlarb-high
0:4,1:0,2:0,3:0,4:0,5:0,6:0,7:0,8:0,9:0,10:0,11:0,12:0,13:0,14:0
Example switch (config) # ib baseqos ca vlarb-high 0:10 1:10
switch (config) # show ib baseqos ca vlarb-high
0:10,1:10,2:0,3:0,4:0,5:0,6:0,7:0,8:0,9:0,10:0,11:0,12:0,13:0,14:0
switch (config) # ib baseqos sw0 vlarb-high i2=4:3
switch (config) # show ib baseqos sw0 vlarb-high
0:10,1:10,4:3,3:0,4:0,5:0,6:0,7:0,8:0,9:0,10:0,11:0,12:0,13:0,14:0
History 3.1.0000
545
switch (config) # ib baseqos sw0 vlarb-low 1:1
switch (config) # show ib baseqos sw0 vlarb-low
Example 1:1, 1:0, 2:0, 3:0, 4:0, 5:0, 6:0, 7:0, 8:0, 9:0, 10:0, 11:0, 12:0, 13:0, 14:0
switch (config) # ib baseqos sw0 vlarb-low i2=4:3
switch (config) # show ib baseqos sw0 vlarb-low
1:1, 1:0, 4:3, 3:0, 4:0, 5:0, 6:0, 7:0, 8:0, 9:0, 10:0, 11:0, 12:0, 13:0, 14:0
Notes You may have multiple entries with the same VL on this list.
ib baseqos reset-config
ib baseqos reset-config
Default N/A
Configuration config
Mode
History 3.1.0000
switch (config) # ib baseqos reset-config
Example
Related Commands
Notes
show ib baseqos
546
baseqos- Possible values are:
parameters • high-limit—Display high limit (how many high pri before low)
• max-vls—Display maximum number of VLs supported on CAs in
subnet
• sl2vl—Display current SL-to-VL mapping vector
• vlarb-high—Display current high priority VL arbitration
• vlarb-low—Display current low priority VL arbitration
Default N/A
History 3.1.0000
switch (config) # show ib baseqos ca high-limit
0
Example
Related
Commands
Notes
ib qos
ib qos
no ib qos
Configuration config
Mode
History 3.1.0000
switch (config) # show ib qos
enable
Example
Notes
547
ib qos level
ib qos level {<name> | default} {mtu-limit <mtu> | packet-life <time> | pkey <number> |
rate-limit <rate-value> | sl <sl-value>| use <description>}
no ib qos level {<name> | default} {mtu-limit | packet-life | pkey | rate-limit | sl | use}
Syntax Description <name> | Specify a name for this qos group, or use the “default” for the default
default qos parameters
packet-life Time a packet can wait in switch egress queue before being dropped.
<time> The bytes from 4 microsecond up to 2 seconds or infinite.
Possible values: 0-20
0—4usec
1—8usec
...
20—unlimited
pkey <number> PKEY value: ranges between -1 and 32767 (hex 0x7fff)
Configuration config
Mode
History 3.1.0000
548
switch (config) # show ib qos my-qos-group
my-qos-group:
Example use = default QoS Level
sl = 0
mtu-limit = 2K
rate-limit = default
packet-life = 0x12
pkey = -1
Notes
ib qos match-rule
destination | source Manages destination or source for QoS Policy match rules
<string>
pkey | qos-class | service- Manages values for QoS Policy match rules
id <index>
{first | last} <value> First or last value range (per PKEY / qos-class of service ID
Default N/A
Configuration config
Mode
History 3.1.0000
switch (config) # show ib qos match-rule 10
match-rule/10:
Example match-rules: use = my-use
match-rules: qos-level-name = DEFAULT
549
Related Commands show ib qos
Notes
ib qos port-group
Default N/A
Configuration config
Mode
History 3.1.0000
switch (config)# show ib qos port-group my-group
port-group/my-group:
Example port-groups: pkey = -1
port-groups: use = my-use
Notes
550
ib qos ulp any
ib qos ulp any {pkey | service-id | target-port-guid <index> {first | last | sl} <value> | sl
<sl-vlaue>}
no ib qos ulp any {pkey | service-id | target-port-guid <index> {first | last | sl} | sl}
Default N/A
History 3.1.0000
switch (config) # ib qos ulp any sl 2
Example
Notes
ib qos ulp ipoib {default sl <sl-value>| pkey <index> {first | last | sl} <value> }
no ib qos ulp ipoib {default sl | pkey <index>}
551
• first—first value in range
first | last | sl • last—last value in range
<value> • sl—service level for the ULP rule
Default N/A
History 3.1.0000
switch (config) # ib qos ulp ipoib default sl 5
Example
Notes
ib qos ulp <protocol-type> {default sl <sl-value> | port-num< index> <first | last | sl>
<value>}
no ib qos ulp iser {default <sl> | port-num1 <first | last | sl>}
Configures ULP IScsi Extensions for RDMA, Reliable Datagram Sockets or Sockets Direct
Protocol attributes.
The no form of the command deletes all rules.
Default N/A
History 3.1.0000
switch (config) # ib qos ulp iser default sl 2
Example
552
Related Commands show ib qos
Notes
Default N/A
History 3.1.0000
switch (config) # ib qos ulp srp target-port-guid 1 sl 2
Example
Notes
show ib qos
553
ulp Displays QoS ulp configurations
Default N/A
History 3.1.0000
switch (config) # show ib qos level my-qos-level
my-qos-level:
Example use = my-use
sl = 0
mtu-limit = 2K
rate-limit = default
packet-life = 0x12
pkey = -1
Related Commands
Notes
Scatter Ports
ib sm scatter-ports
ib sm scatter-ports <seed>
no ib sm scatter-ports
Activates scatter ports and sets seed for random number generation.
The no form of the command deactivates the partition.
Syntax Description seed Integer between 0-4294967295
Default Disabled
Configuration Mode config
History 3.6.8008
Example switch (config) # ib sm scatter-ports 123
Related Commands
ib sm guid-routing-order-no-scatter
Notes
show ib sm scatter-ports
show ib sm scatter-ports
554
Syntax Description N/A
Default N/A
History 3.6.8008
switch (config) # show ib sm scatter-ports
Example Scatter ports seed: 234
Notes
ib sm guid-routing-order add
Default If no position is specified, the new GUID is added to the end of the list
Configuration config
Mode
History 3.6.8008
switch (config) # ib sm guid-routing-order add E4:1D:2D:03:00:3D:5E:87 position 6
Example
Related ib sm guid-routing-order-no-scatter
Commands
Notes
555
ib sm guid-routing-order delete
Deletes a guid from routing order list. The guid can be chosen by its guid or by its position
on guid routing order list.
Default N/A
Configuration config
Mode
History 3.6.8008
switch (config) # ib sm guid-routing-order delete position 3
switch (config) # ib sm guid-routing-order delete E4:1D:2D:03:00:3D:5E:91
Example
Related ib sm guid-routing-order-no-scatter
Commands
Notes
ib sm guid-routing-order move
Default N/A
Configuration config
Mode
History 3.6.8008
switch (config) # ib sm guid-routing-order move E4:1D:2D:03:00:3D:5E:91 to-position 2
Example
Related ib sm guid-routing-order-no-scatter
Commands
556
Notes
ib sm guid-routing-order move-down
Default N/A
Configuration config
Mode
History 3.6.8008
switch (config) # ib sm guid-routing-order move-down E4:1D:2D:03:00:3D:5E:91
Example
Related ib sm guid-routing-order-no-scatter
Commands
Notes
ib sm guid-routing-order move-up
Default N/A
Configuration config
Mode
History 3.6.8008
switch (config) # ib sm guid-routing-order move-up E4:1D:2D:03:00:3D:5E:91
Example
Related ib sm guid-routing-order-no-scatter
Commands
557
Notes
no ib sm guid-routing-order
no ib sm guid-routing-order
Disables the GUID routing order feature and cleans GUID routing order list.
Default N/A
History 3.6.8008
switch (config) # no ib sm guid-routing-order
Example
Notes
ib sm guid-routing-order-no-scatter
ib sm guid-routing-order-no-scatter
no ib sm guid-routing-order-no-scatter
Default N/A
History 3.6.8008
switch (config) # ib sm guid-routing-order-no-scatter
Example
558
Notes If scatter ports (randomization of the output port) is set to anything but zero, guid-
routing-order-no-scatter defines whether or not randomization should be applied to
the destination GUIDs mentioned in the GUID routing order list
show ib sm guid-routing-order
show ib sm guid-routing-order
Default N/A
History 3.6.8008
switch (config) # show ib sm guid-routing-order
Example 1: E4:1D:2D:03:00:3D:5E:85
2: E4:1D:2D:03:00:3D:5E:82
3: E4:1D:2D:03:00:3D:5E:81
4: E4:1D:2D:03:00:3D:5E:84
5: E4:1D:2D:03:00:3D:5E:86
6: E4:1D:2D:03:00:3D:5E:87
7: E4:1D:2D:03:00:3D:5E:90
8: E4:1D:2D:03:00:3D:5E:88
9: E4:1D:2D:03:00:3D:5E:83
Notes
show ib sm guid-routing-order-no-scatter
show ib sm guid-routing-order-no-scatter
Default N/A
History 3.6.8008
559
switch (config) # show ib sm guid-routing-order-no-scatter
Example guid_routing_order_no_scatter: disabled
Notes
ib sm bulk-update enable
ib sm bulk-update enable
no ib sm bulk-update enable
Default Disabled
History 3.6.8008
switch (config) # ib sm bulk-update enable
Example
Notes
show ib sm bulk-update
show ib sm bulk-update
Default N/A
560
History 3.6.8008
switch (config) # show ib sm bulk-update
Example ib sm bulk-update: enabled
Notes
ibdiagnet
ibdiagnet
ibdiagnet [parameters]
Default N/A
History 3.9.3100
switch (config) # ibdiagnet
Example
show ibdiagnet
show ibdiagnet
Default N/A
561
History 3.9.3100
switch (config) # show ibdiagnet
Example
Notes
Upload ibdiagnet archive of output files (from latest call to ibdiagnet) to a remote
host.
Default N/A
History 3.9.3100
switch (config) # file ibdiagnet upload ibdiagnet_output.gz
Example scp:// username:[email protected]/var/www/html/<image_name>
Notes
Default N/A
History 3.9.3100
562
switch (config) # file ibdiagnet delete ibdiagnet_output.gz
Example
Notes
All nodes in an SM HA subnet must be of the same CPU type (e.g. x86), and must run the
same MLNX-OS version.
High availability (HA) refers to a system or component that is continuously operational for a
desirably extended period of time.
NVIDIA Subnet Manager (SM) HA reduces subnet downtime and disruption as it is continuously
operational for a desirably long length of time. It assures continuity of the work even when one of
the SMs dies. The database is synchronized with all the nodes participating in the InfiniBand subnet
and a configuration change is prepared. The synchronization is done out-of-band using an Ethernet
management network.
NVIDIA SM HA allows the systems’ manager to enter and modify all InfiniBand SM configuration of
different subnet managers from a single location. It creates an InfiniBand subnet and associates all
the NVIDIA management appliances that are attached to the same InfiniBand subnet into that
InfiniBand subnet ID. All subnet managers can be controlled, started, or stopped from this address.
All the nodes that participate in the NVIDIA SM HA are joined to the InfiniBand subnet ID and once
joined, the synchronized SMs are launched. One of the nodes is elected as Master and the others are
Slaves (or down). NVIDIA SM HA uses an IP address (VIP) that is always directed to the SM HA master
to monitor the SM state and to verify that all configurations are executed.
563
Joining, Creating or Leaving an InfiniBand Subnet ID
When transitioning from standalone into a group or vice versa, a few seconds are required
for the node state to stabilize. During that time, group feature commands (e.g. SM HA
commands) should not be executed. To run group features, wait for the CLI prompt to turn
into [standalone:master], [<group>:master] or [<group>:standby] instead of
[standalone:*unknown*] or [<group>:*unknown*].
Every system that is not associated to an existing IB subnet (has never been part of an IB subnet or
has left an existing one) or does not have MLNX-OS license installed, is by default associated to a
subnet called “Standalone”.
In order to create, join or leave an InfiniBand subnet, one may use the following commands:
• Create – “ib ha <IB_subnet_ID> ip <ip_addr> <netmask>”
• Join – “ib ha <IB_subnet_ID>”
• Leave – “no ib ha”
When leaving an SM HA cluster, SM configuration is not saved on the node leaving the
cluster. After leaving, the configuration is reset to its default values.
For further information see section “Creating and Adding Systems to an InfiniBand Subnet ID”.
The VIP always points to one of the systems part of the SM HA domain. It is always active even if one
or more of the members are down. For example:
564
High Availability Node Roles
A node is an InfiniBand switch system. Every node member of an IB subnet ID has one of the
following roles:
• Master – the node that manages SM configurations and provides services to the Virtual IP (VIP)
addresses
• Standby – the node that replaces the Master node and takes over its responsibilities once the
Master node is down
• Offline – has run an SM in the past and is currently offline, or it was created manually by the
“ib smnode <node name> create” command. If the node has been removed from the
environment, you can remove it from the list with the “no ib smnode xxx” command.
To see the mode of the current node, look at the CLI prompt for the following format:
For example:
switch [ibstandalone: master] (config) #
To see a list of the existing nodes and details about the running state, run the command “show ib
smnodes {brief}”.
3. Create a new subnet using the command “ib ha <IB_subnet_ID> ip <ip_addr> <netmask>”.
Run:
565
switch [standalone: master] (config) # ib ha subnet2 ip 192.168.10.110 255.255.255.0
switch [subnet2: master] (config) #
You must run the “ib ha <IB_subnet_ID> ip <ip_addr> <netmask>” command only once
per subnet ID.
4. Log into the system that you are going to join to the new created subnet.
5. Join the system to the subnet, using the “ib ha <IB_subnet_ID>” command. Run:
In instances where the SM configuration becomes corrupted or the subnet manager cannot raise any
logical links it is suggested that you restore the default SM configuration.
The asterisk in the example above (*switch) indicates the local system from where
the command is running.
In order to receive information on the running state of a specific node one could run one of the
following commands with its requested parameter:
• show ib smnode <name> sm-running
• show ib smnode <name> sm-state
• show ib smnode <name> sm-priority
• show ib smnode <name> active
• show ib smnode <name> ha-state
• show ib smnode <name> ha-role
To configure the subnet manager, log into the centralized management IP (VIP). Once the SM
configuration is created, the SM database is duplicated to the other nodes.
566
The SM must be configured from MLNX-OS centralized management IP (VIP). All the
configurations that are not created or modified in the master node (using the VIP) are
overridden by the master configuration.
The user can configure different SM parameters such as where to run the SM(s) or the SM priority by
running the commands according to the desired action.
NVIDIA products are fully compliant and interoperable with OpenSM.
Once an SM fails, the SM which takes over the subnet needs to reproduce the internal state of the
failed master. Most of the information required is obtained by scanning the subnet and extracting
the information from the devices. However, some information which is not stored directly in the
network devices cannot be reproduced this way. InfiniBand management architecture limits such
information to data exchanged between clients (either user-level programs or kernel modules) and
the Subnet Administration (SA) service (attached to the SM). The SA keeps this set of client
registrations in an internal data structure called SA-DB. The SA-DB information includes the
multicast groups, the multicast group members, subscriptions for event forwarding and service
records.
The new SM may retrieve the SA-DB by requesting the clients to re-register with the SA or by
obtaining a copy of the previous master SM internal SA-DB via an SA-DB dump file. The client-re-
registration offers database correctness and the SA-DB dump file replication provides lower setup
time. Client re-registration is required since the SA-DB may not be up-to-date on the registrations
listed in the master SM.
Furthermore, since the SM does not maintain SA-DB information for unknown nodes, it is very
possible that some of the SA-DB information relating to nodes momentarily disconnected from the
master SM become purged. Therefore, these nodes must re-register with the new SM when they are
reconnected (they receive a client-re-register request from the SM). Relying only on client re-
registration is also non-optimal as it takes some time to recreate the entire SA-DB and the network
state.
NVIDIA SM HA replicates the SA-DB dump file from the current master SM to all the standby SMs
running on NVIDIA switches. The SA-DB dump file replication provides further optimization to the
standby SM that becomes master.
Standby SM loads the existing SA-DB file the old master has used. By using the existing SA-DB the
amount of processing needed on client re-registration is lessened resulting in a reduced time to
complete setting up the network.
SM HA does not replace InfiniBand spec requirement for client re-registration.
567
When running an SM HA cluster with more than 2 active OpenSM instances, IB multicast
applications need to support client re-register or they may not work correctly after OpenSM
failover.
SM HA Commands
ib ha
Default N/A
History 3.1.0000
switch (config) # ib ha my-subnet
Example
Notes A new subnet may be joined only after leaving the current one
ib smnode
Manages HA SM.
The no form of the command removes HA SM node configuration.
568
Syntax Description hostname Specifies <hostname> SM configuration to modify.
Default N/A
History 3.1.0000
switch (config) # ib smnode switch-1133ce create
Example
Notes
show ib smnode
569
Default N/A
Configuration Mode config
History 3.1.0000
3.8.1000 Updated Syntax Description
Example switch (config) # show ib smnode my-hostname sm-state
enabled
show ib smnodes
Related Commands
Notes
show ib ha
570
show ib ha [brief]
Displays information about all the systems that are active or might be able to run SM.
Syntax Description brief Displays brief HA information
Default N/A
Configuration config
Mode
History 3.1.0000
3.9.1000 Updated example
Example switch (config) # show ib ha
Global HA state:
IB Subnet HA name: Barracuda-s
HA IP address : 10.7.48.100/24
Active HA nodes : 2
HA node local information:
Name : barracuda-216 (active) <--- (local node)
SM-HA state : standby
IP : 10.7.48.50
Virtual switch membership: infiniband-default
Related
Commands
Notes
571
Appendixes
The document contains the following appendixes:
Our switch systems, by default, work with NIST SP 800-131A, as described in the table below.
This appendix describes how to enhance the security of a system in order to comply with the NIST SP
800-131A standard. This standard is a document which defines cryptographically “acceptable”
technologies. This document explains how to protect against possible cryptographic vulnerabilities
in the system by using secure methods. Because of compatibility issues, this security state is not the
default of the system and it should be manually set.
Some protocols, however, cannot be operated in a manner that complies with the NIST SP
800-131A standard.
Web Certificate
The OS supports signature generation of sha256WithRSAEncryption, sha1WithRSAEncryption self-
signed certificates, and importing certificates as text in PEM format.
572
1. Create a new sha256 certificate.
switch (config) # crypto certificate name <cert name> generate self-signed hash-algorithm sha256
For more details and parameters refer to the command “crypto certificate name”.
2. Show crypto certificate detail.
When no options are selected, the generated certificate uses the default values for
each field.
To test strict mode connect to the WebUI using HTTPS and get the certificate. Search for “signature
algorithm”.
There are other ways to configure the certificate to sha256. For example, it is possible to
use “certificate generation default hash-algorithm” and then regenerate the certificate
using these default values.
It is recommended to delete browsing data and previous certificates before retrying to
connect to the WebUI.
Make sure not to confuse “signature algorithm” with “Thumbprint algorithm”.
SNMP
SNMPv3 supports configuring username, authentication keys and privacy keys. For authentication
keys it is possible to use MD5 or SHA. For privacy keys AES or DES are to be used.
573
To configure strict mode, create a new user with HMAC-SHA1-96 and AES-128. Run:
switch (config) # snmp-server user <username> v3 auth sha <password1> priv aes-128 <password2>
To test strict mode, configure users and check them using the CLI, then run an SNMP
request with the new users.
SNMPv1 and SNMPv2 are not considered to be secure. To run in strict mode, only use
SNMPv3.
HTTPS
By default, the OS supports HTTPS encryption using TLS1.2 only. Working in TLS1.2 mode also bans
MD5 ciphers which are not allowed per NIST 800-131a. In strict mode, the switch supports
encryption with TLS1.2 only with the following supported ciphers:
• RSA_WITH_AES_128_CBC_SHA256
• RSA_WITH_AES_256_CBC_SHA256
• DHE_RSA_WITH_AES_128_CBC_SHA256
• DHE_RSA_WITH_AES_256_CBC_SHA256
• TLS_RSA_WITH_AES_128_GCM_SHA256
• TLS_RSA_WITH_AES_256_GCM_SHA384
• TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
• TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
574
Web User Interface:
Web interface enabled: yes
HTTP enabled: yes
HTTP port: 80
HTTP redirect to HTTPS: no
HTTPS enabled: yes
HTTPS port: 443
HTTPS ssl-ciphers: TLS1.2
HTTPS certificate name: default-cert
Listen enabled: yes
No Listen Interfaces.
Code Signing
Code signing is used to verify that the data in the image is not modified by any third-party. The
operating system supports signing the image files with SHA256, RSA2048 using GnuPG.
Strict mode is operational by default.
SSH
The SSH server on the switch by default uses secure ciphers only, message authentication code
(MAC), key exchange methods, and public key algorithm. When configuring SSH server to strict
mode, the aforementioned security methods only use approved algorithms as detailed in the NIST
800-181A specification and the user can connect to the switch via SSH in strict mode only.
The following ciphers are disabled for SSH when strict security is enabled:
• 3des-cbc
• aes256-cbc
• aes192-cbc
• aes128-cbc
575
• [email protected]
Make sure to configure the SSH server to work with minimum version 2 since 1 is vulnerable to
security breaches.
Once this is done, the user cannot revert back to minimum version 1.
LDAP
By default, the switches support LDAP encryption SSL version 3 or TLS1.0 up to TLS1.2. The only
banned algorithm is MD5 which is not allowed per NIST 800-131a. In strict mode, the switch supports
encryption with TLS1.2 only with the following supported ciphers:
• DHE-DSS-AES128-SHA256
• DHE-RSA-AES128-SHA256
• DHE-DSS-AES128-GCM-SHA256
• DHE-RSA-AES128-GCM-SHA256
• DHE-DSS-AES256-SHA256
• DHE-RSA-AES256-SHA256
• DHE-DSS-AES256-GCM-SHA384
• DHE-RSA-AES256-GCM-SHA384
• ECDH-ECDSA-AES128-SHA256
• ECDH-RSA-AES128-SHA256
• ECDH-ECDSA-AES128-GCM-SHA256
• ECDH-RSA-AES128-GCM-SHA256
• ECDH-ECDSA-AES256-SHA384
• ECDH-RSA-AES256-SHA384
• ECDH-ECDSA-AES256-GCM-SHA384
• ECDH-RSA-AES256-GCM-SHA384
• ECDHE-ECDSA-AES128-SHA256
• ECDHE-RSA-AES128-SHA256
• ECDHE-ECDSA-AES128-GCM-SHA256
• ECDHE-RSA-AES128-GCM-SHA256
• ECDHE-ECDSA-AES256-SHA384
• ECDHE-RSA-AES256-SHA384
• ECDHE-ECDSA-AES256-GCM-SHA384
• ECDHE-RSA-AES256-GCM-SHA384
• AES128-SHA256
576
• AES128-GCM-SHA256
• AES256-SHA256
• AES256-GCM-SHA384
Both modes operate using SSL. The different lies in the connection initialization and the
port used.
Splunk automatically clusters millions of log records in real time back into their patterns and finds
connections between those patterns to form the baseline flows of each software individually, thus
enables you to search, monitor and analyze that data to discover powerful insights across multiple
use cases.
This appendix provides a guide on the first steps with Splunk and helps you to begin enjoying
reduced time in detecting and resolving production problems.
577
Now you can access your Splunk WebUI at http://IP:8000/ or http://hostname:8000/. You need to
make sure that port 8000 is open in your server firewall.
Switch Configuration
In this example we are not using the default UDP port 514 to show that any other port can be also
used.
5. In order to add a task, the switch must be configured to send logs to our Splunk server. Run:
Read-only communities:
public
Read-write communities:
(none)
Summary configuration:
Adding a Task
6. The first screen encountered after signing into the Splunk WebUI includes the “Add Data” icon.
578
7. The “Add Data” tab opens up with three options: Upload, Monitor, and Forward. Here our task is
to monitor a folder, so we click Monitor. to proceed
9. Click the TCP or UDP button to choose between a TCP or UDP input, and enter a port number in
the “Port” field.
579
10. In the “Source name override” field, enter a new source name to override the default source
value, if required.
11. Click “Next” to continue to the Input Settings page where we will create a new source type
called Mellanox-Switch.
12. Click Next > Review > Done > Start Searching
580
SNMP Input to Poll Attribute Values and Catch Traps
SNMP represents an incredibly rich source of data that you can get into Splunk for visibility across a
very diverse IT landscape.
SNMP agents may also send notifications, called Traps, to an SNMP trap listening daemon.
Getting Started
Browse to Splunkbase and download the SNMP Modular Input from https://splunkbase.splunk.com/
app/1537/.
Configuration
Login to the Splunk WebUI and go to Manager > Add Data > Monitor > SNMP > New, and set up your
input data.
581
582
13. After configuration is complete it is recommend to run Mellanox-Switch again: Search > Data
Summary > Sourcetypes > Mellanox-Switch.
583
15. You can add to search any value that is relevant for you.
Patterns can be viewed not on real time and you can create alert on most repeatable
events.
584
show files stats *
Logging
show log
Puppet Agent
585
show puppet-agent log
Scheduled Jobs
show jobs
show jobs *
show ib sm log
586
User Interfaces
show cli
show terminal
587
Document Revision History
Rev 7.1-3.10.31xx, August 2022
Updated:
• The command "module-type"
Added:
• The command "ip filter reset-to-default-rules"
There are no changes to this version of the user manual. For further information on bug fixes and
improvements, see the release notes of this software version.
There are no changes to this version of the user manual. For further information on bug fixes and
improvements, see the release notes of this software version.
Added:
• The command "ldap nested-group-search"
• The command "ldap nested-group-depth"
• The command "ldap nested-group-count"
• Note in the command "system secure-mode enable"
Updated:
• The command "show ldap"
There are no changes to this version of the user manual. For further information on bug fixes and
improvements, see the release notes of this software version.
Updated:
• Output of the command "show cpld"
588
Rev 6.8-3.10.10xx, November/December 2021
Added:
• The command "no power redundancy-mode"
• The command "show secure-boot-status"
• The command "interface ib port-type split-2"
• Description of Quantum-2 interface in "Break-Out Cables" section
Removed:
• The section "Fabric Inspector"
• The command "fabric zero-counters"
• The command "show fabric"
Updated:
Updated:
• WebUI look to reflect NVIDIA design
• Example of the command "show banner"
• Output to reflect NVIDIA
Added:
• The command "no interface ib mtu"
Updated:
• Updated the "terminal sysrq enable" command to be disabled by default
• Moved "file help-docs upload" and "file eula upload" command to the .Configuration
Management Commands v6.9-3.10.1100 section
• The options in the command "crypto ipsec peer local"
• List of possible output messages in Link Diagnostic Per Port section
• MAC addresses to all be lowercase
• The section Automated Periodic Backup
589
• Field in the command "show interfaces ib" from VL capabilities' was changed to 'VL admin
capabilities'
• Field of the command "show interfaces ib internal" from VL capabilities' was changed to 'VL
admin capabilities'
• Output of “show ib smnodes”
• Output of "show ip interface"
• Output of "show ip interface port-channel"
• ACL section to reflect the addition of ACL-based mirroring.
Rev 6.6-3.9.24xx, March 2021
Added:
• Note to the command "no zero-touch suppress-write"
Rev 6.6-3.9.23xx, February 2021
There are no changes to this version. The software version was changed due to bug fixes and
improvements. For further information, see Release Notes.
Updated:
• The section "Management Information Bases (MIBs)"
There are no changes to this version. The software version was changed due to bug fixes and
improvements. For further information, see Release Notes.
590
Rev 6.5-3.9.16xx, September 2020
Added:
• The command "docker login"
• The command "docker logout"
• The command "show docker login"
Updated:
• Output "show interfaces ib"
Rev 6.4-3.9.10xx, July 2020
Added:
• Note in SSH section
Updated:
• Output of "show ib ha"
• Example of "show ib fabric port"
Added:
• The command "no logging debug-files rotation criteria"
• The command "no logging files rotation criteria"
• The command "logging mac masking"
• Notes in "ssh server login attempts" command
• Note to "username" command
Updated:
• The command "show logging"
There are no changes to this version. The software version was changed due to bug fixes and
improvements. For further information, see Release Notes.
591
Added:
• The command "show configuration auto-upload"
• The command "configuration auto-upload"
• Description of Automated Periodic Configuration File Backup
• Notes to the command "logging source-interface"
Updated:
• The command "configuration upload"
• Changed the "SSH server login record-period" default from 30 days to 1 day
• Splitting capability on modular systems. For more information see "Break-Out Cables" section.
Updated:
• LDAP description
Removed:
• The command "show running-config interface mgmt0"
• The command "show running-config interface mgmt1"
• The command "power-management width"
Rev 6.3 December 2019 No changes to this version. The software version was changed due to bug
fixes and improvements in cables and speeds. For further information, see Release Notes.
592
Added:
• ca-valid option in the "crypto certificate name" command
• ca-valid option in the "crypto certificate generation" command
• New command "ntp server-role disable"
• New ca-valid option to the "crypto certificate system-self-signed regenerate" command
• The command "logging protocol"
• "all-cas," "all-routers," all-switches," and "all-vcas" parameters to the "ib partition member"
command
Updated:
Removed:
• "prefix-modes show-config" option because it is no longer available in the "cli session"
command
• Terminal type vt320 from the "cli session" command
• "dcb ets enable" command is deprecated
Added:
• The command ib sm calculate-missing-routes
• The command show ib sm calculate-missing-routes
• HDR speed on Quantum systems
593
• Instructions on how to change initial password through JSON API
• Instruction on logging out through JSON API
• The section "Changing Default Password" in order to conform to new law: California's Senate
Bill No. 327, Chapter 886
• The command "logging"
• The command "logging filter include"
• The command "logging filter exclude"
• The command "no logging filter"
Updated:
• Description of the no form of the "neighbor ebgp-multihop" command
• Output example of "show traffic pool interface ethernet" command
• Output example of "show interfaces ethernet description" command
• Output example of "show interfaces counters discard" command
• Output example of "show qos mapping ingress interface egress interface"
• Output example of the "show what-just-happened" command
• Output example of the "qos rewrite pcp" command
• Output example of the "qos rewrite dscp" command
• Output example of the "qos rewrite map switch-priority pcp dei" command
• Moved JSON API Authentication Example from "JSON Examples" section to JSON API
"Authentication" section
• BGP "neighbor weight" range
Removed
• The XML API is deprecated as of release 3.8.2000.
• xml-gw enable" due to XML API depreciation
• The command "show xml-gw" due to XML API depreciation
No changes to this version. The software version was changed due to bug fixes. For further
information, see Release Notes.
594
Added:
• "Appendix: Show command NOT supported by JSON API"
• The command "chassis ha bipv6"
Updated:
• The output for "show chassis ha" in the following sections: Malfunctioned CPU Behavior,
Chassis High Availability Nodes Roles, Takeover Functionally, Chassis Management Commands
No changes to this version. The software version was changed due to bug fixes. For further
information, see Release Notes.
Added:
• Note on port splitting on externally managed switches under section "Break-out Cables"
Updated:
• "Web Interface Overview" with note on the maximum allowed number of WebUI sessions
• The command "system profile"
• JSON "Authentication" section
• Section "Authentication Example"
Added:
• “Additional Reading and Use Cases” sections referring to various community posts providing
more information about a given subject matter
• The command "show running-config interface"
• The command "file stats telemetry delete latest"
• The command "file stats telemetry delete all"
• The command "file stats telemetry upload latest"
• The command "file stats telemetry upload all"
• Section "Upgrade Ramifications" on page "Linux Dockers"
• The command "what just happened auto-export"
• The command "show snmp source interface"
• The command "snmp server source interface"
• The command "system manage inband-ib"
595
• The command "show system manage inband-ib"
Updated:
• The command "show stats sample data"
• The command “snmp-server user”
• The command "monitor session"
• The command "ib fabric import"
• The command "radius-server host"
• The command "show radius"
• The command "show ip bgp neighbors received"
• Section "Destination Interface" on page "Port Mirroring"
• Section "Configuring an SNMPv3 User" on page "Network Management Interfaces"
• Page "Important Pre-OS Upgrade Notes"
• Page "Linus Dockers"
• The command "show json-gw"
• Section "Router ID" on page "OSPF"
• Section "Memory Resources Allocation Protocol" on page "Linux Dockers"
• The command "show running-config"
• The command "start"
• The command "show docker containers"
• The command "copy-sdk"
• The command "cli session"
• The command "show hosts"
• The command "web enable"
• The command "web https"
• Section "Execution Types" on page "Network Management Interfaces"
• Section "Configuring Signal Degradation Monitoring"
• The command "port-channel load-balance ethernet"
• Section "Restoring Subnet Manager Configuration"
• Page "What Just Happened"
• The command "what just happened"
• The command "clear what just happened"
• The command "show what just happened"
• The command "ip default-gateway"
• Section "System Configuration"
• The command "logging trap"
• The command "logging port"
• The command "show logging port"
• Page "Management Source IP Address"
Added:
• The command “show stats sample data”
596
Updated:
Rev 5.6 December 2018No changes made since last revision.Rev 5.5 December 2018
Added:
• The command “email autosupport mailhub”
• The command “email autosupport recipient”
• The command “show email”
• The command “snmp-server cache enable”
• Section “Break-Out Cables”
Updated:
• Section “IB SM Mgmt”
• Section “Supported Events”
• The command “aaa authorization”
• The command “show aaa”
• Section “System File Encryption”
• The command “show memory”
• Section “Configuring an SNMPv3 User”
• The command “snmp-server user”
• The command “show snmp auto-refresh”
• The command “show puppet-agent”
• Section “Configuring IB Router”
• The command “ib sm m-key”
• The command “show ib sm m-key”
Added:
• The command “web proxy auth authtype”
• The command “web proxy auth basic”
• The command “web proxy auth host”
Updated:
• The command “{ip | ipv6} route”
• The command “image install”
• The command “image options”
• Section “Authentication, Authorization and Accounting (AAA)”
• The command “aaa authorization”
• The command “show virtual-machine install”
• The command “show telemetry”
• The command “show telemetry threshold record”
• The command “show system profile”
• The command “show ib fabric messages”
597
• Section "Additional Reading and Use Cases" on page "Licenses"
598
Notice
This document is provided for information purposes only and shall not be regarded as a warranty of a certain
functionality, condition, or quality of a product. Neither NVIDIA Corporation nor any of its direct or indirect subsidiaries
and affiliates (collectively: “NVIDIA”) make any representations or warranties, expressed or implied, as to the accuracy
or completeness of the information contained in this document and assumes no responsibility for any errors contained
herein. NVIDIA shall have no liability for the consequences or use of such information or for any infringement of patents
or other rights of third parties that may result from its use. This document is not a commitment to develop, release, or
deliver any Material (defined below), code, or functionality.
NVIDIA reserves the right to make corrections, modifications, enhancements, improvements, and any other changes to
this document, at any time without notice.
Customer should obtain the latest relevant information before placing orders and should verify that such information is
current and complete.
NVIDIA products are sold subject to the NVIDIA standard terms and conditions of sale supplied at the time of order
acknowledgement, unless otherwise agreed in an individual sales agreement signed by authorized representatives of
NVIDIA and customer (“Terms of Sale”). NVIDIA hereby expressly objects to applying any customer general terms and
conditions with regards to the purchase of the NVIDIA product referenced in this document. No contractual obligations
are formed either directly or indirectly by this document.
NVIDIA products are not designed, authorized, or warranted to be suitable for use in medical, military, aircraft, space, or
life support equipment, nor in applications where failure or malfunction of the NVIDIA product can reasonably be
expected to result in personal injury, death, or property or environmental damage. NVIDIA accepts no liability for
inclusion and/or use of NVIDIA products in such equipment or applications and therefore such inclusion and/or use is at
customer’s own risk.
NVIDIA makes no representation or warranty that products based on this document will be suitable for any specified use.
Testing of all parameters of each product is not necessarily performed by NVIDIA. It is customer’s sole responsibility to
evaluate and determine the applicability of any information contained in this document, ensure the product is suitable
and fit for the application planned by customer, and perform the necessary testing for the application in order to avoid a
default of the application or the product. Weaknesses in customer’s product designs may affect the quality and reliability
of the NVIDIA product and may result in additional or different conditions and/or requirements beyond those contained in
this document. NVIDIA accepts no liability related to any default, damage, costs, or problem which may be based on or
attributable to: (i) the use of the NVIDIA product in any manner that is contrary to this document or (ii) customer product
designs.
No license, either expressed or implied, is granted under any NVIDIA patent right, copyright, or other NVIDIA intellectual
property right under this document. Information published by NVIDIA regarding third-party products or services does not
constitute a license from NVIDIA to use such products or services or a warranty or endorsement thereof. Use of such
information may require a license from a third party under the patents or other intellectual property rights of the third
party, or a license from NVIDIA under the patents or other intellectual property rights of NVIDIA.
Reproduction of information in this document is permissible only if approved in advance by NVIDIA in writing, reproduced
without alteration and in full compliance with all applicable export laws and regulations, and accompanied by all
associated conditions, limitations, and notices.
THIS DOCUMENT AND ALL NVIDIA DESIGN SPECIFICATIONS, REFERENCE BOARDS, FILES, DRAWINGS, DIAGNOSTICS, LISTS,
AND OTHER DOCUMENTS (TOGETHER AND SEPARATELY, “MATERIALS”) ARE BEING PROVIDED “AS IS.” NVIDIA MAKES NO
WARRANTIES, EXPRESSED, IMPLIED, STATUTORY, OR OTHERWISE WITH RESPECT TO THE MATERIALS, AND EXPRESSLY
DISCLAIMS ALL IMPLIED WARRANTIES OF NONINFRINGEMENT, MERCHANTABILITY, AND FITNESS FOR A PARTICULAR PURPOSE.
TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT WILL NVIDIA BE LIABLE FOR ANY DAMAGES, INCLUDING WITHOUT
LIMITATION ANY DIRECT, INDIRECT, SPECIAL, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES, HOWEVER CAUSED AND
REGARDLESS OF THE THEORY OF LIABILITY, ARISING OUT OF ANY USE OF THIS DOCUMENT, EVEN IF NVIDIA HAS BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Notwithstanding any damages that customer might incur for any reason
whatsoever, NVIDIA’s aggregate and cumulative liability towards customer for the products described herein shall be
limited in accordance with the Terms of Sale for the product.
Trademarks
NVIDIA, the NVIDIA logo, and Mellanox are trademarks and/or registered trademarks of NVIDIA Corporation and/
or Mellanox Technologies Ltd. in the U.S. and in other countries. Other company and product names may be trademarks
of the respective companies with which they are associated.
Copyright
© 2022 NVIDIA Corporation & affiliates. All Rights Reserved.