HP 10500 series User manual

HP 10500 Switch Series
Fundamentals
Configuration Guide
Part number: 5998-7111b
Software version: 10500-CMW710-R7169P01
Document version: 6W102-20160218

Legal and notice information
© Copyright 2016 Hewlett-Packard Development Company, L.P.
No part of this documentation may be reproduced or transmitted in any form or by any means without
prior written consent of Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
HEWLETT-PACKARD COMPANY MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS
MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE. Hewlett-Packard shall not be liable for errors contained
herein or for incidental or consequential damages in connection with the furnishing, performance, or
use of this material.
The only warranties for HP products and services are set forth in the express warranty statements
accompanying such products and services. Nothing herein should be construed as constituting an
additional warranty. HP shall not be liable for technical or editorial errors or omissions contained
herein.

i
Contents
Using the CLI ································································································································································ 1
CLI views ············································································································································································1
Entering system view from user view······················································································································2
Returning to the upper-level view from any view ··································································································2
Returning to user view··············································································································································2
Accessing the CLI online help··········································································································································2
Using the undo form of a command ·······························································································································3
Entering a command·························································································································································4
Editing a command line···········································································································································4
Entering a text or string type value for an argument ····························································································4
Abbreviating commands··········································································································································5
Configuring and using command keyword aliases······························································································5
Configuring and using command hotkeys·············································································································6
Enabling redisplaying entered-but-not-submitted commands ···············································································7
Understanding command-line error messages···············································································································7
Using the command history feature·································································································································8
Command buffering rules ········································································································································8
Controlling the CLI output·················································································································································8
Pausing between screens of output ························································································································9
Numbering each output line from a display command ·······················································································9
Filtering the output from a display command····································································································· 10
Saving the output from a display command to a file ························································································ 12
Viewing and managing the output from a display command effectively························································ 14
Saving the running configuration ································································································································· 14
Configuring RBAC······················································································································································15
Overview········································································································································································· 15
Permission assignment ·········································································································································· 15
User role assignment············································································································································· 18
FIPS compliance ····························································································································································· 18
Configuration task list ···················································································································································· 19
Creating user roles························································································································································· 19
Configuring user role rules············································································································································ 19
Configuration restrictions and guidelines ··········································································································· 20
Configuration procedure ······································································································································ 20
Configuring feature groups··········································································································································· 21
Configuring resource access policies ·························································································································· 22
Configuring the interface policy of a user role ·································································································· 22
Configuring the VLAN policy of a user role ······································································································· 22
Configuring the VPN instance policy of a user role ·························································································· 23
Assigning user roles······················································································································································· 23
Enabling the default user role feature ················································································································· 23
Assigning user roles to remote AAA authentication users ················································································ 24
Assigning user roles to local AAA authentication users···················································································· 24
Assigning user roles to non-AAA authentication users on user lines ······························································· 24
Configuring temporary user role authorization ·········································································································· 25
Configuration guidelines ······································································································································ 25
Configuring user role authentication··················································································································· 27
Obtaining temporary user role authorization ···································································································· 28

ii
Displaying and maintaining RBAC settings················································································································· 28
RBAC configuration examples······································································································································ 28
RBAC configuration example for local AAA authentication users ··································································· 28
RBAC configuration example for RADIUS authentication users ······································································· 30
RBAC temporary user role authorization configuration example (HWTACACS authentication) ················· 33
RBAC temporary user role authorization configuration example (RADIUS authentication) ·························· 38
Troubleshooting RBAC··················································································································································· 41
Local users have more access permissions than intended ················································································ 41
Login attempts by RADIUS users always fail ······································································································ 41
Login overview ···························································································································································43
Using the console port for the first device access····································································································45
Configuring CLI login·················································································································································47
CLI overview ··································································································································································· 47
User lines································································································································································ 47
Login authentication modes·································································································································· 48
User roles ······························································································································································· 48
FIPS compliance ····························································································································································· 49
Configuring console login············································································································································· 49
Disabling authentication for console login ········································································································· 49
Configuring password authentication for console login ··················································································· 50
Configuring scheme authentication for console login ······················································································· 51
Configuring common AUX line settings ·············································································································· 51
Configuring Telnet login················································································································································ 53
Configuring the device as a Telnet server ·········································································································· 54
Using the device to log in to a Telnet server ······································································································ 60
Configuring SSH login··················································································································································· 61
Configuring the device as an SSH server··········································································································· 61
Using the device to log in to an SSH server······································································································· 63
Displaying and maintaining CLI login ························································································································· 63
Accessing the device through SNMP ·······················································································································65
Controlling user access to the device ·······················································································································66
FIPS compliance ····························································································································································· 66
Controlling Telnet/SSH logins ······································································································································ 66
Configuration procedures····································································································································· 66
Configuration example ········································································································································· 67
Controlling SNMP access·············································································································································· 67
Configuration procedure ······································································································································ 67
Configuration example ········································································································································· 68
Configuring command authorization··························································································································· 69
Configuration procedure ······································································································································ 69
Configuration example ········································································································································· 70
Configuring command accounting······························································································································· 72
Configuration procedure ······································································································································ 72
Configuration example ········································································································································· 73
Configuring FTP··························································································································································75
FIPS compliance ····························································································································································· 75
Using the device as an FTP server································································································································ 75
Configuring basic parameters ····························································································································· 76
Configuring authentication and authorization ··································································································· 76
Manually releasing FTP connections ··················································································································· 77
Displaying and maintaining the FTP server ········································································································ 77

iii
FTP server configuration example in standalone mode····················································································· 77
FTP server configuration example in IRF mode ·································································································· 79
Using the device as an FTP client································································································································· 80
Establishing an FTP connection···························································································································· 80
Managing directories on the FTP server ············································································································· 81
Working with files on the FTP server··················································································································· 82
Changing to another user account ······················································································································ 83
Maintaining and troubleshooting the FTP connection ······················································································· 83
Terminating the FTP connection ··························································································································· 84
Displaying command help information··············································································································· 84
Displaying and maintaining FTP client························································································································· 84
FTP client configuration example in standalone mode······························································································· 84
FTP client configuration example in IRF mode ············································································································ 86
Configuring TFTP························································································································································88
FIPS compliance ····························································································································································· 88
Configuring the device as an IPv4 TFTP client ············································································································ 88
Configuring the device as an IPv6 TFTP client ············································································································ 89
Managing the file system ··········································································································································90
Storage medium naming rules······································································································································ 90
File name formats··························································································································································· 90
Managing files ······························································································································································· 92
Displaying file information ··································································································································· 92
Displaying the contents of a text file ··················································································································· 93
Renaming a file······················································································································································ 93
Copying a file························································································································································ 93
Moving a file·························································································································································· 93
Compressing/decompressing a file ···················································································································· 93
Archiving/extracting files ····································································································································· 93
Deleting/restoring a file ······································································································································· 94
Deleting files from the recycle bin ······················································································································· 94
Calculating the file digest····································································································································· 94
Managing directories ···················································································································································· 95
Displaying directory information ························································································································· 95
Displaying the current working directory············································································································ 95
Changing the current working directory············································································································· 95
Creating a directory·············································································································································· 95
Deleting a directory··············································································································································· 96
Managing storage media ············································································································································· 96
Repairing a storage medium································································································································ 97
Formatting a storage medium ······························································································································ 97
Mounting or unmounting a storage medium ······································································································ 97
Partitioning a CF card or USB disk ····················································································································· 98
Setting the operation mode for files and folders ········································································································ 99
Managing configuration files································································································································· 100
Overview·······································································································································································100
Configuration types·············································································································································100
Next-startup configuration file redundancy ······································································································101
Configuration file formats···································································································································101
Startup configuration file selection ····················································································································101
Configuration file content organization and format ························································································101
FIPS compliance ···························································································································································102
General configuration restrictions and guidelines····································································································102
Enabling configuration encryption ·····························································································································102

iv
Saving the running configuration ·······························································································································103
Configuring configuration rollback ····························································································································104
Configuration task list ·········································································································································104
Configuring configuration archive parameters ································································································105
Enabling automatic configuration archiving·····································································································106
Manually archiving the running configuration ·································································································106
Rolling back configuration··································································································································106
Specifying a next-startup configuration file ···············································································································107
Backing up the main next-startup configuration file to a TFTP server ·····································································108
Restoring the main next-startup configuration file from a TFTP server ····································································109
Deleting a next-startup configuration file ···················································································································109
Displaying and maintaining configuration files ········································································································110
Upgrading software················································································································································ 112
Overview·······································································································································································112
Software types ·····················································································································································112
Software file naming conventions······················································································································113
Comware image redundancy and loading procedure ···················································································113
System startup process········································································································································114
PEX startup process ·············································································································································115
Upgrade methods ························································································································································119
Upgrade restrictions and guidelines ··························································································································120
Preparing for the upgrade ··········································································································································120
Upgrade task list ··························································································································································121
Preloading the BootWare image to BootWare ········································································································121
Specifying startup images and completing the upgrade ·························································································122
Standalone mode ················································································································································122
IRF mode·······························································································································································123
Restoring or downgrading the BootWare image without using ISSU ····································································125
Enabling software synchronization from the active MPU to the standby MPU at startup ····································126
Upgrading PEXs ···························································································································································126
Preparing for the upgrade··································································································································126
Upgrade procedure ············································································································································127
Displaying and maintaining software image settings ······························································································128
Non-ISSU software upgrade example (for standalone mode) ················································································128
Network requirements·········································································································································128
Configuration procedure ····································································································································129
Verifying the configuration·································································································································129
Non-ISSU software upgrade example (for IRF mode) ······························································································129
Network requirements·········································································································································129
Configuration procedure ····································································································································130
Verifying the configuration·································································································································131
Non-ISSU PEX upgrade example ·······························································································································131
Network requirements·········································································································································131
Configuration procedure ····································································································································131
Verifying the configuration·································································································································132
Performing an ISSU················································································································································· 133
Overview·······································································································································································133
ISSU methods·······················································································································································133
ISSU commands···················································································································································134
Preparing for ISSU ·······················································································································································134
Identifying availability of ISSU···························································································································134
Verifying the device operating status ················································································································135
Preparing the upgrade images ··························································································································135

v
Identifying the ISSU method ·······························································································································135
Verifying feature status ·······································································································································135
Determining the upgrade procedure ·················································································································136
Understanding ISSU guidelines ·························································································································136
Logging in to the device through the console port···························································································136
Saving the running configuration ······················································································································137
Performing an ISSU by using issu commands···········································································································138
Performing a compatible upgrade·····················································································································138
Performing an incompatible upgrade ···············································································································139
Performing an ISSU by using install commands ·······································································································140
ISSU task list·························································································································································140
Decompressing an .ipe file·································································································································140
Installing or upgrading software images ··········································································································140
Uninstalling feature or patch images ················································································································142
Aborting a software activate/deactivate operation ························································································143
Committing software changes····························································································································143
Verifying software images··································································································································143
Deleting inactive software images·····················································································································144
Displaying and maintaining ISSU ······························································································································144
Standalone mode ················································································································································144
IRF mode·······························································································································································145
Troubleshooting ISSU in IRF mode ·····························································································································146
Failure to execute the issu load/issu run switchover/issu commit/install activate/install deactivate command
··············································································································································································146
Examples of using issu commands for ISSU on a dual-member IRF fabric ····························································146
Feature upgrade to a compatible version·········································································································146
Feature upgrade to an incompatible version ···································································································150
Examples of using issu commands for ISSU on a four-member IRF fabric ·····························································154
Feature upgrade to a compatible version·········································································································154
Feature upgrade to an incompatible version (upgrading one subordinate member first)···························162
Feature upgrade to an incompatible version (upgrading multiple subordinate members first) ··················169
Examples of using issu commands for ISSU on an eIRF system ··············································································176
Feature upgrade to a compatible version·········································································································176
Feature upgrade to an incompatible version ···································································································182
Examples of using install commands for ISSU on a standalone device ·································································186
Feature upgrade example ··································································································································186
Examples of using install commands for ISSU on an IRF fabric··············································································188
Feature upgrade example ··································································································································188
Examples of using install commands for ISSU on an eIRF system···········································································193
Feature upgrade example ··································································································································193
Using automatic configuration ······························································································································· 201
Overview·······································································································································································201
Automatic configuration task list·································································································································201
Configuring the file server···········································································································································202
Preparing the files for automatic configuration·········································································································202
Host name file······················································································································································202
Configuration files ···············································································································································202
Script files·····························································································································································203
Configuring the DHCP server······································································································································203
Configuration guidelines ····································································································································203
Configuring the DHCP server when an HTTP file server is used ····································································203
Configuring the DHCP server when a TFTP file server is used ·······································································204
Configuring the DNS server········································································································································205
Configuring the gateway ············································································································································205

vi
Preparing the interfaces used for automatic configuration······················································································205
Starting and completing automatic configuration ····································································································205
Automatic configuration examples·····························································································································206
Automatic configuration using TFTP server ·······································································································206
Automatic configuration using HTTP server and Tcl script ··············································································210
Automatic configuration using HTTP server and Python script ·······································································211
Automatic IRF setup·············································································································································213
Managing the device·············································································································································· 216
Device management task list·······································································································································216
Configuring the device name ·····································································································································216
Configuring the system time········································································································································217
Specifying the system time source ·····················································································································217
Setting the system time········································································································································217
Enabling displaying the copyright statement ············································································································218
Configuring banners····················································································································································218
Banner types ························································································································································218
Banner input methods ·········································································································································218
Configuration procedure ····································································································································219
Setting the system operating mode ····························································································································220
Rebooting the device ···················································································································································220
Configuration guidelines ····································································································································221
Rebooting devices immediately at the CLI ········································································································221
Scheduling a device reboot ·······························································································································221
Scheduling a task·························································································································································222
Configuration guidelines ····································································································································222
Configuration procedure ····································································································································222
Schedule configuration example ·······················································································································224
Setting the port status detection timer ························································································································227
Monitoring CPU usage ················································································································································227
Setting memory alarm thresholds ·······························································································································228
Configuring the temperature alarm thresholds··········································································································230
Specifying an operating mode for a service module·······························································································231
Configuration restrictions and guidelines ·········································································································233
Configuration procedure ····································································································································233
Enabling the port down feature globally···················································································································234
Configuring an asset profile for a physical component···························································································234
Isolating a switching fabric module ···························································································································235
Isolation restrictions and guidelines ··················································································································235
Isolation procedure ·············································································································································235
Suppressing switching fabric module removal interrupt signals ·············································································236
Verifying and diagnosing transceiver modules ········································································································236
Verifying transceiver modules ····························································································································236
Diagnosing transceiver modules························································································································237
Disabling alarm traps for transceiver modules·································································································237
Restoring the factory-default configuration················································································································237
Displaying and maintaining device management configuration ············································································238
Standalone mode ················································································································································238
IRF mode·······························································································································································240
Using Tcl ·································································································································································· 242
Tcl usage guidelines and restrictions ·························································································································242
Entering Tcl configuration view from user view ········································································································242
Returning from Tcl configuration view to user view··································································································242

vii
Managing the system with BootWare··················································································································· 243
Overview·······································································································································································243
Restrictions and guidelines··········································································································································244
Using the BASIC-BOOTWARE menu (for LSU1SUPB0(JG496A) MPUs)································································244
Modifying serial port parameters ······················································································································245
Updating the extended BootWare segment ·····································································································245
Updating the entire BootWare···························································································································246
Running the primary extended BootWare segment·························································································246
Running the backup extended BootWare segment ·························································································246
Using the BASIC-BOOTWARE menu (for all MPUs except LSU1SUPB0(JG496A)) ··············································247
Modifying serial port parameters ······················································································································248
Updating the extended BootWare segment ·····································································································249
Updating the entire BootWare···························································································································249
Running the primary extended BootWare segment·························································································249
Running the backup extended BootWare segment ·························································································250
Using the EXTENDED-BOOTWARE menu (for LSU1SUPB0(JG496A) MPUs)························································250
Running the Comware software·························································································································253
Upgrading Comware software through the console port ···············································································253
Upgrading Comware software through the management Ethernet port ·······················································255
Managing files·····················································································································································257
Restoring the factory-default configuration ·······································································································261
Skipping the configuration file at the next startup ···························································································262
Managing the BootWare image ·······················································································································262
Skipping console login authentication ··············································································································264
Managing storage media···································································································································265
Using the EXTENDED ASSISTANT menu ··········································································································266
Using the EXTENDED-BOOTWARE menu (for all MPUs except LSU1SUPB0(JG496A))······································267
Running the Comware software·························································································································270
Upgrading Comware software through the console port ···············································································270
Upgrading Comware software through the management Ethernet port ·······················································272
Managing files·····················································································································································274
Restoring the factory-default configuration ·······································································································278
Skipping the configuration file at the next startup ···························································································279
Managing the BootWare image ·······················································································································279
Skipping console login authentication ··············································································································281
Managing storage media···································································································································282
Using the EXTENDED ASSISTANT menu ··········································································································283
BootWare shortcut keys···············································································································································284
Disabling password recovery capability ···················································································································285
Comware software upgrade examples ·····················································································································286
Using XMODEM to upgrade software through the console port ···································································286
Using TFTP to upgrade Comware software through the management Ethernet port ···································288
Using FTP to upgrade Comware software through the management Ethernet port ·····································290
Using Python···························································································································································· 291
Entering the Python shell·····································································································································291
Executing a Python script····································································································································291
Python usage example·················································································································································291
Comware V7 extended Python API ······················································································································· 293
Importing and using the Comware V7 extended Python API··················································································293
Comware V7 extended Python API functions············································································································293
CLI class································································································································································293
Transfer class ·······················································································································································295
API get_self_slot···················································································································································296

viii
API get_standby_slot ···········································································································································296
API get_slot_range···············································································································································297
API get_slot_info ··················································································································································298
Support and other resources ·································································································································· 299
Contacting HP ······························································································································································299
Subscription service ············································································································································299
Related information······················································································································································299
Documents····························································································································································299
Websites·······························································································································································299
Conventions ··································································································································································300
Index ········································································································································································ 302

1
Using the CLI
At the command-line interface (CLI), you can enter text commands to configure, manage, and monitor
the device.
Figure 1 CLI example
You can use different methods to log in to the CLI, including through the console port, Telnet, and SSH.
For more information about login methods, see "Login overview."
CLI views
Commands are grouped in different views by feature. To use a command, you must enter its view.
CLI views are hierarchically organized, as shown in Figure 2. Each view has a unique prompt, from which
you can identify where you are and what you can do. For example, the prompt [Sysname-vlan100]
shows that you are in VLAN 100 view and can configure attributes for that VLAN.
Figure 2 CLI views
You are placed in user view immediately after you log in to the CLI. The user view prompt is
<Device-name>, where Device-name indicates the device name. The device name is Sysname by default.
You can change it by using the sysname command.
In user view, you can perform the following tasks:
VLAN view
Interface
view
System
view
User view
User line
view
Local user
view

2
•Perform basic operations including display, debug, file management, FTP, Telnet, clock setting, and
reboot.
•Enter system view. The system view prompt is [Device-name].
In system view, you can perform the following tasks:
•Configure global settings (such as the daylight saving time, banners, and hotkeys) and some
features.
•Enter different feature views.
For example, you can perform the following tasks:
{Enter interface view to configure interface parameters.
{Enter VLAN view to add ports to the VLAN.
{Enter user line view to configure login user attributes.
A feature view might have child views. For example, BGP view has child views IPv4 unicast instance view
and BGP-VPN IPv4 unicast instance view.
To display all commands available in a view, enter a question mark (?) at the view prompt.
Entering system view from user view
Task Command
Enter system view. system-view
Returning to the upper-level view from any view
Task Command
Return to the upper-level view from any view. quit
Executing the quit command in user view terminates your connection to the device.
In public key view, use the peer-public-key end command to return to system view.
Returning to user view
To return directly to user view from any other view, use the return command or press Ctrl+Z.
Task Command
Return directly to user view. return
Accessing the CLI online help
The CLI online help is context sensitive. Enter a question mark at any prompt or in any position of a
command to display all available options.
To access the CLI online help, use one of the following methods:

3
•Enter a question mark at a view prompt to display the first keyword of every command available in
the view. For example:
<Sysname> ?
User view commands:
archive Archive configuration
backup Backup the startup configuration file to a TFTP server
bash
blade
...
•Enter a space and a question mark after a command keyword to display all available, subsequent
keywords and arguments.
{If the question mark is in the place of a keyword, the CLI displays all possible keywords, each
with a brief description. For example:
<Sysname> terminal ?
debugging Enable to display debugging logs on the current terminal
logging Display logs on the current terminal
monitor Enable to display logs on the current terminal
tracing Display traces on the current terminal
{If the question mark is in the place of an argument, the CLI displays the description for the
argument. For example:
<Sysname> system-view
[Sysname] interface vlan-interface ?
<1-4094> Vlan-interface interface number
[Sysname] interface vlan-interface 1 ?
<cr>
[Sysname] interface vlan-interface 1
<1-4094> is the value range for the argument. <cr> indicates that the command is complete
and you can press Enter to execute the command.
•Enter an incomplete keyword string followed by a question mark to display all keywords starting
with that string. For example:
<Sysname> f?
fabric
fabric-mode
file
fips
ftp
<Sysname> display ftp?
client FTP client information
Using the undo form of a command
Most configuration commands have an undo form for the following tasks:
•Canceling a configuration.
•Restoring the default.
•Disabling a feature.

4
For example, the info-center enable command enables the information center. The undo info-center
enable command disables the information center.
Entering a command
When you enter a command, you can perform the following tasks:
•Use keys or hotkeys to edit the command line.
•Use abbreviated keywords or keyword aliases.
Editing a command line
To edit a command line, use the keys listed in Table 1 or the hotkeys listed in Table 2. When you are
finished, you can press Enter to execute the command.
Table 1 Command line editing keys
Ke
y
s Function
Common keys
If the edit buffer is not full, pressing a common key inserts a character at the
cursor and moves the cursor to the right. The edit buffer can store up to 511
characters. Unless the buffer is full, all common characters that you enter
before pressing Enter are saved in the edit buffer.
Backspace Deletes the character to the left of the cursor and moves the cursor back one
character.
Left arrow key (←) Moves the cursor one character to the left.
Right arrow key (→) Moves the cursor one character to the right.
Up arrow key (↑) Gets the previous command in the command history buffer.
Down arrow key (↓) Gets the next command in the command history buffer.
Tab
If you press Tab after entering part of a keyword, the system automatically
completes the keyword.
•If a unique match is found, the system displays the complete keyword.
•If there is more than one match, press Tab multiple times to pick the
keyword you want to enter.
•If there is no match, the system does not modify what you entered but
displays it again in the next line.
The total length of a command line cannot exceed 512 characters, including spaces and special
characters.
Entering a text or string type value for an argument
A text type argument value can contain printable characters other than the question mark (?).
A string type argument value can contain any printable characters except for the following characters:
•Question mark (?).
•Quotation mark (").
•Backward slash (\).

5
•Space.
A specific argument might have more requirements. For more information, see the relevant command
reference.
To enter a printable character, you can enter the character or its ASCII code (in the range of 32 to 126).
Abbreviating commands
You can enter a command line quickly by entering incomplete keywords that uniquely identify the
complete command. In user view, for example, commands starting with an sinclude startup
saved-configuration and system-view. To enter the command system-view, you only need to type sy. To
enter the command startup saved-configuration, type st s.
You can also press Tab to complete an incomplete keyword.
Configuring and using command keyword aliases
The command keyword alias feature allows you to replace the first keyword of a non-undo command or
the second keyword of an undo command with your preferred keyword when you execute the command.
For example, if you configure show as the alias for the display keyword, you can enter either show clock
or display clock to execute the display clock command.
A command keyword can have only one alias.
Usage guidelines
Follow these guidelines when you use command keyword aliases:
•After you successfully execute a command by using a keyword alias, the system saves the keyword,
instead of its alias, to the running configuration.
•If a string you entered for a command partially matches an alias and a keyword, the command
indicated by the alias is executed. To execute the command indicated by the keyword, enter the
complete keyword.
•If a string you entered for a command partially matches multiple aliases, the system displays an
error message.
•If you enter a string that partially matches an alias and a keyword and press Tab, the keyword
indicated by the alias is displayed. Pressing Tab again displays the keyword.
Configuration procedure
To configure a command keyword alias:
Ste
p
Command Remarks
1. Enter system view. system-view N/A
2. Enable the command keyword
alias feature. command-alias enable By default, the command keyword
alias feature is disabled.
3. Configure a command
keyword alias.
command-alias mapping
cmdkey alias
By default, no command keyword
alias is configured.
You must enter the cmdkey and alias
arguments in their complete form.
4. (Optional.) Display command
keyword alias information. display command-alias This command is available in any
view.

6
Configuring and using command hotkeys
The system defines the hotkeys shown in Table 2 and provides five configurable command hotkeys.
Pressing a command hotkey is the same as entering a command.
If a hotkey is also defined by the terminal software you are using to interact with the device, the terminal
software definition takes effect.
To configure a command hotkey:
Ste
p
Command Remarks
1. Enter system view. system-view N/A
2. Assign a command
to a hotkey.
hotkey { ctrl_G | ctrl_L | ctrl_O |
ctrl_T | ctrl_U } command
The following are the defaults:
•Ctrl+G is assigned the display
current-configuration command.
•Ctrl+L is assigned the display ip
routing-table command.
•Ctrl+O is assigned the undo debugging all
command.
•No command is assigned to Ctrl+T or
Ctrl+U.
3. (Optional.) Display
hotkeys. display hotkey This command is available in any view.
Table 2 System-reserved hotkeys
Hotke
y
Function
Ctrl+A Moves the cursor to the beginning of a line.
Ctrl+B Moves the cursor one character to the left.
Ctrl+C Stops the current command.
Ctrl+D Deletes the character at the cursor.
Ctrl+E Moves the cursor to the end of a line.
Ctrl+F Moves the cursor one character to the right.
Ctrl+H Deletes the character to the left of the cursor.
Ctrl+K Aborts the connection request.
Ctrl+N Displays the next command in the history buffer.
Ctrl+P Displays the previous command in the history buffer.
Ctrl+R Redisplays the current line.
Ctrl+V Pastes text from the clipboard.
Ctrl+W Deletes the word to the left of the cursor.
Ctrl+X Deletes all characters to the left of the cursor.
Ctrl+Y Deletes all characters from the cursor to the end of the line.
Ctrl+Z Returns to user view.

7
Hotke
y
Function
Ctrl+] Terminates the current connection.
Esc+B Moves the cursor back one word.
Esc+D Deletes all characters from the cursor to the end of the word.
Esc+F Moves the cursor forward one word.
Enabling redisplaying entered-but-not-submitted commands
Your input might be interrupted by system information output. If redisplaying entered-but-not-submitted
commands is enabled, the system redisplays your input after finishing the output. You can then continue
entering the command line.
To enable redisplaying entered-but-not-submitted commands:
Step Command Remarks
1. Enter system view. system-view N/A
2. Enable redisplaying
entered-but-not-submit
ted commands.
info-center synchronous
By default, the system does not redisplay
entered-but-not-submitted commands.
For more information about this command, see
Network Management and Monitoring
Command Reference.
Understanding command-line error messages
After you press Enter to submit a command, the command line interpreter examines the command syntax.
•If the command passes syntax check, the CLI executes the command.
•If the command fails syntax check, the CLI displays an error message.
Table 3 Common command-line error messages
Error messa
g
e Cause
% Unrecognized command found at '^' position. The keyword in the marked position is invalid.
% Incomplete command found at '^' position. One or more required keywords or arguments are
missing.
% Ambiguous command found at '^' position. The entered character sequence matches more than one
command.
% Too many parameters. The entered character sequence contains excessive
keywords or arguments.
% Wrong parameter found at '^' position. The argument in the marked position is invalid.

8
Using the command history feature
The system automatically saves commands successfully executed by a login user to the following two
command history buffers:
•Command history buffer for the user line.
•Command history buffer for all user lines.
Table 4 Comparison between the two types of command history buffers
Item Command history buffer for a user line Command history buffer for all
user lines
What kind of
commands are saved
in the buffer?
Commands successfully executed by the
current user of the user line.
Commands successfully executed by
all login users.
Cleared when the user
logs out? Yes. No.
How to view buffered
commands? Use the display history-command command. Use the display history-command all
command.
How to recall a
buffered command?
Navigate to the command in the buffer and
press Enter.
You cannot recall buffered
commands.
How to set the buffer
size?
Use the history-command max-size
size-value command in user line view to set
the buffer size.
By default, the buffer can store up to 10
commands.
You cannot set the buffer size.
By default, the buffer can store up to
1024 commands.
How to disable the
buffer?
Setting the buffer size to 0 disables the
buffer. You cannot disable the buffer.
Command buffering rules
The system follows these rules when buffering commands:
•If you use incomplete keywords when entering a command, the system buffers the command in the
exact form that you use.
•If you use an alias when entering a command, the system transforms the alias to the represented
command or command keywords before buffering the command.
•If you enter a command in the same format multiple times in succession, the system buffers the
command only once. If you enter a command in different formats multiple times, the system buffers
each command format. For example, display cu and display current-configuration are buffered as
two entries but successive repetitions of display cu create only one entry.
•To buffer a new command when a buffer is full, the system deletes the oldest command entry in the
buffer.
Controlling the CLI output
This section describes the CLI output control features that help you identify the desired output.

9
Pausing between screens of output
The system automatically pauses after displaying a screen if the output is too long to fit on one screen.
You can use the keys described in "Output controlling keys" to display more information or stop the
display.
By default, up to 24 lines can be displayed on a screen. You can change the limit by using the
screen-length screen-length command. For more information about this command, see Fundamentals
Command Reference.
You can also disable pausing between screens of output for the current session. Then, all output is
displayed at one time and the screen is refreshed continuously until the final screen is displayed.
Output controlling keys
Ke
y
s Function
Space Displays the next screen.
Enter Displays the next line.
Ctrl+C Stops the display and cancels the command execution.
<PageUp> Displays the previous page.
<PageDown> Displays the next page.
Disabling pausing between screens of output
To disable pausing between screens of output, execute the following command in user view:
Task Command Remarks
Disable pausing
between screens of
output for the current
session.
screen-length disable
By default, a session uses the screen-length screen-length
command settings in user line view.
This command is a one-time command and takes effect only
for the current session.
Numbering each output line from a display command
You can use the | by-linenum option to prefix each display command output line with a number for easy
identification.
Each line number is displayed as a 5-character string and might be followed by a colon (:) or hyphen (-).
If you specify both | by-linenum and | begin regular-expression for a display command, a hyphen is
displayed for all lines that do not match the regular expression.
To number each output line from a display command:
Task Command
Number each output line from a display command. display command |by-linenum
For example:
# Display information about VLAN 999, numbering each output line.
<Sysname> display vlan 999 | by-linenum

10
1: VLAN ID: 999
2: VLAN type: Static
3: Route interface: Configured
4: IP address: 192.168.2.1
5: Subnet mask: 255.255.255.0
6: Description: For LAN Access
7: Name: VLAN 0999
8: Tagged ports: None
9: Untagged ports:
10: GigabitEthernet1/0/1
Filtering the output from a display command
You can use the | { begin | exclude | include } regular-expression option to filter the display command
output.
•begin—Displays the first line matching the specified regular expression and all subsequent lines.
•exclude—Displays all lines not matching the specified regular expression.
•include—Displays all lines matching the specified regular expression.
•regular-expression—A case-sensitive string of 1 to 256 characters, which can contain the special
characters described in Table 5.
The required filtering time increases with the complexity of the regular expression. To abort the filtering
process, press Ctrl+C.
Table 5 Special characters supported in a regular expression
Characters Meanin
g
Exam
p
les
^ Matches the beginning of a line. "^u" matches all lines beginning with "u". A line
beginning with "Au" is not matched.
$ Matches the end of a line. "u$" matches all lines ending with "u". A line
ending with "uA" is not matched.
. (period) Matches any single character. ".s" matches "as" and "bs".
* Matches the preceding character or
string zero, one, or multiple times.
"zo*" matches "z" and "zoo", and "(zo)*"
matches "zo" and "zozo".
+ Matches the preceding character or
string one or multiple times. "zo+" matches "zo" and "zoo", but not "z".
| Matches the preceding or succeeding
string. "def|int" matches a line containing "def" or "int".
( )
Matches the string in the parentheses,
usually used together with the plus sign
(+) or asterisk sign (*).
"(123A)" matches "123A".
"408(12)+" matches "40812" and
"408121212", but not "408".
\N
Matches the preceding strings in
parentheses, with the Nth string
repeated once.
"(string)\1" matches a string containing
"stringstring".
"(string1)(string2)\2" matches a string containing
"string1string2string2".
"(string1)(string2)\1\2" matches a string
containing " string1string2string1string2".
Other manuals for 10500 series
13
Table of contents
Other HP Switch manuals

HP
HP StorageWorks 2/16-EL User instructions

HP
HP A10500 Series User manual

HP
HP 6125G User manual

HP
HP Q.11. (2510-24) User manual

HP
HP A5120-24G-PoE+ EI Assembly instructions

HP
HP ProCurve 1600M Setup guide

HP
HP A7340A - Surestore FC 1Gb/2Gb Switch 16B User manual

HP
HP J3102A User manual

HP
HP ProCurve 3500yl Series User manual

HP
HP 10500 series User manual

HP
HP 10500 series User manual

HP
HP FlexFabric 5900CP Series Instruction Manual

HP
HP ProCurve 4204vl User manual

HP
HP ProCurve 5406zl User manual

HP
HP J9979A User manual

HP
HP 2620 series User manual

HP
HP 6125G Installation manual

HP
HP OfficeConnect 1405 Series User manual

HP
HP 3100-8 v2 SI User manual

HP
HP 1410 series User manual