NetApp CN1610 Installation manual

NetApp® CN1610 Network Switch
CLI Command Reference
NetApp, Inc.
495 East Java Drive
Sunnyvale, CA 94089 U.S.A.
Telephone: +1 (408) 822-6000
Fax: +1 (408) 822-4501
Support telephone: +1 (888) 463-8277
Documentation comments: [email protected]
Information Web: www.netapp.com
Part number: 215-06286_C0
August 2017

Copyright and trademark information
Copyright
information
Copyright © 1994–2017 NetApp, Inc. All rights reserved. Printed in the U.S.
No part of this document covered by copyright may be reproduced in any form or by any
means—graphic, electronic, or mechanical, including photocopying, recording, taping, or
storage in an electronic retrieval system—without prior written permission of the
copyright owner.
Software derived from copyrighted NetApp material is subject to the following license
and disclaimer:
THIS SOFTWARE IS PROVIDED BY NETAPP "AS IS" AND WITHOUT ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE,
WHICH ARE HEREBY DISCLAIMED. IN NO EVENT SHALL NETAPP BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
NetApp reserves the right to change any products described herein at any time, and without
notice.
NetApp assumes no responsibility or liability arising from the use of products described
herein, except as expressly agreed to in writing by NetApp. The use or purchase of this
product does not convey a license under any patent rights, trademark rights, or any other
intellectual property rights of NetApp.
Trademark
information
Active IQ, AltaVault, Arch Design, ASUP, AutoSupport, Campaign Express, Clustered Data
ONTAP, Customer Fitness, Data ONTAP, DataMotion, Element, Fitness, Flash Accel, Flash Cache,
FlashPool, FlexArray, FlexCache, FlexClone, FlexPod, FlexScale, FlexShare, FlexVol, FPolicy,
Fueled by SolidFire, GetSuccessful, Helix Design, LockVault, Manage ONTAP, MetroCluster,
MultiStore, NetApp, NetApp Insight, OnCommand, ONTAP, ONTAPI, RAID DP, RAID-TEC,
SANscreen, SANshare, SANtricity, SecureShare, Simplicity, Simulate ONTAP, Snap Creator,
SnapCenter, SnapCopy, SnapDrive, SnapIntegrator, SnapLock, SnapManager, SnapMirror,
SnapMover, SnapProtect, SnapRestore, Snapshot, SnapValidator, SnapVault, SolidFire, SolidFire
Helix, StorageGRID, SyncMirror, Tech OnTap, Unbound Cloud, and WAFL and other names are
trademarks or registered trademarks of NetApp, Inc., in the United States, and/or other countries.
All other brands or products are trademarks or registered trademarks of their respective holders and
should be treated as such. A current list of NetApp trademarks is available on the web.
http://www.netapp.com/us/legal/netapptmlist.aspx
The product described in this manual may be protected by one or more U.S. patents, foreign patents,
or pending applications.
RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the government is subject to
restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer
Software clause at DFARS 252.277-7103 (October 1988) and FAR 52-227-19 (June 1987).


Table of Contents
Table of Contents 1
Chapter 1 About This Document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Chapter 2 Using the Command-Line Interface . . . . . . . . . . . . . . . . . . . . . . 7
Command Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Command Conventions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Common Parameter Values. . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Interface Naming Convention . . . . . . . . . . . . . . . . . . . . . . . . . 12
Using the no Form of a Command . . . . . . . . . . . . . . . . . . . . . . . 13
CN1610 Software Modules. . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Command Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Command Completion and Abbreviation . . . . . . . . . . . . . . . . . . . 21
CLI Error Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
CLI Line-Editing Conventions . . . . . . . . . . . . . . . . . . . . . . . . . 23
Using CLI Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Accessing the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Chapter 3 Management Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Network Interface Commands . . . . . . . . . . . . . . . . . . . . . . . . . 30
Console Port Access Commands . . . . . . . . . . . . . . . . . . . . . . . . 38
Telnet Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Secure Shell Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Management Security Commands . . . . . . . . . . . . . . . . . . . . . . . 50
Access Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
User Account Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
SNMP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
RADIUS Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .107
TACACS+ Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . .125
Configuration Scripting Commands . . . . . . . . . . . . . . . . . . . . . .130

2Table of Contents
Prelogin Banner, System Prompt, and Host Name Commands . . . . . . . .133
Chapter 4 Utility Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .135
AutoInstall Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . .136
CLI Output Filtering Commands . . . . . . . . . . . . . . . . . . . . . . . .140
Dual Image Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . .143
System Information and Statistics Commands . . . . . . . . . . . . . . . . .145
Box Services Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . .187
Logging Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .193
Email Alerting and Mail Server Commands . . . . . . . . . . . . . . . . . .202
System Utility and Clear Commands. . . . . . . . . . . . . . . . . . . . . .210
Simple Network Time Protocol Commands . . . . . . . . . . . . . . . . . .225
Time Zone Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . .231
DNS Client Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . .237
IP Address Conflict Commands . . . . . . . . . . . . . . . . . . . . . . . .243
Serviceability Packet Tracing Commands . . . . . . . . . . . . . . . . . . .244
Support Mode Commands . . . . . . . . . . . . . . . . . . . . . . . . . . .272
BCM Shell Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . .274
sFlow Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .275
Remote Monitoring Commands . . . . . . . . . . . . . . . . . . . . . . . .284
Chapter 5 Switching Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . .307
Port Configuration Commands . . . . . . . . . . . . . . . . . . . . . . . . .309
Spanning Tree Protocol Commands . . . . . . . . . . . . . . . . . . . . . .318
VLAN Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .351
Double VLAN Commands . . . . . . . . . . . . . . . . . . . . . . . . . . .369
Private VLAN Commands . . . . . . . . . . . . . . . . . . . . . . . . . . .373
Switch Ports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .376
Voice VLAN Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . .382
Provisioning (IEEE 802.1p) Commands . . . . . . . . . . . . . . . . . . . .385

Table of Contents 3
Asymmetric Flow Control . . . . . . . . . . . . . . . . . . . . . . . . . . .386
Protected Ports Commands . . . . . . . . . . . . . . . . . . . . . . . . . . .388
GARP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .391
GVRP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .394
GMRP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .397
Port-Based Network Access Control Commands . . . . . . . . . . . . . . .401
802.1X Supplicant Commands . . . . . . . . . . . . . . . . . . . . . . . . .428
Storm-Control Commands . . . . . . . . . . . . . . . . . . . . . . . . . . .433
Link Local Protocol Filtering Commands . . . . . . . . . . . . . . . . . . .442
Port-Channel/LAG (802.3ad) Commands . . . . . . . . . . . . . . . . . . .444
Port Mirroring Commands . . . . . . . . . . . . . . . . . . . . . . . . . . .466
Static MAC Filtering Commands. . . . . . . . . . . . . . . . . . . . . . . .471
DHCP L2 Relay Agent Commands . . . . . . . . . . . . . . . . . . . . . .476
DHCP Client Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . .485
DHCP Snooping Configuration Commands . . . . . . . . . . . . . . . . . .487
Dynamic ARP Inspection Commands . . . . . . . . . . . . . . . . . . . . .499
IGMP Snooping Configuration Commands . . . . . . . . . . . . . . . . . .508
IGMP Snooping Querier Commands . . . . . . . . . . . . . . . . . . . . . .519
MLD Snooping Commands . . . . . . . . . . . . . . . . . . . . . . . . . .524
MLD Snooping Querier Commands . . . . . . . . . . . . . . . . . . . . . .535
Port Security Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . .540
LLDP (802.1AB) Commands . . . . . . . . . . . . . . . . . . . . . . . . .546
LLDP-MED Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . .557
Denial of Service Commands. . . . . . . . . . . . . . . . . . . . . . . . . .566
MAC Database Commands. . . . . . . . . . . . . . . . . . . . . . . . . . .579
ISDP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .583
Chapter 6 IPv6 IPv6 Management Commands . . . . . . . . . . . . . . . . . . . . .593
IPv6 Management Commands . . . . . . . . . . . . . . . . . . . . . . . . .594

4Table of Contents
Chapter 7 Quality of Service Commands . . . . . . . . . . . . . . . . . . . . . . . .605
Class of Service Commands . . . . . . . . . . . . . . . . . . . . . . . . . .606
Differentiated Services Commands. . . . . . . . . . . . . . . . . . . . . . .616
DiffServ Class Commands . . . . . . . . . . . . . . . . . . . . . . . . . . .618
DiffServ Policy Commands . . . . . . . . . . . . . . . . . . . . . . . . . .628
DiffServ Service Commands . . . . . . . . . . . . . . . . . . . . . . . . . .636
DiffServ Show Commands . . . . . . . . . . . . . . . . . . . . . . . . . . .638
MAC Access Control List Commands . . . . . . . . . . . . . . . . . . . . .648
IP Access Control List Commands . . . . . . . . . . . . . . . . . . . . . . .655
IPv6 Access Control List Commands . . . . . . . . . . . . . . . . . . . . .676
Time Range Commands for Time-Based ACLs . . . . . . . . . . . . . . . .687
Command Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .691

5
1
About This Document
Introduction This document describes command-line interface (CLI) commands you use to
view and configure the CN1610 software. You can access the CLI by using a
direct connection to the serial port or by using Telnet or SSH over a remote
network connection.
Note
Some commands in this document may not be available with your version of the
FASTPATH software. Enter a question mark (?) after typing one or more
characters of a word to list the available commands or parameters that begin with
the letters. See “Using CLI Help” on page 25 for more information.
Audience This document is for system administrators who configure and operate systems
using FASTPATH®software. It provides an understanding of the configuration
options of the FASTPATH software.
Software engineers who integrate FASTPATH software into their hardware
platform can also benefit from a description of the configuration options.
This document assumes that you have an understanding of the FASTPATH
software base and have read the appropriate specification for the relevant
networking device platform. It also assumes that you have a basic knowledge of
Ethernet and networking concepts.
Refer to the release notes for the FASTPATH application-level code. The release
notes detail the platform-specific functionality of the Switching, SNMP,
Configuration, Management, and other packages. The suite of features the
FASTPATH packages support is not available on all the platforms to which
FASTPATH software has been ported.
About FASTPATH
Software FASTPATH software has two purposes:
◆Assist attached hardware in switching frames, based on Layer 2, 3, or 4
information contained in the frames.
◆Provide a complete device management portfolio to the network
administrator.

6
About This Document
Scope FASTPATH software encompasses both hardware and software support. The
software is partitioned to run in the following processors:
◆CPU
This code runs the networking device management portfolio and controls the
overall networking device hardware. It also assists in frame forwarding, as
needed and specified. This code is designed to run on multiple platforms
with minimal changes from platform to platform.
◆Networking device processor
This code does the majority of the packet switching, usually at wire speed.
This code is platform-dependent, and substantial changes might exist across
products.
Product Concept Fast Ethernet and Gigabit Ethernet switching continues to evolve from high-end
backbone applications to desktop switching applications. The price of the
technology continues to decline, while performance and feature sets continue to
improve. Devices that are capable of switching Layers 2, 3, and 4 are
increasingly in demand. FASTPATH software provides a flexible solution to
these ever-increasing needs.
The exact functionality provided by each networking device on which the
FASTPATH software base runs varies depending upon the platform and
requirements of the FASTPATH software.
FASTPATH software includes a set of comprehensive management functions for
managing both FASTPATH software and the network. You can manage the
FASTPATH software by using one of the following two methods:
◆Command-Line Interface (CLI)
◆Simple Network Management Protocol (SNMP)
Each of the FASTPATH management methods enables you to configure, manage,
and control the software locally or remotely using in-band or out-of-band
mechanisms. Management is standards-based, with configuration parameters and
a private Management Information Base (MIB) providing control for functions
not completely specified in the MIBs.

Chapter 2: Using the Command-Line Interface 7
2
Using the Command-Line Interface
About this chapter The command-line interface (CLI) is a text-based way to manage and monitor the
system. You can access the CLI by using a direct serial connection or by using a
remote logical connection with Telnet or SSH.
Topics in this
chapter
This chapter describes the CLI syntax, conventions, and modes. It contains the
following sections:
◆“Command Syntax” on page 8
◆“Command Conventions” on page 9
◆“Common Parameter Values” on page 10
◆“Interface Naming Convention” on page 12
◆“Using the no Form of a Command” on page 13
◆“CN1610 Software Modules” on page 14
◆“Command Modes” on page 15
◆“Command Completion and Abbreviation” on page 21
◆“CLI Error Messages” on page 22
◆“CLI Line-Editing Conventions” on page 23
◆“Using CLI Help” on page 25
◆“Accessing the CLI” on page 27

8Command Syntax
Command Syntax
A command is one or more words that might be followed by one or more
parameters. Parameters can be required or optional values.
Some commands, such as
show network
or
clear vlan
, do not require
parameters. Other commands, such as
network parms
, require that you supply a
value after the command. You must type the parameter values in a specific order,
and optional parameters follow required parameters. The following example
describes the
network parms
command syntax:
network parms ipaddr netmask [gateway]
◆
network parms
is the command name.
◆
ipaddr
and
netmask
are parameters and represent required values that you
must enter after you type the command keywords.
◆[
gateway
]is an optional parameter, so you are not required to enter a value
in place of the parameter.
The NetApp CN1610 Network Switch CLI Command Reference lists each
command by the command name and provides a brief description of the
command. Each command reference also contains the following information:
◆Format shows the command keywords and the required and optional
parameters.
◆Mode identifies the command mode you must be in to access the command.
◆Default shows the default value, if any, of a configurable setting on the
device.
The
show
commands also contain a description of the information that the
command shows.

Chapter 2: Using the Command-Line Interface 9
Command Conventions
The parameters for a command might include mandatory values, optional values,
or keyword choices. Parameters are order-dependent. The following Parameter
Conventions table describes the conventions this document uses to distinguish
between value types:
Symbol Example Description
[] square brackets
[value]
Indicates an optional
parameter.
italic
font in a
parameter.
value
or
[value]
Indicates a variable
value. You must replace
the italicized text and
brackets with an
appropriate value,
which might be a name
or number.
{} curly braces
{choice1 | choice2}
Indicates that you must
select a parameter from
the list of choices.
| Vertical bars
choice1 | choice2
Separates the mutually
exclusive choices.
[{}] Braces within
square brackets
[{choice1|choice2}]
Indicates a choice
within an optional
element.

10 Common Parameter Values
Common Parameter Values
Parameter values might be names (strings) or numbers. To use spaces as part of a
name parameter, enclose the name value in double quotes. For example, the
expression “System Name with Spaces” forces the system to accept the spaces.
Empty strings (““) are not valid user-defined strings. The following Parameter
Descriptions table describes common parameter values and value formatting:
Parameter Description
ipaddr This parameter is a valid IP address. You can
enter the IP address in the following formats:
a (32 bits)
a.b (8.24 bits)
a.b.c (8.8.16 bits)
a.b.c.d (8.8.8.8)
In addition to these formats, the CLI accepts
decimal, hexadecimal, and octal formats through
the following input formats (where nis any valid
hexadecimal, octal or decimal number):
0xn
(CLI assumes hexadecimal format.)
0n
(CLI assumes octal format with leading
zeros.)
n
(CLI assumes decimal format.)
ipv6-address
FE80:0000:0000:0000:020F:24FF:FEBF:DBCB,
or
FE80:0:0:0:20F:24FF:FEBF:DBCB, or
FE80::20F24FF:FEBF:DBCB, or
FE80:0:0:0:20F:24FF:128:141:49:32
For additional information, refer to RFC 3513.
Interface or
slot/port
Valid slot and port number separated by a
forward slash. For example, 0/1 represents slot
number 0 and port number 1.
Logical Interface Represents a logical slot and port number. This is
applicable in the case of a port-channel (LAG).
You can use the logical slot/port to configure the
port-channel.

Chapter 2: Using the Command-Line Interface 11
Character strings Use double quotation marks to identify character
strings, for example, “System Name with
Spaces”. An empty string (“”) is not valid.
Parameter Description

12 Interface Naming Convention
Interface Naming Convention
FASTPATH software references physical entities such as cards and ports by using
a slot/port naming convention. The FASTPATH software also uses this
convention to identify certain logical entities, such as link aggregation groups
(LAGs), which are also known as port-channels.
When a command indicates that the variable is
slot/port
, an example of a valid
entry is 0/1. This represents slot 0, port 1 on the switch. To configure port 12, the
slot/port to enter would be 0/12.
To configure a LAG, which is a group of ports acting as a single interface, you
enter the keyword
lag
followed by the LAG number, for example
lag 2
.
For many commands, you can also specify a range of physical or LAG interfaces
to configure at the same time with the same settings. To specify a range of
interfaces, the slot/port is separated by a dash, for example 0/1-0/4 indicates that
the same settings will apply to ports 1, 2, 3, and 4.
The slot number has two uses. In the case of physical ports, it identifies the card
containing the ports. In the case of logical and CPU ports it also identifies the
type of interface or port.
The port identifies the specific physical port being managed on a given slot.
Slot Type Description
Physical slot numbers Physical slot numbers begin with zero, and are
allocated up to the maximum number of physical
slots.
CPU slot numbers The CPU slots immediately follow the logical
slots.
Port Type Description
Physical ports The physical ports for each slot are numbered
sequentially starting from zero.
CPU ports CPU ports are handled by the driver as one or
more physical entities located on physical slots.

Chapter 2: Using the Command-Line Interface 13
Using the no Form of a Command
The
no
keyword is a specific form of an existing command and does not represent
a new or distinct command. Almost every configuration command has a
no
form.
In general, use the
no
form to reverse the action of a command or reset a value
back to the default. For example, the
no shutdown
configuration command
reverses the shutdown of an interface. Use the command without the keyword
no
to re-enable a disabled feature or to enable a feature that is disabled by default.
Only the configuration commands are available in the
no
form.

14 CN1610 Software Modules
CN1610 Software Modules
The CN1610 software consists of flexible modules that can be applied in various
combinations to develop advanced Layer 2/3/4+ products. The commands and
command modes available on your switch depend on the installed modules.
Additionally, for some
show
commands, the output fields might change based on
the modules included in the CN1610 software.
The CN1610 software suite includes the following modules:
◆Switching (Layer 2)
◆Quality of Service
◆Management (CLI and SNMP)
◆IPv6 Management—Allows management of the CN1610 switch through an
IPv6 address without requiring any IPv6 Routing features in the system. The
management address can be associated with the network port (front-panel
switch ports), a routine interface (port or VLAN), and the Service port.
◆Security

Chapter 2: Using the Command-Line Interface 15
Command Modes
The CLI groups commands into modes according to the command function. Each
of the command modes supports specific CN1610 software commands. The
commands in one mode are not available until you switch to that particular mode,
with the exception of the User EXEC mode commands. You can execute the User
EXEC mode commands in the Privileged EXEC mode.
The command changes in each command mode to help you identify the current
mode. The following CLI Command Modes table describes the command modes
and the prompts visible in that mode:
Command Mode Prompt Mode Description
User EXEC
(CN1610)>
Contains a limited set
of commands to view
basic system
information.
Privileged EXEC
(CN1610)#
Allows you to enter any
EXEC
command, enter
the VLAN mode, or
enter the Global
Configuration mode.
Global Config
(CN1610) (Config)#
Groups general setup
commands and permits
you to make
modifications to the
running configuration.
VLAN Config
(CN1610)(Vlan)#
Groups all the VLAN
commands.

16 Command Modes
Interface Config
(CN1610) (Interface
slot/port)#
(CN1610) (Interface
slot/port
(startrange)-
slot/port(endrange)
#
Manages the operation
of an interface.
Use this mode to set up
a physical port for a
specific logical
connection operation.
You can also use this
mode to manage the
operation of a range of
interfaces. For example,
the prompt may display
as follows:
(CN1610) (Interface
0/1-0/4) #
Line Console
(CN1610) (config-
line)#
Contains commands to
configure outbound
Telnet settings and
console interface
settings, as well as to
configure console
login/enable
authentication.
Line SSH
(CN1610) (config-
ssh)#
Contains commands to
configure SSH
login/enable
authentication.
Line Telnet
(CN1610) (config-
telnet)#
Contains commands to
configure Telnet
login/enable
authentication.
AAA IAS User Config
(CN1610) (Config-
IAS-User)#
Allows password
configuration for a user
in the IAS database.
Command Mode Prompt Mode Description

Chapter 2: Using the Command-Line Interface 17
Mail Server Config
(CN1610) (Mail-
Server)#
Allows configuration of
the email server.
Policy Map
Config
(CN1610) (Config-
policy-map)#
Contains the QoS
Policy-Map
configuration
commands.
Policy Class
Config
(CN1610) (Config-
policy-class-map)#
Consists of class
creation, deletion, and
matching commands.
The class match
commands specify
Layer 2, Layer 3, and
general match criteria.
Class Map Config
(CN1610) (Config-
class-map)#
Contains the QoS class
map configuration
commands for IPv4.
MAC Access-list
Config
(CN1610) (Config-
mac-access-list)#
Allows you to create a
MAC Access-List and
to enter the mode
containing MAC
Access-List
configuration
commands.
TACACS Config
(CN1610) (Tacacs)#
Contains commands to
configure properties for
the TACACS servers.
ARP Access-List
Config Mode
(CN1610) (Config-
arp-access-list)#
Contains commands to
add ARP ACL rules in
an ARP Access List.
Command Mode Prompt Mode Description
Other manuals for CN1610
2
Table of contents
Other NetApp Switch manuals
Popular Switch manuals by other brands

HP
HP 5920 Configuration guide

MFJ Enterprises
MFJ Enterprises MFJ-4716 instruction manual

Cisco
Cisco Nexus 9332D-GX2B Hardware installation guide

Zonet
Zonet ZFS3018P Product data

Network Technologies
Network Technologies UNIMUX-USBV-xO Installation and operation manual

HP
HP 438031-B21 - 1:10Gb Ethernet BL-c Switch reference guide

SMC Networks
SMC Networks TigerSwitch SMC8124PL2 Specifications

TP-Link
TP-Link TL-SG1005D - 5 PORT GIGABIT DESKTOP SWITCH user guide

Raritan
Raritan MasterConsole Digital Quick setup

Dataprobe
Dataprobe iBoot manual

Altinex
Altinex MX2436RM user guide

Transition Networks
Transition Networks SM8TAT2SA Cli reference guide