Reference Guide

Table Of Contents
Dell PowerConnect ArubaOS 6.0 Command Line Interface | Reference Guide interface fastethernet | gigabitethernet | 239
Usage Guidelines
Use the show port status command to obtain information about the interfaces available on the controller.
Example
The following commands configure an interface as a trunk port for a set of VLANs:
(host) (config) # interface fastethernet 1/2
(host) (config-range)# switchport mode trunk
(host) (config-range)# switchport trunk native vlan 10
(host) (config-range)# switchport trunk allowed vlan 1,10,100
The following commands configure trunk port 1/2 with test-acl session for VLAN 2.
(host) (config) # interface range fastethernet 1/2
(host) (config-range)# switchport mode trunk
(host) (config-range)# ip access-group
(host) (config-range) # ip access-group test session vlan 2
trusted Set this interface and range of VLANs to be trusted. VLANs not
included in the trusted range of VLANs will be, by default,
untrusted.
Trusted ports and VLANs are typically connected to internal
controlled networks, while untrusted ports connect to third-
party APs, public areas, or other networks to which access
controls should be applied. When Dell APs are attached directly
to the controller, set the port to be trusted.
enabled
vlan <word> Sets the supplied range of VLANs as trusted. All remaining
become untrusted automatically.
For example, If you set a VLAN range as:
vlan 1-10, 100-300, 301, 305-400, 501-4094
Then all VLANs in this range are trusted and all others become
untrusted by default. You can also use the no trusted vlan
command to explicitly make an individual VLAN untrusted. The
no trusted vlan command is additive and adds given vlans to the
existing untrusted vlan set.
However, if you execute the trusted vlan <word> command, it
overrides any earlier untrusted VLANs or a range of untrusted
VLANs and creates a new set of trusted VLANs.
NOTE: A port supports a user VLAN range from 1-4094. If you
want to set all VLANs (1-4094) on a port as untrusted then mark
the port itself as untrusted. By default the port and all its
associated VLANs are trusted.
1-4094
xsec Enables and configures the Extreme Security (xSec) protocol.
NOTE: You must purchase and install the xSec software module
license in the controller.
——
point-to-point MAC address of the controller that is the xSec tunnel
termination point, and the 16-byte shared key used to
authenticate the controllers to each other. The key must be the
same on both controllers.
——
allowed vlan VLANs that are allowed on the xSec tunnel.
mtu (Optional) MTU size for the xSec tunnel.
vlan xSec VLAN ID. For controller-to-controller communications,
both controllers must belong to the same VLAN.
1-4094
Parameter Description Range Default