168
C
HAPTER
7: IP S
ERVICES
C
OMMANDS
ip-addr mask
— IP address and subnet mask for the route
destination, in dotted decimal notation (for example, 10.10.10.10
255.255.255.0).
ip-addr/mask-length
—
IP address and subnet mask length in CIDR
format (for example, 10.10.10.10/24).
gateway
—
IP address, DNS hostname, or alias of the next-hop router.
metric
—
Cost for using the route. You can specify a value from
0 through 2,147,483,647. Lower-cost routes are preferred over
higher-cost routes.
Defaults
— The HTTPS server is enabled by default.
Access
— Enabled.
Usage
— MSS can use a static route only if a direct route in the route
table resolves the static route. MSS adds routes with next-hop types Local
and Direct when you add an IP interface to a VLAN, if the VLAN is up. If
one of these added routes can resolve the static route, MSS can use the
static route.
Before you add a static route, use the
display interface
command to
verify that the WX switch has an IP interface in the same subnet as the
route’s next-hop router. If not, the VLAN:Interface field of the
display ip
route
command output shows that the route is down.
You can configure a maximum of 4 routes per destination. This includes
default routes, which have destination 0.0.0.0/0. Each route to a given
destination must have a unique gateway address. When the route table
contains multiple default or explicit routes to the same destination, MSS
uses the route with the lowest cost. If two or more routes to the same
destination have the lowest cost, MSS selects the first route in the route
table.
When you add multiple routes to the same destination, MSS groups the
routes and orders them from lowest cost at the top of the group to
highest cost at the bottom of the group. If you add a new route that has
the same destination and cost as a route already in the table, MSS places
the new route at the top of the group of routes with the same cost.
Summary of Contents for OfficeConnect WX1200
Page 36: ...36 CHAPTER 2 ACCESS COMMANDS...
Page 62: ...62 CHAPTER 3 SYSTEM SERVICE COMMANDS...
Page 200: ...200 CHAPTER 7 IP SERVICES COMMANDS...
Page 264: ...264 CHAPTER 8 AAA COMMANDS...
Page 272: ...272 CHAPTER 9 MOBILITY DOMAIN COMMANDS...
Page 392: ...392 CHAPTER 11 MANAGED ACCESS POINT COMMANDS...
Page 444: ...444 CHAPTER 13 IGMP SNOOPING COMMANDS...
Page 468: ...468 CHAPTER 14 SECURITY ACL COMMANDS...
Page 484: ...484 CHAPTER 15 CRYPTOGRAPHY COMMANDS...
Page 532: ...532 CHAPTER 18 SESSION MANAGEMENT COMMANDS...
Page 588: ...588 CHAPTER 20 FILE MANAGEMENT COMMANDS...
Page 596: ...596 CHAPTER 21 TRACE COMMANDS...
Page 608: ...608 CHAPTER 22 SNOOP COMMANDS...
Page 618: ...618 CHAPTER 23 SYSTEM LOG COMMANDS...