
Chapter 16
| Loopback Detection Commands
– 478 –
◆
The recover-time is the maximum time when recovery is triggered after a loop
is detected. The actual interval between recovery and detection will be less
than or equal to the recover-time.
◆
If the recovery time is set to zero, all ports placed in shutdown state can be
restored to operation using the
command. To
restore a specific port, use the
no
command.
Example
Console(config)#loopback-detection recover-time 120
Console(config-if)#
loopback-detection
transmit-interval
This command specifies the interval at which to transmit loopback detection
control frames. Use the
no
form to restore the default setting.
Syntax
loopback-detection transmit-interval
seconds
no
loopback-detection transmit-interval
seconds
- The transmission interval for loopback detection control frames.
(Range: 1-32767 seconds)
Default Setting
10 seconds
Command Mode
Global Configuration
Example
Console(config)#loopback-detection transmit-interval 60
Console(config)#
loopback detection
trap
This command sends a trap when a loopback condition is detected, or when the
switch recovers from a loopback condition. Use the no form to restore the default
state.
Syntax
loopback-detection trap
[
both
|
detect
|
none
|
recover
]
no
loopback-detection trap
both
- Sends an SNMP trap message when a loopback condition is
detected, or when the switch recovers from a loopback condition.
detect
- Sends an SNMP trap message when a loopback condition is
detected.
Содержание ECS4120-28F
Страница 36: ...Contents 36...
Страница 38: ...Figures 38...
Страница 46: ...Section I Getting Started 46...
Страница 70: ...Chapter 1 Initial Switch Configuration Setting the System Clock 70...
Страница 86: ...Chapter 2 Using the Command Line Interface CLI Command Groups 86...
Страница 202: ...Chapter 5 SNMP Commands Additional Trap Commands 202...
Страница 210: ...Chapter 6 Remote Monitoring Commands 210...
Страница 216: ...Chapter 7 Flow Sampling Commands 216...
Страница 278: ...Chapter 8 Authentication Commands PPPoE Intermediate Agent 278...
Страница 360: ...Chapter 9 General Security Measures Port based Traffic Segmentation 360...
Страница 384: ...Chapter 10 Access Control Lists ACL Information 384...
Страница 424: ...Chapter 11 Interface Commands Power Savings 424...
Страница 446: ...Chapter 13 Power over Ethernet Commands 446...
Страница 456: ...Chapter 14 Port Mirroring Commands RSPAN Mirroring Commands 456...
Страница 488: ...Chapter 17 UniDirectional Link Detection Commands 488...
Страница 494: ...Chapter 18 Address Table Commands 494...
Страница 554: ...Chapter 20 ERPS Commands 554...
Страница 620: ...Chapter 22 Class of Service Commands Priority Commands Layer 3 and 4 620...
Страница 638: ...Chapter 23 Quality of Service Commands 638...
Страница 772: ...Chapter 25 LLDP Commands 772...
Страница 814: ...Chapter 26 CFM Commands Delay Measure Operations 814...
Страница 826: ...Chapter 27 OAM Commands 826 1 1 00 12 CF 6A 07 F6 000084 Enabled Disabled Enabled Disabled Console...
Страница 836: ...Chapter 28 Domain Name Service Commands 836...
Страница 848: ...Chapter 29 DHCP Commands DHCP Relay Option 82 848...
Страница 902: ...Section III Appendices 902...
Страница 916: ...Glossary 916...
Страница 926: ...CLI Commands 926...
Страница 937: ......
Страница 938: ...E092017 CS R02...