Converged Enhanced Ethernet Command Reference xi
53-1001762-01
DRAFT: BROCADE CONFIDENTIAL
About This Document

In this chapter

How this document is organized . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
Supported hardware and software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii
What’s new in this document. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Document conventions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Notice to the reader . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
Additional information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
Getting technical help. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi
Document feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii

How this document is organized

This document is organized to help you find the information that you want as quickly and easily as
possible.
The document contains the following components:
Chapter 1, “CLI Basics” describes how to access the switch and the CEE CLI command modes.
Chapter 2, “Configuration Management Commands”describes the commands to manage the
configuration files and includes other file management commands.
Chapter 3, “VLAN Commands” describes the commands to create and manage Virtual LAN
interfaces.
Chapter 4, “Interface Commands” describes the commands to configure interfaces.
Chapter 5, “Link Layer Discovery Protocol Commands” describes the commands that support
the Link Layer Discovery Protocol (LLDP) implementation.
Chapter 6, “Link Aggregation Control Protocol Commands” describes the commands to clear
counters of all LACP aggregators or a given LACP aggregator.
Chapter 7, “Layer 2 System Commands” describes the commands to configure Layer 2
features.
Chapter 8, “Layer 2 ACL commands” describes the commands to configure, manage, and view
MAC addresses.
Chapter 9, “Spanning Tree Protocol Commands” describes the commands to configure the
Spanning Tree Protocol (STP), Rapid Spanning Tree Protocol (RSTP), and Multiple Spanning
Tree Protocol (MSTP).
Chapter 10, “Internet Group Management Protocol Commands” describes the commands
used to configure and maintain IGMP snooping.