Switch uptime is 1 hours 48 minutes 4 seconds Reboot Cause: User pushed reset. Supervisor Card Processor XLR 508 (revision C4) with 857M bytes of memory. 32K bytes of non-volatile configuration memory. 512M bytes of Supervisor Card System flash (model=CF 512MB). (Aruba3200) #write erase all Switch will be factory defaulted. All the configuration and databases will be deleted. Press 'y' to proceed : Timed out, Try again (Aruba3200) #show ip % Incomplete command. (Aruba3200) #show configuration version 6.1 enable secret "3cc0afae01d4141537e0bda94d2c1d8e6700d4c4d3743e2601" hostname "Aruba3200" clock timezone PST -8 location "Building1.floor1" controller config 14 ip NAT pool dynamic-srcnat 0.0.0.0 0.0.0.0 ip access-list eth validuserethacl permit any ! netservice svc-snmp-trap udp 162 netservice svc-netbios-dgm udp 138 netservice svc-pcoip2-tcp tcp 4172 netservice svc-dhcp udp 67 68 netservice svc-smb-tcp tcp 445 netservice svc-https tcp 443 netservice svc-ike udp 500 netservice svc-l2tp udp 1701 netservice svc-syslog udp 514 netservice svc-citrix tcp 2598 netservice svc-pptp tcp 1723 netservice svc-ica tcp 1494 netservice svc-telnet tcp 23 netservice svc-sccp tcp 2000 netservice svc-sec-papi udp 8209 netservice svc-tftp udp 69 netservice svc-kerberos udp 88 netservice svc-sip-tcp tcp 5060 netservice svc-netbios-ssn tcp 139 netservice svc-lpd tcp 515 netservice svc-pop3 tcp 110 netservice svc-adp udp 8200 netservice svc-cfgm-tcp tcp 8211 netservice svc-noe udp 32512 netservice svc-http-proxy3 tcp 8888 netservice svc-pcoip-tcp tcp 50002 netservice svc-pcoip-udp udp 50002 netservice svc-dns udp 53 netservice svc-msrpc-tcp tcp 135 139 netservice svc-rtsp tcp 554 netservice svc-http tcp 80 netservice svc-vocera udp 5002 netservice svc-h323-tcp tcp 1720 netservice svc-h323-udp udp 1718 1719 netservice svc-nterm tcp 1026 1028 netservice svc-sip-udp udp 5060 netservice svc-http-proxy2 tcp 8080 netservice svc-papi udp 8211 netservice svc-noe-oxo udp 5000 alg noe netservice svc-ftp tcp 21 netservice svc-natt udp 4500 netservice svc-svp 119 netservice svc-microsoft-ds tcp 445 netservice svc-gre 47 netservice svc-smtp tcp 25 netservice svc-smb-udp udp 445 netservice svc-sips tcp 5061 netservice svc-netbios-ns udp 137 netservice svc-esp 50 netservice svc-ipp-tcp tcp 631 netservice svc-bootp udp 67 69 netservice svc-snmp udp 161 netservice svc-v6-dhcp udp 546 547 netservice svc-pcoip2-udp udp 4172 netservice svc-icmp 1 netservice svc-ntp udp 123 netservice svc-msrpc-udp udp 135 139 netservice svc-ssh tcp 22 netservice svc-ipp-udp udp 631 netservice svc-http-proxy1 tcp 3128 netservice svc-v6-icmp 58 netservice svc-vmware-rdp tcp 3389 netdestination clearpass host 10.1.0.235 ! netexthdr default ! ip access-list session allow-diskservices any any svc-netbios-dgm permit any any svc-netbios-ssn permit any any svc-microsoft-ds permit any any svc-netbios-ns permit ! ip access-list session control user any udp 68 deny any any svc-icmp permit any any svc-dns permit any any svc-papi permit any any svc-sec-papi permit any any svc-cfgm-tcp permit any any svc-adp permit any any svc-tftp permit any any svc-dhcp permit any any svc-natt permit ! ip access-list session v6-icmp-acl ipv6 any any svc-v6-icmp permit ! ip access-list session validuser network 169.254.0.0 255.255.0.0 any any deny any any any permit ipv6 any any any permit ! ip access-list session vocera-acl any any svc-vocera permit queue high ! ip access-list session v6-https-acl ipv6 any any svc-https permit ! ip access-list session vmware-acl any any svc-vmware-rdp permit tos 46 dot1p-priority 6 any any svc-pcoip-tcp permit tos 46 dot1p-priority 6 any any svc-pcoip-udp permit tos 46 dot1p-priority 6 any any svc-pcoip2-tcp permit tos 46 dot1p-priority 6 any any svc-pcoip2-udp permit tos 46 dot1p-priority 6 ! ip access-list session icmp-acl any any svc-icmp permit ! ip access-list session captiveportal user alias controller svc-https dst-nat 8081 user any svc-http dst-nat 8080 user any svc-https dst-nat 8081 user any svc-http-proxy1 dst-nat 8088 user any svc-http-proxy2 dst-nat 8088 user any svc-http-proxy3 dst-nat 8088 ! ip access-list session v6-dhcp-acl ipv6 any any svc-v6-dhcp permit ! ip access-list session allowall any any any permit ipv6 any any any permit ! ip access-list session v6-dns-acl ipv6 any any svc-dns permit ! ip access-list session sip-acl any any svc-sip-udp permit queue high any any svc-sip-tcp permit queue high ! ip access-list session https-acl any any svc-https permit ! ip access-list session dns-acl any any svc-dns permit ! ip access-list session ra-guard ipv6 user any icmpv6 rtr-adv deny ! ip access-list session citrix-acl any any svc-citrix permit tos 46 dot1p-priority 6 any any svc-ica permit tos 46 dot1p-priority 6 ! ip access-list session allow-printservices any any svc-lpd permit any any svc-ipp-tcp permit any any svc-ipp-udp permit ! ip access-list session logon-control user any udp 68 deny any any svc-icmp permit any any svc-dns permit any any svc-dhcp permit any any svc-natt permit ! ip access-list session vpnlogon user any svc-ike permit user any svc-esp permit any any svc-l2tp permit any any svc-pptp permit any any svc-gre permit ! ip access-list session srcnat user any any src-nat ! ip access-list session skinny-acl any any svc-sccp permit queue high ! ip access-list session tftp-acl any any svc-tftp permit ! ip access-list session v6-allowall ipv6 any any any permit ! ip access-list session cplogout user alias controller svc-https dst-nat 8081 ! ip access-list session captiveportal6 ipv6 user alias controller6 svc-https captive ipv6 user any svc-http captive ipv6 user any svc-https captive ipv6 user any svc-http-proxy1 captive ipv6 user any svc-http-proxy2 captive ipv6 user any svc-http-proxy3 captive ! ip access-list session dhcp-acl any any svc-dhcp permit ! ip access-list session http-acl any any svc-http permit ! ip access-list session v6-http-acl ipv6 any any svc-http permit ! ip access-list session ap-uplink-acl any any udp 68 permit any any svc-icmp permit any host 224.0.0.251 udp 5353 permit ! ip access-list session ap-acl any any svc-gre permit any any svc-syslog permit any user svc-snmp permit user any svc-snmp-trap permit user any svc-ntp permit user alias controller svc-ftp permit ! ip access-list session svp-acl any any svc-svp permit queue high user host 224.0.1.116 any permit ! ip access-list session noe-acl any any svc-noe permit queue high ! ip access-list session h323-acl any any svc-h323-tcp permit queue high any any svc-h323-udp permit queue high ! ip access-list session v6-logon-control ipv6 user any udp 68 deny ipv6 any any svc-v6-icmp permit ipv6 any any svc-v6-dhcp permit ipv6 any any svc-dns permit ! vpn-dialer default-dialer ike authentication PRE-SHARE f1012d915e3d46c3e37dfcb763199bf3e463c48150b6fa1b ! user-role ap-role access-list session control access-list session ap-acl ! user-role default-vpn-role access-list session allowall access-list session v6-allowall ! user-role voice access-list session sip-acl access-list session noe-acl access-list session svp-acl access-list session vocera-acl access-list session skinny-acl access-list session h323-acl access-list session dhcp-acl access-list session tftp-acl access-list session dns-acl access-list session icmp-acl ! user-role default-via-role access-list session allowall ! user-role guest-logon captive-portal "default" access-list session logon-control access-list session captiveportal access-list session v6-logon-control access-list session captiveportal6 ! user-role guest access-list session http-acl access-list session https-acl access-list session dhcp-acl access-list session icmp-acl access-list session dns-acl access-list session v6-http-acl access-list session v6-https-acl access-list session v6-dhcp-acl access-list session v6-icmp-acl access-list session v6-dns-acl ! user-role stateful-dot1x ! user-role authenticated access-list session allowall access-list session v6-allowall ! user-role logon access-list session logon-control access-list session captiveportal access-list session vpnlogon access-list session v6-logon-control access-list session captiveportal6 ! ip radius source-interface vlan 900 ip radius nas-ip 10.1.0.160 ! aaa timers stats-timeout 300 seconds interface mgmt shutdown ! dialer group evdo_us init-string ATQ0V1E0 dial-string ATDT#777 ! dialer group gsm_us init-string AT+CGDCONT=1,"IP","ISP.CINGULAR" dial-string ATD*99# ! dialer group gsm_asia init-string AT+CGDCONT=1,"IP","internet" dial-string ATD*99***1# ! dialer group vivo_br init-string AT+CGDCONT=1,"IP","zap.vivo.com.br" dial-string ATD*99# ! vlan 900 interface gigabitethernet 1/0 description "GE1/0" trusted trusted vlan 1-4094 ! interface gigabitethernet 1/1 description "GE1/1" trusted trusted vlan 1-4094 switchport mode trunk switchport access vlan 900 switchport trunk native vlan 900 switchport trunk allowed vlan 1-4094 ! interface gigabitethernet 1/2 description "GE1/2" trusted trusted vlan 1-4094 switchport access vlan 900 ! interface gigabitethernet 1/3 description "GE1/3" trusted trusted vlan 1-4094 ! interface vlan 1 ip address 172.16.0.254 255.255.255.0 ! interface vlan 900 ip address 10.1.0.160 255.255.252.0 ! ip default-gateway 10.1.0.1 uplink disable ap mesh-recovery-profile cluster RecoveryMYqOo/6x9HSTL1Gr wpa-hexkey 086066ba6aeff2e658f888b9bfe22fd912b632751fe4712662d3c5d8c575c35447ad44e80a6e7658dbff3a66489a633cc16e3cb77694a9f706d77021c961378c453aac09f8191eb53d16d17deded802e crypto isakmp policy 20 encryption aes256 ! crypto ipsec transform-set default-boc-bm-transform esp-3des esp-sha-hmac crypto ipsec transform-set default-rap-transform esp-aes256 esp-sha-hmac crypto ipsec transform-set default-aes esp-aes256 esp-sha-hmac crypto dynamic-map default-dynamicmap 10000 set transform-set "default-transform" "default-aes" ! crypto isakmp eap-passthrough eap-tls crypto isakmp eap-passthrough eap-peap crypto isakmp eap-passthrough eap-mschapv2 vpdn group l2tp ! ! vpdn group pptp ! tunneled-node-address 0.0.0.0 adp discovery enable adp igmp-join enable adp igmp-vlan 0 voice rtcp-inactivity disable voice sip-midcall-req-timeout disable ap ap-blacklist-time 3600 ssh mgmt-auth username/password mgmt-user admin root ed980f4201f3b0388f2ed367bccea4931b7ca5a01d1818de1b ip address 10.1.0.160 255.255.252.0 ! ip default-gateway 10.1.0.1 uplink disable ap mesh-recovery-profile cluster RecoveryMYqOo/6x9HSTL1Gr wpa-hexkey 086066ba6aeff2e658f888b9bfe22fd912b632751fe4712662d3c5d8c575c35447ad44e80a6e7658dbff3a66489a633cc16e3cb77694a9f706d77021c961378c453aac09f8191eb53d16d17deded802e crypto isakmp policy 20 encryption aes256 ! crypto ipsec transform-set default-boc-bm-transform esp-3des esp-sha-hmac crypto ipsec transform-set default-rap-transform esp-aes256 esp-sha-hmac crypto ipsec transform-set default-aes esp-aes256 esp-sha-hmac crypto dynamic-map default-dynamicmap 10000 set transform-set "default-transform" "default-aes" ! crypto isakmp eap-passthrough eap-tls crypto isakmp eap-passthrough eap-peap crypto isakmp eap-passthrough eap-mschapv2 vpdn group l2tp ! ! vpdn group pptp ! tunneled-node-address 0.0.0.0 adp discovery enable adp igmp-join enable adp igmp-vlan 0 voice rtcp-inactivity disable voice sip-midcall-req-timeout disable ap ap-blacklist-time 3600 ssh mgmt-auth username/password mgmt-user admin root ed980f4201f3b0388f2ed367bccea4931b7ca5a01d1818de1b no database synchronize database synchronize rf-plan-data ip mobile domain default ! airgroup "enable" airgroup vlan 1 "allow" airgroup vlan 900 "allow" airgroupservice "airplay" id "_airplay._tcp" id "_raop._tcp" description "AirPlay" airgroupservice "airprint" id "_ipp._tcp" id "_pdl-datastream._tcp" id "_printer._tcp" id "_scanner._tcp" id "_universal._sub._ipp._tcp" id "_printer._sub._http._tcp" id "_http._tcp" id "_http-alt._tcp" id "_ipp-tls._tcp" id "_fax-ipp._tcp" id "_riousbprint._tcp" id "_cups._sub._ipp._tcp" id "_cups._sub._fax-ipp._tcp" id "_ica-networking._tcp" id "_ptp._tcp" id "_canon-bjnp1._tcp" description "AirPrint" airgroupservice "allowall" description "Remaining-Services" airgroup service "airplay" enable airgroup service "airprint" enable airgroup service "allowall" enable ! ip igmp ! ipv6 mld ! no firewall attack-rate cp 1024 ipv6 firewall ext-hdr-parse-len 100 ! firewall cp ! firewall cp permit proto 17 ports 21234 21234 packet-capture-defaults tcp disable udp disable sysmsg disable other disable ! ip domain lookup ! country US aaa rfc-3576-server "10.1.0.235" key c771e930ad6b1448a1d1de5d071310413b4150d38fc717a3 ! aaa authentication mac "default" ! aaa authentication dot1x "csudh-air-dot1x-auth-profile" termination eap-type eap-peap termination eap-type eap-tls termination inner-eap-type eap-mschapv2 ! aaa authentication dot1x "default" ! aaa authentication-server radius "clearpass-6x" host "10.1.0.235" key 63b22293c01c3eaa0fce2e653a9616eac146f72f81e3aad6 ! aaa server-group "csudh-air-server-group" auth-server clearpass-6x ! aaa server-group "default" auth-server Internal set role condition role value-of ! aaa profile "csudh-air-dot1x-aaa-profile" authentication-dot1x "csudh-air-dot1x-auth-profile" dot1x-default-role "authenticated" dot1x-server-group "csudh-air-server-group" radius-accounting "csudh-air-server-group" radius-interim-accounting rfc-3576-server "10.1.0.235" ! aaa profile "default" ! aaa authentication captive-portal "default" ! aaa authentication wispr "default" ! aaa authentication vpn "default" ! aaa authentication vpn "default-rap" ! aaa authentication mgmt ! aaa authentication stateful-ntlm "default" ! aaa authentication stateful-kerberos "default" ! aaa authentication stateful-dot1x ! aaa authentication wired ! web-server ! papi-security ! guest-access-email ! voice logging ! voice dialplan-profile "default" ! voice real-time-config ! voice sip ! aaa password-policy mgmt ! control-plane-security ! ids wms-general-profile poll-retries 3 ! ids wms-local-system-profile ! valid-network-oui-profile ! ifmap ! ap system-profile "default" ! ap regulatory-domain-profile "default" country-code US valid-11g-channel 1 valid-11g-channel 6 valid-11g-channel 11 valid-11a-channel 36 valid-11a-channel 40 valid-11a-channel 44 valid-11a-channel 48 valid-11a-channel 149 valid-11a-channel 153 valid-11a-channel 157 valid-11a-channel 161 valid-11a-channel 165 valid-11g-40mhz-channel-pair 1-5 valid-11g-40mhz-channel-pair 7-11 valid-11a-40mhz-channel-pair 36-40 valid-11a-40mhz-channel-pair 44-48 valid-11a-40mhz-channel-pair 52-56 valid-11a-40mhz-channel-pair 60-64 valid-11a-40mhz-channel-pair 100-104 valid-11a-40mhz-channel-pair 108-112 valid-11a-40mhz-channel-pair 116-120 valid-11a-40mhz-channel-pair 124-128 valid-11a-40mhz-channel-pair 132-136 valid-11a-40mhz-channel-pair 149-153 valid-11a-40mhz-channel-pair 157-161 ! ap wired-ap-profile "default" ! ap enet-link-profile "default" ! ap mesh-ht-ssid-profile "default" ! ap mesh-cluster-profile "default" ! ap wired-port-profile "default" ! ap mesh-radio-profile "default" ! ids general-profile "default" ! ids unauthorized-device-profile "default" ! ids profile "default" ! rf arm-profile "arm-maintain" assignment maintain no scanning ! rf arm-profile "arm-scan" ! rf arm-profile "default" ! rf optimization-profile "default" ! rf event-thresholds-profile "default" ! rf am-scan-profile "default" ! rf dot11a-radio-profile "default" ! rf dot11a-radio-profile "rp-maintain-a" arm-profile "arm-maintain" ! rf dot11a-radio-profile "rp-monitor-a" mode am-mode ! rf dot11a-radio-profile "rp-scan-a" arm-profile "arm-scan" ! rf dot11g-radio-profile "default" ! rf dot11g-radio-profile "rp-maintain-g" arm-profile "arm-maintain" ! rf dot11g-radio-profile "rp-monitor-g" mode am-mode ! rf dot11g-radio-profile "rp-scan-g" arm-profile "arm-scan" ! wlan dot11k-profile "default" ! wlan voip-cac-profile "default" ! wlan ht-ssid-profile "default" ! wlan edca-parameters-profile station "default" ! wlan edca-parameters-profile ap "default" ! wlan ssid-profile "csudh-air-dot1x-ssid-profile" essid "csudh-air-dot1x" opmode wpa2-aes ! wlan ssid-profile "default" ! wlan virtual-ap "csudh-air-dot1x-vap" aaa-profile "csudh-air-dot1x-aaa-profile" ssid-profile "csudh-air-dot1x-ssid-profile" vlan 900 ! wlan virtual-ap "default" ! ap provisioning-profile "default" ! ap-group "agtest-grp" virtual-ap "csudh-air-dot1x-vap" ! ap-group "default" ! airgroup cppm-server aaa server-group "csudh-air-server-group" rfc-3576-server "10.1.0.235" rfc3576_udp_port 21234 ! logging level warnings security subcat ids logging level warnings security subcat ids-ap snmp-server enable trap process monitor log remote-node config-id 2 end (Aruba3200) #write erase all Switch will be factory defaulted. All the configuration and databases will be deleted. Press 'y' to proceed : Write Erase successful (Aruba3200) #reload Do you really want to restart the system(y/n): y System will now restart! Shutdown processing started Syncing data....done. Sending SIGKILL to all processes. Please stand by while rebooting the system. 1:<7>ide-disk 0.0: shutdown 1:<0>Restarting system. 1:. 1:<2>Performing hard reset... CPBoot 1.2.0.0 (build 20527) Built: 2009-01-20 at 18:55:40 DRAM: Operating at 533 MHz DRAM: Channel 0: 512 MB DRAM: Channel 2: 0 MB DRAM: Total = 512 MB POST: Memory test: Physical 0 - 0x10000000 - quick test Memory test: Physical 0x10000000 - 0x20000000 - quick test PASS CPU: XLR508 rev. C4 Clock: 800MHz Board: A3200 CPLD: rev: 1.1 SMP: All 8 cpus successfully started Boot: Primary bootflash partition POST2: OK Net: xlr_gmac0 xlr_gmac1 xlr_gmac2 xlr_gmac3 IDE: Bus 0: OK Device 0: Model: CF 512MB Firm: 20080112 Ser#: 2009A 0000218413 Type: Removable Hard Disk Capacity: 502.0 MB = 0.4 GB (1028160 x 512) Hit any key to stop autoboot: 0 Loading image 0:0####################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################### Image is signed; verifying checksum... passed Signer Cert OK Policy Cert OK RSA signature verified. Booting image... Uncompressing core image files... 00:00:07 done. 00:00:43 Aruba Networks ArubaOS Version 6.1.3.4-AirGroup (build 35647 / label #35647) Built by p4build@stan on 2012-10-08 at 13:37:17 PDT (gcc version 3.4.3) Copyright (c) 2002-2012, Aruba Networks, Inc. <<<<< Welcome to Aruba Networks - Aruba A3200-US-8 >>>>> Performing CompactFlash fast test... Checking for file system... Passed. Performing integrity check on Ancillary partition 0...passed. Reboot Cause: User reboot. Crash information available. Downloading SOS...done. Deleting the Databases Restoring the database...done. Generating SSH Keys......done. Initializing TPM and Certificates Generating a 2048 bit RSA private key .........................+++ .........+++ writing new private key to '/tmp/tempCertKey/priveKeyGen.pem' ----- TPM and Certificate Initialization successful. Reading configuration from factory-default.cfg ***************** Welcome to the Aruba3200 setup dialog ***************** This dialog will help you to set the basic configuration for the switch. These settings, except for the Country Code, can later be changed from the Command Line Interface or Graphical User Interface. Commands: Submit input or use [default value], Help Back, Forward, Line begin, Line end Delete, Delete back, Delete to end of line Previous question Restart beginning Enter System name [Aruba3200]: Aruba3200Practice Enter Switch Role (master|local|standalone|remote-node) [master]: Enter VLAN 1 interface IP address [172.16.0.254]: Enter VLAN 1 interface subnet mask [255.255.255.0]: Enter IP Default gateway [none]: 172.16.0.1 This controller is restricted to Country code US for United States, please confirm (yes|no)?: y Enter Time Zone [PST-8:0]: Enter Time in UTC [22:02:02]: 15:06:00 Enter Date (MM/DD/YYYY) [8/20/2013]: Enter Password for admin login (up to 32 chars): ****** Re-type Password for admin login: ***** Passwords were not the same! Please re-enter: Enter Password for admin login (up to 32 chars): ****** Re-type Password for admin login: ****** Enter Password for enable mode (up to 15 chars): ****** Re-type Password for enable mode: ****** Do you wish to shutdown all the ports (yes|no)? [no]: y Current choices are: System name: Aruba3200Practice Switch Role: master VLAN 1 interface IP address: 172.16.0.254 VLAN 1 interface subnet mask: 255.255.255.0 IP Default gateway: 172.16.0.1 Time Zone: PST-8:0 Ports shutdown: y If you accept the changes the switch will restart! Type to go back and change answer for any question Do you wish to accept the changes (yes|no)y Creating configuration... Done. System will now restart! Shutdown processing started Syncing data....done. Sending SIGKILL to all processes. Please stand by while rebooting the system. 1:<7>ide-disk 0.0: shutdown 1:<0>Restarting system. 1:. 1:<2>Performing hard reset... CPBoot 1.2.0.0 (build 20527) Built: 2009-01-20 at 18:55:40 DRAM: Operating at 533 MHz DRAM: Channel 0: 512 MB DRAM: Channel 2: 0 MB DRAM: Total = 512 MB POST: Memory test: Physical 0 - 0x10000000 - quick test Memory test: Physical 0x10000000 - 0x20000000 - quick test PASS CPU: XLR508 rev. C4 Clock: 800MHz Board: A3200 CPLD: rev: 1.1 SMP: All 8 cpus successfully started Boot: Primary bootflash partition POST2: OK Net: xlr_gmac0 xlr_gmac1 xlr_gmac2 xlr_gmac3 IDE: Bus 0: OK Device 0: Model: CF 512MB Firm: 20080112 Ser#: 2009A 0000218413 Type: Removable Hard Disk Capacity: 502.0 MB = 0.4 GB (1028160 x 512) Hit any key to stop autoboot: 0 Loading image 0:0####################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################### Image is signed; verifying checksum... passed Signer Cert OK Policy Cert OK RSA signature verified. Booting image... Uncompressing core image files... 00:00:07 done. 00:00:43 Aruba Networks ArubaOS Version 6.1.3.4-AirGroup (build 35647 / label #35647) Built by p4build@stan on 2012-10-08 at 13:37:17 PDT (gcc version 3.4.3) Copyright (c) 2002-2012, Aruba Networks, Inc. <<<<< Welcome to Aruba Networks - Aruba A3200-US-8 >>>>> Performing CompactFlash fast test... Checking for file system... Passed. Performing integrity check on Ancillary partition 0...passed. Reboot Cause: User reboot. Crash information available. Downloading SOS...done. Restoring the database...done. Generating SSH Keys......done. Initializing TPM and Certificates TPM and Certificate Initialization successful. Performing intra-version configuration upgrade for version 6.1. Saving current config file default.cfg as default.cfg.2013-08-20_15-10-30 Generating new configuration. Configuration upgrade complete. Reading configuration from default.cfg Retrieving Configuration...will take approximately 1 minute (Aruba3200Practice) User: admin Password: ****** (Aruba3200Practice) >en Password:****** (Aruba3200Practice) # *** IDLE TIMEOUT *** (Aruba3200Practice) User: admin Password: ****** (Aruba3200Practice) >en Password:****** (Aruba3200Practice) #line console 2 ^ % Invalid input detected at '^' marker. (Aruba3200Practice) #line console ^ % Invalid input detected at '^' marker. (Aruba3200Practice) #line ^ % Invalid input detected at '^' marker. (Aruba3200Practice) #dis ^ % Invalid input detected at '^' marker. (Aruba3200Practice) #disable ^ % Invalid input detected at '^' marker. (Aruba3200Practice) #logout ^ % Invalid input detected at '^' marker. (Aruba3200Practice) #show ver Aruba Operating System Software. ArubaOS (MODEL: Aruba3200-US), Version 6.1.3.4-AirGroup Website: http://www.arubanetworks.com Copyright (c) 2002-2012, Aruba Networks, Inc. Compiled on 2012-10-08 at 13:37:17 PDT (build 35647) by p4build ROM: System Bootstrap, Version CPBoot 1.2.0.0 (build 20527) Built: 2009-01-20 18:56:10 Built by: p4build@re_client_20527 Switch uptime is 46 minutes 31 seconds Reboot Cause: User reboot. Supervisor Card Processor XLR 508 (revision C4) with 857M bytes of memory. 32K bytes of non-volatile configuration memory. 512M bytes of Supervisor Card System flash (model=CF 512MB). (Aruba3200Practice) # *** IDLE TIMEOUT *** (Aruba3200Practice) User: admin Password: ****** (Aruba3200Practice) >enable Password:****** (Aruba3200Practice) #interface vlan 900 ^ % Invalid input detected at '^' marker. (Aruba3200Practice) #interface vlan 900 ^ % Invalid input detected at '^' marker. (Aruba3200Practice) #ip dhcp ^ % Invalid input detected at '^' marker. (Aruba3200Practice) #! (Aruba3200Practice) >interface vlan 900 ^ % Invalid input detected at '^' marker. (Aruba3200Practice) >!! ^ % Invalid input detected at '^' marker. (Aruba3200Practice) >! ^ % Invalid input detected at '^' marker. (Aruba3200Practice) >enable Password:****** (Aruba3200Practice) #interface vlan 900 ^ % Invalid input detected at '^' marker. (Aruba3200Practice) #interface vlan ^ % Invalid input detected at '^' marker. (Aruba3200Practice) #