Wi-Tek Wi-Tek WI-PMS310GF-Alien Gigabit L2 Managed PoE Switch ユーザーマニュアル

カテゴリー
ネットワーキング
タイプ
ユーザーマニュアル

このマニュアルも適しています

WI-TEK Gigabit Managed Switch
CLI Command manual
1 / 345
Catalog
WI-TEK Gigabit Managed Switch CLI Command manual............................................................... 1
Catalog ............................................................................................................................................... 1
Chapter 1..........................................................................................................................................13
Introduction of CLI command line .................................................................................................. 13
1.1 Access switch CLI....................................................................................................................14
1.1.1 Users access CLI through Console port.............................................................................. 14
1.1.2 Users access CLI through TELNET .............................................................................. 16
1.2 CLI mode introduction............................................................................................................. 17
1.2.1 The role of CLI model ........................................................................................................18
1.2.2 Identification of CLI mode .................................................................................................18
1.2.3 Classification of CLI patterns ............................................................................................. 19
1.3 Introduction to command syntax..............................................................................................21
1.3.1 Command composition....................................................................................................... 22
1.3.2 Parameter type .................................................................................................................... 22
1.3.3 Command syntax rules........................................................................................................22
1.3.4 Command abbreviation....................................................................................................... 24
1.3.5 Grammar help ..................................................................................................................... 24
1.3.6 Command line error message ............................................................................................. 25
1.4 Command line shortcuts ..........................................................................................................26
1.4.1 Line edit shortcut key ......................................................................................................... 26
1.4.2 Display command shortcut key...........................................................................................27
1.5 History command.....................................................................................................................27
Chapter 2..........................................................................................................................................28
System management configuration.................................................................................................. 28
2.1 System security configuration.................................................................................................. 28
2.1.1 Multi-user management control.......................................................................................... 28
2.1.2 TACACS+ authentication authorization .............................................................................30
2.1.3 Anonymous user password control .....................................................................................32
2.1.4 Enable password control.....................................................................................................34
2.1.5 TELNET service control..................................................................................................... 35
2.1.6 SNMP service control......................................................................................................... 36
2.1.7 HTTP service control..........................................................................................................37
2.1.8 SSH service control ......................................................................................................... 38
2.2 System maintenance and debugging........................................................................................ 38
2.2.1 Configure the host name of the system...............................................................................39
2 / 345
2.2.2 Configuring the system clock .............................................................................................39
2.2.3 Configure terminal timeout attributes.................................................................................40
2.2.4 System reset........................................................................................................................ 41
2.2.5 View system information .................................................................................................... 41
2.2.6 Network connectivity debugging........................................................................................ 42
2.2.7 Detecting line distance........................................................................................................42
2.2.8 Traceroute debugging ......................................................................................................... 42
2.2.9 Telnet client.........................................................................................................................43
2.2.10 UDLD configuration.........................................................................................................43
2.3 Configuration file management ...............................................................................................44
2.3.1 View configuration information.......................................................................................... 46
2.3.2 Save configuration.............................................................................................................. 46
2.3.3 Delete configuration file ..................................................................................................... 47
2.3.4 Download configuration files ............................................................................................. 47
2.4 Software version upgrade ........................................................................................................50
2.4.1 Software version upgrade commands ................................................................................. 51
2.4.2 Software upgrade process ................................................................................................... 51
Chapter 3.......................................................................................................................................... 55
Port Configuration............................................................................................................................55
3.1 Common configuration for ports.............................................................................................. 56
3.1.1 Port rate configuration ........................................................................................................ 56
3.1.2 Display port information.....................................................................................................56
3.2 Configuration MIRROR ..........................................................................................................57
3.2.1 Configuration of the MIRROR listen on port and is listening on port................................57
3.2.2 Display the configuration of MIRROR............................................................................... 58
3.3 Configuring STORM-CONTROL ...........................................................................................59
3.3.1 Default configuration.......................................................................................................... 59
3.3.2 Broadcast suppression configuration .................................................................................. 59
3.3.3 Multicast suppression configuration ...................................................................................60
3.3.4 DLF suppression configuration .......................................................................................... 60
3.3.5 Inhibition rate configuration ............................................................................................... 60
3.3.6 Display STORM-CONTROL configuration....................................................................... 61
3.4 Configuring STORM-CONSTRAIN .......................................................................................61
3.5 Configuring FLOW-CONTROL.............................................................................................. 64
3.5.1 Default configuration.......................................................................................................... 64
3.5.2 Set port receive and send side flow control ........................................................................64
3.5.3 Closed port flow control .....................................................................................................64
3.5.4 Display flow control information........................................................................................ 65
3 / 345
3.6 Configuring port bandwidth..................................................................................................... 65
3.6.1 Default configuration.......................................................................................................... 65
3.6.2 Set port send or receive bandwidth control......................................................................... 66
3.6.3 Cancellation of port transmit or receive bandwidth control................................................66
3.6.4 Bandwidth control of display port configuration................................................................66
3.7 Configuring TRUNK ............................................................................................................... 67
3.7.1 LACP protocol configuration.............................................................................................. 68
3.7.2 Configuration of TRUNK group.........................................................................................69
3.7.3 TRUNK group member port configuration ........................................................................69
3.7.4 TRUNK load balancing policy configuration..................................................................... 70
3.7.5 Display of TRUNK............................................................................................................. 71
3.8 Configure super large frame .................................................................................................... 71
3.8.1 Oversize introduction..........................................................................................................71
3.8.2 Oversize configuration........................................................................................................ 71
3.9 Configuring redundant ports ....................................................................................................71
3.9.1 Configuration of redundant ports........................................................................................72
3.9.2 Display of redundant ports..................................................................................................73
3.10 Configuring LLDP .................................................................................................................73
3.10.1 LLDP configuration .......................................................................................................... 74
3.10.2 LLDP display....................................................................................................................75
Chapter 4.......................................................................................................................................... 76
Port based MAC security ................................................................................................................. 76
4.1 brief introduction .....................................................................................................................76
4.2 MAC binding configuration..................................................................................................... 77
4.3 MAC filter configuration .........................................................................................................78
4.4 Port learning constraint configuration...................................................................................... 79
Chapter 5.......................................................................................................................................... 80
Port IP and MAC binding.................................................................................................................80
5.1 brief introduction .....................................................................................................................81
5.2 IP and MAC binding configurations ........................................................................................81
5.3 Configuration example.............................................................................................................82
5.4 Configuration misarrangement ................................................................................................83
Chapter 6.......................................................................................................................................... 84
VLAN configuration........................................................................................................................ 84
6.1 VLAN introduce ......................................................................................................................85
6.1.1 The benefits of VLAN ........................................................................................................85
6.1.2 VLAN ID ............................................................................................................................86
6.1.3 VLAN port member type.................................................................................................... 87
6.1.4 Default VLAN of port.........................................................................................................88
4 / 345
6.1.5 Port VLAN mode................................................................................................................ 88
6.1.6 VLAN relay ........................................................................................................................ 88
6.1.7 Data flow is forwarded in VLAN .......................................................................................89
6.2 VLAN configuration................................................................................................................ 91
6.2.1 Creating and deleting VLAN.............................................................................................. 91
6.2.2 Configuring port VLAN mode............................................................................................92
6.2.3 VLAN configuration of ACCESS mode.............................................................................93
6.2.4 VLAN configuration of TRUNK mode.............................................................................. 94
6.2.5 HYBRID mode VLAN configuration.................................................................................95
6.3VLAN configuration example ..................................................................................................98
6.3.1 VLAN based on PORT .......................................................................................................98
6.3.2 VLAN based on 802.1Q ................................................................................................... 100
6.4 MAC, IP subnet, protocol VLAN ..........................................................................................101
6.5 Voice VLAN .......................................................................................................................... 103
6.6 VLAN mapping .....................................................................................................................105
6.7 QinQ.......................................................................................................................................105
Chapter 7........................................................................................................................................ 108
QoS configuration.......................................................................................................................... 108
7.1 QoS introduce ........................................................................................................................ 109
7.1.1 QoS based on COS ........................................................................................................... 110
7.1.2QoS based on DSCP .......................................................................................................... 110
7.1.3 Policy based QOS............................................................................................................. 111
7.2 QoS configuration................................................................................................................ 111
7.2.1 Default configuration for QoS .......................................................................................... 111
7.2.2 Configuration scheduling mode........................................................................................ 112
7.2.3 Configuring queue weights............................................................................................... 113
7.2.4 Configure the mapping relationship between DSCP and QosProfile................................ 113
7.2.5 Configuring port QoS ....................................................................................................... 113
7.2.6 Configuring the port user priority (COS value) ................................................................ 116
7.4 Policy QoS configuration example ........................................................................................ 117
Chapter 8........................................................................................................................................ 119
MSTP configuration....................................................................................................................... 119
8.1 MSTP introduce ..................................................................................................................... 119
8.1.1 overview ........................................................................................................................... 119
8.1.2 Multiple spanning tree domains........................................................................................ 119
8.1.3 IST, CIST, and CST .......................................................................................................120
8.1.4 Intra domain operation................................................................................................... 121
8.1.5 Inter-domain operation .................................................................................................. 121
5 / 345
8.1.7 Boundary port ...................................................................................................................122
8.1.9 Port role ............................................................................................................................123
8.1.10 A brief introduction to 802.1D spanning tree.................................................................. 126
8.2 MSTP configuration............................................................................................................... 128
8.2.2 General configuration ....................................................................................................... 128
8.2.3 Domain configuration.......................................................................................................131
8.2.4 Instance configuration....................................................................................................... 132
8.2.6 PORTFAST related configuration.....................................................................................135
8.3 MSTP configuration example ................................................................................................ 137
Chapter 9........................................................................................................................................ 140
EAPS configuration ....................................................................................................................... 140
9.1 EAPS brief introduction......................................................................................................... 140
9.2 Basic concepts of EAPS......................................................................................................... 140
9.3 EAPS protocol introduction................................................................................................... 141
9.3.1Link-Down alarm...............................................................................................................142
9.3.2 Loop inspection ................................................................................................................142
9.3.3 Ring restoration ................................................................................................................142
9.3.4 Extreme compatible with EAPS .......................................................................................143
9.3.5 Multi EAPS Domain.........................................................................................................143
9.4EAPS configuration ................................................................................................................ 143
9.5 Restrictive conditions.............................................................................................................144
9.6 A brief introduction to the EAPS command........................................................................... 144
9.7 Single - loop configuration example...................................................................................... 146
9.8 Example of cross ring data forwarding configuration............................................................151
Chapter 10...................................................................................................................................... 155
ERPS configuration........................................................................................................................155
10.1 ERPS overview ....................................................................................................................155
10.2
Introduction of ERPS Technology .................................................................................155
10.2.1 ERPS ring ....................................................................................................................... 155
10.2.2 ERPS node...................................................................................................................... 155
10.2.3 Link and channel.............................................................................................................156
10.2.4 ERPS VLAN................................................................................................................... 156
10.3
ERPS Working principle................................................................................................ 157
10.3.1
Normal state ................................................................................................... 157
10.3.2
Link failures ................................................................................................... 158
10.3.3
Link recovery ................................................................................................. 158
10.4
Technical features of ERPS............................................................................................159
10.4.1
ERPS load balancing...................................................................................... 159
6 / 345
10.4.2
Good safety ....................................................................................................160
10.4.3
Multi-loop intersecting is supported...............................................................160
10.5
ERPS protocol command............................................................................................... 161
10.6
Typical use of ERPS ......................................................................................................163
10.6.1
Example of single ring ................................................................................... 163
10.6.2
Multi ring example......................................................................................... 166
10.6.3
Multi instance load balancing example ..........................................................172
Chapter 11 ......................................................................................................................................180
AAA configuration......................................................................................................................... 180
11.1 802.1x introduce...................................................................................................................182
11.1.1 802.1x device composition ............................................................................................. 183
11.1.2 Brief introduction of protocol package ...........................................................................184
11.1.3 Protocol flow interaction.................................................................................................185
11.1.4 802.1x port state.............................................................................................................. 187
11.2 RADIUS introduce............................................................................................................... 188
11.2.1 Brief introduction of protocol package ...........................................................................189
11.2.2 Protocol flow interaction.................................................................................................190
11.2.3 User authentication method ............................................................................................ 191
11.3 Configuring 802.1x ..............................................................................................................192
11.3.1 802.1x default configuration ........................................................................................... 193
11.3.2 Start and close 802.1x..................................................................................................... 194
11.3.3 Configuring 802.1x port status........................................................................................194
11.3.4 Configuring 802.1x port authentication .......................................................................... 195
11.3.5 Configuring 802.1x port guest VLAN ............................................................................195
11.3.6 Configuration re authentication mechanism ...................................................................196
11.3.7 Maximum number of configuration port access host...................................................... 197
11.3.8 Configure interval times and resend times......................................................................197
11.3.9 Configuration port is the transport port........................................................................... 198
11.3.10 Configuring the 802.1x client version number ............................................................. 198
11.3.11 Configure whether to check the client version number.................................................198
11.3.12 Configuration authentication method............................................................................ 199
11.3.13 Configure whether to check the client's timing packet .................................................199
11.3.14 Display 802.1x information .......................................................................................... 199
11.4 configuration RADIUS ........................................................................................................ 200
11.4.1 RADIUS Default configuration ......................................................................................200
11.4.2 Configuring the IP address of the authentication server ................................................. 201
11.4.3 Configuring shared keys ................................................................................................. 201
11.4.4 Start and close billing......................................................................................................201
7 / 345
11.4.5 Configuring RADIUS ports and attribute information ...................................................202
11.4.6 Configuring RADIUS roaming function......................................................................... 202
11.4.7 Display RADIUS information ........................................................................................203
11.5 Configuration example......................................................................................................... 203
Chapter 12...................................................................................................................................... 204
GMRPconfiguration....................................................................................................................... 204
12.1 GMRP introduce .................................................................................................................. 204
12.2 configuration GMRP............................................................................................................ 204
12.2.1 Open GMRP settings ...................................................................................................... 205
12.2.2 View GMRP information ................................................................................................205
12.3 Examples of typical GMRP configurations .........................................................................205
Chapter 13...................................................................................................................................... 207
SNOOPING configuration............................................................................................................. 207
13.1 IGMP SNOOPING introduce ..............................................................................................207
13.1.1 IGMP SNOOPING processing ....................................................................................... 208
13.1.2 Second layer dynamic multicast ..................................................................................... 209
13.1.3 Join a group..................................................................................................................... 209
13.1.4 Leave a group ................................................................................................................. 211
13.2
IGMP SNOOPING configuration .................................................................................. 212
13.2.1 IGMP SNOOPING default configuration....................................................................... 212
13.2.2 Open and close IGMP SNOOPING................................................................................ 213
13.2.3 Configuration survival time ............................................................................................ 213
13.2.4 configuration fast-leave ............................................................................................... 214
13.2.5 configuration MROUTER ........................................................................................... 214
13.2.6 display information......................................................................................................... 214
13.3
The IGMP SNOOPING configuration example ............................................................215
Chapter 14...................................................................................................................................... 216
MVR configuration........................................................................................................................ 216
14.1 MVR profile......................................................................................................................... 217
14.2 configuration MVR.............................................................................................................. 217
14.3 MVR configuration example ...............................................................................................218
Chapter 15...................................................................................................................................... 220
DHCP SNOOPING configuration .................................................................................................220
15.1 DHCP SNOOPING introduce.............................................................................................. 221
15.1.1 DHCP SNOOPING processing....................................................................................... 221
15.1.2 DHCP SNOOPING binding table................................................................................... 222
15.1.3 DHCP SNOOPING specifies the physical port of the linked server .............................. 223
15.1.4 DHCP SNOOPING binding list is uploaded and downloaded .......................................223
15.2
DHCP SNOOPING configuration ................................................................................. 224
15.2.1 DHCP SNOOPING default configuration ...................................................................... 224
8 / 345
15.2.2 Global open and close DHCP SNOOPING .................................................................... 224
15.2.3 The interface opens and closes DHCP SNOOPING....................................................... 225
15.2.4 DHCP SNOOPING binding list is uploaded and downloaded .......................................225
15.2.5 display information......................................................................................................... 226
15.3
DHCP SNOOPING configuration example ...................................................................226
15.3.1
configuration .................................................................................................. 226
15.4
DHCP SNOOPING configuration error......................................................................... 228
Chapter 16...................................................................................................................................... 229
MLD SNOOPING configuration ...................................................................................................229
16.1 MLD SNOOPING introduce ...............................................................................................230
16.1.1 MLD SNOOPING processing ........................................................................................230
16.1.2 Second layer dynamic multicast ..................................................................................... 231
16.1.3 Join a group..................................................................................................................... 232
16.1.4 Leave a group ................................................................................................................. 233
16.2
MLD SNOOPING configuration ................................................................................ 234
16.2.1 MLD SNOOPING default configuration........................................................................ 234
16.2.2 Open and close MLD SNOOPING................................................................................. 235
16.2.3 Configuration survival time ............................................................................................ 235
16.2.4 configuration fast-leave ............................................................................................ 236
16.2.5 configuration MROUTER ........................................................................................... 236
16.2.6 display information......................................................................................................... 236
16.3
MLD SNOOPING configuration example................................................................. 237
Chapter 17...................................................................................................................................... 239
ACL configuration .........................................................................................................................239
17.1 Introduction of ACL resource library................................................................................... 239
17.2 ACL filtering introduction....................................................................................................241
17.3 ACL repository configuration .............................................................................................. 243
17.4 ACL based on time interval.................................................................................................. 247
17.5 ACL filter configuration....................................................................................................... 249
17.6 ACL configuration example................................................................................................. 250
17.7 ACL configuration debugging..............................................................................................251
Chapter 18...................................................................................................................................... 252
TCP/IP basic configuration ............................................................................................................ 252
18.1 Configuring the VLAN interface ......................................................................................... 253
18.2 Configuring ARP .................................................................................................................255
18.2.1 Configuring static ARP...................................................................................................256
18.2.2 View ARP information.................................................................................................... 257
18.3 Configuring static routing ....................................................................................................258
18.4 TCP/IP basic configuration example.................................................................................... 261
9 / 345
18.4.1 Three layer interface .......................................................................................................261
18.4.2 Static routing...................................................................................................................262
18.4.3 ARP................................................................................................................................. 262
Chapter 19...................................................................................................................................... 264
SNMP configuration ...................................................................................................................... 264
19.1 SNMP introduce................................................................................................................... 264
19.2 SNMP configuration ............................................................................................................ 265
19.3 SNMP configuration example.............................................................................................. 268
Chapter 20...................................................................................................................................... 270
RMON configuration ..................................................................................................................... 270
20.1 RMON introduce .................................................................................................................270
20.2 RMON configuration........................................................................................................... 271
20.3 RMON configuration example.............................................................................................273
Chapter 21...................................................................................................................................... 274
Cluster configuration......................................................................................................................274
21.1
Introduction of cluster management ..............................................................................275
21.1.1 Cluster definition ............................................................................................................275
21.1.2 Cluster role......................................................................................................................276
21.1.3 NDP profile..................................................................................................................... 277
21.1.4 NTDP profile .................................................................................................................. 278
21.1.5 Cluster management maintenance .................................................................................. 279
21.1.6 Managing VLAN ............................................................................................................281
21.2
Brief introduction of cluster configuration ....................................................................282
21.3
Configuration management equipment .......................................................................... 283
21.3.1
Enable system and port NDP capabilities.......................................................283
21.3.2
Configuring NDP parameters......................................................................... 283
21.3.3
Enable system and interface NTDP capabilities............................................. 284
21.3.4
Configuring NTDP parameters.......................................................................284
21.3.5
Configure manual collection of NTDP information.......................................285
21.3.6
Enable cluster function................................................................................... 285
21.3.7
Build clusters.................................................................................................. 285
21.3.8
Configure the cluster's internal members to interact ......................................288
21.3.9
Configuring cluster member management ..................................................... 288
21.4
Configuration member device........................................................................................289
21.4.1
Enable system and port NDP capabilities.......................................................289
21.4.2
Enable system and port NTDP capabilities ....................................................289
21.4.3
Configure manual collection of NTDP information.......................................289
21.4.4
Enable cluster function................................................................................... 289
21.5
Configuring access cluster members..............................................................................289
10 / 345
21.6
Cluster management display and maintenance ..............................................................290
21.7
Example of cluster management typical configuration.................................................. 291
Chapter 22...................................................................................................................................... 294
System log configuration ...............................................................................................................294
22.1 System log introduction ....................................................................................................... 294
22.1.1 Format of log information............................................................................................... 295
22.1.2 Log storage ..................................................................................................................... 296
22.1.3 Log display ..................................................................................................................... 297
22.1.4 Debugging tools.............................................................................................................. 298
22.2 System log configuration ..................................................................................................... 298
22.2.1 Configuring terminal real time display switch................................................................ 298
22.2.2 View log information ...................................................................................................... 299
22.2.3 Configure debugging switch...........................................................................................300
22.2.4 View debugging information .......................................................................................... 302
22.3 configuration SYSLOG .......................................................................................................303
22.3.1 SYSLOG introduce......................................................................................................... 303
22.3.2 SYSLOG configuration .................................................................................................. 304
22.3.3 SYSLOG configuration example.................................................................................... 305
Chapter 23...................................................................................................................................... 306
Port loop......................................................................................................................................... 306
23.1 Profile...................................................................................................................................307
23.2 Protocol principle................................................................................................................. 307
23.2.1 Detection process............................................................................................................ 307
23.2.2 Recovery mode ............................................................................................................... 307
23.2.3 Protocol security ............................................................................................................. 308
23.3 Configuration introduction................................................................................................... 308
23.3.1 Global configuration.......................................................................................................309
23.3.2 Interface configuration.................................................................................................... 309
23.3.3 Display configuration .....................................................................................................309
Chapter 24...................................................................................................................................... 310
SNTP configuration .......................................................................................................................310
24.1 SNTP introduce.................................................................................................................... 311
24.2
configuration SNTP ....................................................................................................... 311
24.2.1 Default SNTP settings..................................................................................................... 311
24.2.2 Configuring SNTP Server address..................................................................................312
24.2.3 Configure the SNTP sync clock interval......................................................................... 313
24.2.4 Configuring the local time zone......................................................................................313
24.3
SNTP information display..............................................................................................313
Chapter 25...................................................................................................................................... 314
11 / 345
OAM configuration........................................................................................................................ 314
25.1 OAM introduce ....................................................................................................................314
25.1.1 Link performance monitoring......................................................................................... 315
25.1.2 Remote fault detection.................................................................................................... 315
25.1.3 Distal loopback ............................................................................................................... 315
25.2 configuration OAM.............................................................................................................. 316
25.3 Typical configuration examples of OAM.............................................................................317
Chapter 26...................................................................................................................................... 318
CFM configuration......................................................................................................................... 318
26.1 CFM profile .........................................................................................................................319
26.1.1 Basic concepts of CFM................................................................................................... 319
26.1.2 Various functions of CFM............................................................................................... 322
26.2 Brief introduction of CFM configuration task .....................................................................323
26.3
CFM base configuration ................................................................................................ 324
26.3.1 Enable CFM function...................................................................................................... 324
26.3.2 Configuration service instance........................................................................................ 324
26.3.3 Configuration maintenance endpoint.............................................................................. 324
26.3.4 Configuration maintenance intermediate point............................................................ 325
26.4
Configure various functions of CFM ............................................................................. 326
26.4.1
Configuration continuity detection function .................................................. 326
26.4.2
Configuration loopback function....................................................................327
26.4.3
Configuring link tracking function................................................................. 327
26.5
CFM display and maintenance.......................................................................................328
26.6
Typical configuration examples ..................................................................................... 329
Chapter 27...................................................................................................................................... 332
IPv6 basic configuration ................................................................................................................ 332
27.1 IPv6 profile .......................................................................................................................... 333
27.1.1 The characteristics of IPv6 protocol ...............................................................................333
27.1.2 IPv6 address introduction ............................................................................................... 334
27.1.3 IPv6 neighbor discovery protocol................................................................................336
27.1.4 IPv6 PMTU discovery .................................................................................................... 338
27.1.5 Protocol specification ..................................................................................................... 339
27.2 IPv6 basic configuration task profile ................................................................................... 339
27.3 Configure IPv6 basic functionality ...................................................................................... 340
27.3.1Configuring IPv6 unicast address .................................................................................... 340
27.4 Configuring IPv6 neighbor discovery protocol....................................................................340
27.4.1 Configuring the parameters of the RA message..............................................................340
27.4.2 The number of sending neighbor request messages when configuring duplicate address
detection..................................................................................................................................... 343
12 / 345
27.5 IPv6 static routing configuration.......................................................................................... 343
27.6 IPv6 display and maintenance.............................................................................................. 343
13 / 345
Chapter 1
Introduction of CLI command line
This chapter gives a detailed description of the WI-TEK Managed Switch CLI command line
interface The main contents are as follows
Access switch CLI
CLI mode introduction
Introduction to command syntax
Command line shortcuts
History command
14 / 345
1.1 Access switch CLI
The CLI command line interface of the switch provides the interface for the user to manage
the switch The user can access the CLI command line interface of the switch through the
Console port and the Telnet two terminals The following are introduced separately
The main contents include
Users access CLI through Console port
Users access CLI through TELNET
1.1.1 Users access CLI through Console port
Figure 1 - Console cable
Cisco part number 72-3383-01 (Console Cable)
The operating procedure is as follows
First step Connect the serial port of PC with the Console port of the switch by configuring
the cable The following diagram
15 / 345
Second steps Start the terminal emulation program on the PC machine (such as the super
terminal of Windows) Configuring communication parameters of terminal emulation program
The communication parameters of the terminal are configured as follows
Baud rate 38400
Data bits 8
Parity check nothing
Stop bit 1
Data stream control nothing
The communication parameters configuration of the super terminal is shown below
16 / 345
Third steps Start switch After the Switch is started, the CLI prompt will be displayed on
the terminal (the default is Switch >) Users can enter commands at this prompt This allows the
user to access the CLI of the switch
1.1.2
Users access CLI through TELNET
The user can access the switch through the port of the switch
The IP address of the port of the switch defaults to 192.168.0.1 The steps to access the
switch through the port are as follows
First step Connect Ethernet port and switch port of PC through Ethernet cable The
following diagram
Second steps Set the IP address of the Ethernet port of the PC machine The IP address
must be in the 192.168.0.0/24 segment (such as IP address 192.168.0.100) Judging the
connectivity between PC and switch through Ping 192.168.0.1
Third steps If the PC is connected to the switch Then Telnet 192.168.0.1 enters the Telnet
terminal interface The following diagram
17 / 345
Fourth steps If the system does not have a password, the Telnet interface goes directly to
the CLI, and the CLI prompt appears (default is Switch >). If the system sets the password, you
need to enter the password on the Telnet interface to enter the CLI.
Two points should be paid special attention to
The IP address of the switch port is based on the VLAN three layer interface Before
accessing the switch You must set the IP address of a VLAN interface The default IP
address of VLAN1 is 192.168.0.1 It can be used directly The IP address of the
VLAN interface can be configured through the Console port
The user accesses the switch through the port You can connect PC and ports directly
through Ethernet cable You can also connect through a network You just need PC to
communicate with one of the VLAN switches
1.2 CLI mode introduction
The main contents include
The role of CLI model
Identification of CLI mode
Classification of CLI patterns
18 / 345
1.2.1 The role of CLI model
There are two main functions of the CLI model
Convenient classification of users Prevent unauthorized users from using CLI
illegally
Users can be divided into two levels That's the two category Common users and
privileged users
Ordinary users can only see some of the running state of the switch Use only display
commands
Privileged users can not only view the running state of the switch, but also maintain and
configure the switch to change the behavior of the switch
Convenient for users to configure switches
Switches have a lot of configuration, and if you put all the configuration in one mode, it's
very inconvenient for the user to use. To this end, the establishment of multiple modes on the CLI,
the similar commands placed in a mode, user-friendly understanding and use. For example, put the
commands associated with VLAN in the VLAN configuration mode.Put the interface related
commands in the interface configuration mode
1.2.2 Identification of CLI mode
The CLI prompt is the identity of the CLI mode When the user is using CLI By looking at
the CLI prompt, you know the CLI model that you're currently in
The CLI prompt consists of two parts Part identifies the host Another part identifies
patterns
The host part of the CLI prompt uses the hostname of the system The host name of the
system is configurable the default is Switch So the CLI prompt defaults to Switch the CLI
19 / 345
descriptor mentioned later generally uses the default host name
The schema section in the CLI prompt is not configurable each pattern has its own
corresponding pattern string some pattern strings are immutable some pattern strings are
mutable If the pattern string of the VLAN configuration pattern is fixed, the pattern string of the
interface configuration pattern is variable
For example
CLI prompt Switch# identifies privileged mode Switch identifies the host, and #
identification model
The CLI prompt (config-ge1/1)# identifies the interface configuration mode and is
configured with ge1/1 port Switch identifies the host, and (config-ge1/1) # identification
model
The CLI prompt Switch(config-vlan2)# identifies the interface configuration mode And
configure the vlan2 interface Switch identifies the host, and (config-vlan2) # identification
model
1.2.3 Classification of CLI patterns
The CLI model is divided into four categories: general mode, privileged mode, global
configuration mode and configuration sub pattern, while the configuration sub model is composed
of many CLI modes.
Ordinary users can only access common patterns, and privileged users can access all of the
CLI patterns
Console and Telnet terminals first enter the common mode, enter the enable command in the
normal mode, and successfully verify the password, then enter privileged mode On the Telnet
terminal, ordinary users can only stay in the ordinary mode and cannot enter privileged mode
Enter configure terminal in privileged mode CLI mode enters global configuration mode In
global configuration mode, you can enter the relevant commands and enter each configuration sub
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244
  • Page 245 245
  • Page 246 246
  • Page 247 247
  • Page 248 248
  • Page 249 249
  • Page 250 250
  • Page 251 251
  • Page 252 252
  • Page 253 253
  • Page 254 254
  • Page 255 255
  • Page 256 256
  • Page 257 257
  • Page 258 258
  • Page 259 259
  • Page 260 260
  • Page 261 261
  • Page 262 262
  • Page 263 263
  • Page 264 264
  • Page 265 265
  • Page 266 266
  • Page 267 267
  • Page 268 268
  • Page 269 269
  • Page 270 270
  • Page 271 271
  • Page 272 272
  • Page 273 273
  • Page 274 274
  • Page 275 275
  • Page 276 276
  • Page 277 277
  • Page 278 278
  • Page 279 279
  • Page 280 280
  • Page 281 281
  • Page 282 282
  • Page 283 283
  • Page 284 284
  • Page 285 285
  • Page 286 286
  • Page 287 287
  • Page 288 288
  • Page 289 289
  • Page 290 290
  • Page 291 291
  • Page 292 292
  • Page 293 293
  • Page 294 294
  • Page 295 295
  • Page 296 296
  • Page 297 297
  • Page 298 298
  • Page 299 299
  • Page 300 300
  • Page 301 301
  • Page 302 302
  • Page 303 303
  • Page 304 304
  • Page 305 305
  • Page 306 306
  • Page 307 307
  • Page 308 308
  • Page 309 309
  • Page 310 310
  • Page 311 311
  • Page 312 312
  • Page 313 313
  • Page 314 314
  • Page 315 315
  • Page 316 316
  • Page 317 317
  • Page 318 318
  • Page 319 319
  • Page 320 320
  • Page 321 321
  • Page 322 322
  • Page 323 323
  • Page 324 324
  • Page 325 325
  • Page 326 326
  • Page 327 327
  • Page 328 328
  • Page 329 329
  • Page 330 330
  • Page 331 331
  • Page 332 332
  • Page 333 333
  • Page 334 334
  • Page 335 335
  • Page 336 336
  • Page 337 337
  • Page 338 338
  • Page 339 339
  • Page 340 340
  • Page 341 341
  • Page 342 342
  • Page 343 343
  • Page 344 344
  • Page 345 345

Wi-Tek Wi-Tek WI-PMS310GF-Alien Gigabit L2 Managed PoE Switch ユーザーマニュアル

カテゴリー
ネットワーキング
タイプ
ユーザーマニュアル
このマニュアルも適しています