Wi-Tek Wi-Tek WI-PMS310GF-Alien Gigabit L2 Managed PoE Switch, WI-PMS310GF-Alien Gigabit L2 Managed PoE Switch ユーザーマニュアル

  • WI-TEKギガビットマネージドスイッチのCLIコマンドマニュアルに関するご質問にお答えします。このマニュアルには、システム設定、ポート設定、セキュリティ設定、トラブルシューティングなど、スイッチの機能に関する詳細な情報が記載されています。お気軽にご質問ください!
  • スイッチへのCLIアクセス方法は?
    ユーザーアカウントの管理方法は?
    ポートの速度設定はどのように行いますか?
    MACアドレスフィルタリング機能はありますか?
WI-TEK Gigabit Managed Switch
CLI Command manual
1 / 345
Catalog
WI-TEK Gigabit Managed Switch CLI Command manual............................................................... 1
Catalog ............................................................................................................................................... 1
Chapter 1..........................................................................................................................................13
Introduction of CLI command line .................................................................................................. 13
1.1 Access switch CLI....................................................................................................................14
1.1.1 Users access CLI through Console port.............................................................................. 14
1.1.2 Users access CLI through TELNET .............................................................................. 16
1.2 CLI mode introduction............................................................................................................. 17
1.2.1 The role of CLI model ........................................................................................................18
1.2.2 Identification of CLI mode .................................................................................................18
1.2.3 Classification of CLI patterns ............................................................................................. 19
1.3 Introduction to command syntax..............................................................................................21
1.3.1 Command composition....................................................................................................... 22
1.3.2 Parameter type .................................................................................................................... 22
1.3.3 Command syntax rules........................................................................................................22
1.3.4 Command abbreviation....................................................................................................... 24
1.3.5 Grammar help ..................................................................................................................... 24
1.3.6 Command line error message ............................................................................................. 25
1.4 Command line shortcuts ..........................................................................................................26
1.4.1 Line edit shortcut key ......................................................................................................... 26
1.4.2 Display command shortcut key...........................................................................................27
1.5 History command.....................................................................................................................27
Chapter 2..........................................................................................................................................28
System management configuration.................................................................................................. 28
2.1 System security configuration.................................................................................................. 28
2.1.1 Multi-user management control.......................................................................................... 28
2.1.2 TACACS+ authentication authorization .............................................................................30
2.1.3 Anonymous user password control .....................................................................................32
2.1.4 Enable password control.....................................................................................................34
2.1.5 TELNET service control..................................................................................................... 35
2.1.6 SNMP service control......................................................................................................... 36
2.1.7 HTTP service control..........................................................................................................37
2.1.8 SSH service control ......................................................................................................... 38
2.2 System maintenance and debugging........................................................................................ 38
2.2.1 Configure the host name of the system...............................................................................39
2 / 345
2.2.2 Configuring the system clock .............................................................................................39
2.2.3 Configure terminal timeout attributes.................................................................................40
2.2.4 System reset........................................................................................................................ 41
2.2.5 View system information .................................................................................................... 41
2.2.6 Network connectivity debugging........................................................................................ 42
2.2.7 Detecting line distance........................................................................................................42
2.2.8 Traceroute debugging ......................................................................................................... 42
2.2.9 Telnet client.........................................................................................................................43
2.2.10 UDLD configuration.........................................................................................................43
2.3 Configuration file management ...............................................................................................44
2.3.1 View configuration information.......................................................................................... 46
2.3.2 Save configuration.............................................................................................................. 46
2.3.3 Delete configuration file ..................................................................................................... 47
2.3.4 Download configuration files ............................................................................................. 47
2.4 Software version upgrade ........................................................................................................50
2.4.1 Software version upgrade commands ................................................................................. 51
2.4.2 Software upgrade process ................................................................................................... 51
Chapter 3.......................................................................................................................................... 55
Port Configuration............................................................................................................................55
3.1 Common configuration for ports.............................................................................................. 56
3.1.1 Port rate configuration ........................................................................................................ 56
3.1.2 Display port information.....................................................................................................56
3.2 Configuration MIRROR ..........................................................................................................57
3.2.1 Configuration of the MIRROR listen on port and is listening on port................................57
3.2.2 Display the configuration of MIRROR............................................................................... 58
3.3 Configuring STORM-CONTROL ...........................................................................................59
3.3.1 Default configuration.......................................................................................................... 59
3.3.2 Broadcast suppression configuration .................................................................................. 59
3.3.3 Multicast suppression configuration ...................................................................................60
3.3.4 DLF suppression configuration .......................................................................................... 60
3.3.5 Inhibition rate configuration ............................................................................................... 60
3.3.6 Display STORM-CONTROL configuration....................................................................... 61
3.4 Configuring STORM-CONSTRAIN .......................................................................................61
3.5 Configuring FLOW-CONTROL.............................................................................................. 64
3.5.1 Default configuration.......................................................................................................... 64
3.5.2 Set port receive and send side flow control ........................................................................64
3.5.3 Closed port flow control .....................................................................................................64
3.5.4 Display flow control information........................................................................................ 65
3 / 345
3.6 Configuring port bandwidth..................................................................................................... 65
3.6.1 Default configuration.......................................................................................................... 65
3.6.2 Set port send or receive bandwidth control......................................................................... 66
3.6.3 Cancellation of port transmit or receive bandwidth control................................................66
3.6.4 Bandwidth control of display port configuration................................................................66
3.7 Configuring TRUNK ............................................................................................................... 67
3.7.1 LACP protocol configuration.............................................................................................. 68
3.7.2 Configuration of TRUNK group.........................................................................................69
3.7.3 TRUNK group member port configuration ........................................................................69
3.7.4 TRUNK load balancing policy configuration..................................................................... 70
3.7.5 Display of TRUNK............................................................................................................. 71
3.8 Configure super large frame .................................................................................................... 71
3.8.1 Oversize introduction..........................................................................................................71
3.8.2 Oversize configuration........................................................................................................ 71
3.9 Configuring redundant ports ....................................................................................................71
3.9.1 Configuration of redundant ports........................................................................................72
3.9.2 Display of redundant ports..................................................................................................73
3.10 Configuring LLDP .................................................................................................................73
3.10.1 LLDP configuration .......................................................................................................... 74
3.10.2 LLDP display....................................................................................................................75
Chapter 4.......................................................................................................................................... 76
Port based MAC security ................................................................................................................. 76
4.1 brief introduction .....................................................................................................................76
4.2 MAC binding configuration..................................................................................................... 77
4.3 MAC filter configuration .........................................................................................................78
4.4 Port learning constraint configuration...................................................................................... 79
Chapter 5.......................................................................................................................................... 80
Port IP and MAC binding.................................................................................................................80
5.1 brief introduction .....................................................................................................................81
5.2 IP and MAC binding configurations ........................................................................................81
5.3 Configuration example.............................................................................................................82
5.4 Configuration misarrangement ................................................................................................83
Chapter 6.......................................................................................................................................... 84
VLAN configuration........................................................................................................................ 84
6.1 VLAN introduce ......................................................................................................................85
6.1.1 The benefits of VLAN ........................................................................................................85
6.1.2 VLAN ID ............................................................................................................................86
6.1.3 VLAN port member type.................................................................................................... 87
6.1.4 Default VLAN of port.........................................................................................................88
4 / 345
6.1.5 Port VLAN mode................................................................................................................ 88
6.1.6 VLAN relay ........................................................................................................................ 88
6.1.7 Data flow is forwarded in VLAN .......................................................................................89
6.2 VLAN configuration................................................................................................................ 91
6.2.1 Creating and deleting VLAN.............................................................................................. 91
6.2.2 Configuring port VLAN mode............................................................................................92
6.2.3 VLAN configuration of ACCESS mode.............................................................................93
6.2.4 VLAN configuration of TRUNK mode.............................................................................. 94
6.2.5 HYBRID mode VLAN configuration.................................................................................95
6.3VLAN configuration example ..................................................................................................98
6.3.1 VLAN based on PORT .......................................................................................................98
6.3.2 VLAN based on 802.1Q ................................................................................................... 100
6.4 MAC, IP subnet, protocol VLAN ..........................................................................................101
6.5 Voice VLAN .......................................................................................................................... 103
6.6 VLAN mapping .....................................................................................................................105
6.7 QinQ.......................................................................................................................................105
Chapter 7........................................................................................................................................ 108
QoS configuration.......................................................................................................................... 108
7.1 QoS introduce ........................................................................................................................ 109
7.1.1 QoS based on COS ........................................................................................................... 110
7.1.2QoS based on DSCP .......................................................................................................... 110
7.1.3 Policy based QOS............................................................................................................. 111
7.2 QoS configuration................................................................................................................ 111
7.2.1 Default configuration for QoS .......................................................................................... 111
7.2.2 Configuration scheduling mode........................................................................................ 112
7.2.3 Configuring queue weights............................................................................................... 113
7.2.4 Configure the mapping relationship between DSCP and QosProfile................................ 113
7.2.5 Configuring port QoS ....................................................................................................... 113
7.2.6 Configuring the port user priority (COS value) ................................................................ 116
7.4 Policy QoS configuration example ........................................................................................ 117
Chapter 8........................................................................................................................................ 119
MSTP configuration....................................................................................................................... 119
8.1 MSTP introduce ..................................................................................................................... 119
8.1.1 overview ........................................................................................................................... 119
8.1.2 Multiple spanning tree domains........................................................................................ 119
8.1.3 IST, CIST, and CST .......................................................................................................120
8.1.4 Intra domain operation................................................................................................... 121
8.1.5 Inter-domain operation .................................................................................................. 121
5 / 345
8.1.7 Boundary port ...................................................................................................................122
8.1.9 Port role ............................................................................................................................123
8.1.10 A brief introduction to 802.1D spanning tree.................................................................. 126
8.2 MSTP configuration............................................................................................................... 128
8.2.2 General configuration ....................................................................................................... 128
8.2.3 Domain configuration.......................................................................................................131
8.2.4 Instance configuration....................................................................................................... 132
8.2.6 PORTFAST related configuration.....................................................................................135
8.3 MSTP configuration example ................................................................................................ 137
Chapter 9........................................................................................................................................ 140
EAPS configuration ....................................................................................................................... 140
9.1 EAPS brief introduction......................................................................................................... 140
9.2 Basic concepts of EAPS......................................................................................................... 140
9.3 EAPS protocol introduction................................................................................................... 141
9.3.1Link-Down alarm...............................................................................................................142
9.3.2 Loop inspection ................................................................................................................142
9.3.3 Ring restoration ................................................................................................................142
9.3.4 Extreme compatible with EAPS .......................................................................................143
9.3.5 Multi EAPS Domain.........................................................................................................143
9.4EAPS configuration ................................................................................................................ 143
9.5 Restrictive conditions.............................................................................................................144
9.6 A brief introduction to the EAPS command........................................................................... 144
9.7 Single - loop configuration example...................................................................................... 146
9.8 Example of cross ring data forwarding configuration............................................................151
Chapter 10...................................................................................................................................... 155
ERPS configuration........................................................................................................................155
10.1 ERPS overview ....................................................................................................................155
10.2
Introduction of ERPS Technology .................................................................................155
10.2.1 ERPS ring ....................................................................................................................... 155
10.2.2 ERPS node...................................................................................................................... 155
10.2.3 Link and channel.............................................................................................................156
10.2.4 ERPS VLAN................................................................................................................... 156
10.3
ERPS Working principle................................................................................................ 157
10.3.1
Normal state ................................................................................................... 157
10.3.2
Link failures ................................................................................................... 158
10.3.3
Link recovery ................................................................................................. 158
10.4
Technical features of ERPS............................................................................................159
10.4.1
ERPS load balancing...................................................................................... 159
6 / 345
10.4.2
Good safety ....................................................................................................160
10.4.3
Multi-loop intersecting is supported...............................................................160
10.5
ERPS protocol command............................................................................................... 161
10.6
Typical use of ERPS ......................................................................................................163
10.6.1
Example of single ring ................................................................................... 163
10.6.2
Multi ring example......................................................................................... 166
10.6.3
Multi instance load balancing example ..........................................................172
Chapter 11 ......................................................................................................................................180
AAA configuration......................................................................................................................... 180
11.1 802.1x introduce...................................................................................................................182
11.1.1 802.1x device composition ............................................................................................. 183
11.1.2 Brief introduction of protocol package ...........................................................................184
11.1.3 Protocol flow interaction.................................................................................................185
11.1.4 802.1x port state.............................................................................................................. 187
11.2 RADIUS introduce............................................................................................................... 188
11.2.1 Brief introduction of protocol package ...........................................................................189
11.2.2 Protocol flow interaction.................................................................................................190
11.2.3 User authentication method ............................................................................................ 191
11.3 Configuring 802.1x ..............................................................................................................192
11.3.1 802.1x default configuration ........................................................................................... 193
11.3.2 Start and close 802.1x..................................................................................................... 194
11.3.3 Configuring 802.1x port status........................................................................................194
11.3.4 Configuring 802.1x port authentication .......................................................................... 195
11.3.5 Configuring 802.1x port guest VLAN ............................................................................195
11.3.6 Configuration re authentication mechanism ...................................................................196
11.3.7 Maximum number of configuration port access host...................................................... 197
11.3.8 Configure interval times and resend times......................................................................197
11.3.9 Configuration port is the transport port........................................................................... 198
11.3.10 Configuring the 802.1x client version number ............................................................. 198
11.3.11 Configure whether to check the client version number.................................................198
11.3.12 Configuration authentication method............................................................................ 199
11.3.13 Configure whether to check the client's timing packet .................................................199
11.3.14 Display 802.1x information .......................................................................................... 199
11.4 configuration RADIUS ........................................................................................................ 200
11.4.1 RADIUS Default configuration ......................................................................................200
11.4.2 Configuring the IP address of the authentication server ................................................. 201
11.4.3 Configuring shared keys ................................................................................................. 201
11.4.4 Start and close billing......................................................................................................201
7 / 345
11.4.5 Configuring RADIUS ports and attribute information ...................................................202
11.4.6 Configuring RADIUS roaming function......................................................................... 202
11.4.7 Display RADIUS information ........................................................................................203
11.5 Configuration example......................................................................................................... 203
Chapter 12...................................................................................................................................... 204
GMRPconfiguration....................................................................................................................... 204
12.1 GMRP introduce .................................................................................................................. 204
12.2 configuration GMRP............................................................................................................ 204
12.2.1 Open GMRP settings ...................................................................................................... 205
12.2.2 View GMRP information ................................................................................................205
12.3 Examples of typical GMRP configurations .........................................................................205
Chapter 13...................................................................................................................................... 207
SNOOPING configuration............................................................................................................. 207
13.1 IGMP SNOOPING introduce ..............................................................................................207
13.1.1 IGMP SNOOPING processing ....................................................................................... 208
13.1.2 Second layer dynamic multicast ..................................................................................... 209
13.1.3 Join a group..................................................................................................................... 209
13.1.4 Leave a group ................................................................................................................. 211
13.2
IGMP SNOOPING configuration .................................................................................. 212
13.2.1 IGMP SNOOPING default configuration....................................................................... 212
13.2.2 Open and close IGMP SNOOPING................................................................................ 213
13.2.3 Configuration survival time ............................................................................................ 213
13.2.4 configuration fast-leave ............................................................................................... 214
13.2.5 configuration MROUTER ........................................................................................... 214
13.2.6 display information......................................................................................................... 214
13.3
The IGMP SNOOPING configuration example ............................................................215
Chapter 14...................................................................................................................................... 216
MVR configuration........................................................................................................................ 216
14.1 MVR profile......................................................................................................................... 217
14.2 configuration MVR.............................................................................................................. 217
14.3 MVR configuration example ...............................................................................................218
Chapter 15...................................................................................................................................... 220
DHCP SNOOPING configuration .................................................................................................220
15.1 DHCP SNOOPING introduce.............................................................................................. 221
15.1.1 DHCP SNOOPING processing....................................................................................... 221
15.1.2 DHCP SNOOPING binding table................................................................................... 222
15.1.3 DHCP SNOOPING specifies the physical port of the linked server .............................. 223
15.1.4 DHCP SNOOPING binding list is uploaded and downloaded .......................................223
15.2
DHCP SNOOPING configuration ................................................................................. 224
15.2.1 DHCP SNOOPING default configuration ...................................................................... 224
8 / 345
15.2.2 Global open and close DHCP SNOOPING .................................................................... 224
15.2.3 The interface opens and closes DHCP SNOOPING....................................................... 225
15.2.4 DHCP SNOOPING binding list is uploaded and downloaded .......................................225
15.2.5 display information......................................................................................................... 226
15.3
DHCP SNOOPING configuration example ...................................................................226
15.3.1
configuration .................................................................................................. 226
15.4
DHCP SNOOPING configuration error......................................................................... 228
Chapter 16...................................................................................................................................... 229
MLD SNOOPING configuration ...................................................................................................229
16.1 MLD SNOOPING introduce ...............................................................................................230
16.1.1 MLD SNOOPING processing ........................................................................................230
16.1.2 Second layer dynamic multicast ..................................................................................... 231
16.1.3 Join a group..................................................................................................................... 232
16.1.4 Leave a group ................................................................................................................. 233
16.2
MLD SNOOPING configuration ................................................................................ 234
16.2.1 MLD SNOOPING default configuration........................................................................ 234
16.2.2 Open and close MLD SNOOPING................................................................................. 235
16.2.3 Configuration survival time ............................................................................................ 235
16.2.4 configuration fast-leave ............................................................................................ 236
16.2.5 configuration MROUTER ........................................................................................... 236
16.2.6 display information......................................................................................................... 236
16.3
MLD SNOOPING configuration example................................................................. 237
Chapter 17...................................................................................................................................... 239
ACL configuration .........................................................................................................................239
17.1 Introduction of ACL resource library................................................................................... 239
17.2 ACL filtering introduction....................................................................................................241
17.3 ACL repository configuration .............................................................................................. 243
17.4 ACL based on time interval.................................................................................................. 247
17.5 ACL filter configuration....................................................................................................... 249
17.6 ACL configuration example................................................................................................. 250
17.7 ACL configuration debugging..............................................................................................251
Chapter 18...................................................................................................................................... 252
TCP/IP basic configuration ............................................................................................................ 252
18.1 Configuring the VLAN interface ......................................................................................... 253
18.2 Configuring ARP .................................................................................................................255
18.2.1 Configuring static ARP...................................................................................................256
18.2.2 View ARP information.................................................................................................... 257
18.3 Configuring static routing ....................................................................................................258
18.4 TCP/IP basic configuration example.................................................................................... 261
9 / 345
18.4.1 Three layer interface .......................................................................................................261
18.4.2 Static routing...................................................................................................................262
18.4.3 ARP................................................................................................................................. 262
Chapter 19...................................................................................................................................... 264
SNMP configuration ...................................................................................................................... 264
19.1 SNMP introduce................................................................................................................... 264
19.2 SNMP configuration ............................................................................................................ 265
19.3 SNMP configuration example.............................................................................................. 268
Chapter 20...................................................................................................................................... 270
RMON configuration ..................................................................................................................... 270
20.1 RMON introduce .................................................................................................................270
20.2 RMON configuration........................................................................................................... 271
20.3 RMON configuration example.............................................................................................273
Chapter 21...................................................................................................................................... 274
Cluster configuration......................................................................................................................274
21.1
Introduction of cluster management ..............................................................................275
21.1.1 Cluster definition ............................................................................................................275
21.1.2 Cluster role......................................................................................................................276
21.1.3 NDP profile..................................................................................................................... 277
21.1.4 NTDP profile .................................................................................................................. 278
21.1.5 Cluster management maintenance .................................................................................. 279
21.1.6 Managing VLAN ............................................................................................................281
21.2
Brief introduction of cluster configuration ....................................................................282
21.3
Configuration management equipment .......................................................................... 283
21.3.1
Enable system and port NDP capabilities.......................................................283
21.3.2
Configuring NDP parameters......................................................................... 283
21.3.3
Enable system and interface NTDP capabilities............................................. 284
21.3.4
Configuring NTDP parameters.......................................................................284
21.3.5
Configure manual collection of NTDP information.......................................285
21.3.6
Enable cluster function................................................................................... 285
21.3.7
Build clusters.................................................................................................. 285
21.3.8
Configure the cluster's internal members to interact ......................................288
21.3.9
Configuring cluster member management ..................................................... 288
21.4
Configuration member device........................................................................................289
21.4.1
Enable system and port NDP capabilities.......................................................289
21.4.2
Enable system and port NTDP capabilities ....................................................289
21.4.3
Configure manual collection of NTDP information.......................................289
21.4.4
Enable cluster function................................................................................... 289
21.5
Configuring access cluster members..............................................................................289
10 / 345
21.6
Cluster management display and maintenance ..............................................................290
21.7
Example of cluster management typical configuration.................................................. 291
Chapter 22...................................................................................................................................... 294
System log configuration ...............................................................................................................294
22.1 System log introduction ....................................................................................................... 294
22.1.1 Format of log information............................................................................................... 295
22.1.2 Log storage ..................................................................................................................... 296
22.1.3 Log display ..................................................................................................................... 297
22.1.4 Debugging tools.............................................................................................................. 298
22.2 System log configuration ..................................................................................................... 298
22.2.1 Configuring terminal real time display switch................................................................ 298
22.2.2 View log information ...................................................................................................... 299
22.2.3 Configure debugging switch...........................................................................................300
22.2.4 View debugging information .......................................................................................... 302
22.3 configuration SYSLOG .......................................................................................................303
22.3.1 SYSLOG introduce......................................................................................................... 303
22.3.2 SYSLOG configuration .................................................................................................. 304
22.3.3 SYSLOG configuration example.................................................................................... 305
Chapter 23...................................................................................................................................... 306
Port loop......................................................................................................................................... 306
23.1 Profile...................................................................................................................................307
23.2 Protocol principle................................................................................................................. 307
23.2.1 Detection process............................................................................................................ 307
23.2.2 Recovery mode ............................................................................................................... 307
23.2.3 Protocol security ............................................................................................................. 308
23.3 Configuration introduction................................................................................................... 308
23.3.1 Global configuration.......................................................................................................309
23.3.2 Interface configuration.................................................................................................... 309
23.3.3 Display configuration .....................................................................................................309
Chapter 24...................................................................................................................................... 310
SNTP configuration .......................................................................................................................310
24.1 SNTP introduce.................................................................................................................... 311
24.2
configuration SNTP ....................................................................................................... 311
24.2.1 Default SNTP settings..................................................................................................... 311
24.2.2 Configuring SNTP Server address..................................................................................312
24.2.3 Configure the SNTP sync clock interval......................................................................... 313
24.2.4 Configuring the local time zone......................................................................................313
24.3
SNTP information display..............................................................................................313
Chapter 25...................................................................................................................................... 314
11 / 345
OAM configuration........................................................................................................................ 314
25.1 OAM introduce ....................................................................................................................314
25.1.1 Link performance monitoring......................................................................................... 315
25.1.2 Remote fault detection.................................................................................................... 315
25.1.3 Distal loopback ............................................................................................................... 315
25.2 configuration OAM.............................................................................................................. 316
25.3 Typical configuration examples of OAM.............................................................................317
Chapter 26...................................................................................................................................... 318
CFM configuration......................................................................................................................... 318
26.1 CFM profile .........................................................................................................................319
26.1.1 Basic concepts of CFM................................................................................................... 319
26.1.2 Various functions of CFM............................................................................................... 322
26.2 Brief introduction of CFM configuration task .....................................................................323
26.3
CFM base configuration ................................................................................................ 324
26.3.1 Enable CFM function...................................................................................................... 324
26.3.2 Configuration service instance........................................................................................ 324
26.3.3 Configuration maintenance endpoint.............................................................................. 324
26.3.4 Configuration maintenance intermediate point............................................................ 325
26.4
Configure various functions of CFM ............................................................................. 326
26.4.1
Configuration continuity detection function .................................................. 326
26.4.2
Configuration loopback function....................................................................327
26.4.3
Configuring link tracking function................................................................. 327
26.5
CFM display and maintenance.......................................................................................328
26.6
Typical configuration examples ..................................................................................... 329
Chapter 27...................................................................................................................................... 332
IPv6 basic configuration ................................................................................................................ 332
27.1 IPv6 profile .......................................................................................................................... 333
27.1.1 The characteristics of IPv6 protocol ...............................................................................333
27.1.2 IPv6 address introduction ............................................................................................... 334
27.1.3 IPv6 neighbor discovery protocol................................................................................336
27.1.4 IPv6 PMTU discovery .................................................................................................... 338
27.1.5 Protocol specification ..................................................................................................... 339
27.2 IPv6 basic configuration task profile ................................................................................... 339
27.3 Configure IPv6 basic functionality ...................................................................................... 340
27.3.1Configuring IPv6 unicast address .................................................................................... 340
27.4 Configuring IPv6 neighbor discovery protocol....................................................................340
27.4.1 Configuring the parameters of the RA message..............................................................340
27.4.2 The number of sending neighbor request messages when configuring duplicate address
detection..................................................................................................................................... 343
12 / 345
27.5 IPv6 static routing configuration.......................................................................................... 343
27.6 IPv6 display and maintenance.............................................................................................. 343
13 / 345
Chapter 1
Introduction of CLI command line
This chapter gives a detailed description of the WI-TEK Managed Switch CLI command line
interface The main contents are as follows
Access switch CLI
CLI mode introduction
Introduction to command syntax
Command line shortcuts
History command
14 / 345
1.1 Access switch CLI
The CLI command line interface of the switch provides the interface for the user to manage
the switch The user can access the CLI command line interface of the switch through the
Console port and the Telnet two terminals The following are introduced separately
The main contents include
Users access CLI through Console port
Users access CLI through TELNET
1.1.1 Users access CLI through Console port
Figure 1 - Console cable
Cisco part number 72-3383-01 (Console Cable)
The operating procedure is as follows
First step Connect the serial port of PC with the Console port of the switch by configuring
the cable The following diagram
15 / 345
Second steps Start the terminal emulation program on the PC machine (such as the super
terminal of Windows) Configuring communication parameters of terminal emulation program
The communication parameters of the terminal are configured as follows
Baud rate 38400
Data bits 8
Parity check nothing
Stop bit 1
Data stream control nothing
The communication parameters configuration of the super terminal is shown below
16 / 345
Third steps Start switch After the Switch is started, the CLI prompt will be displayed on
the terminal (the default is Switch >) Users can enter commands at this prompt This allows the
user to access the CLI of the switch
1.1.2
Users access CLI through TELNET
The user can access the switch through the port of the switch
The IP address of the port of the switch defaults to 192.168.0.1 The steps to access the
switch through the port are as follows
First step Connect Ethernet port and switch port of PC through Ethernet cable The
following diagram
Second steps Set the IP address of the Ethernet port of the PC machine The IP address
must be in the 192.168.0.0/24 segment (such as IP address 192.168.0.100) Judging the
connectivity between PC and switch through Ping 192.168.0.1
Third steps If the PC is connected to the switch Then Telnet 192.168.0.1 enters the Telnet
terminal interface The following diagram
17 / 345
Fourth steps If the system does not have a password, the Telnet interface goes directly to
the CLI, and the CLI prompt appears (default is Switch >). If the system sets the password, you
need to enter the password on the Telnet interface to enter the CLI.
Two points should be paid special attention to
The IP address of the switch port is based on the VLAN three layer interface Before
accessing the switch You must set the IP address of a VLAN interface The default IP
address of VLAN1 is 192.168.0.1 It can be used directly The IP address of the
VLAN interface can be configured through the Console port
The user accesses the switch through the port You can connect PC and ports directly
through Ethernet cable You can also connect through a network You just need PC to
communicate with one of the VLAN switches
1.2 CLI mode introduction
The main contents include
The role of CLI model
Identification of CLI mode
Classification of CLI patterns
18 / 345
1.2.1 The role of CLI model
There are two main functions of the CLI model
Convenient classification of users Prevent unauthorized users from using CLI
illegally
Users can be divided into two levels That's the two category Common users and
privileged users
Ordinary users can only see some of the running state of the switch Use only display
commands
Privileged users can not only view the running state of the switch, but also maintain and
configure the switch to change the behavior of the switch
Convenient for users to configure switches
Switches have a lot of configuration, and if you put all the configuration in one mode, it's
very inconvenient for the user to use. To this end, the establishment of multiple modes on the CLI,
the similar commands placed in a mode, user-friendly understanding and use. For example, put the
commands associated with VLAN in the VLAN configuration mode.Put the interface related
commands in the interface configuration mode
1.2.2 Identification of CLI mode
The CLI prompt is the identity of the CLI mode When the user is using CLI By looking at
the CLI prompt, you know the CLI model that you're currently in
The CLI prompt consists of two parts Part identifies the host Another part identifies
patterns
The host part of the CLI prompt uses the hostname of the system The host name of the
system is configurable the default is Switch So the CLI prompt defaults to Switch the CLI
19 / 345
descriptor mentioned later generally uses the default host name
The schema section in the CLI prompt is not configurable each pattern has its own
corresponding pattern string some pattern strings are immutable some pattern strings are
mutable If the pattern string of the VLAN configuration pattern is fixed, the pattern string of the
interface configuration pattern is variable
For example
CLI prompt Switch# identifies privileged mode Switch identifies the host, and #
identification model
The CLI prompt (config-ge1/1)# identifies the interface configuration mode and is
configured with ge1/1 port Switch identifies the host, and (config-ge1/1) # identification
model
The CLI prompt Switch(config-vlan2)# identifies the interface configuration mode And
configure the vlan2 interface Switch identifies the host, and (config-vlan2) # identification
model
1.2.3 Classification of CLI patterns
The CLI model is divided into four categories: general mode, privileged mode, global
configuration mode and configuration sub pattern, while the configuration sub model is composed
of many CLI modes.
Ordinary users can only access common patterns, and privileged users can access all of the
CLI patterns
Console and Telnet terminals first enter the common mode, enter the enable command in the
normal mode, and successfully verify the password, then enter privileged mode On the Telnet
terminal, ordinary users can only stay in the ordinary mode and cannot enter privileged mode
Enter configure terminal in privileged mode CLI mode enters global configuration mode In
global configuration mode, you can enter the relevant commands and enter each configuration sub
/