This product includes software licensed under the BSD License. As such, the following language applies for those
portions of the software licensed under the BSD License:
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following
conditions are met:
* Redistributions of source code must retain the above copyright notice, this list of conditions and the following
disclaimer.
* Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
* Neither the name of Allied Telesis, Inc. nor the names of the respective companies above may be used to endorse or
promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS “AS IS” AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Copyright 1989, 1991, 1992 by Carnegie Mellon University. Derivative Work - 1996, 1998-2000. Copyright 1996, 19982000 by The Regents of the University of California - All rights reserved. Copyright (c) 2001-2003 by Networks
Associates Technology, Inc. - All rights reserved. Copyright (c) 2001-2003 by Cambridge Broadband Ltd. - All rights
reserved. Copyright (c) 2003 by Sun Microsystems, Inc. - All rights reserved. Copyright (c) 2003-2005 by Sparta, Inc. All rights reserved. Copyright (c) 2004 by Cisco, Inc. and Information Network Center of Beijing University of Posts and
Telecommunications. - All rights reserved. Copyright (c) 2003 by Fabasoft R&D Software GmbH & Co KG - All rights
reserved. Copyright (c) 2004-2006 by Internet Systems Consortium, Inc. (“ISC”) - All rights reserved. Copyright (c)
1995-2003 by Internet Software Consortium - All rights reserved. Copyright (c) 1992-2003 by David Mills - All rights
reserved. Copyright (c) 1995 by Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland - All rights reserved. Copyright (c) 1998
by CORE SDI S.A., Buenos Aires, Argentina - All rights reserved. Copyright 1995, 1996 by David Mazieres - All rights
reserved. Copyright 1983, 1990, 1992, 1993, 1995 by The Regents of the University of California - All rights reserved.
Copyright (c) 1995 Patrick Powell - All rights reserved. Copyright (c) 1998-2005 The OpenSSL Project - All rights
reserved. Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - All rights reserved. Copyright (c) 2008, Henry
Kwok - All rights reserved. Copyright (c) 1995, 1998, 1999, 2000, 2001 by Jef Poskanzer <jef@mail.acme.com>. - All
rights reserved.
Some components of the SSH software are provided under a standard 2-term BSD license with the following names as
copyright holders: Markus Friedl, Theo de Raadt, Niels Provos, Dug Song, Aaron Campbell, Damien Miller, Kevin
Steves, Daniel Kouril, Wesley Griffin, Per Allansson, Nils Nordman, and Simon Wilkinson,
Portable OpenSSH includes code from the following copyright holders, also under the 2-term BSD license: Ben
Lindstrom, Tim Rice, Andre Lucas, Chris Adams, Corinna Vinschen, Cray Inc., Denis Parker, Gert Doering, Jakob
Schlyter, Jason Downs, Juha Yrjola, Michael Stone, Network Associates, Solar Designer, Todd C. Miller, Wayne
Schroeder, William Jones, Darren Tucker, Sun Microsystems, The SCO Group.
Some Portable OpenSSH code is licensed under a 3-term BSD style license to the following copyright holders: Todd C.
Miller, Theo de Raadt, Damien Miller, Eric P. Allman, The Regents of the University of California, and Constantin S.
Svintsoff. Some Portable OpenSSH code is licensed under an ISC-style license to the following copyright holders:
Internet Software Consortium, Todd C. Miller, Reyk Floeter, and Chad Mynhier. Some Portable OpenSSH code is
licensed under a MIT-style license to the following copyright holder: Free Software Foundation, Inc.
This product also includes software licensed under the GNU General Public License available from:
http://www.gnu.org/licenses/gpl2.html
Page 3
Allied Telesis is committed to meeting the requirements of the open source licenses including the GNU General Public
License (GPL) and will make all required source code available.
If you would like a copy of the GPL source code contained in this product, please send us a request by registered mail
including a check for US$15 to cover production and shipping costs, and a CD with the GPL code will be mailed to you.
GPL Code Request
Allied Telesis, Inc.
3041 Orchard Parkway
San Jose, California 95134
No part of this publication may be reproduced without prior written permission from Allied Telesis, Inc.
Allied Telesis, AlliedWare Plus, and the Allied Telesis logo are trademarks of Allied Telesis, Incorporated. Microsoft and
Internet Explorer are registered trademarks of Microsoft Corporation. All other product names, company names, logos or
other designations mentioned herein are trademarks or registered trademarks of their respective owners.
Allied Telesis, Inc. reserves the right to make changes in specifications and other information contained in this document
without prior written notice. The information provided herein is subject to change without notice. In no event shall Allied
Telesis, Inc. be liable for any incidental, special, indirect, or consequential damages whatsoever, including but not limited
to lost profits, arising out of or related to this manual or the information contained herein, even if Allied Telesis, Inc. has
been advised of, known, or should have known, the possibility of such damages.
Port Numbers in Commands...................................................................................................................... 30
Combo Ports 25 to 28 ................................................................................................................................ 32
Command Format ...................................................................................................................................... 33
Command Line Interface Features ...................................................................................................... 33
What to Configure First .............................................................................................................................. 42
Creating a Boot Configuration File ...................................................................................................... 42
Changing the Login Password............................................................................................................. 43
Assigning a Name to the Switch.......................................................................................................... 43
Adding a Management IP Address...................................................................................................... 44
5
Page 6
Contents
Saving Your Changes .......................................................................................................................... 46
Ending a Management Session..................................................................................................................47
Chapter 3: Basic Command Line Management ........................................................................................... 49
Clearing the Screen.................................................................................................................................... 50
Displaying the On-line Help ........................................................................................................................ 51
Saving Your Configuration Changes .......................................................................................................... 53
Ending a Management Session..................................................................................................................54
Chapter 4: Basic Command Line Management Commands ...................................................................... 55
? (Question Mark Key)................................................................................................................................ 57
DO .............................................................................................................................................................. 63
END ............................................................................................................................................................ 65
Resetting the Switch................................................................................................................................... 91
Restoring the Default Settings to the Switch .............................................................................................. 92
Setting the Baud Rate of the Console Port................................................................................................. 94
Configuring the Management Session Timers ........................................................................................... 96
Setting the Maximum Number of Manager Sessions .................................................................................98
Configuring the Banners............................................................................................................................. 99
LINE CONSOLE....................................................................................................................................... 118
LINE VTY ................................................................................................................................................. 119
NO HOSTNAME ...................................................................................................................................... 120
SERVICE MAXMANAGER ...................................................................................................................... 126
SHOW BANNER LOGIN.......................................................................................................................... 127
SHOW BAUD-RATE ................................................................................................................................ 128
SHOW CLOCK......................................................................................................................................... 129
SHOW RUNNING-CONFIG ..................................................................................................................... 130
SHOW SWITCH....................................................................................................................................... 131
SHOW SYSTEM ...................................................................................................................................... 133
SHOW SYSTEM SERIALNUMBER......................................................................................................... 134
SHOW USERS......................................................................................................................................... 135
SHOW VERSION..................................................................................................................................... 137
Restoring the Default Settings ................................................................................................................. 158
Displaying Port Settings ........................................................................................................................... 159
Displaying Speed and Duplex Settings ............................................................................................. 159
Displaying Port Status ....................................................................................................................... 159
Displaying Port Configuration ............................................................................................................ 160
Displaying or Clearing Port Statistics ....................................................................................................... 161
Displaying SFP Information ..................................................................................................................... 162
Chapter 10: Port Parameter Commands ................................................................................................... 163
IP ADDRESS ........................................................................................................................................... 274
IP ADDRESS DHCP ................................................................................................................................ 276
IP ROUTE ................................................................................................................................................ 278
NO IP ADDRESS ..................................................................................................................................... 284
NO IP ADDRESS DHCP.......................................................................................................................... 285
NO IP ROUTE.......................................................................................................................................... 286
NO IPV6 ADDRESS................................................................................................................................. 287
NO IPV6 ROUTE ..................................................................................................................................... 288
SHOW IP INTERFACE ............................................................................................................................ 289
SHOW IP ROUTE .................................................................................................................................... 290
SHOW IPV6 INTERFACE........................................................................................................................ 292
SHOW IPV6 ROUTE................................................................................................................................ 293
Chapter 15: Simple Network Time Protocol (SNTP) Client ...................................................................... 295
NO CLOCK SUMMER-TIME.................................................................................................................... 306
NO NTP PEER......................................................................................................................................... 307
SHOW CLOCK......................................................................................................................................... 310
SHOW NTP ASSOCIATIONS.................................................................................................................. 311
SHOW NTP STATUS............................................................................................................................... 313
Chapter 17: MAC Address Table ................................................................................................................ 315
Adding Static MAC Addresses .................................................................................................................318
Deleting MAC Addresses ......................................................................................................................... 320
Setting the Aging Timer ............................................................................................................................322
Displaying the MAC Address Table..........................................................................................................323
Chapter 18: MAC Address Table Commands ............................................................................................ 325
CLEAR MAC ADDRESS-TABLE..............................................................................................................326
MAC ADDRESS-TABLE AGEING-TIME ..................................................................................................328
MAC ADDRESS-TABLE STATIC.............................................................................................................330
NO MAC ADDRESS-TABLE STATIC ......................................................................................................332
SHOW MAC ADDRESS-TABLE .............................................................................................................. 334
ESTACK RUN .......................................................................................................................................... 364
NO ESTACK COMMAND-SWITCH ......................................................................................................... 365
NO ESTACK RUN ....................................................................................................................................366
REBOOT ESTACK MEMBER .................................................................................................................. 368
SHOW ESTACK ....................................................................................................................................... 370
SHOW ESTACK COMMAND-SWITCH.................................................................................................... 372
SHOW ESTACK REMOTELIST ...............................................................................................................373
Chapter 21: Port Mirror ................................................................................................................................379
CLEAR IP IGMP....................................................................................................................................... 406
IP IGMP LIMIT ......................................................................................................................................... 407
IP IGMP QUERIER-TIMEOUT................................................................................................................. 408
IP IGMP SNOOPING ............................................................................................................................... 409
IP IGMP SNOOPING FLOOD-UNKNOWN-MCAST................................................................................ 410
IP IGMP SNOOPING MROUTER ............................................................................................................ 412
IP IGMP STATUS .................................................................................................................................... 413
NO IP IGMP SNOOPING......................................................................................................................... 414
NO IP IGMP SNOOPING MROUTER...................................................................................................... 415
SHOW IP IGMP SNOOPING ................................................................................................................... 416
NO BOOT CONFIG-FILE ......................................................................................................................... 455
SHOW BOOT ........................................................................................................................................... 456
SHOW STARTUP-CONFIG .....................................................................................................................458
NO LOG BUFFERED ...............................................................................................................................491
SHOW LOG.............................................................................................................................................. 493
SHOW LOG CONFIG............................................................................................................................... 496
SHOW LOG REVERSE............................................................................................................................497
SHOW LOG TAIL .....................................................................................................................................498
NO LOG HOST.........................................................................................................................................510
SHOW LOG CONFIG............................................................................................................................... 511
Section V: Port Trunks ........................................................................................................................... 513
Chapter 36: Static Port Trunks ................................................................................................................... 515
LACP System Priority ........................................................................................................................ 534
Base Port........................................................................................................................................... 535
Load Distribution Methods................................................................................................................. 535
Bridge Priority and the Root Bridge.......................................................................................................... 563
Path Costs and Port Costs....................................................................................................................... 564
Port Priority .............................................................................................................................................. 565
Forwarding Delay and Topology Changes............................................................................................... 566
Hello Time and Bridge Protocol Data Units (BPDU) ................................................................................ 567
Point-to-Point and Edge Ports.................................................................................................................. 568
Mixed STP and RSTP Networks .............................................................................................................. 570
Spanning Tree and VLANs ...................................................................................................................... 571
RSTP and MSTP BPDU Guard................................................................................................................ 572
REGION ................................................................................................................................................... 683
Displaying the VLANs...............................................................................................................................709
Chapter 48: Port-based and Tagged VLAN Commands ...........................................................................711
NO SWITCHPORT ACCESS VLAN......................................................................................................... 712
NO SWITCHPORT TRUNK...................................................................................................................... 713
NO SWITCHPORT TRUNK NATIVE VLAN ............................................................................................. 714
NO VLAN.................................................................................................................................................. 715
SHOW VLAN ............................................................................................................................................ 716
General Steps .......................................................................................................................................... 778
Creating MAC Address-based VLANs ..................................................................................................... 779
Adding MAC Addresses to VLANs and Designating Egress Ports .......................................................... 780
Removing MAC Addresses...................................................................................................................... 781
Example of Creating a MAC Address-based VLAN ................................................................................. 784
Chapter 52: MAC Address-based VLAN Commands ............................................................................... 787
NO VLAN ................................................................................................................................................. 788
NO VLAN MACADDRESS (Global Configuration Mode)......................................................................... 789
NO VLAN MACADDRESS (Port Interface Mode) .................................................................................... 790
SHOW VLAN MACADDRESS ................................................................................................................. 792
Uplink Port ......................................................................................................................................... 802
Chapter 54: Private Port VLAN Commands .............................................................................................. 809
NO VLAN ................................................................................................................................................. 810
Enabling MAC Address-based Security on Ports .....................................................................................844
Disabling MAC Address-based Security on Ports ....................................................................................845
Displaying Port Settings ........................................................................................................................... 846
Chapter 59: MAC Address-based Port Security Commands ................................................................... 849
NO SWITCHPORT PORT-SECURITY.....................................................................................................850
NO SWITCHPORT PORT-SECURITY AGING ........................................................................................851
SHOW PORT-SECURITY INTERFACE................................................................................................... 852
SHOW PORT-SECURITY INTRUSION INTERFACE ..............................................................................855
Port Roles................................................................................................................................................. 866
None Role .......................................................................................................................................... 866
General Steps........................................................................................................................................... 878
NO AAA AUTHENTICATION DOT1X DEFAULT GROUP RADIUS........................................................ 917
NO AUTH DYNAMIC-VLAN-CREATION ................................................................................................. 918
NO AUTH GUEST-VLAN ......................................................................................................................... 919
NO AUTH REAUTHENTICATION ........................................................................................................... 920
NO AUTH-MAC ENABLE......................................................................................................................... 921
NO DOT1X PORT-CONTROL ................................................................................................................. 922
SHOW AUTH-MAC INTERFACE............................................................................................................. 923
SHOW AUTH-MAC SESSIONSTATISTICS INTERFACE....................................................................... 924
SHOW AUTH-MAC STATISTICS INTERFACE....................................................................................... 925
SHOW AUTH-MAC SUPPLICANT INTERFACE ..................................................................................... 926
SHOW DOT1X ......................................................................................................................................... 927
SHOW DOT1X INTERFACE.................................................................................................................... 928
SHOW DOT1X STATISTICS INTERFACE.............................................................................................. 929
SHOW DOT1X SUPPLICANT INTERFACE ............................................................................................ 930
Configuring the sFlow Agent .................................................................................................................... 998
Configuring the Ports................................................................................................................................ 999
Configuring the Sampling Rate ..........................................................................................................999
Configuring the Polling Interval ........................................................................................................1000
Enabling the sFlow Agent.......................................................................................................................1001
Disabling the sFlow Agent ...................................................................................................................... 1002
Displaying the sFlow Agent .................................................................................................................... 1003
Configuration Example ........................................................................................................................... 1004
Disabling LLDP and LLDP-MED on the Switch...................................................................................... 1044
Displaying General LLDP Settings......................................................................................................... 1045
Displaying Port Settings ......................................................................................................................... 1046
Displaying or Clearing Neighbor Information ......................................................................................... 1047
Displaying Port TLVs.............................................................................................................................. 1049
Displaying and Clearing Statistics.......................................................................................................... 1050
Chapter 68: LLDP and LLDP-MED Commands ....................................................................................... 1051
LLDP RUN ............................................................................................................................................. 1068
NO LLDP MED-NOTIFICATIONS.......................................................................................................... 1082
NO LLDP MED-TLV-SELECT................................................................................................................ 1083
NO LLDP NOTIFICATIONS ................................................................................................................... 1085
NO LLDP RUN ....................................................................................................................................... 1086
21
Page 22
Contents
NO LLDP TLV-SELECT ......................................................................................................................... 1087
NO LLDP TRANSMIT RECEIVE ............................................................................................................1088
NO LOCATION....................................................................................................................................... 1089
SHOW LLDP ..........................................................................................................................................1091
SHOW LLDP INTERFACE .....................................................................................................................1093
SHOW LLDP LOCAL-INFO INTERFACE .............................................................................................. 1095
SHOW LLDP NEIGHBORS DETAIL ......................................................................................................1097
SHOW LLDP NEIGHBORS INTERFACE .............................................................................................. 1102
SHOW LLDP STATISTICS..................................................................................................................... 1104
SHOW LLDP STATISTICS INTERFACE ............................................................................................... 1106
SHOW LOCATION .................................................................................................................................1108
NO ARP (IP ADDRESS).........................................................................................................................1121
SHOW ARP ............................................................................................................................................ 1122
RMON Port Statistics.............................................................................................................................. 1127
Deleting Numbered IP and MAC Address ACLs.................................................................................... 1195
Displaying the ACLs............................................................................................................................... 1196
ACCESS-LIST IP ................................................................................................................................... 1211
Support for SSH ..................................................................................................................................... 1301
NO SERVICE SSH................................................................................................................................. 1316
SERVICE SSH ....................................................................................................................................... 1317
SHOW CRYPTO KEY HOSTKEY.......................................................................................................... 1318
SHOW SSH SERVER............................................................................................................................ 1319
Chapter 84: Non-secure HTTP Web Browser Server ............................................................................. 1321
Enabling the Web Browser Server ......................................................................................................... 1323
Setting the Protocol Port Number .......................................................................................................... 1324
Disabling the Web Browser Server ........................................................................................................ 1325
Displaying the Web Browser Server ...................................................................................................... 1326
Chapter 85: Non-secure HTTP Web Browser Server Commands ......................................................... 1327
SERVICE HTTP ..................................................................................................................................... 1328
IP HTTP PORT ...................................................................................................................................... 1329
NO SERVICE HTTP............................................................................................................................... 1330
SHOW IP HTTP ..................................................................................................................................... 1331
Chapter 86: Secure HTTPS Web Browser Server ................................................................................... 1333
Appendix A: System Monitoring Commands .......................................................................................... 1403
SHOW CPU............................................................................................................................................1404
SHOW CPU HISTORY........................................................................................................................... 1405
SHOW CPU USER-THREADS ..............................................................................................................1406
SHOW MEMORY ...................................................................................................................................1407
SHOW MEMORY ALLOCATION ........................................................................................................... 1408
SHOW MEMORY HISTORY ..................................................................................................................1409
SHOW MEMORY POOLS...................................................................................................................... 1410
SHOW PROCESS.................................................................................................................................. 1411
SHOW SYSTEM SERIALNUMBER .......................................................................................................1412
SHOW SYSTEM INTERRUPTS............................................................................................................. 1413
SHOW TECH-SUPPORT ....................................................................................................................... 1414
Class of Service...................................................................................................................................... 1419
Port Settings ........................................................................................................................................... 1431
Secure Shell Server ............................................................................................................................... 1435
Simple Network Management Protocol (SNMPv1, SNMPv2c and SNMPv3) ........................................ 1437
Simple Network Time Protocol............................................................................................................... 1438
Spanning Tree Protocols (STP, RSTP and MSTP)................................................................................ 1439
Spanning Tree Status...................................................................................................................... 1439
Spanning Tree Protocol................................................................................................................... 1439
Rapid Spanning Tree Protocol ........................................................................................................ 1439
Multiple Spanning Tree Protocol ..................................................................................................... 1440
System Name......................................................................................................................................... 1441
Web Server ............................................................................................................................................ 1445
Command Index ......................................................................................................................................... 1447
Figure 7: INTERFACE PORT Command - Single Port........................................................................................................ 25
Figure 8: INTERFACE PORT Command - Multiple Ports.................................................................................................... 26
Figure 9: INTERFACE PORT Command - Moving Between Port Interface Modes ............................................................ 26
Figure 15: Moving Up One Mode with the EXIT and QUIT Command ................................................................................ 28
Figure 16: Returning to the Privileged Exec Mode with the END Command....................................................................... 29
Figure 17: Returning to the User Exec Mode with the DISABLE Command ....................................................................... 29
Figure 18: PORT Parameter in the Command Line Interface.............................................................................................. 30
Figure 22: Connecting the Management Cable to the Console Port ................................................................................... 38
Figure 23: AlliedWare Plus Command Line Prompt ............................................................................................................ 39
Figure 24: SHOW BOOT Command.................................................................................................................................... 43
Figure 25: Displaying the Keywords of a Mode ................................................................................................................... 51
Figure 26: Displaying Subsequent Keywords of a Keyword ................................................................................................ 51
Figure 27: Displaying the Class of a Parameter .................................................................................................................. 52
Figure 28: SHOW SYSTEM ENVIRONMENT Command ................................................................................................... 75
Figure 29: SHOW ECOFRIENDLY Command .................................................................................................................... 80
Figure 30: SHOW SYSTEM ENVIRONMENT Command ................................................................................................... 81
Figure 31: SHOW BOOT Command.................................................................................................................................... 92
Figure 32: SHOW BAUD-RATE Command......................................................................................................................... 94
Figure 34: HELP Command............................................................................................................................................... 116
Figure 35: SHOW BANNER LOGIN Command................................................................................................................. 127
Figure 36: SHOW BAUD-RATE Command....................................................................................................................... 128
Figure 37: SHOW SWITCH Command.............................................................................................................................. 131
Figure 38: SHOW SYSTEM Command............................................................................................................................. 133
Figure 39: SHOW SYSTEM SERIALNUMBER Command................................................................................................ 134
Figure 40: SHOW USERS Command ............................................................................................................................... 135
Figure 41: SHOW VERSION Command............................................................................................................................ 137
Figure 42: SHOW FLOWCONTROL INTERFACE Command .......................................................................................... 151
Figure 43: SHOW STORM-CONTROL Command............................................................................................................ 156
Figure 44: SHOW STORM-CONTROL Command............................................................................................................ 156
Figure 45: SHOW INTERFACE STATUS Command ........................................................................................................ 159
Figure 46: SHOW INTERFACE Command ....................................................................................................................... 160
Figure 47: SHOW RUNNING-CONFIG INTERFACE Command ...................................................................................... 160
Figure 48: Head of Line Blocking ...................................................................................................................................... 180
Figure 49: SHOW FLOWCONTROL INTERFACE Command .......................................................................................... 191
1
Page 30
List of Figures
Figure 50: SHOW INTERFACE Command........................................................................................................................ 194
Figure 51: SHOW INTERFACE BRIEF Command............................................................................................................ 197
Figure 52: SHOW INTERFACE STATUS Command ........................................................................................................ 199
Figure 53: SHOW RUNNING-CONFIG INTERFACE Command....................................................................................... 204
Figure 54: SHOW STORM-CONTROL Command............................................................................................................ 205
Figure 55: SHOW SYSTEM PLUGGABLE Command ...................................................................................................... 207
Figure 56: SHOW SYSTEM PLUGGABLE DETAIL Command......................................................................................... 208
Figure 57: SHOW POWER-INLINE Command.................................................................................................................. 225
Figure 58: SHOW POWER-INLINE INTERFACE Command............................................................................................ 226
Figure 59: SHOW POWER-INLINE INTERFACE DETAIL Command............................................................................... 226
Figure 60: SHOW POWER-INLINE Command.................................................................................................................. 246
Figure 61: SHOW POWER-INLINE COUNTERS INTERFACE Command ....................................................................... 249
Figure 62: SHOW POWER-INLINE INTERFACE Command............................................................................................ 251
Figure 63: SHOW POWER-INLINE INTERFACE DETAIL Command............................................................................... 252
Figure 64: SHOW IP ROUTE Command........................................................................................................................... 265
Figure 65: SHOW IP INTERFACE Command................................................................................................................... 265
Figure 66: SHOW IPV6 ROUTE Command....................................................................................................................... 269
Figure 67: SHOW IPV6 INTERFACE Command............................................................................................................... 269
Figure 68: SHOW IP INTERFACE Command................................................................................................................... 289
Figure 69: SHOW IP ROUTE Command........................................................................................................................... 290
Figure 70: SHOW IPV6 INTERFACE Command............................................................................................................... 292
Figure 71: SHOW IPV6 ROUTE Command....................................................................................................................... 293
Figure 72: SHOW NTP ASSOCIATIONS Command......................................................................................................... 301
Figure 73: SHOW NTP STATUS Command...................................................................................................................... 301
Figure 74: SHOW NTP ASSOCIATIONS Command......................................................................................................... 311
Figure 75: SHOW NTP STATUS Command...................................................................................................................... 313
Figure 76: SHOW MAC ADDRESS-TABLE Command..................................................................................................... 323
Figure 77: SHOW MAC ADDRESS-TABLE Command..................................................................................................... 335
Figure 78: SHOW ESTACK REMOTELIST Command......................................................................................
Figure 79: SHOW ESTACK Command.............................................................................................................................. 348
Figure 80: SHOW ESTACK Command.............................................................................................................................. 370
Figure 81: SHOW ESTACK COMMAND-SWITCH Command .......................................................................................... 372
Figure 82: SHOW ESTACK REMOTELIST Command...................................................................................................... 373
Figure 83: SHOW MIRROR Command ............................................................................................................................. 385
Figure 84: SHOW MIRROR Command and Access Control Lists..................................................................................... 385
Figure 85: SHOW MIRROR Command ............................................................................................................................. 392
Figure 86: SHOW MIRROR Command and Access Control Lists..................................................................................... 393
Figure 87: SHOW IP IGMP SNOOPING............................................................................................................................ 403
Figure 88: SHOW IP IGMP SNOOPING Command.......................................................................................................... 416
Figure 89: SHOW FILE SYSTEMS Command .................................................................................................................. 432
Figure 90: SHOW FILE SYSTEMS Command .................................................................................................................. 441
Figure 91: SHOW BOOT Command.................................................................................................................................. 448
Figure 92: SHOW BOOT Command.................................................................................................................................. 456
Figure 93: SHOW ESTACK REMOTELIST....................................................................................................................... 470
Figure 94: SHOW LOG Command .................................................................................................................................... 485
Figure 95: SHOW LOG Command .................................................................................................................................... 493
Figure 96: SHOW LOG CONFIG Command ..................................................................................................................... 496
Figure 97: SHOW LOG CONFIG Command with Syslog Server Entries .......................................................................... 505
Figure 98: SHOW LOG CONFIG Command with Syslog Server Entries .......................................................................... 511
Figure 99: Static Port Trunk Example................................................................................................................................ 516
Figure 100: SHOW STATIC-CHANNEL-GROUP Command ............................................................................................ 523
Figure 101: SHOW STATIC-CHANNEL-GROUP Command ............................................................................................ 529
Figure 102: SHOW ETHERCHANNEL DETAIL................................................................................................................. 542
Figure 103: SHOW LACP SYS-ID Command.................................................................................................................... 543
Figure 104: SHOW ETHERCHANNEL Command............................................................................................................. 552
Figure 105: SHOW ETHERCHANNEL DETAIL Command............................................................................................... 553
Figure 106: SHOW ETHERCHANNEL SUMMARY Command ......................................................................................... 555
Figure 107: SHOW LACP SYS-ID Command.................................................................................................................... 556
Figure 108: SHOW PORT ETHERCHANNEL Command.................................................................................................. 557
Figure 113: Loop Guard Example 1 .................................................................................................................................. 575
Figure 114: Loop Guard Example 2 .................................................................................................................................. 576
Figure 115: Loop Guard Example 3 .................................................................................................................................. 576
Figure 116: Loop Guard Example 4 .................................................................................................................................. 577
Figure 117: Loop Guard Example 5 .................................................................................................................................. 578
Figure 118: SHOW SPANNING-TREE Command for STP............................................................................................... 588
Figure 119: SHOW SPANNING-TREE Command for STP............................................................................................... 592
Figure 120: SHOW SPANNING-TREE Command for RSTP ............................................................................................ 616
Figure 121: SHOW SPANNING-TREE Command for RSTP ............................................................................................ 624
Figure 122: VLAN Fragmentation with STP or RSTP ........................................................................................................ 643
Figure 123: MSTP Example of Two Spanning Tree Instances.......................................................................................... 644
Figure 124: Multiple VLANs in an MSTI............................................................................................................................. 644
Figure 125: CIST and VLAN Guideline - Example 1.......................................................................................................... 655
Figure 126: CIST and VLAN Guideline - Example 2.......................................................................................................... 656
Figure 127: Spanning Regions - Example 1...................................................................................................................... 657
Figure 128: Spanning Regions without Blocking ............................................................................................................... 658
Figure 129: SHOW SPANNING-TREE Command for MSTP............................................................................................ 669
Figure 130: SHOW SPANNING-TREE MST CONFIG Command..................................................................................... 670
Figure 131: SHOW SPANNING-TREE MST Command.................................................................................................... 671
Figure 132: Port-based VLAN - Example 1 ....................................................................................................................... 693
Figure 133: Port-based VLAN - Example 2 ....................................................................................................................... 694
Figure 134: Example of a Tagged VLAN........................................................................................................................... 698
Figure 135: SHOW VLAN ALL Command......................................................................................................................... 709
Figure 136: SHOW VLAN Command ................................................................................................................................ 716
Figure 137: GVRP Example .............................................................................................................................................. 733
Figure 138: SHOW GVRP TIMER Command ................................................................................................................... 747
Figure 139: Example of a MAC Address-based VLAN that Spans Switches .................................................................... 775
Figure 140: SHOW VLAN MACADDRESS Command...................................................................................................... 783
Figure 141: SHOW VLAN MACADDRESS Command...................................................................................................... 792
Figure 142: SHOW VLAN PRIVATE-VLAN Command ..................................................................................................... 808
Figure 143: SHOW VLAN PRIVATE-VLAN Command ..................................................................................................... 812
Figure 144: Metro Provider 802.1Q Header in Tagged Packets........................................................................................ 823
Figure 145: Metro Provider 802.1Q Header in Untagged Packets ...................................................................
Figure 146: VLAN Stacking Process ................................................................................................................................. 825
Figure 147: SHOW VLAN VLAN-STACKING Command .................................................................................................. 834
Figure 148: SHOW PORT-SECURITY INTERFACE Command ....................................................................................... 846
Figure 149: Example of SHOW PORT-SECURITY INTRUSION INTERFACE Command ............................................... 847
Figure 150: SHOW PORT-SECURITY INTERFACE Command ....................................................................................... 852
Figure 151: SHOW PORT-SECURITY INTRUSION INTERFACE Command .................................................................. 855
Figure 152: Example of SHOW PORT-SECURITY INTRUSION INTERFACE Command ............................................... 856
Figure 153: Single Host Mode ........................................................................................................................................... 869
Figure 154: Multi Host Operating Mode............................................................................................................................. 870
Figure 155: Multi Supplicant Mode .................................................................................................................................... 872
Figure 156: SHOW DOT1X INTERFACE Command ........................................................................................................ 888
Figure 157: SHOW DOT1X STATISTICS INTERFACE Command................................................................................... 889
Figure 158: SHOW AUTH-MAC INTERFACE Command ................................................................................................. 923
Figure 159: SHOW AUTH-MAC SESSIONSTATISTICS INTERFACE Command............................................................ 924
Figure 160: SHOW AUTH-MAC STATISTICS INTERFACE Command............................................................................ 925
Figure 161: SHOW AUTH-MAC SUPPLICANT INTERFACE Command.......................................................................... 926
Figure 162: SHOW DOT1X Command.............................................................................................................................. 927
Figure 163: SHOW DOT1X INTERFACE Command ........................................................................................................ 928
Figure 164: SHOW DOT1X STATISTICS INTERFACE Command................................................................................... 929
Figure 165: SHOW DOT1X SUPPLICANT INTERFACE Command................................................................................. 930
Figure 166: SHOW SNMP-SERVER Command ............................................................................................................... 942
Figure 167: SHOW SNMP-SERVER COMMUNITY Command ........................................................................................ 942
Figure 168: SHOW RUNNING-CONFIG SNMP Command .............................................................................................. 943
Figure 169: SHOW RUNNING-CONFIG SNMP Command ...................................................................................
................. 823
........... 955
3
Page 32
List of Figures
Figure 170: SHOW SNMP-SERVER Command................................................................................................................ 956
Figure 171: SHOW SNMP-SERVER COMMUNITY Command ........................................................................................ 957
Figure 172: SHOW SNMP-SERVER VIEW Command ..................................................................................................... 959
Figure 173: SHOW SNMP-SERVER Command................................................................................................................ 978
Figure 174: SHOW SFLOW Command ........................................................................................................................... 1003
Figure 175: SHOW SFLOW Command ........................................................................................................................... 1016
Figure 176: SHOW LLDP Command............................................................................................................................... 1045
Figure 177: SHOW LLDP INTERFACE Command.......................................................................................................... 1046
Figure 178: SHOW LLDP STATISTICS Command ......................................................................................................... 1050
Figure 179: SHOW LLDP Command............................................................................................................................... 1091
Figure 180: SHOW LLDP INTERFACE Command.......................................................................................................... 1093
Figure 181: SHOW LLDP LOCAL-INFO INTERFACE Command................................................................................... 1096
Figure 182: SHOW LLDP LOCAL-INFO INTERFACE Command (continued) ................................................................ 1096
Figure 183: SHOW LLDP NEIGHBORS DETAIL Command........................................................................................... 1098
Figure 184: SHOW LLDP NEIGHBORS DETAIL Command (continued)........................................................................ 1098
Figure 185: SHOW LLDP NEIGHBORS INTERFACE Command................................................................................... 1102
Figure 186: SHOW LLDP STATISTICS Command ......................................................................................................... 1104
Figure 187: SHOW LLDP STATISTICS INTERFACE Command.................................................................................... 1106
Figure 188: SHOW LOCATION Command for a Civic Location...................................................................................... 1108
Figure 189: SHOW ARP Command................................................................................................................................. 1115
Figure 190: SHOW ARP Command................................................................................................................................. 1122
Figure 191: SHOW RMON STATISTICS Command....................................................................................................... 1128
Figure 192: SHOW RMON HISTORY Command............................................................................................................ 1131
Figure 193: SHOW RMON ALARM Command................................................................................................................ 1158
Figure 194: SHOW RMON EVENT Command................................................................................................................ 1160
Figure 195: SHOW RMON HISTORY Command............................................................................................................ 1162
Figure 196: SHOW RMON STATISTICS Command....................................................................................................... 1164
Figure 197: SHOW ACCESS-LIST Command ................................................................................................................ 1196
Figure 198: SHOW INTERFACE ACCESS-GROUP Command ..................................................................................... 1197
Figure 199: SHOW RUNNING-CONFIG Command ........................................................................................................ 1197
Figure 200: SHOW ACCESS-LIST Command ...........................................................................................
Figure 201: SHOW INTERFACE ACCESS-GROUP Command ..................................................................................... 1234
Figure 209: Displaying the Local Manager Accounts in the Running Configuration ........................................................ 1269
Figure 210: SHOW TELNET Command .......................................................................................................................... 1285
Figure 211: SHOW TELNET Command .......................................................................................................................... 1290
Figure 212: SSH Remote Management of a Member Switch.......................................................................................... 1303
Figure 213: SHOW CRYPTO KEY HOSTKEY Command............................................................................................... 1318
Figure 214: SHOW SSH SERVER Command................................................................................................................. 1319
Figure 215: SHOW IP HTTP Command .......................................................................................................................... 1326
Figure 216: SHOW IP HTTP Command .......................................................................................................................... 1331
Figure 217: SHOW IP HTTPS Command........................................................................................................................ 1346
Figure 218: SHOW IP HTTPS Command........................................................................................................................ 1359
Figure 219: SHOW RADIUS Command .......................................................................................................................... 1369
Figure 220: SHOW TACACS Command ......................................................................................................................... 1372
Figure 221: SHOW RADIUS Command .......................................................................................................................... 1396
Figure 222: SHOW TACACS Command ......................................................................................................................... 1398
Table 2. AlliedWare Plus Modes .........................................................................................................................................22
Table 3. Adding a Management Address: Example 1 ........................................................................................................45
Table 4. Adding a Management IP Address: Example 2 ....................................................................................................45
Table 5. Basic Command Line Commands ........................................................................................................................55
Table 6. Temperature and Fan Control Commands ...........................................................................................................77
Table 7. SHOW SYSTEM ENVIRONMENT Command ......................................................................................................81
Table 19. PoE Port Priorities ............................................................................................................................................217
Table 20. Receiving Power Consumption Notification ......................................................................................................224
Table 21. PoE Show Commands ......................................................................................................................................225
Table 22. Power over Ethernet Commands ......................................................................................................................227
Table 23. SHOW POWER-INLINE Command ..................................................................................................................247
Table 24. SHOW POWER-INLINE COUNTERS INTERFACE Command .......................................................................249
Table 25. SHOW POWER-INLINE INTERFACE DETAIL Command ...............................................................................252
Table 26. Features Requiring an IP Management Address on the Switch ...........................................................
Table 27. Management IP Address Commands ...............................................................................................................271
Table 28. SHOW IP ROUTE Command ...........................................................................................................................290
Table 29. SHOW IPV6 INTERFACE Command ...............................................................................................................292
Table 30. SNTP Daylight Savings Time and UTC Offset Commands ..............................................................................298
Table 31. Simple Network Time Protocol Commands ......................................................................................................303
Table 32. SHOW NTP ASSOCIATIONS Command .........................................................................................................311
Table 33. MAC Address Table Commands ......................................................................................................................325
Table 34. SHOW MAC ADDRESS-TABLE Command - Unicast Addresses ....................................................................335
Table 35. SHOW MAC ADDRESS-TABLE Command - Multicast Addresses ..................................................................336
Table 44. File Extensions and File Types .........................................................................................................................428
Table 45. File System Commands ....................................................................................................................................435
Table 46. SHOW FILE SYSTEMS Command ..................................................................................................................441
Table 56. Program Abbreviations .....................................................................................................................................501
Table 64. RSTP Port Parameters .....................................................................................................................................611
Table 65. Rapid Spanning Tree Protocol Commands ......................................................................................................617
Table 66. MSTP Region ....................................................................................................................................................649
Table 67. Two Region Examples ......................................................................................................................................658
Table 68. Multiple Spanning Tree Protocol Commands ...................................................................................................661
Table 69. MSTP Bridge Priority Value Increments ...........................................................................................................663
Table 70. VLAN Port Assignments ...................................................................................................................................699
Table 71. Port-based and Tagged VLAN Commands ......................................................................................................711
Table 72. SHOW VLAN Command ...................................................................................................................................716
Table 115. MIB Object Names and ID Numbers ............................................................................................................1148
Table 116. SHOW RMON ALARM Command ................................................................................................................1159
Table 117. SHOW RMON EVENT Command ................................................................................................................1160
Table 118. SHOW RMON HISTORY Command ............................................................................................................1162
Table 119. SHOW RMON STATISTICS Command .......................................................................................................1164
Table 120. Access Control List ID Number Ranges .......................................................................................................1167
Table 121. ACCESS-LIST Commands for Creating Numbered IPv4 ACLs ...................................................................1169
Table 122. Blocking Ingress Packets Example ...............................................................................................................1171
Table 123. Blocking Traffic with Two IPv4 Addresses ....................................................................................................1171
Table 124. Creating a Permit ACL Followed by a Deny ACL Example ..........................................................................1172
Table 125. Permit ACLs IPv4 Packets Example .............................................................................................................1173
Table 126. ACL Filters Tagged IPv4 Packets Example ..................................................................................................1174
Table 127. Numbered IPv4 ACL with ICMP Packets Example .......................................................................................1175
Table 128. Numbered IPv4 ACL with Protocol Example ................................................................................................1177
Table 129. Numbered IPv4 ACL with TCP Port Packets Example .................................................................................1179
Table 130. Numbered IPv4 ACL with UDP Port Example ..............................................................................................1181
Table 131. Numbered MAC ACL Example .....................................................................................................................1183
Table 133. Assigning MAC Address ACLs Example ......................................................................................................1185
Table 134. Removing Numbered IP ACLs Example .......................................................................................................1187
Table 135. Removing MAC Address ACLs Example ......................................................................................................1188
Table 136. Assigning Numbered IP ACLs to VTY Lines Example ..................................................................................1189
Table 137. Assigning MAC ACLs to VTY Lines Example ............................................................................
Table 138. Assigning Named IPv4 ACLs to VTY Lines Example ...................................................................................1191
Table 139. Assigning Named IPv4 ACLs to VTY Lines Example ...................................................................................1192
Table 140. Removing Numbered IP ACLs from VTY Lines Example .............................................................................1194
Table 141. Deleting Numbered IP ACLs Example 1 .......................................................................................................1195
Table 142. Deleting Numbered IP ACLs Example 2 .......................................................................................................1195
Table 143. Access Control List Commands ....................................................................................................................1199
Table 145. Quality of Service Commands ......................................................................................................................1235
Table 146. SHOW MLS QOS INTERFACE Command ..................................................................................................1251
Table 147. Local Manager Account Commands .............................................................................................................1271
Table 148. Telnet Server Commands .............................................................................................................................1287
Table 150. Secure Shell Server Commands ..................................................................................................................1311
Table 151. Non-secure HTTP Web Browser Server Commands ...................................................................................1327
Table 152. Secure HTTPS Web Browser Server Commands ........................................................................................1347
Table 153. SHOW IP HTTPS Command ........................................................................................................................1359
Table 154. RADIUS and TACACS+ Client Commands ..................................................................................................1377
Table 155. SHOW RADIUS Command ..........................................................................................................................1396
Table 156. SHOW TACACS Command .........................................................................................................................1398
Table 157. System Monitoring Commands .....................................................................................................................1403
...................1190
7
Page 36
Tables
8
Page 37
Preface
Caution
This is the command line management guide for the AT-9000/12POE,
AT-9000/28, AT-9000/28POE, AT-9000/28SP, and AT-9000/52 Managed
Layer 2-4 Gigabit Ethernet EcoSwitches. The instructions in this guide
explain how to start a management session and how to use the commands
in the AlliedWare Plus command line interface to view and configure the
features of the switch.
For hardware installation instructions, refer to the AT-9000 Manager Layer 2 Fast Ethernet EcoSwitch Series Installation Guide.
This preface contains the following sections:
“Document Conventions” on page 10
“Where to Find Web-based Guides” on page 11
“Contacting Allied Telesis” on page 12
The customer, re-seller, sub-contractor, distributor, software
developer or any buyer of an Allied Telesis “ATI” product known as
“customer”, hereby agrees to have all licenses required by any
governmental agency and to comply with all applicable laws and
regulations in its performance under this Agreement, including
export control, maintained by U.S. Commerce Department’s Bureau
of Industry and Security (BIS) and the U.S. Treasury Department’s
Office of Foreign Assets Control (OFAC), international boycotts
regulations and all anti-corruption laws, including the U.S. Foreign
Corrupt Practices Act (FCPA). The customer understands that U.S.
Government authorization may be required to export the software,
commodity or technology, or to re-export or re-transfer to a third
country, another end-user or another end-use. The customer agrees
to assume all such obligations.
9
Page 38
Document Conventions
Note
Caution
Warning
This document uses the following conventions:
Notes provide additional information.
Cautions inform you that performing or omitting a specific action
may result in equipment damage or loss of data.
Warnings inform you that performing or omitting a specific action
may result in bodily injury.
10
Page 39
Where to Find Web-based Guides
The installation and user guides for all of the Allied Telesis products are
available for viewing in portable document format (PDF) from our web site
at www.alliedtelesis.com/support/documentation.
AT-9000 Switch Command Line User’s Guide
11
Page 40
Contacting Allied Telesis
If you need assistance with this product, you may contact Allied Telesis
technical support by going to the Support & Services section of the Allied
Telesis web site at www.alliedtelesis.com/support. You can find links for
the following services on this page:
24/7 Online Support— Enter our interactive support center to
search for answers to your product questions in our knowledge
database, to check support tickets, to learn about RMAs, and to
contact Allied Telesis experts.
USA and EMEA phone support— Select the phone number that
best fits your location and customer type.
Hardware warranty information— Learn about Allied Telesis
warranties and register your product online.
Replacement Services— Submit a Return Materials Authorization
(RMA) request via our interactive support center.
Documentation— View the most recent installation and user
guides, software release notes, white papers, and data sheets for
your products.
Software Downloads— Download the latest software releases for
your managed products.
For sales or corporate information, go to www.alliedtelesis.com/purchase and select your region.
12
Page 41
Section I
Getting Started
This section contains the following chapters:
Chapter 1, “AlliedWare Plus Command Line Interface” on page 15
Chapter 2, “Starting a Management Session” on page 37
Chapter 3, “Basic Command Line Management” on page 49
Chapter 4, “Basic Command Line Management Commands” on page
55
Chapter 5, “Temperature and Fan Control Overview” on page 73
Chapter 6, “Temperature and Fan Control Commands” on page 77
13
Page 42
14
Page 43
Chapter 1
AlliedWare Plus Command Line
Interface
This chapter has the following sections:
“Management Sessions” on page 16
“Management Interfaces” on page 19
“Local Manager Account” on page 20
“AlliedWare Plus Command Modes” on page 21
“Moving Down the Hierarchy” on page 24
“Moving Up the Hierarchy” on page 28
“Port Numbers in Commands” on page 30
“Combo Ports 25 to 28” on page 32
“Command Format” on page 33
“Startup Messages” on page 34
15
Page 44
Chapter 1: AlliedWare Plus Command Line Interface
Note
Management Sessions
You can manage the switch locally or remotely. Local management is
conducted through the Console port on the switch. Remote management
is possible with a variety of management tools from workstations on your
network.
Local
Management
Remote
Management
The switch has a Console port for local management of the unit. Local
management sessions, which must be performed at the unit, hence the
name “local,” are commonly referred to as out-of-band management
because they are not conducted over your network.
The requirements for local management sessions are a terminal or a PC
with a terminal emulator program and the RS-232 console management
cable that comes with the switch. For modern PCs without a serial port, a
USB-to-serial adapter and driver software is required.
The initial management session of the switch must be from a local
management session.
You can manage the switch remotely with the following software tools:
Telnet client
Secure Shell client
Secure (HTTPS) or non-secure (HTTP) web browser
SNMPv1, SNMPv2c, or SNMPv3 application
16
Management sessions performed with these tools are referred to as inband management because the sessions are conducted over your
network. Remote management sessions are generally more convenient
than local management session because they can be performed from any
workstation that has one of these software tools.
Table 1. Remote Software Tool Settings
Software ToolDefault Setting
TelnetEnabled
Secure Shell ServerDisabled
HTTPSDisabled
HTTPEnabled (This tool is disabled by
a factory reset of the switch.)
Page 45
AT-9000 Switch Command Line User’s Guide
Note
To support remote management, the switch must have a management IP
address. For instructions on how to assign a management IP address to
the switch, refer to “Adding a Management IP Address” on page 44.
Remote Telnet Management
The switch has a Telnet server that you can use to remotely manage the
unit from Telnet clients on your management workstations. Remote Telnet
sessions give you access to the same commands and the same
management functions as local management sessions.
Telnet remote management sessions are conducted in clear text,
leaving them vulnerable to snooping. If an intruder captures the
packet with your login name and password, the security of the switch
will be compromised. For secure remote management, Allied Telesis
recommends Secure Shell (SSH) or secure web browser (HTTPS).
Remote Secure Shell Management
The switch has an SSH server for remote management with an SSH client
on a management workstation. This management method is similar to
Telnet management sessions in that it gives you access to the same
command line interface and the same functions. But where they differ is
SSH management sessions are secure against snooping because the
packets are encrypted, rendering them unintelligible to intruders who might
capture them.
For instructions on how to configure the switch for SSH management, refer
to Chapter 82, “Secure Shell (SSH) Server” on page 1299.
Web Browser Windows
The switch comes with a web browser server so that you can manage the
unit using a web browser on a management workstation. The switch
supports both encrypted (HTTPS) and non-encrypted (HTTP) web
browser management sessions.
Simple Network Management Protocol
The switch supports remote SNMPv1, SNMPv2c and SNMPv3
management. This form of management requires an SNMP application,
such as AT-View, and an understanding of management information base
(MIB) objects.
17
Page 46
Chapter 1: AlliedWare Plus Command Line Interface
The switch supports the following MIBs for SNMP management:
atistackinfo.mib
atiEdgeSwtich.mib
RFC 1155 MIB
RFC 1213 MIB-II
RFC 1493 Bridge MIB
RFC 1643 Ethernet MIB
RFC 2096 IP Forwarding Table MIB
RFC 2790 Host MIB
RFC 2863 Interface Group MIB
RFC 3176 sFlow MIB
IEEE 802.1x 2010 MIB
The Allied Telesis managed switch MIBs (atistackinfo.mib and
atiEdgeSwitch.mib) are available from the Allied Telesis web site.
18
Page 47
Management Interfaces
The switch has two management interfaces:
AlliedWare Plus command line
Web browser windows
The AlliedWare Plus command line is available from local management
sessions, and remote Telnet and Secure Shell management sessions. The
web browser windows are available from remote web browser
management sessions.
AT-9000 Switch Command Line User’s Guide
19
Page 48
Chapter 1: AlliedWare Plus Command Line Interface
Local Manager Account
You must log on to manage the switch. This requires a valid user name
and password. The switch comes with one local manager account. The
user name of the account is “manager” and the default password is
“friend.” The user name and password are case sensitive. This account
gives you access to all management modes and commands.
The default manager account is referred to as “local” because the switch
authenticates the user name and password itself. If more manager
accounts are needed, you can add up to eight more local manager
accounts. For instructions, refer to Chapter 76, “Local Manager Accounts”
on page 1259.
Another way to create more manager accounts is to transfer the task of
authenticating the accounts to a RADIUS or TACACS+ server on your
network. For instructions, refer to Chapter 88, “RADIUS and TACACS+
Clients” on page 1361.
The initial and default switch configuration supports up to three
management sessions at one time. The number of sessions can be
configured using the SERVICE MAXMANAGER command. The maximum
number of sessions is 3. See “SERVICE MAXMANAGER” on page 126.
20
Page 49
AlliedWare Plus Command Modes
The AlliedWare Plus command line interface consists of a series of modes
that are arranged in the hierarchy shown in Figure 1.
AT-9000 Switch Command Line User’s Guide
Figure 1. Command Modes
The modes have different commands and support different management
functions. The only exceptions are the User Exec mode and the Privileged
Exec mode. The Privileged Exec mode contains all the same commands
as the User Exec mode, plus many more.
To perform a management function, you first have to move to the mode
that has the appropriate commands. For instance, to configure the speeds
and wiring configurations of the ports, you have to move to the Port
Interface mode because the SPEED and POLARITY commands, which
are used to configure the speed and wiring parameters, are stored in that
mode.
Some management functions require that you perform commands from
more than one mode. For instance, creating a new VLAN requires that you
first go to the VLAN Configuration mode to initially create it and then to the
Port Interface mode to designate the ports.
The modes, their command line prompts, and their functions are listed in
Table 2 on page 22.
21
Page 50
Chapter 1: AlliedWare Plus Command Line Interface
Note
By default, the mode prompts are prefixed with the “awplus” string.
To change this string, use the HOSTNAME command. See “What to
Configure First” on page 42.
ModePromptFunction
Table 2. AlliedWare Plus Modes
User Exec modeawplus>
Privileged Exec modeawplus#
Global Configuration modeawplus (config)#
Displays the switch settings.
Lists the files in the file system.
Pings remote systems.
Displays the switch settings.
Lists the files in the file system.
Pings remote systems.
Sets the date and time.
Saves the current configuration.
Downloads new versions of the
management software.
Restores the default settings.
Renames files in the file system.
Resets the switch.
Creates classifiers and access
control lists.
Creates encryption keys for remote
HTTPS and SSH management.
Activates and deactivates 802.1x
port-based network access control.
Assigns a name to the switch.
Configures IGMP snooping.
Sets the MAC address table aging
timer.
Enters static MAC addresses.
Specifies the IP address of an
SNTP server.
Configures the RADIUS client.
Sets the console timer.
22
Page 51
AT-9000 Switch Command Line User’s Guide
Table 2. AlliedWare Plus Modes (Continued)
ModePromptFunction
Console Line modeawplus (config-line)# Sets the session timer for local
awplus(config)# line console 0
awplus(config-line)#
Moving Down the Hierarchy
To move down the mode hierarchy, you have to step through each mode
in sequence. Skipping modes is not permitted.
Each mode has a different command. For instance, to move from the User
Exec mode to the Privileged Exec mode, you use the ENABLE command.
Some commands, like the INTERFACE PORT command, which is used to
enter the Port Interface mode, require a value, such as a port number, a
VLAN ID or a port trunk ID.
ENABLE
Command
CONFIGURE
TERMINAL
Command
You use this command to move from the User Exec mode to the
Privileged Exec mode. The format of the command is:
enable
Figure 2. ENABLE Command
You use this command to move from the Privileged Exec mode to the
Global Configuration mode. The format of the command is:
configure terminal
Figure 3. CONFIGURE TERMINAL Command
LINE CONSOLE
0 Command
24
You use this command to move from the Global Configuration mode to the
Console Line mode to set the management session timer and to activate
or deactivate remote authentication for local management sessions. The
mode is also used to set the baud rate of the terminal port. The format of
the command is:
You use this command to move from the Global Configuration mode to the
Virtual Terminal Line mode to set the management session timer and to
activate or deactivate remote authentication of manager accounts. The
format of the command is:
line vty
The range of the LINE_ID parameter is 0 to 9. For information on the VTY
lines, refer to “VTY Lines” on page 41. This example enters the Virtual
Terminal Line mode for VTY line 2:
You use this command to move from the Global Configuration mode to the
Dynamic Port Trunk Interface mode, to change the load distribution
methods of static port trunks. You specify a trunk by its name of “po”
followed by its ID number. You can specify only one static port trunk at a
time. The format of the command is:
interface
line_id
Figure 5. LINE VTY Command
trunk_name
INTERFACE
Command - Ports
This example enters the Port Trunk Interface mode for trunk ID 5:
Figure 6. INTERFACE TRUNK Command
You use this command to move from the Global Configuration mode to the
Interface mode where you configure the parameter settings of the ports
and add ports to VLANs and Quality of Service policies. The format of the
command is:
interface
This example enters the Port Interface mode for port 21.
You can configure more than one port at a time. This example enters the
Port Interface mode for ports 11 to 15 and 22.
The INTERFACE PORT command is also located in the Port Interface
mode itself, so that you do not have to return to the Global Configuration
mode to configure different ports. This example moves from the current
Port Interface mode to the Port Interface mode for ports 7 and 10.
Figure 9. INTERFACE PORT Command - Moving Between Port Interface
Figure 8. INTERFACE PORT Command - Multiple Ports
Modes
INTERFACE
Command -
Static Port Trunk
INTERFACE
VLAN Command
You use this command to move from the Global Configuration mode to the
Static Port Trunk Interface mode, to change the load distribution methods
of static port trunks. You specify a trunk by its name of “sa” followed by its
ID number. You can specify only one static port trunk at a time. The format
of the command is:
interface
trunk_name
This example enters the Static Port Trunk Interface mode for trunk ID 2:
Figure 10. INTERFACE TRUNK Command
You use this command to move from the Global Configuration mode to the
VLAN Interface mode to assign the switch a management IP address. The
format of the command is:
interface vlan
vid
The VID parameter is the ID of an existing VLAN on the switch. This
example enters the VLAN Interface mode for a VLAN that has the VID 12:
A VLAN must be identified in this command by its VID and not by its
name.
VLAN
DATABASE
Command
LOCATION
CIVIC-
LOCATION
Command
You use this command to move from the Global Configuration mode to the
VLAN Configuration mode, which has the commands for creating VLANs.
The format of the command is:
vlan database
Figure 12. VLAN DATABASE Command
You use this command to move from the Global Configuration mode to the
Civic Location mode, to create LLDP civic location entries. The format of
the command is:
location civic-location
This example assigns the ID number 16 to a new LLDP civic location
entry:
id_number
LOCATION
COORD-
LOCATION
Command
Figure 13. LLDP LOCATION CIVIC-LOCATION Command
You use this command to move from the Global Configuration mode to the
Coordinate Location mode, to create LLDP coordinate location entries.
The format of the command is:
location coord-location
This example assigns the ID number 8 to a new LLDP coordinate location
entry:
Figure 14. LLDP LOCATION COORD-LOCATION Command
id_number
27
Page 56
Chapter 1: AlliedWare Plus Command Line Interface
Moving Up the Hierarchy
There are four commands for moving up the mode hierarchy. They are the
EXIT, QUIT, END and DISABLE commands.
EXIT and QUIT
Commands
These commands, which are functionally identical, are found in nearly all
the modes. They move you up one level in the hierarchy, as illustrated in
Figure 15.
Figure 15. Moving Up One Mode with the EXIT and QUIT Command
END CommandAfter you have configured a feature, you may want to return to the
Privileged Exec mode to verify your changes with the appropriate SHOW
command. You can step back through the modes one at a time with the
EXIT or QUIT command. However, the END command is more convenient
because it moves you directly to the Privileged Exec mode from any mode
below the Global Configuration mode.
28
Page 57
AT-9000 Switch Command Line User’s Guide
DISABLE
Command
Figure 16. Returning to the Privileged Exec Mode with the END Command
To return to the User Exec mode from the Privileged Exec mode, use the
DISABLE command.
Figure 17. Returning to the User Exec Mode with the DISABLE Command
29
Page 58
Chapter 1: AlliedWare Plus Command Line Interface
Note
Port Numbers in Commands
The ports on the switch are identified in the commands with the PORT
parameter. The parameter has the format shown in Figure 18.
Figure 18. PORT Parameter in the Command Line Interface
The variables in the parameter are defined here:
Switch ID: This number is used if the switch supports stacking. It is the
switch’s ID number in a stack. This number should always be 1 for AT9000 Series switches because they do not support stacking.
Module Slot ID: This number is used for modular switches that have
slots for networking modules. It is used to identify the networking
modules by their slot numbers. This number should always be 0 for
AT-9000 Series switches because they are not modular switches.
Port number: This is a port number.
The correct format of the PORT parameter for AT-9000 Series
switches is PORT1.0.n.
Here are a few examples of the PORT parameter. This example uses the
INTERFACE PORT command to enter the Port Interface mode for ports
12 and 18:
You can also specify port ranges. This example displays the port settings
for ports 21 to 23:
awplus# show interface port1.0.21-port1.0.23
Note that you must include the prefix “port1.0.” in the last number of a
range.
30
Page 59
AT-9000 Switch Command Line User’s Guide
You can also combine individual ports and port ranges in the same
command, as illustrated in these commands, which enter the Port
Interface mode for ports 5 to 11 and ports 16 and 18:
Ports 25 to 28 on the AT-9000/28, AT-9000/28POE, and AT-9000/28SP
Managed Layer 2 ecoSwitches are combo ports. Each combo consists of
one 10/100/1000Base-T port and one SFP slot. The twisted pair ports
have the letter R for Redundant as part of their port numbers on the front
faceplates of the units.
Here are the guidelines to using these ports and slots:
Only one port in a pair — either the twisted pair port or the companion
SFP module — can be active at a time.
The twisted pair port is the active port if the SFP slot is empty, or if an
SFP module is installed but does not have a link to a network device.
The twisted pair port automatically changes to the redundant status
mode when an SFP module establishes a link with a network device.
A twisted pair port automatically transitions back to the active status
when a link is lost on an SFP module.
A twisted pair port and an SFP module share the same configuration
settings, including port settings, VLAN assignments, access control
lists, and spanning tree.
The only exception to shared settings is port speed. If you disable
Auto-Negotiation on a twisted pair port and set the speed and duplex
mode manually, the speed reverts to Auto-Negotiation when an SFP
module establishes a link with an end node.
These guidelines do not apply to the SFP slots on the AT-9000/52
Managed Layer 2 ecoSwitch.
32
Page 61
Command Format
AT-9000 Switch Command Line User’s Guide
The following sections describe the command line interface features and
the command syntax conventions.
Command Line
Interface
Features
Command
Formatting
Conventions
Command
Examples
The command line interface has these features:
Command history - Use the up and down arrow keys.
Keyword abbreviations - Any keyword can be recognized by typing
an unambiguous prefix, for example, type “sh” and the software
responds with “show.”
Tab key - Pressing the Tab key fills in the rest of a keyword
automatically. For example, typing “sh” and then pressing the Tab
key enters “show” on the command line.
This manual uses the following command format conventions:
screen text font - This font illustrates the format of a command
and command examples.
[ ] - Brackets indicate optional parameters.
| - Vertical line separates parameter options for you to choose
from.
Italics - Italics indicate variables you have to provide.
Most of the command examples in this guide start at the User Exec mode
and include the navigational commands. Here is an example that creates a
new VLAN called Engineering with the VID 5:
You do not have to return to the User Exec mode when you finish a
management task. But it is a good idea to return to the Privileged Exec
mode to confirm your changes with the appropriate SHOW command,
before performing a new task.
33
Page 62
Chapter 1: AlliedWare Plus Command Line Interface
CFE-NTSW-5.0.4 for BCM956218 (32bit,SP,BE,MIPS)
Build Date: Thu May 20 12:22:14 PDT 2010 (jwong@tiramisu)
Copyright (C) 2000-2008 Broadcom Corporation.
Initializing Arena.
Initializing Devices.
Board : AT9000_28SP
CPU type 0x2901A: 266MHz
Total memory: 0x8000000 bytes (128MB)
Total memory used by CFE: 0x87EB8000 - 0x87FFFBE0 (1342432)
Initialized Data: 0x87EFA324 - 0x87EFCAF0 (10188)
BSS Area: 0x87EFCAF0 - 0x87EFDBE0 (4336)
Local Heap: 0x87EFDBE0 - 0x87FFDBE0 (1048576)
Stack Area: 0x87FFDBE0 - 0x87FFFBE0 (8192)
Text (code) segment: 0x87EB8000 - 0x87EF9B6F (269167)
Boot area (physical): 0x07E77000 - 0x07EB7000
Relocation Factor: I:E82B8000 - D:E82B8000
Resetting uart to 9600 baud.
Press Ctrl-C to stop auto boot..........3...2...1...
Loader:elf Filesys:raw Dev:flash0.os-Linux File:ATI Options:(null)
Loading: 0x80001000/42538636 0x8289268c/96724 Entry at 0x80230860
Starting program at 0x80230860
The switch generates the following series of status messages whenever it
is powered on or reset. The messages can be viewed on the Console port
with a terminal or a computer with a terminal emulator program.
34
Figure 19. Startup Messages
Page 63
Initializing System ................................. done!
“Starting a Local Management Session” on page 38
“Starting a Remote Telnet or SSH Management Session” on page 40
“What to Configure First” on page 42
“Ending a Management Session” on page 47
You must do the initial configuration of the switch from a local
management session.
37
Page 66
Chapter 2: Starting a Management Session
Note
Starting a Local Management Session
To start a local management session on the switch, perform the following
procedure:
1. Connect the RJ-45 connector on the management cable that comes
with the switch to the Console port, as shown in Figure 22. The
Console port is located on the front panels on the AT-9000/12POE,
AT-9000/28, AT-9000/28POE, and AT-9000/28SP Switches and on
the back panel on the AT-9000/52 Switch.
Figure 22. Connecting the Management Cable to the Console Port
2. Connect the other end of the cable to an RS-232 port on a terminal or
PC with a terminal emulator program.
3. Configure the terminal or terminal emulator program as follows:
Baud rate: 9600 bps (The baud rate of the Console Port is
adjustable from 1200 to 115200 bps. The default is 9600 bps.)
Data bits: 8
Parity: None
Stop bits: 1
Flow control: None
The port settings are for a DEC VT100 or ANSI terminal, or an
equivalent terminal emulator program.
4. Press Enter.
You are prompted for a user name and password.
38
Page 67
AT-9000 Switch Command Line User’s Guide
awplus>
5. Enter a user name and password. If this is the initial management
session of the switch, enter “manager” as the user name “friend” as the
password. The user name and password are case sensitive.
The local management session has started when the AlliedWare Plus
command line prompt, shown in Figure 23 is displayed.
Figure 23. AlliedWare Plus Command Line Prompt
39
Page 68
Chapter 2: Starting a Management Session
Starting a Remote Telnet or SSH Management Session
Here are the requirements for remote management of the switch from a
Telnet or SSH client on your network:
You must assign the switch a management IP address. To initially
assign the switch an address, use a local management session.
For instructions, refer to “What to Configure First” on page 42 or
Chapter 13, “IPv4 and IPv6 Management Addresses” on page 257.
The workstation that has the Telnet or SSH client must be a
member of the same subnet as the management IP address on the
switch, or must have access to it through routers or other Layer 3
devices.
If the workstation with the Telnet or SSH client is not a member of
the same subnet as the management IP address, you must also
assign the switch a default gateway. This IP address needs to
specify an interface on a router or other Layer 3 routing device that
is the first hop to the subnet where the client resides. The default
gateway must be a member of the same subnet as the
management IP address. For instructions, refer to “What to
Configure First” on page 42 or Chapter 13, “IPv4 and IPv6
Management Addresses” on page 257.
For remote SSH management, you must create an encryption key
pair and configure the SSH server on the switch. For instructions,
see Chapter 82, “Secure Shell (SSH) Server” on page 1299. The
factory configuration includes a default random key. When you
initially connect to the switch, most SSH clients will flag the new
key and ask you to accept it.
To start a remote Telnet or SSH management session, perform the
following procedure:
1. In the Telnet or SSH client on your remote management workstation,
enter the management IP address of the switch.
Prompts are displayed for a user name and password.
2. Enter a user name and password of a management account on the
switch. The switch comes with one management account. The user
name is “manager” and the password is “friend“. User names and
passwords are case sensitive.
The management session starts and the command line interface
prompt is displayed, as shown in Figure 23 on page 39.
40
Page 69
AT-9000 Switch Command Line User’s Guide
VTY LinesThe switch has ten VTY (virtual teletypewriter) lines. Each line supports
one remote Telnet or SSH management session. The switch allocates the
lines, which are numbered 0 to 9, in ascending order, beginning with line 0,
as remote sessions are initiated.
The VTY lines cannot be reserved for particular remote workstations
because the switch allocates them as needed. Line 0 is assigned by the
switch to a new remote session if there are no other active remote
sessions. Or, if there is already one active management session, a new
session is assigned line 1, and so on.
You can adjust these three parameters on the individual lines:
Management session timer - This timer is used by the switch to
end inactive management sessions, automatically. This protects
the switch from unauthorized changes to its configuration sessions
should you leave your workstation unattended during a
management session. For instructions on how to set this timer,
refer to “Configuring the Management Session Timers” on
page 96.
Number of SHOW command scroll lines - You can specify the
number of lines that SHOW commands display at one time on your
screen. Refer to “LENGTH” on page 67 to set this parameter.
Remote authentication of management accounts - You can toggle
on or off remote authentication of management accounts on the
individual VTY lines. Lines use local authentication when remote
authentication is turned off. For background information, refer to
Chapter 88, “RADIUS and TACACS+ Clients” on page 1361.
41
Page 70
Chapter 2: Starting a Management Session
What to Configure First
Here are a few suggestions on what to configure during your initial
management session of the switch. The initial management session must
be a local management session from the Console port on the switch. For
instructions on how to start a local management session, refer to “Starting
a Local Management Session” on page 38.
Creating a Boot
Configuration
File
The first thing you should do is create a boot configuration file in the
switch’s file system and mark it as the active boot configuration file. This
file is used by the switch to store your configuration changes. It should be
noted that a boot configuration file contains only those parameter settings
that have been changed from their default values on the unit. So,
assuming the switch is just out of its shipping container, the file, when you
create it, contains about 20 lines.
The quickest and easiest way to create a new boot configuration file and
to designate it as the active file is with the BOOT CONFIG-FILE
command, located in the Global Configuration mode. Here is the format of
the command:
boot config-file
The name of the new boot configuration file, which is specified with the
FILENAME parameter, can be from 1 to 16 alphanumeric characters, not
including the extension “.cfg.” The filename cannot contain spaces and the
extension must be “.cfg.”
Here is an example that creates a new boot configuration file called
“switch1.cfg:”
When you see the message “Operation successful,” the switch has
created the file and marked it as the active boot configuration file. To
confirm the creation of the file, return to the Global Configuration mode
and enter the SHOW BOOT command:
awplus(config)# exit
awplus# show boot
Figure 24 on page 43 is an example of the display.
Page 71
AT-9000 Switch Command Line User’s Guide
Note
Current software: v2.2.1.1
Current boot image: v2.2.1.1
Default boot config: boot.cfg
Current boot config: switch1.cfg (file exists)
Figure 24. SHOW BOOT Command
The name of your new active boot configuration file is displayed in the
“Current boot config” field.
Changing the
Login Password
To protect the switch from unauthorized access, you should change the
password of the manager account. The password is set with the
USERNAME command in the Global Configuration. Here is the format of
the command.
username
username
password
password
Both the user name and the password are case sensitive. The password
can consist of 1 to 16 alphanumeric characters including punctuation and
printable special characters. Spaces are not permitted.
This example of the command changes the password of the manager
account to “clearsky2a:
Write down the new password and keep it in a safe and secure
location. If you forget the manager password, you cannot manage
the switch if there are no other management accounts on the unit. In
this case, contact Allied Telesis Technical Support for assistance.
For instructions on how to create additional management accounts, refer
to Chapter 76, “Local Manager Accounts” on page 1259.
Assigning a Name
to the Switch
The switch will be easier to identify if you assign it a name. The switch’s
name is displayed in the screen banner when you log on and replaces the
“awplus” in the command line prompt.
A name is assigned to the switch with the HOSTNAME command in the
Global Configuration mode. Here is the format of the command:
hostname
name
A name can consist of up to 39 alphanumeric characters. Spaces,
punctuation, special characters, and quotation marks are not permitted.
43
Page 72
Chapter 2: Starting a Management Session
Note
This example assigns the name “Engineering_sw2” to the switch:
You must assign the switch a management IP address to use the features
in Table 26 on page 258. Here are the requirements:
The switch can have one management IPv4 address and one
management IPv6 address.
A management IP address must be assigned to a VLAN on the
switch. It can be any VLAN, including the Default_VLAN. For
background information on VLANs, refer to Chapter 47, “Portbased and Tagged VLANs” on page 687.
The network devices (that is, syslog servers, TFTP servers, etc.)
must be members of the same subnet as a management IP
address or have access to it through the default gateway.
The switch must also have a default gateway if the network
devices are not members of the same subnet as the management
IP address. The default gateway specifies the IP address of a
router interface that represents the first hop to the subnets or
networks of the network devices.
A default gateway address, if needed, must be a member of the
same subnet as a management IP address.
The switch can have one IPv4 default gateway and one IPv6
gateway.
44
The following examples illustrate how to assign a management IPv4
address to the switch. For instructions on how to assign an IPv6
address, refer to Chapter 13, “IPv4 and IPv6 Management
Addresses” on page 257.
The IP ADDRESS command in the VLAN Interface mode command adds
a management IPv4 address to the switch. This example of the command
assigns the management IPv4 address 149.82.112.72 and a subnet mask
of 255.255.255.0 to the Default_VLAN, which has the VID 1. The switch is
also assigned the default gateway 149.82.112.18:
Page 73
AT-9000 Switch Command Line User’s Guide
Table 3. Adding a Management Address: Example 1
awplus> enable
awplus# configure terminal
awplus(config)# interface vlan1
awplus(config-if)# ip address
149.82.112.72/24
awplus(config-if)# exit
awplus(config)# ip route 0.0.0.0/0
149.82.112.18
awplus(config)# exit
Move to the Privileged Exec mode.
Move to the Global Configuration mode.
Use the INTERFACE VLAN command to
move to the VLAN Interface mode of the
Default_VLAN.
Assign the management IPv4 address to
the switch using the IP ADDRESS
command. The mask is a decimal number
that represents the number of bits, from
left to right, that constitute the network
portion of the address. For example, the
decimal masks 16 and 24 are equivalent
to masks 255.255.0.0 and 255.255.255.0,
respectively.
Return to the Global Configuration mode.
Assign the default gateway to the switch
using the IP ROUTE command.
Return to the Privileged Exec mode.
awplus# show ip route
This example assigns the management IPv4 address to a new VLAN
called Tech_Support, with the VID 5. The VLAN will consist of the
untagged ports 5,6, and 23. The management IPv4 address and default
route of the switch will be assigned by a DHCP server on the network:
Table 4. Adding a Management IP Address: Example 2
Verify the new management IPv4 address
and default gateway with the SHOW IP
ROUTE command.
Move to the Privileged Exec mode.
Move to the Global Configuration mode.
Enter the VLAN Configuration mode.
Create the new VLAN with the VLAN
command.
Return to the Global Configuration mode.
Enter the Port Interface mode for ports 5,
6, and 23.
45
Page 74
Chapter 2: Starting a Management Session
Table 4. Adding a Management IP Address: Example 2
awplus(config-if)# switchport access vlan 5
awplus(config-if)# exit
awplus(config)# interface vlan5
awplus(config-if)# ip address dhcp
awplus(config-if)# end
awplus# show ip interface
awplus# show ip route
Saving Your
Changes
To permanently save your changes in the active boot configuration file,
use the WRITE command in the Privileged Exec mode:
awplus# write
Add the ports as untagged ports to the
VLAN with the SWITCHPORT ACCESS
VLAN command.
Return to the Global Configuration mode.
Use the INTERFACE VLAN command to
move to the VLAN Interface mode of
VLAN 5.
Activate the DHCP client on the switch
with the IP ADDRESS DHCP command.
Return to the Global Configuration mode.
Verify the management IP address on the
switch.
Verify the new management IPv4 address
and default gateway.
You can also update the active configuration file with the COPY
RUNNING-CONFIG STARTUP-CONFIG command, also located in the
Global Configuration mode. It is just more to type.
46
Page 75
Ending a Management Session
To end a management session, go to either the Privileged Exec mode or
the User Exec mode. From the Privileged Exec mode, enter either the
EXIT or LOGOUT to end a management session:
awplus# exit
or
awplus# logout
From the User Exec mode, enter either the EXIT or LOGOUT command to
end a management session:
awplus> exit
or
awplus> logout
AT-9000 Switch Command Line User’s Guide
47
Page 76
Chapter 2: Starting a Management Session
48
Page 77
Chapter 3
Basic Command Line Management
This chapter contains the following sections:
“Clearing the Screen” on page 50
“Displaying the On-line Help” on page 51
“Saving Your Configuration Changes” on page 53
“Ending a Management Session” on page 54
49
Page 78
Chapter 3: Basic Command Line Management
Clearing the Screen
If your screen becomes cluttered with commands, you can start fresh by
entering the CLEAR SCREEN command in the User Exec or Privileged
Exec mode. If you are in a lower mode, you have to move up the mode
hierarchy to one of these modes to use the command. Here is an example
of the command from the Port Interface mode:
convertConvert vlan
doTo run exec commands in config mode
endEnd current mode and down to privileged mode
exitEnd current mode and down to previous mode
helpDescription of the interactive help system
noNegate a command or set its defaults
private-vlanPrivate-vlan
quitEnd current mode and down to previous mode
vlanAdd, delete, or modify values associated
with a single VLAN
bothFlow control on send and receive
receiveFlow control on receive
sendFlow control on send
The command line interface has an on-line help system to assist you with
the commands. The help system is displayed by typing a question mark.
Typing a question mark at a command line prompt displays all the
keywords in the current mode. This example displays all the keywords in
the VLAN Configuration mode.
AT-9000 Switch Command Line User’s Guide
Figure 25. Displaying the Keywords of a Mode
Typing a question mark after a keyword displays any additional keywords
or parameters. This example displays the available parameters for the
FLOWCONTROL command in the Port Interface mode.
Figure 26. Displaying Subsequent Keywords of a Keyword
You must type a space between the keyword and the question mark.
Otherwise, the on-line help system simply displays the previous
keyword.
Typing a question mark at the point in a command where a value is
required displays a value’s class (that is, integer, string, etc.). The example
in Figure 27 on page 52 displays the class of the value for the
HOSTNAME command in the Global Configuration mode.
To permanently save your changes to the parameter settings on the
switch, you must update the active boot configuration file. This is
accomplished with either the WRITE command or the COPY RUNNINGCONFIG STARTUP-CONFIG command, both of which are found in the
Privileged Exec mode. When you enter either of these commands, the
switch copies its running configuration into the active boot configuration
file for permanent storage.
To update the active configuration file, enter:
awplus# write
or
awplus# copy running-config startup-config
AT-9000 Switch Command Line User’s Guide
Parameter changes that are not saved in the active boot
configuration file are discarded when the switch is powered off or
reset.
53
Page 82
Chapter 3: Basic Command Line Management
Ending a Management Session
To end a management session, go to either the Privileged Exec mode or
the User Exec mode. From the Privileged Exec mode, enter either the
EXIT or LOGOUT to end a management session:
awplus# exit
or
awplus# logout
From the User Exec mode, enter either the EXIT or LOGOUT command to
end a management session:
awplus> exit
or
awplus> logout
54
Page 83
Chapter 4
Basic Command Line Management
Commands
The basic command line commands are summarized in Table 5.
Table 5. Basic Command Line Commands
CommandModeDescription
“? (Question Mark Key)” on page 57All modesDisplays the on-line help.
“CLEAR SCREEN” on page 59User Exec and
Privileged Exec
“CONFIGURE TERMINAL” on
page 60
“COPY RUNNING-CONFIG
STARTUP-CONFIG” on page 61
“DISABLE” on page 62Privileged ExecReturns you to the User Exec mode
“DO” on page 63Global
“ENABLE” on page 64User ExecMoves you from the User Exec mode
“END” on page 65All modes
Privileged ExecMoves you from the Privileged Exec
Privileged ExecUpdates the active boot configuration
Configuration
below the
Global
Configuration
mode
Clears the screen.
mode to the Global Configuration
mode.
file with the current settings from the
switch.
from the Privileged Exec mode.
Performs Privileged Exec mode
commands from the Global
Configuration mode.
to the Privileged Exec mode.
Returns you to the Privileged Exec
mode.
“EXIT” on page 66All modes
except the User
Exec and
Privileged Exec
“LENGTH” on page 67Console Line
and Virtual
Terminal Line
“LOGOUT” on page 69User ExecEnds a management session.
Moves you up one mode.
Specifies the maximum number of
lines the SHOW commands display at
one time on the screen.
55
Page 84
Chapter 4: Basic Command Line Management Commands
Table 5. Basic Command Line Commands (Continued)
CommandModeDescription
“QUIT” on page 70All modes
Moves you up one mode.
except the User
Exec and
Privileged Exec
“WRITE” on page 71Privileged ExecUpdates the active boot configuration
file with the current settings of the
switch.
56
Page 85
? (Question Mark Key)
Note
Syntax
?
Parameters
None
Modes
All modes
Description
Use the question mark key to display on-line help messages. Typing the
key at different points in a command displays different messages:
AT-9000 Switch Command Line User’s Guide
Typing “?” at a command line prompt displays all the keywords in
the current mode.
Typing “?” after a keyword displays the available parameters.
You must type a space between a keyword and the question mark.
Otherwise, the on-line help returns the previous keyword.
Typing “?” after a keyword or parameter that requires a value
displays a value’s class (i.e. integer, string, etc.).
Examples
This example displays all the keywords in the Port Interface mode for port
4:
Use this command to move from the Privileged Exec mode to the Global
Configuration mode.
Example
awplus# configure terminal
awplus(config)#
60
Page 89
COPY RUNNING-CONFIG STARTUP-CONFIG
Note
Syntax
copy running-config startup-config
Parameters
None
Mode
Privileged Exec mode
Description
Use this command to update the active boot configuration file with the
switch’s current configuration, for permanent storage. When you enter the
command, the switch copies its parameter settings into the active boot
configuration file. The switch saves only those parameters that are not at
their default settings.
AT-9000 Switch Command Line User’s Guide
Parameter changes that are not saved in the active boot
configuration file are discarded when the switch is powered off or
reset.
To view the name of the active boot configuration file, see “SHOW BOOT”
on page 456.
This command is equivalent to “WRITE” on page 71.
Example
awplus# copy running-config startup-config
61
Page 90
Chapter 4: Basic Command Line Management Commands
DISABLE
Syntax
disable
Parameters
None
Mode
Privileged Exec mode
Description
Use this command to return to the User Exec mode from the Privileged
Exec mode.
Example
The following command returns the software to the User Exec mode:
awplus# disable
awplus>
62
Page 91
DO
AT-9000 Switch Command Line User’s Guide
Syntax
do
command
Parameter
command
Specifies the Privileged Exec mode command to perform.
Mode
Global Configuration mode
Description
Use this command to perform Privileged Exec mode commands from the
Global Configuration mode. You may use the command to perform some,
but not all, of the Privileged Exec mode commands. To view the available
commands, type a question mark “?” after the DO command.
Examples
This example displays all of the Privileged Exec mode commands you may
perform using the DO command in the Global Configuration mode:
awplus(config)# do ?
This example displays all of the available SHOW commands:
awplus(config)# do show ?
This example performs the SHOW INTERFACE command for port 4 from
the Global Configuration mode:
awplus(config)# do show interface port1.0.4
This example pings a network device:
awplus(config)# do ping 149.11.123.45
63
Page 92
Chapter 4: Basic Command Line Management Commands
ENABLE
Syntax
enable
Parameters
None
Mode
User Exec mode
Description
Use this command to move from the User Exec mode to the Privileged
Exec mode.
Example
The following command moves the prompt from the User Exec mode to
the Privileged Exec mode:
awplus> enable
awplus#
64
Page 93
END
AT-9000 Switch Command Line User’s Guide
Syntax
end
Parameters
None
Mode
All modes below the Global Configuration mode.
Description
Use this command to return to the Privileged Exec mode.
Example
The following command returns the prompt to the Privileged Exec mode:
awplus(config-if)# end
awplus#
65
Page 94
Chapter 4: Basic Command Line Management Commands
EXIT
Syntax
exit
Parameters
None
Mode
All modes
Description
Use this command to move down one mode in the mode hierarchy in all
modes except the User Exec and Privileged Exec modes. Using the EXIT
command in the User Exec and Privileged Exec modes terminates the
management session.
Example
The following example moves the prompt from the Global Configuration
mode to the Privileged Exec mode:
awplus(config)# exit
awplus#
66
Page 95
LENGTH
AT-9000 Switch Command Line User’s Guide
Syntax
length
value
Parameters
value
Specifies the maximum number of lines that the SHOW commands
display at one time on the screen. The range is 0 to 512 lines. Use
the value 0 if you do not want the SHOW commands to pause.
Mode
Console Line and Virtual Terminal Line modes
Description
Use this command to specify the maximum number of lines the SHOW
commands display at one time on the screen during local or remote
management sessions. You can set different values for the local and
remote management methods. To set this parameter for local
management sessions, enter the command in the Console Line mode. To
set this parameter for the ten VTY lines for remote Telnet and SSH
sessions, enter the same command in the Virtual Terminal Line modes.
Each VTY line can have a different setting.
The default value is 20 lines for the console port. For the VTY lines, the
default value is negotiated with the VTY ports.
Examples
This example sets the maximum number of lines to 25 for local
management sessions:
All modes except the User Exec and Privileged Exec modes.
Description
Use this command to move up one mode in the mode hierarchy. This
command is almost identical to the EXIT command. The difference is that
unlike the EXIT command, the QUIT command cannot be used to end a
management session.
Example
This example uses the QUIT command to return to the Privileged Exec
mode from the Global Configuration mode:
awplus(config)# quit
awplus#
70
Page 99
WRITE
Note
AT-9000 Switch Command Line User’s Guide
Syntax
write
Parameters
None
Mode
Privileged Exec mode
Description
Use this command to update the active boot configuration file with the
switch’s current configuration, for permanent storage. When you enter the
command, the switch copies its parameter settings into the active boot
configuration file. The switch saves only those parameters that are not at
their default settings.
Parameter changes that are not saved in the active boot
configuration file are discarded when the switch is powered off or
reset.
To view the name of the active boot configuration file, see “SHOW BOOT”
on page 456.
This command is equivalent to “COPY RUNNING-CONFIG STARTUPCONFIG” on page 61.
Example
awplus# write
71
Page 100
Chapter 4: Basic Command Line Management Commands
72
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.