Netscape Navigator is a registered trademark of Netscape Communications Corporation. All other product names, company names, logos or
other designations mentioned herein are trademarks or registered trademarks of their respective owners.
Allied Telesis, Inc. reserves the right to make changes in specifications and other information contained in this document without prior
written notice. The information provided herein is subject to change without notice. In no event shall Allied Telesis, Inc. be liable for any
incidental, special, indirect, or consequential damages whatsoever, including but not limited to lost profits, arising out of or related to this
manual or the information contained herein, even if Allied Telesis, Inc. has been advised of, known, or should have known, the possibility of
such damages.
port security.........................................................................................................................................58
port security mode............................................................................................................................... 59
port security max................................................................................................................................. 59
port security routed secure-address....................................................................................................60
show bridge address-table ..................................................................................................................61
show bridge address-table static......................................................................................................... 62
show bridge address-table count.........................................................................................................62
show bridge multicast address-table ...................................................................................................64
show bridge multicast address-table static..........................................................................................66
show bridge multicast filtering .............................................................................................................66
show bridge multicast unregistered.....................................................................................................68
show ports security.............................................................................................................................. 68
sntp server ...........................................................................................................................................80
show clock............................................................................................................................................81
show sntp configuration .......................................................................................................................82
show sntp status ..................................................................................................................................83
Chapter 6.Configuration and Image File Commands...................................................... 85
show arp............................................................................................................................................140
show hosts......................................................................................................................................... 144
terminal history size ...........................................................................................................................159
show line............................................................................................................................................160
port monitor .......................................................................................................................................206
show ports monitor............................................................................................................................ 207
Chapter 23.Power over Ethernet Commands................................................................. 208
show qos............................................................................................................................................215
priority-queue out num-of-queues......................................................................................................216
show ip ssh ........................................................................................................................................295
show crypto key mypubkey................................................................................................................296
show crypto key pubkey-chain ssh ....................................................................................................297
show stack......................................................................................................................................... 328
show users ........................................................................................................................................ 329
show sessions................................................................................................................................... 330
show system...................................................................................................................................... 331
show system id..................................................................................................................................332
show version...................................................................................................................................... 333
show history....................................................................................................................................... 341
show privilege.................................................................................................................................... 342
show vlan...........................................................................................................................................356
show vlan internal usage....................................................................................................................356
show interfaces switchport.................................................................................................................357
Chapter 36.Web Server Commands................................................................................361
ip http server ................................. ... ... ....................................... ... .... ... ... ... ........................................361
show crypto certificate mycertificate ..................................................................................................369
show ip http........................................................................................................................................369
show ip https......................................................................................................................................370
Allied Telesis
AT-8000S-S94-3.0 Command Line Interface User’s Guide
Page 13
Preface
Preface
This guide describes how to configure an AT-8000S Series switch with AT-S94 V2.0.0 firmware using the
command line interface. The commands are grouped by topic into the following chapters:
•Chapter 1. "Using the CLI" — Describe the CLI basic structure and command usage.
•Chapter 2. "ACL Commands" — Define MAC and IP based ACLs and ACL bindings.
•Chapter 3. "AAA Commands" — Define the authentication method lists for servers.
information, enable GVRP globally or on an interface.
•Chapter 10. "IGMP Snooping Commands" — Enable the Internet Group Management Protocol (IGMP)
snooping.
•Chapter 11. "IP Addressing Commands" — Define a default gateway, set an IP address for interface,
delete entries from the host.
•Chapter 12. "IPv6 Addressing Commands" — Define addressing commands for the IPv6 protocol.
•Chapter 13. "Line Commands" — Display line parameters, enable the command history function, or
configure the command history buffer size.
•Chapter 14. "DHCP Option 82 Commands" — DHCP with Option 82 attaches authentication messages to
the packets sent from the host. DHCP passes the configuration information to hosts on a TCP/IP network.
This permits network administrators to limit address allocation authorized hosts.
•Chapter 15. "IP DHCP Relay" — Defines Dynamic Host Configuration Protocol (DHCP) relay features on
the router.
•Chapter 16. "LACP Commands" — Specify LACP system and port priority and display LACP information.
•Chapter 17. "LLDP Commands" — Define commands for use with LLDP.
for use on interfaces running IEEE 802.1x, and enable 802.1x globally.
Intended Audience
This guide is intended for network administrators familiar with IT concepts and terminology.
Document Conventions
This document uses the following conventions:
Provides related information or information of special importance.
Indicates potential damage to hardware or software, or loss of data.
Indicates a risk of personal injury.
Page 15
Contacting Allied Telesis
Contacting Allied Telesis
This section provides Allied Telesis contact information for technical support as well as sales or corporate
information. .
Preface
Online Support
Email and Telephone
Support
Returning Products
For Sales or
Corporate
Information
Warranty
You can request technical support online by accessing the Allied Telesis Knowledge Base
from the following web site:
www.alliedtelesis.com/support. You can use the Knowledge Base to submit questions
to our technical support staff and review answers to previously asked questions..
For Technical Support via email or telephone, refer to the Allied Telesis web site:
www.alliedtelesis.com. Select your country from the list displayed on the website. Then
select the appropriate menu tab.
Products for return or repair must first be assigned a Return Materials Authorization (RMA)
number. A product sent to Allied Telesis without a RMA number will be returned to the
sender at the sender’s expense.
To obtain an RMA number, contact the Allied Telesis Technical Support group at our web
site: www.alliedtelesis.com/support/. Select your country from the list displayed on the
website. Then select the appropriate menu tab.
You can contact Allied Telesis for sales or corporate information at our web site:
www.alliedtelesis.com. Select your country from the list displayed on the website. Then
select the appropriate menu tab.
The AT-8000S Series Switch has a limited warranty of two years. Go to
www.alliedtelesis.com/warranty for the specific terms and conditions of the warranty
and for warranty registration.
Page 16
Allied Telesis
AT-8000S-S94-3.0 Command Line Interface User’s Guide
Chapter 1. Using the CLI
Overview
This chapter describes how to start using the CLI and the CLI command editing features.
CLI Command Modes
Introduction
To assist in configuring the device, the Command Line Interface (CLI) is divided into different command modes.
Each command mode has its own set of specific commands. Entering a question mark "?" at the system prompt
(console prompt) displays a list of commands available for that particular command mode.
From each mode a specific command is used to navigate from one command mode to another. The standard
order to access the modes is as follows: Privileged EXEC mode, Global Configuration mode, and Interface Configuration mode. After logging into the device, the user is automatically in Privileged EXEC command mode
unless the user is defined as a User EXEC user.
The User EXEC mode can be assigned for a user once a user account is created. Only a limited subset of
commands are available in User EXEC mode. This level is reserved for tasks that do not change the configuration.
To enter the next level, the Privileged EXEC mode, a password is required.
The Privileged EXEC mode gives access to commands that are restricted on User EXEC mode and provides
access to the device Configuration mode.
The Global Configuration mode manages the device configuration on a global level.
The Interface Configuration mode configures specific interfaces in the device.
User EXEC Mode
In general, the User EXEC commands allow the user to perform basic tests, and list system information.
The user-level prompt consists of the device host name followed by the angle bracket (>).
Console>
The default host name is Console unless it has been changed using the hostname command in the Global
Configuration mode.
Privileged EXEC Mode
Privileged access is the system default mode and is password protected to prevent unauthorized use because
many of the privileged commands set operating system parameters. The password is not displayed on the screen
and is case sensitive.
Privileged users enter directly into the Privileged EXEC mode. To enter the Privileged EXEC mode from the User
EXEC mode, perform the following steps:
1.At the prompt enter the enable command and press <Enter>. A password prompt is displayed.
Page 17
Using the CLI
CLI Command Modes
2.Enter the password and press <Enter>. The password is displayed as *. The Privileged EXEC mode prompt
is displayed. The Privileged EXEC mode prompt consists of the device host name followed by #.
Console#
To return from the Privileged EXEC mode to the User EXEC mode, use the disable command. The following
example illustrates how to access the Privileged EXEC mode and return to the User EXEC mode:
Console>
Enter Password: ******
Console#
Console#
Console>
The exit command is used to return from any mode to the previous mode except when returning to the User
EXEC mode from the Privileged EXEC mode. For example, the exit command is used to return from the Inter face
Configuration mode to the Global Configuration mode.
enable
disable
Global Configuration Mode
Global Configuration mode commands apply to features that affect the system as a whole, rather than just a
specific interface. The configure Privileged EXEC mode command is used to enter the Global Configuration
mode.
To enter the Global Configuration mode perform the following steps:
1.At the Privileged EXEC mode prompt enter the configure command and press <Enter>. The Global
Configuration mode prompt is displayed. The Global Configuration mode prompt consists of the device host
name followed by (config) and #.
Console(config)#
One of the following commands can be used to return from the Global Configuration mode to the Privileged EXEC
mode:
•exit
•end
•Ctrl+Z
The following example illustrates how to access the Global Configuration mode and return to the Privileged EXEC
mode:
Console#
Console#
Console(config)#
Console#
configure
exit
Page 18
Allied Telesis
AT-8000S-S94-3.0 Command Line Interface User’s Guide
Interface Configuration and Specific Configuration Modes
Interface Configuration mode commands modify specific interface operations. The following are the Interface
Configuration modes:
•Line Interface — Contains commands to configure the management connections. These include commands
such as line timeout settings, etc. The line Global Configuration mode command is used to enter the Line
Configuration command mode.
•VLAN Database — Contains commands to create a VLAN as a whole. The VLAN database Global
Configuration mode command is used to enter the VLAN Database Interface Configuration mode.
•Management Access List — Contains commands to define management access-lists. The management
access-list Global Configuration mode command is used to enter the Management Access List Configuration
mode.
•Ethernet — Contains commands to manage port configuration. The interface ethernet Global Configuration
mode command is used to enter the Interface Configuration mode to configure an Ethernet type interface.
•Port Channel — Contains commands to configure port-channels, for example, assigning ports to a port-
channel. Most of these commands are the same as the commands in the Ethernet interface mode, and are
used to manage the member ports as a single entity. The interface port-channel Global Configuration mode
command is used to enter the Port Channel Interface Configuration mode.
•SSH Public Key-chain — Contains commands to manually specify other device SSH public keys. The
crypto key pubkey-chain ssh Global Configuration mode command is used to enter the SSH Public Key-
chain Configuration mode.
•QoS — Contains commands related to service definitions. The qos Global Configuration mode command is
used to enter the QoS services configuration mode.
•MAC Access-List— Configures conditions required to allow traffic based on MAC addresses. The mac
access-list Global Configuration mode command is used to enter the MAC access-list configuration mode.
•Tunnel Mode — Configures tunneling specifications in the device. The tunnel interface Global
Configuration mode command is used to enter the tunneling configuration mode.
Page 19
Using the CLI
Note
Note
Note
Starting the CLI
Starting the CLI
The device can be managed over a direct connection to the device console RS-232 port or via a Telnet
connection. The device is managed by entering command keywords and parameters at the prompt. Using the
device Command Line Interface (CLI) is very similar to entering commands on a UNIX system.
If access is via a Telnet connection, ensure that the device has a defined IP address, corresponding management
access is granted, and the workstation used to access the device is connected to the device prior to using CLI
commands.
The following steps are for use on the console line only.
To start using the CLI, perform the following steps:
1.Connect the DB9 null-modem or cross over cable to the RS-232 serial port of the device to the RS-232 serial
port of the terminal or computer running the terminal emulation application.
The default data rate is 115200 bps.
a) Set the data format to 8 data bits, 1 stop bit, and no parity.
b) Set Flow Control to none.
c) Under Properties, select VT100 for Emulation mode.
d) Select Terminal keys for Function, Arrow, and Ctrl keys. Ensure that the setting is for Terminal keys
(not Windows keys).
When using HyperTerminal with Microsoft® Windows 2000, ensure that Windows® 2000 Service Pack 2
or later is installed. With Windows 2000 Service Pack 2, the arrow keys function properly in
HyperTerminal’s VT100 emulation. Go to www.microsoft.com for information on Windows 2000 service
packs.
2.Configure the device and enter the necessary commands to complete the required tasks.
3.When finished, exit the session with the exit command.
When a different user is required to log onto the system, use the login Privileged EXEC mode command. This
effectively logs off the current user and logs on the new user.
Editing Features
Entering Commands
A CLI command is a series of keywords and arguments. Keywords identify a command, and arguments specify
configuration parameters. For example, in the command show interfaces status ethernet 1/e11, show, interfaces and status are keywords, ethernet is an argument that specifies the interface type, and 1/e11
specifies the port.
Page 20
Allied Telesis
AT-8000S-S94-3.0 Command Line Interface User’s Guide
To enter commands that require parameters, enter the required parameters after the command keyword. For
example, to set a password for the administrator, enter:
Console(config)#
When working with the CLI, the com m an d options are not displayed. The command is not selected from a menu,
but is manually entered. To see what commands are available in each mode or within an interface configuration,
the CLI does provide a method of displaying the available commands, the command syntax requirements and in
some instances parameters required to complete the command. The standard command to request help is ?.
There are two instances where help information can be displayed:
username
admin
password
alansmith
•Keyword lookup — The character ? is entered in place of a command. A list of all valid commands and
corresponding help messages are is displayed.
•Partial keyword lookup — If a command is incomplete and or the character ? is entered in place of a
parameter. The matched keyword or parameters for this command are displayed.
To assist in using the CLI, there is an assortment of editing features. The following features are described:
•Terminal Command Buffer
•Command Completion
•Nomenclature
•Keyboard Shortcuts
Terminal Command Buffer
Every time a command is entered in the CLI, it is recorded on an internally managed Command History buffer.
Commands stored in the buffer are maintained on a First In First Out (FI FO) basis. These commands can be
recalled, reviewed, modified, and reissued. This buffer is not preserved across device resets.
KeywordDescription
Up-arrow key
Ctrl+P
Down-arrow keyReturns to more recent commands in the history buffer after recalling
By default, the history buffer system is enabled, but it can be disabled at any time. For information about the
command syntax to enable or disable the history buffer, see history.
There is a standard default number of commands that are stored in the buffer. The standard number of 10
commands can be increased to 216. By configuring 0, the effect is the same as disabling the history buffer
system. For information about the command syntax for configuring the command history buffer, see history size.
To display the history buff er, see show history.
Recalls commands in the history buffer, beginning with the most recent
command. Repeats the key sequence to recall successively older commands.
commands with the up-arrow key. Repeating the key sequence will recall
successively more recent commands.
Negating the Effect of Commands
For many configuration commands, the prefix keyword no can be entered to cancel the effect of a command or
reset the configuration to the default value. This guide describes the negation effect for all applicable commands.
Command Completion
If the command entered is incomplete, invalid or has missing or invalid parameters, then the appropriate error
message is displayed. This assists in entering the correct command. By pressing the <Tab> button, an incomplete
Page 21
Using the CLI
Editing Features
command is entered. If the characters already entered are not enough for the system to identify a single matching
command, press ? to display the available commands matching the characters already entered.
Nomenclature
When referring to an Ethernet port in a CLI command, the following format is used:
•For an Ethernet port on a standalone device: Ethernet_type port_number
•For an Ethernet port on a stacked device: unit_number/Ethernet_type port number
The Ethernet type is Fast Ethernet (indicated by “e”).
For example, and e3 stands for Fast Ethernet port 3 on a stand-alone device, whereas 1/e3 stands for Fast
Ethernet port 3 on stacking unit 1.
The ports may be described on an individual basis or within a range. Use format port number-port number to
specify a set of consecutive ports and port number, port number to indicate a set of non-consecutive ports. For
example, e1-3 stands for Ethernet ports 1, 2 and 3, and e1, 5 stands for Ethernet ports 1 and 5.
Keyboard Shortcuts
The CLI has a range of keyboard shortcuts to assist in editing the CLI commands. The following table describes
the CLI shortcuts.
Keyboard KeyDescription
Up-arrow keyRecalls commands from the history buffer, beginning with the most recent command.
Repeat the key sequence to recall successively older commands.
Down-arrow keyReturns the most recent commands from the history buffer after recalling commands with
the up arrow key. Repeating the key sequence will recall successively more recent
commands.
Ctrl+AMoves the cursor to the beginning of the command line.
Ctrl+EMoves the cursor to the end of the command line.
Ctrl+Z / EndReturns back to the Privileged EXEC mode from any configuration mode.
Backspace keyDeletes one character left to the cursor position.
CLI Command Conventions
When entering commands there are certain command entry standards that apply to all commands. The following
table describes the command conventions.
ConventionDescription
[ ]In a command line, square brackets indicates an optional entry.
{ }In a command line, curly brackets indicate a selection of compulsory parameters
separated by the | character. One option must be selected. For example: flowcontrol {auto|on|off} means that for the flowcontrol command either auto, on or off must be
selected.
Italic fontIndicates a parameter.
<Enter> Indicates an individual key on the keyboard. For example, <Enter> indicates the Enter
key.
Page 22
Note
Note
Ctrl+F4Any combination keys pressed simultaneously on the keyboard.
Screen Display
allWhen a parameter is required to define a range of ports or parameters and all is an
Indicates system messages and prompts appearing on the console.
option, the default for the command is all when no parameters are defined. For
example, the command interface range port-channel has the option of either entering
a range of channels, or selecting all. When the command is entered without a
parameter, it automatically defaults to all.
Copying and Pasting Text
Up to 1000 lines of text (i.e., commands) can be copied and pasted into the device.
It is the user’s responsibility to ensure that the text copied into the device consists of legal commands only.
This feature is dependent on the baud rate of the device.
The default device baud rate is 115,200
When copying and pasting commands from a configuration file, make sure that the following conditions exist:
•A device Configuration mode has been accessed.
•The commands contain no encrypted data, like encrypted passwords or keys. Encrypted data cannot be
copied and pasted into the device.
ACL Commands
Chapter 2. ACL Commands
ip access-list
The ip access-list Global Configuration mode command defines an IPv4 Access List and places the devic e in
IPv4 Access List Configuration mode. Use the no form of this command to remove the Access List.
Syntax
ip access-list access-list-name
no ip access-list access-list-name
Parameters
access-list-name — Name of the IPv4 Access List. (Range: 1 - 32 characters)
•
Default Configuration
No IPv4 Access List is defined
Command Mode
Global Configuration mode
User Guidelines
IPv4 ACLs are defined by a unique name. An IPv4 ACL and MAC ACL cannot share the same name.
Example
The following example places the device in IPv4 Access List Configuration mode.
console(config)#
ip access-list
permit (ip)
The permit IP Access-list Configuration mode command sets conditions to allow a packet to pass a named IP
Access List.
•flags list-of-flags — List of TCP flags that should occur. If a flag should be set it is prefixed by "+".If a flag
should be unset it is prefixed by "-". Available options are +urg, +ack, +psh, +rst, +syn, +fin, -urg, -ack, psh, -rst, -syn and -fin. The flags are concatenated to a one string. For example: +fin-ack.
Page 25
ACL Commands
IP ProtocolAbbreviated NameProtocol Number
Internet Control Message Protocolicmp1
Internet Group Management Protocoligmp2
IP in IP (encapsulation) Protocolipinip4
Transmission Control Protocol tcp6
Exterior Gateway Protocolegp8
Interior Gateway Protocoligp9
User Datagram Protocoludp17
Host Monitoring Protocolhmp20
Reliable Data Protocolrdp27
Open Shortest Path Protocolospf89
Protocol Independent Multicastpim103
Layer Two Tunneling Protocoll2tp115
ISIS over IPv4isis124
(any IP protocol)any25504
idpr35
idrp45
esp50
•dscp — Indicates matching the dscp number with the packet dscp value.
•ip-precedence — Indicates matching ip-precedence with the packet ip-precedence value.
•icmp-type — Specifies an ICMP message type for filtering ICMP packets. Enter a value or one of the following
Allied Telesis
AT-8000S-S94-3.0 Command Line Interface User’s Guide
mobile-registration-request, mobile-registration-reply, domain-name-request, domain-name-reply,
skip and photuris. (Range: 0-255)
•icmp-code — Specifies an ICMP message code for filtering ICMP packets. ICMP packets that are filtered by
ICMP message type can also be filtered by the ICMP message code. (Range: 0-255)
•igmp-type — IGMP packets can be filtered by IGMP message type. Enter a number or one of the following
values: dvmrp, host-query, host-report, pim or trace. (Range: 0-255)
•destination-port — Specifies the UDP/TCP destination port. (Range: 0-65535)
•source-port — Specifies the UDP/TCP source port. (Range: 0-65535)
•list-of-flags — Specifies a list of TCP flags that can be triggered. If a flag is set, it is prefixed by “+”. If a flag is
not set, it is prefixed by “-”. Possible values: +urg, +ack, +psh, +rst, +syn, +fin, -urg, -ack, -psh, -rst, -syn
and -fin. The flags are concatenated into one string. For example: +fin-ack.
Default Configuration
No IPv4 ACL is defined.
Command Mode
Ip Access-list Configuration mode
User Guidelines
You enter IP-Access List configuration mode by using the ip access-list Global Configuration mode command.
Example
The following example defines a permit statement for an IP ACL.
console(config)#
console(config-ip-al)#
ip access-list
permit
rsvp 192.1.1.1 0.0.0.0
ip-acl1
any dscp
56
deny (IP)
The deny IP Access List Configuration mode command sets conditions to not allow a packet to pass a named IP
Access List.
•flags list-of-flags — List of TCP flags that should occur. If a flag is intended to be set, it is prefixed by ‘+’.If a
flag should be unset it is prefixed by ‘-’. Available options are: +urg, +ack, +psh, +rst, +syn, +fin, -urg, -ack,
-psh, -rst, -syn and -fin. The flags are concatenated to a single string. For example: +fin-ack.
IP ProtocolAbbreviated NameProtocol Number
Internet Control Message Protocolicmp1
Internet Group Management Protocoligmp2
Transmission Control Protocol tcp6
Exterior Gateway Protocolegp8
Interior Gateway Protocoligp9
User Datagram Protocoludp17
Host Monitoring Protocolhmp20
Reliable Data Protocolrdp27
Allied Telesis
AT-8000S-S94-3.0 Command Line Interface User’s Guide
IP ProtocolAbbreviated NameProtocol Number
General Routing Encapsulationgre47
Encapsulating Security Payload (50)
Authentication Headerah51
ICMP for IPv6ipv6-icmp58
EIGRP routing protocoleigrp88
Open Shortest Path Protocolospf89
Protocol Independent Multicastpim103
Layer Two Tunneling Protocoll2tp115
ISIS over IPv4isis124
(any IP protocol)any25504
esp50
Default Configuration
No IPv4 Access List is defined.
Command Mode
IP Access-list Configuration mode
User Guidelines
Enter IP-Access List configuration mode by using the ip access-list Global Configuration mode command.
•
•After an access control entry (ACE) is added to an access control list, an implied deny-any-any condition
exists at the end of the list. That is, if there are no matches, the packets are denied. However, before the first
ACE is added, the list permits all packets.
Example
The following example defines a permit statement for an IP ACL.
console(config)#
console(config-ip-al)#
ip-access-list
deny
rsvp 192.1.1.1 0.0.0.255
ip-acl1
any
ipv6 access-list
The ipv6 access-list Global Configuration mode command defines an IPv6 Access List and places the device in
IPv6 Access List Configuration mode. Use the no form of this command to remove the Access List.
Syntax
ipv6 access-list access-list-name
no ipv6 access-list access-list-name
Parameters
access-list-name — Name of the IPv6 Access List. (Range: 1 - 32 characters)
•
Page 29
Loading...
+ 372 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.