Allied Telesis AT-S95 CLI User Manual

Management Software
AT-S95
CLI User’s Guide
AT-8000GS Series Stackable Gigabit Ethernet Switches
Version 1.0.1
613-001020 Rev. B
Copyright © 2008 Allied Telesis, Inc.
Allied Telesis is a trademark of Allied Telesis, Inc. Microsoft and Internet Explorer are registered trademarks of Microsoft Corporation. Netscape Navigator is a registered trademark of Netscape Communications Corporation. All other product names, company names, logos or other designations mentioned herein are trademarks or registered trademarks of their respective owners.
Allied Telesis, Inc. reserves the right to make changes in specifications and other information contained in this document without prior written notice. The information provided herein is subject to change without notice. In no event shall Allied Telesis, Inc. be liable for any incidental, special, indirect, or consequential damages whatsoever, including but not limited to lost profits, arising out of or related to this manual or the information contained herein, even if Allied Telesis, Inc. has been advised of, known, or should have known, the possibility of such damages.

Table of Contents

Preface ................................................................................................................................... 1
Intended Audience........................................................................................................................... 2
Document Conventions ................................................................................................................... 3
Contacting Allied Telesis .................................................................................................................4
Chapter 1.Using the CLI ....................................................................................................... 5
Overview ................................................................................................................................................5
CLI Command Modes...................................................................................................................... 5
Introduction................................................................................................................................................5
User EXEC Mode ......................................................................................................................................5
Privileged EXEC Mode ..............................................................................................................................5
Global Configuration Mode........................................................................................................................6
Interface Configuration and Specific Configuration Modes........................................................................7
Starting the CLI................................................................................................................................ 8
Editing Features ..............................................................................................................................9
Entering Commands..................................................................................................................................9
Terminal Command Buffer ...................................................................................................................9
Negating the Effect of Commands .....................................................................................................10
Command Completion........................................................................................................................10
Nomenclature.....................................................................................................................................10
Keyboard Shortcuts............................................................................................................................10
CLI Command Conventions ...............................................................................................................11
Copying and Pasting Text........................................................................................................................11
Chapter 2.ACL Commands ................................................................................................ 13
ip access-list.........................................................................................................................................13
permit (ip) .............................................................................................................................................13
deny (IP)...............................................................................................................................................16
mac access-list.....................................................................................................................................18
permit (MAC)........................................................................................................................................19
deny (MAC)..........................................................................................................................................20
service-acl ............................................................................................................................................21
show access-lists .................................................................................................................................22
show interfaces access-lists.................................................................................................................22
Chapter 3.AAA Commands ................................................................................................ 24
aaa authentication login .......................................................................................................................24
aaa authentication enable ....................................................................................................................25
login authentication ..............................................................................................................................26
enable authentication...........................................................................................................................27
ip http authentication ............................................................................................................................27
Page i
Allied Telesis
Command Line Interface User’s Guide
ip https authentication.......................................................................................................................... 28
show authentication methods .............................................................................................................. 29
password ............................................................................................................................................. 30
username............................................................................................................................................. 30
show users accounts ........................................................................................................................... 31
enable password ................................................................................................................................. 32
Chapter 4.Address Table Commands............................................................................... 34
bridge address..................................................................................................................................... 34
bridge multicast filtering....................................................................................................................... 34
bridge multicast address...................................................................................................................... 35
bridge multicast forbidden address...................................................................................................... 36
bridge multicast forward-all.................................................................................................................. 37
bridge multicast forbidden forward-all.................................................................................................. 38
bridge aging-time................................................................................................................................. 38
clear bridge.......................................................................................................................................... 39
port security ......................................................................................................................................... 39
port security mode ............................................................................................................................... 40
port security max ................................................................................................................................. 41
port security routed secure-address .................................................................................................... 41
show bridge address-table .................................................................................................................. 42
show bridge address-table static ......................................................................................................... 43
show bridge address-table count......................................................................................................... 44
show bridge multicast address-table ................................................................................................... 45
show bridge multicast address-table static .......................................................................................... 47
show bridge multicast filtering ............................................................................................................. 47
show ports security.............................................................................................................................. 49
show ports security addresses ............................................................................................................ 50
Chapter 5.Clock Commands .............................................................................................. 52
clock set............................................................................................................................................... 52
clock source......................................................................................................................................... 52
clock timezone..................................................................................................................................... 53
clock summer-time .............................................................................................................................. 54
sntp authentication-key........................................................................................................................ 55
sntp authenticate ................................................................................................................................. 56
sntp trusted-key ................................................................................................................................... 56
sntp client poll timer............................................................................................................................. 57
sntp broadcast client enable................................................................................................................ 57
sntp anycast client enable ................................................................................................................... 58
sntp client enable (Interface) ............................................................................................................... 59
sntp unicast client enable .................................................................................................................... 59
sntp unicast client poll ......................................................................................................................... 60
sntp server........................................................................................................................................... 60
show clock ........................................................................................................................................... 61
show sntp configuration....................................................................................................................... 62
show sntp status.................................................................................................................................. 63
Page ii
Not approved by Document Control. For review only.
Chapter 6.Configuration and Image File Commands ...................................................... 65
copy......................................................................................................................................................65
dir .........................................................................................................................................................67
delete ...................................................................................................................................................68
boot system..........................................................................................................................................69
show running-config .............................................................................................................................69
show startup-config ..............................................................................................................................70
show bootvar........................................................................................................................................71
Chapter 7.DHCP Option 82 Commands ............................................................................ 72
ip dhcp information option....................................................................................................................72
show ip dhcp information option...........................................................................................................72
ip dhcp relay enable .............................................................................................................................73
Chapter 8.DHCP Snooping Commands ............................................................................ 74
ip dhcp snooping..................................................................................................................................74
ip dhcp snooping vlan ..........................................................................................................................74
ip dhcp snooping trust ..........................................................................................................................75
ip dhcp snooping information option allowed-untrusted .......................................................................76
ip dhcp snooping verify ........................................................................................................................76
ip dhcp snooping database ..................................................................................................................77
ip dhcp snooping database update-freq...............................................................................................77
ip dhcp snooping binding .....................................................................................................................78
clear ip dhcp snooping database .........................................................................................................79
show ip dhcp snooping.........................................................................................................................79
show ip dhcp snooping binding ............................................................................................................80
Chapter 9.Ethernet Configuration Commands................................................................. 82
interface ethernet .................................................................................................................................82
interface range ethernet.......................................................................................................................82
shutdown..............................................................................................................................................83
description............................................................................................................................................84
speed ...................................................................................................................................................84
duplex...................................................................................................................................................85
negotiation............................................................................................................................................86
flowcontrol............................................................................................................................................86
mdix......................................................................................................................................................87
back-pressure ......................................................................................................................................88
port jumbo-frame..................................................................................................................................88
system flowcontrol................................................................................................................................89
clear counters.......................................................................................................................................89
set interface active ...............................................................................................................................90
show interfaces advertise.....................................................................................................................90
show interfaces configuration...............................................................................................................91
show interfaces status..........................................................................................................................93
show interfaces description..................................................................................................................94
show ports jumbo-frame.......................................................................................................................95
Page iii
Allied Telesis
Command Line Interface User’s Guide
show interfaces counters..................................................................................................................... 95
show system flowcontrol...................................................................................................................... 99
port storm-control include-multicast (IC).............................................................................................. 99
port storm-control broadcast enable.................................................................................................. 100
port storm-control broadcast rate ...................................................................................................... 101
show ports storm-control ................................................................................................................... 102
Chapter 10.GVRP Commands.......................................................................................... 103
gvrp enable (Global) .......................................................................................................................... 103
gvrp enable (Interface) ...................................................................................................................... 103
garp timer .......................................................................................................................................... 104
gvrp vlan-creation-forbid.................................................................................................................... 105
gvrp registration-forbid....................................................................................................................... 105
clear gvrp statistics ............................................................................................................................ 106
show gvrp configuration..................................................................................................................... 106
show gvrp statistics ........................................................................................................................... 107
show gvrp error-statistics................................................................................................................... 108
Chapter 11.IGMP Snooping Commands......................................................................... 110
ip igmp snooping (Global).................................................................................................................. 110
ip igmp snooping (Interface) .............................................................................................................. 110
ip igmp snooping mrouter learn-pim-dvmrp....................................................................................... 111
ip igmp snooping host-time-out ......................................................................................................... 112
ip igmp snooping querier enable ....................................................................................................... 112
ip igmp snooping querier address ..................................................................................................... 113
ip igmp snooping querier version....................................................................................................... 114
ip igmp snooping mrouter-time-out.................................................................................................... 114
ip igmp snooping leave-time-out........................................................................................................ 115
show ip igmp snooping mrouter......................................................................................................... 116
show ip igmp snooping interface ....................................................................................................... 117
show ip igmp snooping groups .......................................................................................................... 118
Chapter 12.IP Addressing Commands............................................................................ 119
ip address .......................................................................................................................................... 119
ip address dhcp ................................................................................................................................. 119
ip default-gateway ............................................................................................................................. 120
show ip interface................................................................................................................................ 121
arp ..................................................................................................................................................... 122
arp timeout......................................................................................................................................... 122
clear arp-cache.................................................................................................................................. 123
show arp ............................................................................................................................................ 124
ip domain-lookup............................................................................................................................. 124
ip domain-name................................................................................................................................. 125
ip name-server................................................................................................................................... 126
ip domain-name................................................................................................................................. 126
ip name-server................................................................................................................................... 127
ip host ................................................................................................................................................ 127
Page iv
Not approved by Document Control. For review only.
clear host............................................................................................................................................128
clear host dhcp...................................................................................................................................129
show hosts .........................................................................................................................................129
Chapter 13.Line Commands ............................................................................................ 131
line......................................................................................................................................................131
speed .................................................................................................................................................131
autobaud ............................................................................................................................................132
exec-timeout.......................................................................................................................................133
history.................................................................................................................................................133
history size .........................................................................................................................................134
terminal history...................................................................................................................................134
terminal history size ...........................................................................................................................135
show line ............................................................................................................................................135
Section 14.LACP Commands........................................................................................... 138
lacp system-priority ............................................................................................................................138
lacp port-priority .................................................................................................................................139
lacp timeout........................................................................................................................................140
show lacp ethernet .............................................................................................................................141
show lacp port-channel ......................................................................................................................143
Chapter 15.Management ACL Commands ..................................................................... 144
management access-list ....................................................................................................................144
permit (Management).........................................................................................................................145
deny (Management)...........................................................................................................................146
management access-class.................................................................................................................146
show management access-list ...........................................................................................................147
show management access-class .......................................................................................................148
Chapter 16.PHY Diagnostics Commands ....................................................................... 149
test copper-port tdr.............................................................................................................................149
show copper-ports tdr ........................................................................................................................149
show copper-ports cable-length .........................................................................................................150
Chapter 17.Port Channel Commands ............................................................................. 152
interface port-channel ........................................................................................................................152
interface range port-channel ..............................................................................................................152
channel-group ....................................................................................................................................153
show interfaces port-channel .............................................................................................................153
Chapter 18.Port Monitor Commands .............................................................................. 155
port monitor........................................................................................................................................155
show ports monitor.............................................................................................................................156
Chapter 19.Power over Ethernet Commands................................................................. 157
power inline........................................................................................................................................157
Page v
Allied Telesis
Command Line Interface User’s Guide
power inline powered-device ............................................................................................................. 157
power inline priority............................................................................................................................ 158
power inline usage-threshold............................................................................................................. 159
power inline traps enable................................................................................................................... 159
show power inline .............................................................................................................................. 160
Chapter 20.QoS Commands ............................................................................................ 164
qos..................................................................................................................................................... 164
show qos ........................................................................................................................................... 164
priority-queue out num-of-queues ..................................................................................................... 165
rate-limit............................................................................................................................................. 165
traffic-shape....................................................................................................................................... 166
show qos interface............................................................................................................................. 166
wrr-queue cos-map............................................................................................................................ 167
qos trust(Global) ................................................................................................................................ 168
qos map dscp-queue ......................................................................................................................... 169
qos cos .............................................................................................................................................. 170
show qos map ................................................................................................................................... 170
Chapter 21.Radius Commands........................................................................................ 172
radius-server host.............................................................................................................................. 172
radius-server key ............................................................................................................................... 173
radius-server retransmit..................................................................................................................... 173
radius-server source-ip...................................................................................................................... 174
radius-server timeout......................................................................................................................... 175
radius-server deadtime...................................................................................................................... 175
show radius-servers .......................................................................................................................... 176
Chapter 22.RMON Commands......................................................................................... 178
show rmon statistics .......................................................................................................................... 178
rmon collection history....................................................................................................................... 180
show rmon collection history ............................................................................................................. 180
show rmon history ............................................................................................................................. 181
rmon alarm ........................................................................................................................................ 184
show rmon alarm-table ...................................................................................................................... 185
show rmon alarm ............................................................................................................................... 186
rmon event......................................................................................................................................... 187
show rmon events ............................................................................................................................. 188
show rmon log ................................................................................................................................... 189
rmon table-size .................................................................................................................................. 190
Chapter 23.SNMP Commands ......................................................................................... 192
snmp-server community .................................................................................................................... 192
snmp-server view .............................................................................................................................. 193
snmp-server group ............................................................................................................................ 194
snmp-server user............................................................................................................................... 194
snmp-server engineID local............................................................................................................... 196
Page vi
Not approved by Document Control. For review only.
snmp-server enable traps ..................................................................................................................197
snmp-server filter ...............................................................................................................................197
snmp-server host ...............................................................................................................................198
snmp-server v3-host ..........................................................................................................................199
snmp-server trap authentication.........................................................................................................200
snmp-server contact...........................................................................................................................201
snmp-server location..........................................................................................................................201
snmp-server set .................................................................................................................................202
show snmp .........................................................................................................................................203
show snmp engineid ..........................................................................................................................204
show snmp views ...............................................................................................................................205
show snmp groups .............................................................................................................................205
show snmp filters ...............................................................................................................................206
show snmp users ...............................................................................................................................207
Chapter 24.Spanning-Tree Commands........................................................................... 208
spanning-tree .....................................................................................................................................208
spanning-tree mode ...........................................................................................................................208
spanning-tree forward-time ................................................................................................................209
spanning-tree hello-time.....................................................................................................................209
spanning-tree max-age ......................................................................................................................210
spanning-tree priority .........................................................................................................................211
spanning-tree disable.........................................................................................................................211
spanning-tree cost..............................................................................................................................212
spanning-tree port-priority ..................................................................................................................213
spanning-tree portfast ........................................................................................................................213
spanning-tree link-type.......................................................................................................................214
spanning-tree pathcost method..........................................................................................................214
spanning-tree bpdu ............................................................................................................................215
spanning-tree guard root....................................................................................................................216
spanning-tree bpduguard ...................................................................................................................216
clear spanning-tree detected-protocols..............................................................................................217
spanning-tree mst priority...................................................................................................................217
spanning-tree mst max-hops..............................................................................................................218
spanning-tree mst port-priority ...........................................................................................................218
spanning-tree mst cost.......................................................................................................................219
spanning-tree mst configuration.........................................................................................................220
instance (mst).....................................................................................................................................220
name (mst) .........................................................................................................................................221
revision (mst)......................................................................................................................................222
show (mst)..........................................................................................................................................222
exit (mst) ............................................................................................................................................223
abort (mst)..........................................................................................................................................224
show spanning-tree............................................................................................................................224
Chapter 25.SSH Commands ............................................................................................ 236
ip ssh port...........................................................................................................................................236
Page vii
Allied Telesis
Command Line Interface User’s Guide
ip ssh server ...................................................................................................................................... 236
crypto key generate dsa .................................................................................................................... 237
crypto key generate rsa ..................................................................................................................... 237
ip ssh pubkey-auth ............................................................................................................................ 238
crypto key pubkey-chain ssh ............................................................................................................. 238
user-key............................................................................................................................................. 239
key-string ........................................................................................................................................... 240
show ip ssh........................................................................................................................................ 241
show crypto key mypubkey ............................................................................................................... 242
show crypto key pubkey-chain ssh.................................................................................................... 243
Chapter 26.Syslog Commands........................................................................................ 245
logging on .......................................................................................................................................... 245
logging ............................................................................................................................................... 245
logging console.................................................................................................................................. 246
logging buffered................................................................................................................................. 247
logging buffered size ......................................................................................................................... 247
clear logging ...................................................................................................................................... 248
logging file ......................................................................................................................................... 249
clear logging file................................................................................................................................. 249
aaa logging ........................................................................................................................................ 250
file-system logging............................................................................................................................. 250
management logging ......................................................................................................................... 251
show logging...................................................................................................................................... 252
show logging file ................................................................................................................................ 254
show syslog-servers .......................................................................................................................... 256
Chapter 27.TACACS+ Commands................................................................................... 258
tacacs-server host ............................................................................................................................. 258
tacacs-server key .............................................................................................................................. 259
tacacs-server timeout ........................................................................................................................ 259
tacacs-server source-ip ..................................................................................................................... 260
show tacacs....................................................................................................................................... 260
Chapter 28.System Management Commands................................................................ 262
ping.................................................................................................................................................... 262
reload................................................................................................................................................. 264
resume............................................................................................................................................... 264
hostname........................................................................................................................................... 265
stack master ...................................................................................................................................... 265
stack reload ....................................................................................................................................... 266
stack change unit-id........................................................................................................................... 267
show stack......................................................................................................................................... 267
show users ........................................................................................................................................ 269
show sessions ................................................................................................................................... 270
show system...................................................................................................................................... 271
show system id .................................................................................................................................. 272
Page viii
Not approved by Document Control. For review only.
show version ......................................................................................................................................273
set system ..........................................................................................................................................275
Chapter 29.User Interface Commands............................................................................ 276
enable ................................................................................................................................................276
disable................................................................................................................................................276
login....................................................................................................................................................277
configure ............................................................................................................................................277
exit (Configuration).............................................................................................................................278
exit......................................................................................................................................................278
end .....................................................................................................................................................279
help ....................................................................................................................................................279
terminal datadump .............................................................................................................................280
show history .......................................................................................................................................281
show privilege ....................................................................................................................................281
Chapter 30.VLAN Commands .......................................................................................... 283
vlan database.....................................................................................................................................283
vlan.....................................................................................................................................................283
default-vlan disable ............................................................................................................................284
default-vlan vlan .................................................................................................................................284
interface vlan......................................................................................................................................285
interface range vlan............................................................................................................................286
name ..................................................................................................................................................286
switchport protected ...........................................................................................................................287
switchport mode .................................................................................................................................288
switchport access vlan .......................................................................................................................289
switchport trunk allowed vlan .............................................................................................................289
switchport trunk native vlan................................................................................................................290
switchport general allowed vlan .........................................................................................................290
switchport general pvid ......................................................................................................................291
switchport general ingress-filtering disable ........................................................................................292
switchport general acceptable-frame-type tagged-only .....................................................................292
switchport general acceptable-frame-type tagged-only .....................................................................293
switchport general map macs-group vlan ..........................................................................................293
map mac macs-group ........................................................................................................................294
show vlan macs-group .......................................................................................................................295
switchport forbidden vlan ...................................................................................................................295
ip internal-usage-vlan.........................................................................................................................296
show vlan ...........................................................................................................................................298
show vlan internal usage....................................................................................................................298
show interfaces switchport .................................................................................................................299
Chapter 31.Web Server Commands ................................................................................ 303
ip http server ......................................................................................................................................303
ip http port ..........................................................................................................................................303
ip http exec-timeout............................................................................................................................304
Page ix
Allied Telesis
Command Line Interface User’s Guide
ip https server .................................................................................................................................... 304
ip https port........................................................................................................................................ 305
ip https exec-timeout ......................................................................................................................... 305
crypto certificate generate ................................................................................................................. 306
crypto certificate request ................................................................................................................... 307
crypto certificate import ..................................................................................................................... 308
ip https certificate............................................................................................................................... 309
show crypto certificate mycertificate .................................................................................................. 310
show ip http ....................................................................................................................................... 311
show ip https...................................................................................................................................... 311
Chapter 32.802.1x Commands......................................................................................... 313
aaa authentication dot1x ................................................................................................................... 313
dot1x system-auth-control ................................................................................................................. 313
dot1x port-control............................................................................................................................... 314
dot1x re-authentication ...................................................................................................................... 315
dot1x timeout re-authperiod............................................................................................................... 315
dot1x re-authenticate......................................................................................................................... 316
dot1x timeout quiet-period ................................................................................................................. 316
dot1x timeout tx-period ...................................................................................................................... 317
dot1x max-req.................................................................................................................................... 318
dot1x timeout supp-timeout ............................................................................................................... 318
dot1x timeout server-timeout ............................................................................................................. 319
show dot1x ........................................................................................................................................ 320
show dot1x users............................................................................................................................... 323
show dot1x statistics.......................................................................................................................... 324
dot1x auth-not-req ............................................................................................................................. 326
dot1x guest-vlan ................................................................................................................................ 327
dot1x single-host-violation ................................................................................................................. 328
dot1x mac-authentication .................................................................................................................. 328
show dot1x advanced........................................................................................................................ 329
dot1x guest-vlan enable .................................................................................................................... 330
........................................................................................................................................................... 331
Index................................................................................................................................... 332
Page x
Not approved by Document Control. For review only.

Preface

Preface
This guide describes how to configure an AT-S95 v1.0.04 v1.1.0 Series switch using the command line interface. The commands are grouped by topic into the following chapters:
Chapter 1. "Using the CLI" — Describe the CLI basic structure and command usage.
Chapter 2. "ACL Commands" — Define MAC and IP based ACLs and ACL bindings.
Chapter 3. "AAA Commands" — Define the authentication method lists for servers.
Chapter 4. "Address Table Commands" — Register MAC-layer Multicast addresses, and handles MAC-
layer secure address to a routed port .
Chapter 5. "Clock Commands" — Show the configuration or status of the Simple Network Time Protocol
(SNTP).
Chapter 6. "Configuration and Image File Commands" — Display the contents of the currently running
configuration file, specify contents of image files.
Chapter 7. "DHCP Option 82 Commands" — DHCP with Option 82 attaches authentication messages to
the packets sent from the host. DHCP passes the configuration information to hosts on a TCP/IP network. This permits network administrators to limit address allocation authorized hosts.
Chapter 8. "DHCP Snooping Commands" — Contains parameters for enabling DHCP Snooping on the
device
Chapter 9. "Ethernet Configuration Commands" — Configure multiple Ethernet type interfaces.
Chapter 10. "GVRP Commands" — Display the GARP VLAN Registration Protocol (GVRP) configuration
information, enable GVRP globally or on an interface.
Chapter 11. "IGMP Snooping Commands" — Enable the Internet Group Management Protocol (IGMP)
snooping.
Chapter 12. "IP Addressing Commands" — Define a default gateway, set an IP address for interface,
delete entries from the host.
Chapter 13. "Line Commands" — Display line parameters, enable the command history function, or
configure the command history buffer size.— Configure system priority, physical port priority, assign
Page 1
Allied Telesis
Command Line Interface User’s Guide
administrative LACP timeouts, display LACP information for Ethernet ports, and display LACP information for a port-channel.
Chapter 15. "Management ACL Commands" — Define a permit or deny a rule, or configure a management
access control list.
Chapter 16. "PHY Diagnostics Commands" — Display the optical transceiver diagnostics.
Chapter 17. "Port Channel Commands" — Enter the interface configuration mode to configure a specific,
or a multiple port-channel.
Chapter 18. "Port Monitor Commands" — Start a port monitoring session, or display the port monitoring
status.
Chapter 19. "Power over Ethernet Commands" — Configure and display Power over Ethernet device
settings.
Chapter 20. "QoS Commands" — Enable Quality of Service (QoS) on the device, create policy maps, and
define traffic classifications
Chapter 21. "Radius Commands" — Specify the source IP address used for communication with Remote
Authentication Dial-in User Service (RADIUS) servers, and display the RADIUS server settings.
Chapter 22. "RMON Commands" — Display the Remote Network Monitoring (RMON) Ethernet history
statistics, alarms table and configuration.
Chapter 23. "SNMP Commands" — Configure the community access string to permit access to the Simple
Network Management Protocol (SNMP) server, create or update SNMP server entries, and specify SNMP engineID.
Chapter 24. "Spanning-Tree Commands" — Configure the spanning-tree functionality.
Chapter 25. "SSH Commands" — Display the Secure Socket Shell (SSH) public keys on the device, SSH
server configuration, or which SSH public key is manually configured.
Chapter 26. "Syslog Commands" — Log messages to a syslog server, or limit log messages to a syslog
server.
Chapter 27. "TACACS+ Commands" — Display configuration and statistical information about a Terminal
Access Controller Access Control System (TACACS+) server, or specify a TACACS+ host.
Chapter 28. "System Management Commands" — Display and list system, version or Telnet session
information.
Chapter 29. "User Interface Commands" — Display and list system, version or Telnet session information.
Chapter 30. "VLAN Commands" — Enter the (Virtual Local Area Network) VLAN Configuration mode,
enable simultaneously configuring multiple VLANs, or adds or remove VLANs.
Chapter 31. "Web Server Commands" — Enable configuring the device from a browser, or display the
HTTP server configuration.
Chapter 32. "802.1x Commands" — Specify authentication, authorization and accounting (AAA) methods
for use on interfaces running IEEE 802.1x, and enable 802.1x globally.

Intended Audience

This guide is intended for network administrators familiar with IT concepts and terminology.
Page 2
Not approved by Document Control. For review only.

Document Conventions

Note
Caution
Warning
This document uses the following conventions:
Provides related information or information of special importance.
Indicates potential damage to hardware or software, or loss of data.
Indicates a risk of personal injury.
Preface
Document Conventions
Page 3
Allied Telesis
Command Line Interface User’s Guide

Contacting Allied Telesis

This section provides Allied Telesis contact information for technical support as well as sales or corporate information. .
Online Support
Email and Telephone Support
Returning Products
For Sales or Corporate Information
Warranty
You can request technical support online by accessing the Allied Telesis Knowledge Base from the following web site: www.alliedtelesis.com/support. You can use the Knowledge Base to submit questions to our technical support staff and review answers to previously asked questions..
For Technical Support via email or telephone, refer to the Allied Telesis web site: www.alliedtelesis.com. Select your country from the list displayed on the website. Then select the appropriate menu tab.
Products for return or repair must first be assigned a Return Materials Authorization (RMA) number. A product sent to Allied Telesis without a RMA number will be returned to the sender at the sender’s expense.
To obtain an RMA number, contact the Allied Telesis Technical Support group at our web site: www.alliedtelesis.com/support/rma. Select your country from the list displayed on the website. Then select the appropriate menu tab.
You can contact Allied Telesis for sales or corporate information at our web site: www.alliedtelesis.com. Select your country from the list displayed on the website. Then select the appropriate menu tab.
The AT-AT-800GS series intelligent Multiservice Gateway has a limited warranty of two years. Go to www.alliedtelesis.com/warranty for the specific terms and conditions of the warranty and for warranty registration.
Page 4
Not approved by Document Control. For review only.
Using the CLI

CLI Command Modes

Chapter 1. Using the CLI

Overview

This chapter describes how to start using the CLI and the CLI command editing features.
CLI Command Modes

Introduction

To assist in configuring the device, the Command Line Interface (CLI) is divided into different command modes. Each command mode has its own set of specific commands. Entering a question mark "?" at the system prompt (console prompt) displays a list of commands available for that particular command mode.
From each mode a specific command is used to navigate from one command mode to another. The standard order to access the modes is as follows: User EXEC mode, Privileged EXEC mode, Global Configuration mode, and Interface Configuration mode.
When starting a session, the initial mode is the User EXEC mode. Only a limited subset of commands are available in User EXEC mode. This level is reserved for tasks that do not change the configuration. To enter the next level, the Privileged EXEC mode, a password is required.
The Privileged EXEC mode gives access to commands that are restricted on User EXEC mode and provides access to the device Configuration mode.
The Global Configuration mode manages the device configuration on a global level.
The Interface Configuration mode configures specific interfaces in the device.

User EXEC Mode

After logging into the device, the user is automatically in User EXEC command mode unless the user is defined as a privileged user. In general, the User EXEC commands allow the user to perform basic tests, and list system information.
The user-level prompt consists of the device host name followed by the angle bracket (>).
Console>
The default host name is Console unless it has been changed using the hostname command in the Global Configuration mode.

Privileged EXEC Mode

Privileged access is password protected to prevent unauthorized use because many of the privileged commands set operating system parameters. The password is not displayed on the screen and is case sensitive.
Privileged users enter directly into the Privileged EXEC mode. To enter the Privileged EXEC mode from the User EXEC mode, perform the following steps:
1. At the prompt enter the enable command and press <Enter>. A password prompt is displayed.
Page 5
Allied Telesis
Command Line Interface User’s Guide
2. Enter the password and press <Enter>. The password is displayed as *. The Privileged EXEC mode prompt is displayed. The Privileged EXEC mode prompt consists of the device host name followed by #.
Console#
To return from the Privileged EXEC mode to the User EXEC mode, use the disable command. The following example illustrates how to access the Privileged EXEC mode and return to the User EXEC mode:
Console>
Enter Password: ******
Console#
Console#
Console>
The exit command is used to return from any mode to the previous mode except when returning to the User EXEC mode from the Privileged EXEC mode. For example, the exit command is used to return from the Interface Configuration mode to the Global Configuration mode.
enable
disable

Global Configuration Mode

Global Configuration mode commands apply to features that affect the system as a whole, rather than just a specific interface. The configure Privileged EXEC mode command is used to enter the Global Configuration mode.
To enter the Global Configuration mode perform the following steps:
1. At the Privileged EXEC mode prompt enter the configure command and press <Enter>. The Global Configuration mode prompt is displayed. The Global Configuration mode prompt consists of the device host name followed by (config) and #.
Console(config)#
One of the following commands can be used to return from the Global Configuration mode to the Privileged EXEC mode:
exit
end
Ctrl+Z
The following example illustrates how to access the Global Configuration mode and return to the Privileged EXEC mode:
Console#
Console#
Console(config)#
Console#
configure
exit
Page 6
Not approved by Document Control. For review only.
Using the CLI
CLI Command Modes

Interface Configuration and Specific Configuration Modes

Interface Configuration mode commands modify specific interface operations. The following are the Interface Configuration modes:
Line Interface — Contains commands to configure the management connections. These include commands
such as line timeout settings, etc. The line Global Configuration mode command is used to enter the Line Configuration command mode.
VLAN Database — Contains commands to create a VLAN as a whole. The VLAN database Global
Configuration mode command is used to enter the VLAN Database Interface Configuration mode.
Management Access List — Contains commands to define management access-lists. The management
access-list Global Configuration mode command is used to enter the Management Access List Configuration
mode.
Ethernet — Contains commands to manage port configuration. The interface ethernet Global Configuration
mode command is used to enter the Interface Configuration mode to configure an Ethernet type interface.
Port Channel — Contains commands to configure port-channels, for example, assigning ports to a port-
channel. Most of these commands are the same as the commands in the Ethernet interface mode, and are used to manage the member ports as a single entity. The interface port-channel Global Configuration mode command is used to enter the Port Channel Interface Configuration mode.
SSH Public Key-chain — Contains commands to manually specify other device SSH public keys. The
crypto key pubkey-chain ssh Global Configuration mode command is used to enter the SSH Public Key-
chain Configuration mode.
QoS — Contains commands related to service definitions. The qos Global Configuration mode command is
used to enter the QoS services configuration mode.
MAC Access-List— Configures conditions required to allow traffic based on MAC addresses. The mac
access-list Global Configuration mode command is used to enter the MAC access-list configuration mode.
Page 7
Allied Telesis
Note
Note
Note
Command Line Interface User’s Guide

Starting the CLI

The device can be managed over a direct connection to the device console RS-232 port or via a Telnet connection. The device is managed by entering command keywords and parameters at the prompt. Using the device Command Line Interface (CLI) is very similar to entering commands on a UNIX system.
If access is via a Telnet connection, ensure that the device has a defined IP address, corresponding management access is granted, and the workstation used to access the device is connected to the device prior to using CLI commands.
The following steps are for use on the console line only.
To start using the CLI, perform the following steps:
1. Connect the DB9 null-modem or cross over cable to the RS-232 serial port of the device to the RS-232 serial port of the terminal or computer running the terminal emulation application.
The default data rate is 115200 bps.
a) Set the data format to 8 data bits, 1 stop bit, and no parity. b) Set Flow Control to none.
c) Under Properties, select VT100 for Emulation mode. d) Select Terminal keys for Function, Arrow, and Ctrl keys. Ensure that the setting is for Terminal keys
(not Windows keys).
When using HyperTerminal with Microsoft® Windows 2000, ensure that Windows® 2000 Service Pack 2 or later is installed. With Windows 2000 Service Pack 2, the arrow keys function properly in HyperTerminal’s VT100 emulation. Go to www.microsoft.com for information on Windows 2000 service packs.
2. Enter the following commands to begin the configuration procedure:
Console>
Console#
enable
configure
Console(config)#
3. Configure the device and enter the necessary commands to complete the required tasks.
4. When finished, exit the session with the exit command.
When a different user is required to log onto the system, use the login Privileged EXEC mode command. This effectively logs off the current user and logs on the new user.
Page 8
Not approved by Document Control. For review only.
Using the CLI

Editing Features

Editing Features

Entering Commands

A CLI command is a series of keywords and arguments. Keywords identify a command, and arguments specify configuration parameters. For example, in the command show interfaces status ethernet 1/g11, show, interfaces and status are keywords, ethernet is an argument that specifies the interface type, and 1/g11 specifies the port.
To enter commands that require parameters, enter the required parameters after the command keyword. For example, to set a password for the administrator, enter:
Console(config)#
When working with the CLI, the command options are not displayed. The command is not selected from a menu, but is manually entered. To see what commands are available in each mode or within an interface configuration, the CLI does provide a method of displaying the available commands, the command syntax requirements and in some instances parameters required to complete the command. The standard command to request help is ?.
There are two instances where help information can be displayed:
Keyword lookup — The character ? is entered in place of a command. A list of all valid commands and
corresponding help messages are is displayed.
Partial keyword lookup — If a command is incomplete and or the character ? is entered in place of a
parameter. The matched keyword or parameters for this command are displayed.
To assist in using the CLI, there is an assortment of editing features. The following features are described:
Terminal Command Buffer
Command Completion
Nomenclature
Keyboard Shortcuts
username
admin
password
alansmith
Terminal Command Buffer
Every time a command is entered in the CLI, it is recorded on an internally managed Command History buffer. Commands stored in the buffer are maintained on a First In First Out (FIFO) basis. These commands can be recalled, reviewed, modified, and reissued. This buffer is not preserved across device resets.
Keyword Description
Up-arrow key Ctrl+P
Down-arrow key Returns to more recent commands in the history buffer after recalling
By default, the history buffer system is enabled, but it can be disabled at any time. For information about the command syntax to enable or disable the history buffer, see history.
There is a standard default number of commands that are stored in the buffer. The standard number of 10 commands can be increased to 216. By configuring 0, the effect is the same as disabling the history buffer system. For information about the command syntax for configuring the command history buffer, see history size.
To display the history buffer, see show history.
Recalls commands in the history buffer, beginning with the most recent command. Repeats the key sequence to recall successively older commands.
commands with the up-arrow key. Repeating the key sequence will recall successively more recent commands.
Page 9
Allied Telesis
Command Line Interface User’s Guide
Negating the Effect of Commands
For many configuration commands, the prefix keyword no can be entered to cancel the effect of a command or reset the configuration to the default value. This guide describes the negation effect for all applicable commands.
Command Completion
If the command entered is incomplete, invalid or has missing or invalid parameters, then the appropriate error message is displayed. This assists in entering the correct command. By pressing the <Tab> button, an incomplete command is entered. If the characters already entered are not enough for the system to identify a single matching command, press ? to display the available commands matching the characters already entered.
Nomenclature
When referring to an Ethernet port in a CLI command, the following format is used:
For an Ethernet port on a standalone device: Ethernet_type port_number
For an Ethernet port on a stacked device: unit_number/Ethernet_type port number
The Ethernet type may be Gigabit Ethernet (indicated by “g”) or Fast Ethernet (indicated by “e”).
For example, g3 stands for Gigabit Ethernet port 3 on a stand-alone device, and e3 stands for Fast Ethernet port 3 on a stand-alone device, whereas 1/g3 stands for Gigabit Ethernet port 3 on stacking unit 1 and 1/g3 stands for Fast Ethernet port 3 on stacking unit 1.
The ports may be described on an individual basis or within a range. Use format port number-port number to specify a set of consecutive ports and port number, port number to indicate a set of non-consecutive ports. For example, g1-3 stands for Gigabit Ethernet ports 1, 2 and 3, and g1, 5 stands for Gigabit Ethernet ports 1 and 5.
Keyboard Shortcuts
The CLI has a range of keyboard shortcuts to assist in editing the CLI commands. The following table describes the CLI shortcuts.
Keyboard Key Description
Up-arrow key Recalls commands from the history buffer, beginning with the most recent command.
Repeat the key sequence to recall successively older commands.
Down-arrow key Returns the most recent commands from the history buffer after recalling commands with
the up arrow key. Repeating the key sequence will recall successively more recent commands.
Ctrl+A Moves the cursor to the beginning of the command line.
Ctrl+E Moves the cursor to the end of the command line.
Ctrl+Z / End Returns back to the Privileged EXEC mode from any configuration mode.
Backspace key Deletes one character left to the cursor position.
Page 10
Not approved by Document Control. For review only.
CLI Command Conventions
Note
Note
When entering commands there are certain command entry standards that apply to all commands. The following table describes the command conventions.
Convention Description
[ ] In a command line, square brackets indicates an optional entry.
{ } In a command line, curly brackets indicate a selection of compulsory parameters
separated by the | character. One option must be selected. For example: flowcontrol {auto|on|off} means that for the flowcontrol command either auto, on or off must be selected.
Italic font Indicates a parameter.
<Enter> Indicates an individual key on the keyboard. For example, <Enter> indicates the Enter
key.
Ctrl+F4 Any combination keys pressed simultaneously on the keyboard.
Screen Display
all When a parameter is required to define a range of ports or parameters and all is an
Indicates system messages and prompts appearing on the console.
option, the default for the command is all when no parameters are defined. For example, the command interface range port-channel has the option of either entering a range of channels, or selecting all. When the command is entered without a parameter, it automatically defaults to all.

Copying and Pasting Text

Up to 1000 lines of text (i.e., commands) can be copied and pasted into the device.
It is the user’s responsibility to ensure that the text copied into the device consists of legal commands only.
This feature is dependent on the baud rate of the device.
The default device baud rate is 115,200
When copying and pasting commands from a configuration file, make sure that the following conditions exist:
A device Configuration mode has been accessed.
The commands contain no encrypted data, like encrypted passwords or keys. Encrypted data cannot be
copied and pasted into the device.
Allied Telesis
Command Line Interface User’s Guide
Page 12
Not approved by Document Control. For review only.
ACL Commands

Chapter 2. ACL Commands

ip access-list

The ip access-list Global Configuration mode command defines an IPv4 Access List and places the device in IPv4 Access List Configuration mode. Use the no form of this command to remove the Access List.
Syntax
ip access-list access-list-name
no ip access-list access-list-name
Parameters
access-list-name — Name of the IPv4 Access List.
Default Configuration
No IPv4 Access List is defined
Command Mode
Global Configuration mode
User Guidelines
IPv4 ACLs are defined by a unique name. An IPv4 ACL and MAC ACL cannot share the same name.
Example
The following example places the device in IPv4 Access List Configuration mode.
Console(config)#
ip access-list

permit (ip)

The permit Ip Access-list Configuration mode command sets conditions to allow a packet to pass a named IP Access List.
Syntax
permit {any | protocol} {any | {source source-wildcard}} {any | {destination destination-wildcard}} [dscp number | ip-precedence number] [fragments]
permit-icmp {any | {source source-wildcard}} {any | {destination destination-wildcard}} {any | icmp-type} {any | icmp-code} [dscp number | ip-precedence number]
permit-igmp {any | {source source-wildcard}} {any | {destination destination-wildcard}} {any | igmp-type} [dscp number | ip-precedence number]
permit-tcp {any | { source source-wildcard}} {any | source-port} {any |{ destination destination-wildcard}} {any |
destination-port} [dscp number | ip-precedence number] [flags list-of-flags]
Page 13
Allied Telesis
Command Line Interface User’s Guide
permit-udp {any | { source source-wildcard}} {any | source-port} {any | {destination destination-wildcard}} {any | destination-port} [dscp number | ip-precedence number]
Parameters
source — Source IP address of the packet.
source-wildcard — Wildcard bits to be applied to the source IP address. Use 1s in the bit position to be
ignored.
destination — Destination IP address of the packet.
destination-wildcard — Wildcard bits to be applied to the destination IP address. Use 1s in the bit position to
be ignored.
protocol — The name or the number of an IP protocol. Available protocol names: icmp, igmp, ip, tcp, egp,
igp, udp, hmp, rdp, idpr, idrp, rsvp, gre, esp, ah, eigrp, ospf, ipip, pim, l2tp, isis. (Range: 0 - 255)
dscp number — Specifies the DSCP value.
ip-precedence number — Specifies the IP precedence value.
fragments— The set of conditions is applied only to noninitial fragments.
icmp-type — Specifies an ICMP message type for filtering ICMP packets. Enter a number or one of the
following values: echo-reply, destination-unreachable, source-quench, redirect, alternate-host­address, echo-request, router-advertisement, router-solicitation, time-exceeded, parameter-problem, timestamp, timestamp-reply, information-request, information-reply, address-mask-request, address mask-reply, traceroute, datagram-conversion-error, mobile-host-redirect, mobile-registration-request, mobile-registration-reply, domain-name-request, domain-name-reply, skip, photuris. (Range: 0 - 255)
icmp-code — Specifies an ICMP message code for filtering ICMP packets. (Range: 0 - 255)
igmp-type — IGMP packets can be filtered by IGMP message type. Enter a number or one of the following
values: host-query, host-report, dvmrp, pim, cisco-trace, host-report-v2, host-leave-v2, host-report-v3. (Range: 0 - 255)
destination-port — Specifies the UDP/TCP destination port. (Range: 0 - 65535)
source-port — Specifies the UDP/TCP source port. (Range: 0 - 65535)
flags list-of-flags — List of TCP flags that should occur. If a flag should be set it is prefixed by "+".If a flag
should be unset it is prefixed by "-". Available options are +urg, +ack, +psh, +rst, +syn, +fin, -urg, -ack, ­psh, -rst, -syn and -fin. The flags are concatenated to a one string. For example: +fin-ack.
Page 14
Not approved by Document Control. For review only.
ACL Commands
IP Protocol Abbreviated Name Protocol Number
Internet Control Message Protocol icmp 1
Internet Group Management Protocol igmp 2
IP in IP (encapsulation) Protocol ipinip 4
Transmission Control Protocol tcp 6
Exterior Gateway Protocol egp 8
Interior Gateway Protocol igp 9
User Datagram Protocol udp 17
Host Monitoring Protocol hmp 20
Reliable Data Protocol rdp 27
Inter-Domain Policy Routing Protocol
Ipv6 protocol ipv6 41
Routing Header for IPv6 ipv6-route 43
Fragment Header for IPv6 ipv6-frag 44
Inter-Domain Routing Protocol
Reservation Protocol rsvp 46
General Routing Encapsulation gre 47
Encapsulating Security Payload (50)
Authentication Header ah 51
ICMP for IPv6 ipv6-icmp 58
EIGRP routing protocol eigrp 88
Open Shortest Path Protocol ospf 89
Protocol Independent Multicast pim 103
Layer Two Tunneling Protocol l2tp 115
ISIS over IPv4 isis 124
(any IP protocol) any 25504
idpr 35
idrp 45
esp 50
dscp — Indicates matching the dscp number with the packet dscp value.
ip-precedence — Indicates matching ip-precedence with the packet ip-precedence value.
icmp-type — Specifies an ICMP message type for filtering ICMP packets. Enter a value or one of the following
values: echo-reply, destination-unreachable, source-quench, redirect, alternate-host-address, echo­request, router-advertisement, router-solicitation, time-exceeded, parameter-problem, timestamp, timestamp-reply, information-request, information-reply, address-mask-request, address-mask-reply, traceroute, datagram-conversion-error, mobile-host-redirect, ipv6-where-are-you, ipv6-i-am-here,
Page 15
Allied Telesis
Command Line Interface User’s Guide
mobile-registration-request, mobile-registration-reply, domain-name-request, domain-name-reply, skip and photuris. (Range: 0-255)
icmp-code — Specifies an ICMP message code for filtering ICMP packets. ICMP packets that are filtered by
ICMP message type can also be filtered by the ICMP message code. (Range: 0-255)
igmp-type — IGMP packets can be filtered by IGMP message type. Enter a number or one of the following
values: dvmrp, host-query, host-report, pim or trace. (Range: 0-255)
destination-port — Specifies the UDP/TCP destination port. (Range: 0-65535)
source-port — Specifies the UDP/TCP source port. (Range: 0-65535)
list-of-flags — Specifies a list of TCP flags that can be triggered. If a flag is set, it is prefixed by “+”. If a flag is
not set, it is prefixed by “-”. Possible values: +urg, +ack, +psh, +rst, +syn, +fin, -urg, -ack, -psh, -rst, -syn and -fin. The flags are concatenated into one string. For example: +fin-ack.
Default Configuration
No IPv4 ACL is defined.
Command Mode
Ip Access-list Configuration mode
User Guidelines
You enter IP-Access List configuration mode by using the ip access-list Global Configuration mode command.
Example
The following example shows how to define a permit statement for an IP ACL.
Console(config)#
Console(config-ip-al)#
ip access-list
permit
rsvp 192.1.1.1 0.0.0.0
ip-acl1
any dscp
56

deny (IP)

The deny IP Access List Configuration mode command sets conditions to not allow a packet to pass a named IP Access List.
Syntax
deny [disable-port] {any| protocol} {any|{source source-wildcard}} {any|{destination destination- wildcard}} [dscp number | ip-precedence number]
deny-icmp [disable-port] {any|{source source-wildcard}} {any|{destination destination-wildcard}} {any|icmp-type} {any|icmp-code} [dscp number | ip-precedence number]
deny-igmp [disable-port] {any|{source source-wildcard}} {any|{destination destination-wildcard}} {any|igmp-type} [dscp number | ip-precedence number]
deny-tcp [disable-port] {any|{ source source-wildcard}} {any|source-port} {any|{ destination destination-wildcard}} {any|destination-port} [dscp number | ip-precedence number] [flags list-of-
Page 16
Not approved by Document Control. For review only.
ACL Commands
flags]
deny-udp [disable-port] {any|{ source source-wildcard}} {any| source-port} {any|{destination destination-wildcard}} {any|destination-port} [dscp number | ip-precedence number]
Parameters
disable-port — The Ethernet interface is disabled if the condition is matched. (Range: 0 - 65535)
source — Source IP address of the packet.
source-wildcard — Wildcard bits to be applied to the source IP address. Use 1s in the bit position to be
ignored.
destination — Packet’s destination IP address.
destination-wildcard — Wildcard bits to be applied to the destination IP address. Use 1s in the bit position to
be ignored.
protocol —The name or number of an IP protocol. Available protocol names: icmp, igmp, ip, tcp, egp, igp,
udp, hmp, rdp, idpr, idrp, rsvp, gre, esp, ah, eigrp, ospf, ipip, pim, l2tp, isis.: (Range: 0 - 255)
dscp number — Specifies the DSCP value.
ip-precedence number — Specifies the IP precedence value.
icmp-type — Specifies an ICMP message type for filtering ICMP packets. Enter a number, or one of the
following values: echo-reply, destination-unreachable, source-quench, redirect, alternate-host­address, echo-request, router-advertisement, router-solicitation, time-exceeded, parameter-problem, timestamp, timestamp-reply, information-request, information-reply, address-mask-request, address­mask-reply, traceroute, datagram-conversion-error, mobile-host-redirect, mobile-registration-request, mobile-registration-reply, domain-name-request, domain-name-reply, skip, photuriss. (Range: 0 - 255)
icmp-code — Specifies an ICMP message code for filtering ICMP packets. (Range: 0 - 255)
igmp-type — GMP packets can be filtered by IGMP message type. Enter a number, or one of the following
values: host-query, host-report, dvmrp, pim, cisco-trace, host-report-v2, host-leave-v2, host-report-v3. (Range: 0 - 255)
destination-port — Specifies the UDP/TCP destination port.
source-port — Specifies the UDP/TCP source port. (Range: 0 - 65535)
flags list-of-flags — List of TCP flags that should occur. If a flag is intended to be set, it is prefixed by ‘+’.If a
flag should be unset it is prefixed by ‘-’. Available options are: +urg, +ack, +psh, +rst, +syn, +fin, -urg, -ack,
-psh, -rst, -syn and -fin. The flags are concatenated to a single string. For example: +fin-ack.
IP Protocol Abbreviated Name Protocol Number
Internet Control Message Protocol icmp 1
Internet Group Management Protocol igmp 2
Transmission Control Protocol tcp 6
Exterior Gateway Protocol egp 8
Interior Gateway Protocol igp 9
User Datagram Protocol udp 17
Host Monitoring Protocol hmp 20
Reliable Data Protocol rdp 27
Inter-Domain Policy Routing Protocol
idpr 35
Page 17
Allied Telesis
Command Line Interface User’s Guide
IP Protocol Abbreviated Name Protocol Number
Ipv6 protocol ipv6 41
Routing Header for IPv6 ipv6-route 43
Fragment Header for IPv6 ipv6-frag 44
Inter-Domain Routing Protocol
Reservation Protocol rsvp 46
General Routing Encapsulation gre 47
Encapsulating Security Payload (50)
Authentication Header ah 51
ICMP for IPv6 ipv6-icmp 58
EIGRP routing protocol eigrp 88
Open Shortest Path Protocol ospf 89
Protocol Independent Multicast pim 103
Layer Two Tunneling Protocol l2tp 115
ISIS over IPv4 isis 124
(any IP protocol) any 25504
idrp 45
esp 50
Default Configuration
No IPv4 Access List is defined.
Command Mode
IP Access-list Configuration mode
User Guidelines
Enter IP-Access List configuration mode by using the ip access-list Global Configuration mode command.
After an access control entry (ACE) is added to an access control list, an implied deny-any-any condition
exists at the end of the list. That is, if there are no matches, the packets are denied. However, before the first ACE is added, the list permits all packets.
Example
The following example shows how to define a permit statement for an IP ACL.
Console(config)#
Console(config-ip-al)#
ip-access-list
deny
rsvp 192.1.1.1 0.0.0.255
ip-acl1
any

mac access-list

The mac access-list Global Configuration mode command defines a Layer 2 Access List and places the device in MAC-Access List Configuration mode. Use the no form of this command to remove the Access List.
Page 18
Not approved by Document Control. For review only.
Loading...
+ 318 hidden pages