v
INDUSTRIAL PROTOCOLS
Command Line Interface ............................................. 1
Using the Command-Line Interface................................................................................................. 1
Initially Configuring a Device ........................................ ... ... .......................................... ... ... ...... 1
Understanding Command Syntax............................................................................................. 1
Understanding Admin and User Accounts................................................................................ 2
Understanding Enable and Enable Secret Passwords............................................................. 2
Abbreviating Commands .......... ... .... .......................................... ... ... ... ... .... ... ... ... .... ... ... ............ 2
Using Aliases for CLI Commands............................................................................................. 3
L2 Features...................................................................................................................................... 3
Port Configuration..................................................................................................................... 3
MAC Address Table......................................... ... ... ... .... .......................................... ... ... ... ... ...... 4
Jumbo Frame...................................... ... ... ... .......................................... .... ... ... ... ...................... 5
Flow Control..............................................................................................................................5
Spanning Tree.......................................................................................................................... 6
VLAN ........................................................................................................................................ 9
Q-in-Q..................................................................................................................................... 11
Link Aggregation..................................................................................................................... 12
GARP...................................................................................................................................... 13
GVRP...................................................................................................................................... 13
Port Mirror............................................................................................................................... 14
LLDP....................................................................................................................................... 14
Multicast......................................................................................................................................... 16
IGMP Snooping ...................................................................................................................... 16
MLD Snooping........................................................................................................................ 19
Redundancy................................................................................................................................... 22
X-Ring..................................................................................................................................... 22
QoS................................................................................................................................................23
Rate Limit................................................................................................................................ 23
QoS......................................................................................................................................... 23
Security.......................................................................................................................................... 25
Loop Detection / Prevention ................................................................................................... 25
Storm Control.......................................................................................................................... 25
Port Security........................................................................................................................... 26
802.1X .................................................................................................................................... 27
Remote Authentication ...........................................................................................................27
One Time Password...............................................................................................................28
Account Manager...................................... .......................................... ... .... ... ... ....................... 28
DoS Attack Prevention..................................... ... ... ... .... ... ... ... .... ... ... ... .................................... 29
IP Security .............................................................................................................................. 29
Management.................................................................................................................................. 30
IP Management ...................................................................................................................... 30
SNMP .....................................................................................................................................31
Configuration Management .................................................................................................... 32
Firmware Management ... .... ... ... ... .... ... ... ... ... .... ... .......................................... ... ... .... ... ... ... ... .... 33
DHCP Server............ ... ... .... ... ... ... .... ... ... .......................................... ... ... .... ... .......................... 33
DHCP Client ... ... .... ... ... ... .... ... ... .......................................... ... ................................................. 34
System Log (SYSLOG)........................................................................................................... 35
System Time........................................................................................................................... 35
SMTP...................................................................................................................................... 37
NTP Server............................................................................................................................. 37
RMON...........................................................................................................................
.......... 38
IP Configuration...................................................................................................................... 39
TELNET.................................................................................................................................. 40
CONTENTS