Zyxel GS1350-12HP, GS1350-6HP, GS1350-26HP, XGS2210-52HP, XGS4600-32 CLI Reference Guide

...
Default Login Details
3'ŻMÍº Guide

Ethernet Switch Series

Managed Ethernet Switches
Out-of-Band MGMT Port
In-Band Ports http://DHCP-assigned IP
User Name admin
Password 1234
http://192.168.0.1
or
http://192.168.1.1
Version 4.70 Edition 2, 03/2021
Copyright © 2021 Zyxel Communications Corporation
IMPORTANT! READ CAREFULLY BEFORE USE. KEEP THIS GUIDE FOR FUTURE REFERENCE.
This is a Reference Guide for a series of products intended for people who want to configure the Switch through Command Line Interface (CLI).
Note: Some commands or command options in this guide may not be available in your
product. See your product's User’s Guide for a list of supported features. Every effort has been made to ensure that the information in this guide is accurate.
How To Use This Guide
1 Read Chapter 1 on page 10 for how to access and use the CLI (Command Line Interface).
2 Read Chapter 2 on page 13 to learn about the CLI user and privilege modes.
Do not use commands not documented in this guide.
Related Documentation
•Quick Start Guide The Quick Start Guide shows how to connect the Switch and access the Web Configurator.
• User’s Guide The User’s Guide explains how to use the Web Configurator to configure the Switch.
Note: It is recommended you use the Web Configurator to configure the Switch.

About This CLI Reference Guide

About This CLI Reference Guide
Intended Audience
This manual is intended for people who want to configure Zyxel Switches through Command Line Interface (CLI).
The version number on the cover page refers to the latest firmware version supported by the Zyxel Switches. This guide applies to version 4.70 at the time of writing.
Note: This guide is intended as a command reference for a series of products. Therefore many
commands in this guide may not be available in your product. See your User’s Guide for a list of supported features and details about feature implementation.
Please refer to www.zyxel.com for product specific User Guides and product certifications.
How To Use This Guide
• Read the How to Access the CLI chapter for an overview of various ways you can get to the command interface on your Switch.
• Use the Reference section in this guide for command syntax, description and examples. Each chapter describes commands related to a feature.
• To find specific information in this guide, use the Contents Overview, the Index of Commands, or search the PDF file.
Ethernet Switch CLI Reference Guide
3

Document Conventions

Document Conventions
Warnings and Notes
These are how warnings and notes are shown in this CLI Reference Guide.
Warnings tell you about things that could harm you or your device. See your User’s Guide for product specific warnings.
Note: Notes tell you other important information (for example, other things you may need to
configure or helpful tips) or recommendations.
Syntax Conventions
This manual follows these general conventions:
• Zyxel’s switches may be referred to as the “Switch”, the “device”, the “system” or the “product” in this Reference Guide.
• Units of measurement may denote the “metric” value or the “scientific” value. For example, “k” for kilo may denote “1000” or “1024”, “M” for mega may denote “1000000” or “1048576” and so on.
Command descriptions follow these conventions:
• Commands are in courier new font.
• Required input values are in angle brackets <>; for example, specify an IP address for this command.
• Optional fields are in square brackets []; for instance show logins [name], the name field is optional. The following is an example of a required field within an optional field: snmp-server [contact
<system contact>], the contact field is optional. However, if you use contact, then you must provide the system contact information.
• In some commands you specify slots or interfaces by the Access ID <aid>, use “?” to show which types of interfaces you can specify. For example, you might be able to use: slot-<slot> | <ge|msc>-<slot>-<port> | <ge|msc>-<slot>-<port>&&-<port>.
• Use “msc-<slot>-<port>” for an uplink slot on the management switch card.
• Use “ge-<slot>-<port>” for a Gigabit Ethernet port or switch settings on a PON interface.
• Use “pon-<slot>-<port>” to configure PON interface settings.
• A “slot” is a chassis slot.
• The “port” is 1-N where N is the number of ports on the card.
• Use && to specify a range of ports.
•Lists (such as <port-list>) consist of one or more elements separated by commas. Each element might be a single value (1, 2, 3, ...) or a range of values (1–2, 3–5, ...) separate d b y a dash .
• The | (bar) symbol means “or”.
italic terms represent user-defined input values; for example, in snmp-server [contact <system contact>], system contact can be replaced by the administrator’s name.
• A key stroke is denoted by square brackets and uppercase text, for example, [ENTER] means the “Enter” or “Return” key on your keyboard.
ping <ip> means that you must
Ethernet Switch CLI Reference Guide
4
Document Conventions
<cr> means press the [ENTER] key.
• An arrow (-->) indicates that this line is a continuation of the previous line.
Command summary tables are organized as follows: Table 1 Example: Command Summary Table
COMMAND DESCRIPTION M P
show vlan
vlan <1-4094>
inactive
no inactive
no vlan <1-4094>
Displays the status of all VLANs. E 3 Enters config-vlan mode for the specified VLAN. Creates
the VLAN, if necessary. Disables the specified VLAN. C 13
Enables the specified VLAN. C 13 Deletes a VLAN. C 13
C13
The Table title identifies commands or the specific feature that the commands configure.
The COMMAND column shows the syntax of the command.
• If a command is not indented, you run it in the enable or config mode. See Chapter 2 on page 13 for more information on command modes.
• If a command is indented, you run it in a sub-command mode.
The DESCRIPTION column explains what the command does. It also identifies legal input values, if necessary.
The M column identifies the mode in which you run the command.
E: The command is available in enable mode. It is also available in user mode if the privilege level (P) is less than 13.
C: The command is available in config (not indented) or one of the sub-command modes (indented).
The P column identifies the privilege level of the command. If you do not have a high enough privilege level you may not be able to view or execute some of the commands. See Chapter 2 on page 13 for more information on privilege levels.
Ethernet Switch CLI Reference Guide
5

Contents Overview

Contents Overview
Introduction .........................................................................................................................................9
How to Use the CLI ............................................................................................................................... 10
Privilege Level and Command Mode .................................................................... ....... ....... ....... ....... 13
Initial Setup ............................................................................................................................................ 18
Reference A-G ..................................................................................................................................25
AAA Commands .................................................................................................................................. 27
Anti-Arpscan ......................................................................................................................................... 30
ARP Commands ................................................................................................................................... 32
ARP Inspection Commands ................................................................................................................ 34
ARP Learning Commands ......................... .......................................................................................... 39
Auto Configuration Commands ........ ................................................................................... .............. 40
Bandwidth Commands ........................................................................................................................ 42
BPDU Guard .......................................................................................................................................... 45
Broadcast Storm Commands .............................................................................................................. 46
Certificates Commands ...................................................................................................................... 49
Classifier Commands ........................................................................................................................... 52
Cluster Commands ........................................................ ....... ....... ....... ....... ....... ....... ....... ..................... 57
CLV Commands ................................................................................................................................... 60
Custom Default Commands ............................................................................................................... 66
Date and Time Commands ................................................................................................................. 67
Data Center Bridging Commands ..................................................................................................... 70
DHCP Commands ................................................................................................................................ 78
DHCP Snooping and DHCP VLAN Commands ................................................................................. 84
DiffServ Commands ............................................................................................................................. 88
Display Commands .............................................................................................................................. 89
DVMRP Commands .............................................................................................................................. 90
Error Disable and Recovery Commands ........................................................................................... 92
Ethernet OAM Commands .................................................................................................................. 96
External Alarm Commands ............................................................................................................... 101
GARP Commands .............................................................................................................................. 103
Green Ethernet Commands ........ ....... ....... ...... ....... ....... ....... ....... .............. ....... ....... ....... ....... ............ 105
GVRP Commands .............................................................................................................................. 109
Reference H-M ................................................................................................................................110
HTTPS Server Commands ................................................................................................................... 112
IGMP and Multicasting Commands .................................... ....... ....... ....... ....... ....... ....... ....... ....... .....115
IGMP Snooping Commands ............................................................................ ....... ....... ....... ............ 118
Ethernet Switch CLI Reference Guide
6
Contents Overview
Interface Commands ........................................................................................................................ 126
Interface Loopback Mode ................................................................................................................ 132
Interface Route-domain Mode ........................................................................................................ 134
IP Commands ..................................................................................................................................... 135
IP Source Binding Commands .......................................................................................................... 140
IP Source Guard .................................................................................................................................. 142
IPv6 Commands ................................................................................................................................. 144
Layer 2 Protocol Tunnel (L2PT) Commands ..................................................................................... 172
Link Layer Discovery Protocol (LLDP) Commands .......................................................................... 175
Load Sharing Commands .................................................................................................................. 187
Logging Commands .......................................................................................................................... 189
Login Account Commands ............................................................................................ ................... 191
Loopguard Commands ..................................................................................................................... 193
MAC Address Commands ................................................................................................................. 195
MAC-based VLAN .............................................................................................................................. 197
MAC Filter Commands ........................................................................................................... ............ 199
MAC Forward Commands ................................................................................................................ 201
MAC Pinning Commands .................................................................................................................. 202
Mirror Commands ............................................................................................................................... 204
MRSTP Commands ............................................................................................................................. 209
MSTP Commands ..................................................... ....... ....... ....... ....... ....... ....... ....... ....... ................... 212
Multiple Login Commands .............................. ....... .............. ....... ....... ....... ....... ....... ....... ....... ............ 217
MVR Commands ................................................................................................................................ 218
Reference N-S .................................................................................................................................220
NLB Commands .................................................................................................................................. 222
ONVIF Commands ............................................................................................................................. 226
OSPF Commands ................................................................................................................................ 229
Password Commands ........................................................................................................................ 239
PoE Commands .................................................................................................................................. 241
Policy Commands .............................................................................................................................. 248
Policy Route Commands ................................................................................................................... 252
Port Authentication Commands ...................................................................................................... 254
Port Security Commands ................................................................................................................... 261
Port-based VLAN Commands ........................................................................................................... 263
PPPoE IA Commands ......................................................................................................................... 265
Private VLAN Commands .................................................................................................................. 271
Protocol-based VLAN Commands ...................................................................................................276
Proxy Server Commands ................................................................................................................... 278
Queuing Commands ......................................................................................................................... 280
RADIUS Commands ............................................................................................................................ 284
Remote Management Commands ................................................................................................. 287
RIP Commands ................................................................................................................................... 290
Ethernet Switch CLI Reference Guide
7
Contents Overview
RMON ............................................................................... .................................................................... 293
Running Configuration Commands ......................................................... ....... ....... ....... ....... ....... .....300
Service Register ................................................................................................................................... 303
sFlow ................................................................................. .................................................................... 306
SNMP Server Commands ................................................................................................................... 308
Stacking Commands ........................................................................................ ....... ....... ................... 313
STP and RSTP Commands .................................................................................................................. 319
SSH Commands .................................................................................................................................. 323
Static Multicast Commands .............................................................................................................. 325
Static Route Commands ................................................................................................................... 327
Subnet-based VLAN Commands .....................................................................................................330
Syslog Commands .............................................................................................................................. 332
Reference T-Z ..................................................................................................................................334
TACACS+ Commands ........................................................................................................................ 335
Tech Support Commands .... ....... ....... ............. ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ............ 337
TFTP Commands ................................................................................................................................. 341
Time Range Commands .................................................................................................................... 342
Traceroute Commands ..................................................................................................................... 344
Trunk Commands ................................................................... ....... ....... ....... ....... ....... ....... ................... 345
Vendor ID-based VLAN ...................................................................................................................... 350
VLAN Commands ............................................................................................................................... 353
VLAN IP Commands ........................................................................................................................... 359
VLAN Isolation Commands ................................................................................................................ 361
VLAN Mapping Commands .............................................................................................................. 364
VLAN Port Isolation Commands ........................................................................................................ 366
VLAN Stacking Commands ............................................................................................................... 367
VLAN Trunking Commands ................................................................................................................ 370
Voice VLAN Commands .................................................................................................................... 371
VRRP Commands ............................................................................................................................... 374
Wol Relay Commands ....................................................................................................................... 377
ZULD Commands ..... ........................................................................................................................... 378
Miscellaneous Commands ................................................................................................................ 381
Appendices and Index of Commands .........................................................................................394
Ethernet Switch CLI Reference Guide
8
PART I

Introduction

How to Use the CLI (10)
Privilege Level and Command Mode (13)
Initial Setup (18)
9

How to Use the CLI

This chapter introduces the command line interface (CLI).

1.1 Accessing the CLI

Use any of the following methods to access the CLI.
1.1.1 Console Port
1 Connect your computer to the console port on the Switch using the appropriate cable.
2 Use terminal emulation software with the following settings:
CHAPTER 1
Table 2 Default Settings for the Console Port
SETTING DEFAULT VALUE
Terminal Emulation VT100 Baud Rate 9600 or 115200 bps Parity None Number of Data Bits 8 Number of Stop Bits 1 Flow Control None
3 Press [ENTER] to open the login screen.
1.1.2 Telnet
1 Connect your computer to one of the Ethernet ports.
2 Open a Telnet session to the Switch’s IP address. If this is your first login, use the default values.
Table 3 Default Management IP Address
SETTING DEFAULT VALUE
IP Address 192.168.1.1 Subnet Mask 255.255.255.0
Make sure your computer IP address is in the same subnet, unless you are accessing the Switch through one or more routers.
Ethernet Switch CLI Reference Guide
10
1.1.3 SSH
1 Connect your computer to one of the Ethernet ports.
2 Use a SSH client program to access the Switch. If this is your first login, use the default values in Table 3 on
page 10 and Table 4 on page 11. Make sure your computer IP address is in the same subnet, unless you
are accessing the Switch through one or more routers.

1.2 Logging in

Use the administrator username and password. If this is your first login, use the default values. Table 4 Default User Name and Password
SETTING DEFAULT VALUE
User Name admin Password 1234
Note: The Switch automatically logs you out of the management interface after 5 minutes of
inactivity. If this happens to you, simply log back in again.
Chapter 1 How to Use the CLI

1.3 Using Shortcuts and Getting Help

This table identifies some shortcuts in the CLI, as well as how to get help. Table 5 CLI Shortcuts and Help
COMMAND / KEYS DESCRIPTION
history
 (up/down arrow keys)
[CTRL]+U
[TAB]
?
help
Displays a list of recently-used commands. Scrolls through the list of recently-used commands. You can edit any
command or press [ENTER] to run it again. Clears the current command.
Auto-completes the keyword you are typing if possible. For example, type config, and press [TAB]. The Switch finishes the word configure.
Displays the keywords and/or input values that are allowed in place of the ?. Displays the (full) commands that are allowed in place of help.

1.4 Saving Your Configuration

When you run a command, the Switch saves any changes to its run-time memory. The Switch loses these changes if it is turned off or loses power. Use the current configuration permanently to non-volatile memory.
write memory command in enable mode to save the
sysname# write memory
Ethernet Switch CLI Reference Guide
11
Note: You should save your changes after each CLI session. All unsaved configuration
changes are lost once you restart the Switch.

1.5 Logging Out

Enter logout to log out of the CLI. You have to be in user, enable, or config mode. See Chapter 2 on
page 13 for more information about modes.
Chapter 1 How to Use the CLI
Ethernet Switch CLI Reference Guide
12
This chapter introduces the CLI privilege levels and command modes.
• The privilege level determines whether or not a user can run a particular command.
• If a user can run a particular command, the user has to run it in the correct mode.

2.1 Privilege Levels

Every command has a privilege level (0 – 14). Users can run a command if the session’s privilege level is greater than or equal to the command’s privilege level. The session’s privilege level initially comes from the login account’s privilege level, though it is possible to change the session’s privilege level after logging in.
CHAPTER 2
Privilege Level and
Command Mode
2.1.1 Privilege Levels for Commands
The privilege level of each command is listed in the Reference A-G chapters on page 25.
At the time of writing, commands have a privilege level of 0, 3, 13, or 14. The following table summarizes the types of commands at each of these privilege levels.
Table 6 Types of Commands at Different Privilege Levels
PRIVILEGE LEVEL TYPES OF COMMANDS AT THIS PRIVILEGE LEVEL
0 Display basic system information. 3 Display configuration or status.
13 Configure features except for login accounts, SNMP user accounts, the authentication
method sequence and authorization settings, multiple logins, admi nistrator and enable passwords, and configuration information display.
14 Configure login accounts, SNMP user accounts, the authentication method sequence and
authorization settings, multiple logins, and administrator and enable passwords, and display configuration information.
2.1.2 Privilege Levels for Login Accounts
You can manage the privilege levels for login accounts in the following ways:
• Using commands. Login accounts can be configured by the admin account or any login account with a privilege level of 14. See Chapter 45 on page 191.
Ethernet Switch CLI Reference Guide
13
Chapter 2 Privilege Level and Command Mode
• Using vendor-specific attributes in an external authentication server. See the User’s Guide for more information.
The admin account has a privilege level of 14, so the administrator can run every command. You cannot change the privilege level of the admin account.
2.1.3 Privilege Levels for Sessions
The session’s privilege level initially comes from the privilege level of the login account the user used to log in to the Switch. After logging in, the user can use the following commands to change the session’s privilege level.
2.1.3.1 enable Command
This command raises the session’s privilege level to 14. It also changes the session to enable mode (if not already in enable mode). This command is available in user mode or enable mode, and users have to know the enable password.
In the following example, the login account user0 has a privilege level of 0 but knows that the enable password is 123456. Afterwards, the session’s privilege level is 14, instead of 0, and the session changes to enable mode.
sysname> enable Password: 123456 sysname#
The default enable password is 1234. Use this command to set the enable password.
password <password>
<password> consists of 1 – 32 alphanumeric characters. For example, the following command sets the
enable password to 123456. See Section 60.2 on page 239 for more information about this command.
sysname(config)# password 123456
The password is sent in plain text and stored in the Switch’s buffers. Use this command to set the cipher password for password encryption.
password cipher <password>
<password> consists of 32 alphanumeric characters. For example, the following command encrypts the
enable password with a 32-character cipher password. See Section 60.2 on page 239 for more information about this command.
sysname(config)# password cipher qwertyuiopasdfghjklzxcvbnm123456
2.1.3.2 enable <0–14> Command
This command raises the session’s privilege level to the specified level. It also changes the session to enable mode, if the specified level is 13 or 14. This command is available in user mode or enable mode, and users have to know the password for the specified privilege level.
Ethernet Switch CLI Reference Guide
14
In the following example, the login account user0 has a privilege level of 0 but knows that the password for privilege level 13 is pswd13. Afterwards, the session’s privilege level is 13, instead of 0, and the session changes to enable mode.
sysname> enable 13 Password: pswd13 sysname#
Users cannot use this command until you create passwords for specific privilege levels. Use the following command to create passwords for specific privilege levels.
password <password> privilege <0–14>
<password> consists of 1 – 32 alphanumeric characters. For example, the following command sets the
password for privilege level 13 to pswd13. See Section 60.2 on page 239 for more information about this command.
sysname(config)# password pswd13 privilege 13
2.1.3.3 disable Command
Chapter 2 Privilege Level and Command Mode
This command reduces the session’s privilege level to 0. It also changes the session to user mode. This command is available in enable mode.
2.1.3.4 show privilege command
This command displays the session’s current privilege level. This command is available in user mode or enable mode.
sysname# show privilege Current privilege level : 14

2.2 Command Modes

The CLI is divided into several modes. If a user has enough privilege to run a particular command, the user has to run the command in the correct mode. The modes that are available depend on the session’s privilege level.
2.2.1 Command Modes for Privilege Levels 0 – 12
If the session’s privilege level is 0 – 12, the user and all of the allowed commands are in user mode. Users do not have to change modes to run any allowed commands.
Ethernet Switch CLI Reference Guide
15
Chapter 2 Privilege Level and Command Mode
2.2.2 Command Modes for Privilege Levels 13 – 14
If the session’s privilege level is 13 – 14, the allowed commands are in one of several modes. Table 7 Command Modes for Privilege Levels 13-14 and the Types of Commands in Each One
MODE PROMPT COMMAND FUNCTIONS IN THIS MODE
enable
config config-interface config-mvr config-route-
domain config-dvmrp
config-igmp
config-ma
config-ospf config-rip config-vrrp
sysname#
sysname(config)#
sysname(config-interface)#
sysname(config-mvr)#
sysname(config-if)#
sysname(config-dvmrp)#
sysname(config-igmp)#
sysname(config-ma)#
sysname(config-ospf)#
sysname(config-rip)#
sysname(config-vrrp)#
Display current configuration, diagnostics, maintenance.
Configure features other than those below. Configure ports. Configure multicast VLAN. Enable and enter configuration mode for an IPv4 or
IPv6 routing domain. Configure Distance Vector Multicast Routing Protocol
(DVRMP). Configure Internet Group Management Protocol
(IGMP). Configure an Maintenance Association (MA) in
Connectivity Fault Management (CFM). Configure Open Shortest Path First (OSPF) protocol.
Configure Routing Information Protocol (RIP). Configure Virtual Router Redundancy Protocol (VRRP).
Each command is usually in one and only one mode. If a user wants to run a particular comm an d, the user has to change to the appropriate mode. The command modes are organized like a tree, and users start in enable mode. The following table explains how to change from one mode to another.
Table 8 Changing Between Command Modes for Privilege Levels 13 – 14
MODE ENTER MODE LEAVE MODE
enable
config
–-
configure
config-interface interface port-channel <port-list>
config-mvr mvr <1-4094>
config-vlan vlan <1-4094>
config-route-domain interface route domain <ip-address>/<mask-bits>
config-dvmrp router dvmrp
config-igmp router igmp
config-ospf router ospf <router-id>
config-rip router rip
config-vrrp router vrrp network <ip-address>/<mask-bits>
-­exit exit exit exit exit exit exit exit exit exit
vr-id <1–7> uplink-gateway <ip-address>
Ethernet Switch CLI Reference Guide
16
Chapter 2 Privilege Level and Command Mode

2.3 Listing Available Commands

Use the help command to view the executable commands on the Switch. You must have the highest privilege level in order to view all the commands. Follow these steps to create a list of supported commands:
1 Log into the CLI. This takes you to the enable mode.
2 Type help and press [ENTER]. A list comes up which shows all the commands available in enable mode.
The example shown next has been edited for brevity’s sake.
sysname# help Commands available:
help logout exit history enable <0-14> enable <cr> . . traceroute <ip|host-name> [vlan <vlan-id>][..] traceroute help ssh <1|2> <[user@]dest-ip> <cr> ssh <1|2> <[user@]dest-ip> [command </>] sysname#
3 Copy and paste the results into a text editor of your choice. This creates a list of all the executable
commands in the user and enable modes.
4 Type configure and press [ENTER]. This takes you to the config mode.
5 Type help and press [ENTER]. A list is displayed which shows all the commands available in config mode
and all the sub-commands. The sub-commands are preceded by the command necessary to enter that sub-command mode. For example, the command name <name-str> as shown next, is preceded by the command used to enter the config-vlan sub-mode: vlan <1-4094>.
sysname# help . . no arp inspection log-buffer logs no arp inspection filter-aging-time no arp inspection <cr> vlan <1-4094> vlan <1-4094> name <name-str> vlan <1-4094> normal <port-list> vlan <1-4094> fixed <port-list>
6 Copy and paste the results into a text editor of your choice. This creates a list of all the executable
commands in config and the other submodes, for example, the config-vlan mode.
Ethernet Switch CLI Reference Guide
17
CHAPTER 3

Initial Setup

This chapter identifies tasks you might want to do when you first configure the Switch.

3.1 Changing the Administrator Password

Note: It is recommended you change the default administrator password. You can encrypt
the password using the password encryption command. See Chapter 60 on page
239 for more information.
Use this command to change the administrator password.
admin-password <pw-string> <Confirm-string>
Up to 32 characters are allowed for the new password except [ ? ], [ | ], [ ' ], [ " ], [ space ], or [ , ].
sysname# configure sysname(config)# admin-password t1g2y7i9 t1g2y7i9

3.2 Changing the Enable Password

Note: It is recommended you change the default enable password. You can encrypt the
password using the password encryption command. See Chapter 60 on page 239 for more information.
Use this command to change the enable password.
password <password>
Up to 32 characters are allowed for the new password except [ ? ], [ | ], [ ' ], [ " ], [ space ], or [ , ].
sysname# configure sysname(config)# password k8s8s3dl0
Ethernet Switch CLI Reference Guide
18
Chapter 3 Initial Setup

3.3 Prohibiting Concurrent Logins

By default, multiple CLI sessions are allowed through the console port or Telnet. See the User’s Guide for the maximum number of concurrent sessions for your Switch. Use this command to prohibit concurrent logins.
no multi-login
Console port has higher priority than Telnet. See Chapter 55 on page 217 for more commands.
sysname# configure sysname(config)# no multi-login

3.4 Changing the Management IP Address

The Switch has a different IP address in each VLAN. By default, the Switch has VLAN 1 with IP address
192.168.1.1 and subnet mask 255.255.255.0. Use this command in config-vlan mode to change the
management IP address in a specific VLAN.
ip address <ip> <mask>
This example shows you how to change the management IP address in VLAN 1 to 172.16.0.1 with subnet mask 255.255.255.0.
sysname# configure sysname(config)# vlan 1 sysname(config-vlan)# ip address default-management 172.16.0.1 255.255.255.0
multi-login
Note: Afterwards, you have to use the new IP address to access the Switch.

3.5 Changing the Out-of-band Management IP Address

If your Switch has a MGMT port (also referred to as the out-of-band management port), then the Switch can also be managed through this interface. By default, the MGMT port IP address is 192.168.0.1 and the subnet mask is 255.255.255.0. Use this command in config mode to change the out-of-band management IP address.
ip address <ip> <mask>
This example shows you how to change the out-of-band management IP address to 10.10.10.1 with subnet mask 255.255.255.0 and the default gateway 10.10.10.254.
sysname# configure sysname(config)# ip address 10.10.10.1 255.255.255.0 sysname(config)# ip address default-gateway 10.10.10.254
Ethernet Switch CLI Reference Guide
19
Chapter 3 Initial Setup

3.6 Using Auto Configuration

Follow the steps below to set up configurations on the Switch, so you can load an auto configuration file automatically from a TFTP server when you reboot the Switch.
Note: You need to set up configurations on a DHCP server and TFTP server first to use auto
configuration.
1 Use this command to enable auto configuration on the Switch.
auto-config
sysname# config sysname(config)# auto-config
2 Use this command to enable the DHCP mode for auto configuration.
auto-config dhcp
sysname# config sysname(config)# auto-config dhcp
3 Use this command to configure the Switch as a DHCP client.
ip address default-management dhcp-bootp
sysname# config sysname(config)# vlan 1 sysname(config-vlan)# ip address default-management dhcp-bootp
4 Use this command to enable DHCP option 60.
ip address default-management dhcp-bootp option-60
When you enable DHCP option 60, make sure you set up a Vendor Class Identifier. The Vendor Class Identifier specifies the Zyxel switch that should receive the auto configuration file. Skip this step if you are not enabling DHCP option 60.
sysname# config sysname(config)# vlan 1 sysname(config-vlan)# ip address default-management dhcp-bootp option-60
5 Use this command to define a Vendor Class Identifier for DHCP option 60.
ip address default-management dhcp-bootp option-60 class-id <class-id>
In this example, we use “ZyxelCorp”. Skip this step if you don’t need to define a Vendor Class Identifier.
sysname# config sysname(config)# vlan 1 sysname(config-vlan)# ip address default-management dhcp-bootp option-60 class-id ZyxelCorp
Ethernet Switch CLI Reference Guide
20
Chapter 3 Initial Setup
6 Use this command to check the settings for auto configuration.
show running-config
GS2210# show running-config Building configuration...
Current configuration:
vlan 1 name 1 normal "" fixed 1-50 forbidden "" untagged 1-50 ip address default-management dhcp-bootp ip address default-management dhcp-bootp option-60 class-id ZyxelCorp exit pwr mode consumption auto-config
7 You need to save the current configuration in a configuration file, so the Switch will load the auto
configuration files from the TFTP server automatically when rebooting. Use this command to save the current configuration in a configuration file.
write memory [<index>]
For [<index>], you can enter a value to save the current configuration to a specified configuration file. 1 is for Config 1, and 2 is for Config 2.
In this example, we save the current configuration to Config 1.
sysname# write memory 1
........................................................................
............................
8 Use this command to reboot the Switch.
reload config [1|2]
For [1|2], 1 is for Config 1, and 2 is for Config 2.
In this example, we load Config 1 to reboot the Switch.
Ethernet Switch CLI Reference Guide
21
Chapter 3 Initial Setup
sysname# reload config 1 Do you really want to reboot system with configuration file 1? [y/N]y Bootbase Version: V1.05 | 12/19/2013 16:57:54 DRAM calibration...PASSED RAM: Size = 131072 Kbytes
ZyNOS Version: V4.50(AAHW.0)b3_20171020_1 | 10/20/2017 16:9:36
Press any key to enter debug mode within 1 second.
....................
(Compressed) Version: GS2210, start: b4962430 Length: 16F0668, Checksum: 03AA Compressed Length: 2EE424, Checksum: 87A5 Copyright (c) 1994 - 2017 Zyxel Communications Corp. initialize mgmt, initialize switch, ethernet address: 00:19:cb:00:00:01
Initializing MSTP.............
Initializing VLAN Database... Initializing IP Interface... Initializing Advanced Applications... Initializing Command Line Interface... Initializing Web Interface... Restore System Configuration... Start Auto Configuration...
..............
Try to download and restore configuration file from TFTP://10.90.90.11/ TestConf2
Downloading....
Get the file TestConf2, length 289 bytes.
Restoring......
Auto-config processes successfully. Press ENTER to continue...
9 Use this command to check whether the auto configuration file was loaded successfully.
Show auto-config
Mode: DHCP State: Success Filename: TFTP://10.90.90.11/TestConf2

3.7 Using Custom Default

Follow the steps below to set up configurations on the Switch, so you can load a customized default file when you reboot the Switch.
1 Use this command to enable custom default on the Switch.
custom-default
sysname# config sysname(config)# custom-default
Ethernet Switch CLI Reference Guide
22
Chapter 3 Initial Setup
2 Use this command to save the current configuration settings permanently to a customized default file on
the Switch.
copy running-config custom-default
sysname# copy running-config custom-default
........................................................................
............................
3 Use this command to reboot the system and load a saved customized default file on the Switch.
reload custom-default
sysname# reload custom-default Do you really want to restore system to custom default settings and reboot?[y/N]y
.......
Bootbase Version: V1.05 | 12/19/2013 16:57:54 DRAM calibration...PASSED RAM: Size = 131072 Kbytes ZyNOS Version: V4.50(AAHW.0)b3_20171020_1 | 10/20/2017 16:9:36
Press any key to enter debug mode within 1 second.
....................
(Compressed) Version: GS2210, start: b4962430 Length: 16F0668, Checksum: 03AA Compressed Length: 2EE424, Checksum: 87A5 Copyright (c) 1994 - 2017 Zyxel Communications Corp. initialize mgmt, initialize switch, ethernet address: 00:19:cb:00:00:01
Initializing MSTP.............
Initializing VLAN Database... Initializing IP Interface... Initializing Advanced Applications... Initializing Command Line Interface... Initializing Web Interface... Restore System Configuration... Press ENTER to continue...

3.8 Looking at Basic System Information

Use this command to look at general system information about the Switch.
show system-information
Ethernet Switch CLI Reference Guide
23
Chapter 3 Initial Setup
This is illustrated in the following example.
sysname# show system-information
Product Model : sysname System Name : sysname System Mode : Standalone System Contact : System Location : System up Time : 98:26:28 (151f8939 ticks) Ethernet Address : 00:19:cb:00:00:02 Bootbase Version : V1.02 | 08/27/2014 ZyNOS F/W Version : V4.20(AASS.0)b3 | 09/24/2014 Config Boot Image : 1 Current Boot Image : 1 RomRasSize : 8336318 sysname#
See Table 281 on page 390 for more information about these attributes.

3.9 Looking at the Operating Configuration

Use this command to look at the current operating configuration.
show running-config
This is illustrated in the following example.
sysname# show running-config Building configuration...
Current configuration:
vlan 1 name 1 normal "" fixed 1-52 forbidden "" untagged 1-52 ip address 192.168.1.1 255.255.255.0 exit interface route-domain 192.168.1.1/24 exit pwr mode consumption
Ethernet Switch CLI Reference Guide
24
PART II

Reference A-G

AAA Commands (27)
ARP Commands (32)
ARP Inspection Commands (34)
ARP Learning Commands (39)
Auto Configuration Commands (40)
Bandwidth Commands (42)
Broadcast Storm Commands (46)
Certificates Commands (49)
Classifier Commands (52)
Cluster Commands (57)
CLV Commands (60)
Custom Default Commands (66)
Date and Time Commands (67)
Data Center Bridging Commands (70)
DHCP Commands (78)
DHCP Snooping and DHCP VLAN Commands (84)
DiffServ Commands (88)
25
Display Commands (89)
DVMRP Commands (90)
Error Disable and Recovery Commands (92)
Ethernet OAM Commands (96)
External Alarm Commands (101)
GARP Commands (103)
Green Ethernet Commands (105)
GVRP Commands (109)
26
Use these commands to configure authentication, authorization and accounting on the Switch.

4.1 Command Summary

The following section lists the commands for this feature. Table 9 aaa authentication Command Summary
COMMAND DESCRIPTION M P
show aaa authentication
show aaa authentication enable
aaa authentication enable <method1> [<method2> ...]
no aaa authentication enable
show aaa authentication login
aaa authentication login <method1> [<method2> ...]
no aaa authentication login
CHAPTER 4

AAA Commands

Displays what methods are used for authentication. E 3 Displays the authentication methods for checking privilege
level of administrators. Specifies the first, second, and third method used for
checking privileges. method: local, radius, or tacacs+.
Resets the method list for checking privileges to its default value.
Displays the authentication methods for administrator login accounts.
Specifies which method should be used first, second, and third for the authentication of login accounts.
method: local, radius, or tacacs+. Resets the method list for the authentication of login
accounts to its default value.
E3
C14
C14
E3
C14
C14
Table 10 Command Summary: aaa accounting
COMMAND DESCRIPTION M P
show aaa accounting
show aaa accounting update
aaa accounting update periodic <1-2147483647>
no aaa accounting update
show aaa accounting commands
aaa accounting commands <privilege> stop-only tacacs+ [broadcast]
Ethernet Switch CLI Reference Guide
Displays accounting settings configured on the Switch. E 3 Display the update period setting on the Switch for
accounting sessions. Sets the update period (in minutes) for accounting
sessions. This is the time the Switch waits to send an update to an accounting server after a session starts.
Resets the accounting update interval to the default value.
Displays accounting settings for recording command events.
Enables accounting of command sessions and specifies the minimum privilege level (0 – 14) for the command sessions that should be recorded. Optionally, sends accounting information for command sessions to all configured accounting servers at the same time.
E3
C13
C13
E3
C13
27
Chapter 4 AAA Commands
Table 10 Command Summary: aaa accounting (continued)
COMMAND DESCRIPTION M P
no aaa accounting commands
show aaa accounting dot1x
aaa accounting dot1x <start­stop|stop-only> <radius|tacacs+> [broadcast]
no aaa accounting dot1x
show aaa accounting exec
aaa accounting exec <start­stop|stop-only> <radius|tacacs+> [broadcast]
no aaa accounting exec
show aaa accounting system
aaa accounting system <radius|tacacs+> [broadcast]
no aaa accounting system
Disables accounting of command sessions on the Switch. C 13 Displays accounting settings for recording IEEE 802.1x
session events. Enables accounting of IEEE 802.1x authentication sessions
and specifies the mode and protocol method. Optionally, sends accounting information for IEEE 802.1x authentication sessions to all configured accounting servers at the same time.
Disables accounting of IEEE 802.1x authentication sessions on the Switch.
Displays accounting settings for recording administrative sessions through SSH, Telnet or the console port.
Enables accounting of administrative sessions through SSH, Telnet and console port and specifies the mode and protocol method. Optionally, sends accou nting information for administrative sessions through SSH, Telnet and console port to all configured accounting servers at the same time.
Disables accounting of administrative sessions through SSH, Telnet or console on the Switch.
Displays accounting settings for recording system events, for example system shut down, start up, accounting enabled or accounting disabled.
Enables accounting of system events and specifies the protocol method. Optionally, sends accou nting information for system events to all configured accounting servers at the same time.
Disables accounting of system events on the Switch. C 13
E3
C13
C13
E3
C13
C13
E3
C13
Table 11 aaa authorization Command Summary
COMMAND DESCRIPTION M P
show aaa authorization
show aaa authorization dot1x
show aaa authorization exec
aaa authorization console
aaa authorization dot1x radius
aaa authorization exec <radius|tacacs+>
no aaa authorization console
Displays authorization settings configured on the Switch. E 3 Displays the authorization method used to allow an IEEE
802.1x client to have different bandwidth limit or VLAN ID assigned through the external server.
Displays the authorization method used to allow an administrator which logs in the Switch through Telnet or SSH to have different access privilege level assigned through the external server.
Enables authorization of allowing an administrator which logs in the Switch through the console port to have different access privilege level assigned through the external server.
Enables authorization for IEEE 802.1x clients using RADIUS. C 14 Specifies which method (radius or tacacs+) should be
used for administrator authorization. Disables authorization of allowing an administrator which
logs in the Switch through the console port to have different access privilege level assigned through the external server.
E3
E3
C14
C14
C14
Ethernet Switch CLI Reference Guide
28
Chapter 4 AAA Commands
Table 11 aaa authorization Command Summary (continued)
COMMAND DESCRIPTION M P
no aaa authorization dot1x
no aaa authorization exec
Disables authorization for IEEE 802.1x clients using RADIUS. C 14 Disables authorization of allowing an administrator which
logs in the Switch through Telnet or SSH to have different access privilege level assigned through the external server.
C14
Ethernet Switch CLI Reference Guide
29
Use these commands to configure anti-Arpscan on the Switch.

5.1 Anti-Arpscan Overview

Address Resolution Protocol (ARP), RFC 826, is a protocol used to convert a network-layer IP address to a link-layer MAC address. ARP scan is used to scan the network of a certain interface for alive hosts. It shows the IP address and MAC addresses of all hosts found. Hackers could use ARP scan to find targets in your network. Anti-arpscan is used to detect unusual ARP scan activity and block suspicious hosts or ports.
Unusual ARP scan activity is determined by port and host thresholds that you set. A port threshold is determined by the number of packets received per second on the port. If the received packet rate is over the threshold, then the port is put into an Err-Disable state. You can recover the normal state of the port manually if this happens and after you identify the cause of the problem.
CHAPTER 5

Anti-Arpscan

A host threshold is determined by the number of ARP-request packets received per second. There is a global threshold rate for all hosts. If the rate of a host is over the threshold, then that host is blocked by using a MAC address filter. A blocked host is released automatically after the MAC aging time expires.
Note: A port-based threshold must be larger than the host-based threshold or the host-based
threshold will not work.

5.2 Command Summary

The following table describes user-input values available in multiple commands for this feature. Table 12 Interface Command Values
COMMAND DESCRIPTION
port-list
A list of one or more ports, separated by commas with no spaces. The list may also contain ranges of ports signified by a hyphen. For example: 1,3,5–8,10.
Ethernet Switch CLI Reference Guide
30
Loading...
+ 395 hidden pages