Command Line Interface Guide
Page 3
Contents Notes and Cautions 2 1 Using the CLI 25 CLI Command Modes 25 Introduction 25 User EXEC Mode 26 Privileged EXEC Mode 27 Global Configuration Mode 27 Interface Configuration Mode and Specific Configuration Modes . . . . 28 Starting the CLI 29 Editing Features 30 Setup Wizard 31 Terminal Command Buffer 31 Negating the Effect of Commands... Conventions 32 2 Command Groups 33 Introduction 33 Command Groups 33 AAA Commands 35 ACL Commands 35 Address Table Commands 36 Clock Commands Commands 37 Configuration and Image Files Commands 38 DHCP Snooping Commands 39 Ethernet...
Contents Notes and Cautions 2 1 Using the CLI 25 CLI Command Modes 25 Introduction 25 User EXEC Mode 26 Privileged EXEC Mode 27 Global Configuration Mode 27 Interface Configuration Mode and Specific Configuration Modes . . . . 28 Starting the CLI 29 Editing Features 30 Setup Wizard 31 Terminal Command Buffer 31 Negating the Effect of Commands... Conventions 32 2 Command Groups 33 Introduction 33 Command Groups 33 AAA Commands 35 ACL Commands 35 Address Table Commands 36 Clock Commands Commands 37 Configuration and Image Files Commands 38 DHCP Snooping Commands 39 Ethernet...
Command Line Interface Guide
Page 8
... show sntp status 139 8 Configuration and Image Files 141 copy 141 delete 144 delete startup-config 144 dir 145 more 146 rename 147 boot system 148 show running-config 149 ...
... show sntp status 139 8 Configuration and Image Files 141 copy 141 delete 144 delete startup-config 144 dir 145 more 146 rename 147 boot system 148 show running-config 149 ...
Command Line Interface Guide
Page 9
... 166 duplex 166 negotiation 167 flowcontrol 168 mdix 168 back-pressure 169 clear counters 170 set interface active 170 show interfaces advertise 171 show interfaces configuration 172 show interfaces status 174 show interfaces description 176 show interfaces counters 177 port storm-control include-multicast 179 port storm-control broadcast enable 180...
... 166 duplex 166 negotiation 167 flowcontrol 168 mdix 168 back-pressure 169 clear counters 170 set interface active 170 show interfaces advertise 171 show interfaces configuration 172 show interfaces status 174 show interfaces description 176 show interfaces counters 177 port storm-control include-multicast 179 port storm-control broadcast enable 180...
Command Line Interface Guide
Page 10
gvrp vlan-creation-forbid 185 gvrp registration-forbid 186 clear gvrp statistics 186 show gvrp configuration 187 show gvrp statistics 188 show gvrp error-statistics 189 12 IGMP Snooping Commands 191 ip igmp snooping (Global 191 ip igmp snooping (Interface 191 ...
gvrp vlan-creation-forbid 185 gvrp registration-forbid 186 clear gvrp statistics 186 show gvrp configuration 187 show gvrp statistics 188 show gvrp error-statistics 189 12 IGMP Snooping Commands 191 ip igmp snooping (Global 191 ip igmp snooping (Interface 191 ...
Command Line Interface Guide
Page 17
... spanning-tree mst priority 366 spanning-tree mst max-hops 367 spanning-tree mst port-priority 368 spanning-tree mst cost 369 spanning-tree mst configuration 369 instance (mst 370 name (mst 371 revision (mst 372 Contents 17
... spanning-tree mst priority 366 spanning-tree mst max-hops 367 spanning-tree mst port-priority 368 spanning-tree mst cost 369 spanning-tree mst configuration 369 instance (mst 370 name (mst 371 revision (mst 372 Contents 17
Command Line Interface Guide
Page 20
...-time 444 passwords lockout 445 aaa login-history file 446 set username active 446 set line active 447 set enable-password active 447 show passwords configuration 448 show users login-history 450 show users accounts 451 34 Tunnel 453 interface tunnel 453 tunnel mode ipv6ip 453 tunnel isatap router 454 tunnel...
...-time 444 passwords lockout 445 aaa login-history file 446 set username active 446 set line active 447 set enable-password active 447 show passwords configuration 448 show users login-history 450 show users accounts 451 34 Tunnel 453 interface tunnel 453 tunnel mode ipv6ip 453 tunnel isatap router 454 tunnel...
Command Line Interface Guide
Page 25
... Command Modes Introduction To assist in using the CLI. From each mode a specific command is used to navigate from one command mode to assist in configuring the device, the Command Line Interface (CLI) is as follows: User EXEC mode, Privileged EXEC mode, Global...
... Command Modes Introduction To assist in using the CLI. From each mode a specific command is used to navigate from one command mode to assist in configuring the device, the Command Line Interface (CLI) is as follows: User EXEC mode, Privileged EXEC mode, Global...
Command Line Interface Guide
Page 26
... Mode After logging into the device, the user is automatically in the device. This level is required. The Global Configuration mode manages the device configuration on User EXEC mode and provides access to perform basic tests, and list system information. Only a limited subset of... the initial mode is defined as a privileged user. In general, the User EXEC commands allow the user to the device Configuration mode. The Interface Configuration mode configures specific interfaces in the User EXEC command mode unless the user is the User EXEC mode. Console> 26 Using the CLI...
... Mode After logging into the device, the user is automatically in the device. This level is required. The Global Configuration mode manages the device configuration on User EXEC mode and provides access to perform basic tests, and list system information. Only a limited subset of... the initial mode is defined as a privileged user. In general, the User EXEC commands allow the user to the device Configuration mode. The Interface Configuration mode configures specific interfaces in the User EXEC command mode unless the user is the User EXEC mode. Console> 26 Using the CLI...
Command Line Interface Guide
Page 27
.... A password prompt appears. 2 Enter the password and press . For example, the exit command is password protected to the Global Configuration mode. The configure Privileged EXEC mode command is used to the User EXEC mode, use because, many of the device host name followed by #. Using...Console> enable Enter Password: ****** Console# Console# disable Console> The exit (mst) command is used to return from the Interface Configuration mode to prevent unauthorized use the disable command. The password is Console unless it was changed using the hostname command in the Global...
.... A password prompt appears. 2 Enter the password and press . For example, the exit command is password protected to the Global Configuration mode. The configure Privileged EXEC mode command is used to the User EXEC mode, use because, many of the device host name followed by #. Using...Console> enable Enter Password: ****** Console# Console# disable Console> The exit (mst) command is used to return from the Interface Configuration mode to prevent unauthorized use the disable command. The password is Console unless it was changed using the hostname command in the Global...
Command Line Interface Guide
Page 28
...-channels, for example, assigning ports to the Privileged EXEC mode: Console# Console# configure Console(config)# exit Console# Interface Configuration Mode and Specific Configuration Modes Interface Configuration mode commands modify specific interface operations. Console(config)# To return from the Global Configuration mode to the Privileged EXEC mode, the user can use one of the device host...
...-channels, for example, assigning ports to the Privileged EXEC mode: Console# Console# configure Console(config)# exit Console# Interface Configuration Mode and Specific Configuration Modes Interface Configuration mode commands modify specific interface operations. Console(config)# To return from the Global Configuration mode to the Privileged EXEC mode, the user can use one of the device host...
Command Line Interface Guide
Page 29
...9600). Starting the CLI The device can be managed over cable to the RS-232 serial port of the device to enter the QoS services configuration mode. • MAC Access-List- If access is for Function, Arrow, and Ctrl keys. NOTE: The default data rate, for information ... other device SSH public keys. Contains commands to 8 data bits, 1 stop bit, and no parity. Configures conditions required to enter the MAC access-list configuration mode. For more information, see Dell™ PowerConnect™ 3500 Series User's Guide. 2 Enter the following steps: 1 Connect the DB9 null-modem or ...
...9600). Starting the CLI The device can be managed over cable to the RS-232 serial port of the device to enter the QoS services configuration mode. • MAC Access-List- If access is for Function, Arrow, and Ctrl keys. NOTE: The default data rate, for information ... other device SSH public keys. Contains commands to 8 data bits, 1 stop bit, and no parity. Configures conditions required to enter the MAC access-list configuration mode. For more information, see Dell™ PowerConnect™ 3500 Series User's Guide. 2 Enter the following steps: 1 Connect the DB9 null-modem or ...
Command Line Interface Guide
Page 30
...can be copied and pasted into the device consists of legal commands only. 30 Using the CLI Keywords identify a command, and arguments specify configuration parameters. There are two instances where help information can be displayed: • Keyword lookup - The following features are described: •... and status are keywords, ethernet is displayed. • Partial keyword lookup - For example, in place of keywords and arguments. 3 Configure the device and enter the necessary commands to complete the required tasks. 4 When finished, exit the session with the CLI, the command...
...can be copied and pasted into the device consists of legal commands only. 30 Using the CLI Keywords identify a command, and arguments specify configuration parameters. There are two instances where help information can be displayed: • Keyword lookup - The following features are described: •... and status are keywords, ethernet is displayed. • Partial keyword lookup - For example, in place of keywords and arguments. 3 Configure the device and enter the necessary commands to complete the required tasks. 4 When finished, exit the session with the CLI, the command...
Command Line Interface Guide
Page 31
...the command syntax for all applicable commands. The standard number of a command or reset the configuration to recall successively older commands. Negating the Effect of Commands For many configuration commands, the prefix keyword no encrypted data, like encrypted passwords or keys. Repeats the key... sequence to the default value. This guide describes the negation effect for configuring the command history buffer, see show history. Setup Wizard The CLI supports a Setup Wizard. When copying and pasting commands from a ...
...the command syntax for all applicable commands. The standard number of a command or reset the configuration to recall successively older commands. Negating the Effect of Commands For many configuration commands, the prefix keyword no encrypted data, like encrypted passwords or keys. Repeats the key... sequence to the default value. This guide describes the negation effect for configuring the command history buffer, see show history. Setup Wizard The CLI supports a Setup Wizard. When copying and pasting commands from a ...
Command Line Interface Guide
Page 32
Keyboard Key Up-arrow key Down-arrow key Ctrl+A Ctrl+E Ctrl+Z / End Backspace key Description Recalls commands from any configuration mode. The following table describes the CLI shortcuts. In a command line, curly brackets indicate a selection of keys pressed simultaneously on the keyboard. Indicates a parameter. Indicates ...
Keyboard Key Up-arrow key Down-arrow key Ctrl+A Ctrl+E Ctrl+Z / End Backspace key Description Recalls commands from any configuration mode. The following table describes the CLI shortcuts. In a command line, curly brackets indicate a selection of keys pressed simultaneously on the keyboard. Indicates a parameter. Indicates ...
Command Line Interface Guide
Page 33
... using a terminal keyboard and the textual output displays via a terminal monitor. Basic installation configuration is described in setting up a minimum configuration, so that the device can configure and maintain a device by entering commands from the CLI, which is based solely on ... access the CLI from a VT100 terminal connected to the Getting Started Guide and User Guide for configuring the PowerConnect device, details the procedures, and provides configuration examples. The CLI is structured, describes the command syntax, and describes the command functionality. Command Groups...
... using a terminal keyboard and the textual output displays via a terminal monitor. Basic installation configuration is described in setting up a minimum configuration, so that the device can configure and maintain a device by entering commands from the CLI, which is based solely on ... access the CLI from a VT100 terminal connected to the Getting Started Guide and User Guide for configuring the PowerConnect device, details the procedures, and provides configuration examples. The CLI is structured, describes the command syntax, and describes the command functionality. Command Groups...
Command Line Interface Guide
Page 34
... Ethernet setings on the device. Configures IGMP snooping and displays IGMP configuration and IGMP information. Configures and displays Port Channel information. Displays RMON statistics. Configures SSH authentication. Configures tunnel routing configurations. Configures and displays LLDP information. Configures and displays RADIUS information. Configures VLANs and displays VLAN information. Configures Voice VLANs and displays VLAN information. Configures and manages IP addresses on the...
... Ethernet setings on the device. Configures IGMP snooping and displays IGMP configuration and IGMP information. Configures and displays Port Channel information. Displays RMON statistics. Configures SSH authentication. Configures tunnel routing configurations. Configures and displays LLDP information. Configures and displays RADIUS information. Configures VLANs and displays VLAN information. Configures Voice VLANs and displays VLAN information. Configures and manages IP addresses on the...
Command Line Interface Guide
Page 35
...higher privilege level from a remote telnet or console. Permits traffic if the conditions defined in the deny statement match. Line Configuration Global Configuration Global Configuration ACL Commands Command Group ip access-list permit (IP) deny (IP) mac access-list permit (MAC) Description Creates Layer... authentication. Set permit conditions for a MAC access list Access Mode Global Configuration IP Access-List Configuration IP Access-List Configuration Global Configuration MAC Access-List Configuration Command Groups 35 Privileged EXEC Specifies a password on a line. Global...
...higher privilege level from a remote telnet or console. Permits traffic if the conditions defined in the deny statement match. Line Configuration Global Configuration Global Configuration ACL Commands Command Group ip access-list permit (IP) deny (IP) mac access-list permit (MAC) Description Creates Layer... authentication. Set permit conditions for a MAC access list Access Mode Global Configuration IP Access-List Configuration IP Access-List Configuration Global Configuration MAC Access-List Configuration Command Groups 35 Privileged EXEC Specifies a password on a line. Global...
Command Line Interface Guide
Page 36
...aging time. Access Mode Interface (VLAN) Configuration Global Configuration Interface (VLAN) Configuration Interface (VLAN) Configuration Interface Configuration Interface (VLAN) Configuration Interface (VLAN) Configuration Global Configuration Privileged EXEC Interface Configuration Interface Configuration Interface Configuration 36 Command Groups Enables filtering of unregistered ...-layer station source address to the bridge table. Forbids a port from the forwarding database. Configures the maximum number of addresses that may be learned on a port. Forbids adding a specific...
...aging time. Access Mode Interface (VLAN) Configuration Global Configuration Interface (VLAN) Configuration Interface (VLAN) Configuration Interface Configuration Interface (VLAN) Configuration Interface (VLAN) Configuration Global Configuration Privileged EXEC Interface Configuration Interface Configuration Interface Configuration 36 Command Groups Enables filtering of unregistered ...-layer station source address to the bridge table. Forbids a port from the forwarding database. Configures the maximum number of addresses that may be learned on a port. Forbids adding a specific...
Command Line Interface Guide
Page 37
...forwarding database. Displays all entries in locked ports. Displays the Multicast filtering configuration. Sets the polling time for Simple Network Time Protocol (SNTP). Displays the statically configured multicast addresses. Sets the time zone for received Network Time Protocol (...addresses to summer time (daylight saving time). Displays statically created entries in the bridge-forwarding database. Interface Configuration Privileged EXEC Privileged EXEC Privileged EXEC Privileged EXEC Privileged EXEC Privileged EXEC Privileged EXEC Privileged EXEC Clock Commands ...
...forwarding database. Displays all entries in locked ports. Displays the Multicast filtering configuration. Sets the polling time for Simple Network Time Protocol (SNTP). Displays the statically configured multicast addresses. Sets the time zone for received Network Time Protocol (...addresses to summer time (daylight saving time). Displays statically created entries in the bridge-forwarding database. Interface Configuration Privileged EXEC Privileged EXEC Privileged EXEC Privileged EXEC Privileged EXEC Privileged EXEC Privileged EXEC Privileged EXEC Clock Commands ...
Command Line Interface Guide
Page 38
...sntp client enable (Interface) sntp unicast client enable sntp unicast client poll sntp server show clock show sntp configuration show sntp status Enables the Simple Network Time Protocol (SNTP) Broadcast clients. Displays the time and date from...at startup. Deletes the startup-config file. Renames a file. Global Configuration Global Configuration Global Configuration Interface Configuration Global Configuration Global Configuration Global Configuration User EXEC Privileged EXEC Privileged EXEC Configuration and Image Files Commands Command Group copy delete delete startup-config dir more...
...sntp client enable (Interface) sntp unicast client enable sntp unicast client poll sntp server show clock show sntp configuration show sntp status Enables the Simple Network Time Protocol (SNTP) Broadcast clients. Displays the time and date from...at startup. Deletes the startup-config file. Renames a file. Global Configuration Global Configuration Global Configuration Interface Configuration Global Configuration Global Configuration Global Configuration User EXEC Privileged EXEC Privileged EXEC Configuration and Image Files Commands Command Group copy delete delete startup-config dir more...