Command Line Interface Guide
Page 3
Contents 1 Using the CLI 25 CLI Command Modes 25 Introduction 25 User EXEC Mode 26 Privileged EXEC Mode 26 Global Configuration Mode 27 Interface Configuration Mode and Specific Configuration Modes 28 Starting the CLI 28 Editing Features 29 Setup Wizard 30 Terminal Command Buffer 30 Negating the Effect of Commands 30 Command Completion 31... CLI Command Conventions 32 2 Command Groups 33 Introduction 33 Command Groups 33 ACL Commands 35 AAA Commands 35 Address Table Commands 36 Clock Commands 37 Configuration and Image Files Commands 38 DHCP Snooping Commands 39 Ethernet...
Contents 1 Using the CLI 25 CLI Command Modes 25 Introduction 25 User EXEC Mode 26 Privileged EXEC Mode 26 Global Configuration Mode 27 Interface Configuration Mode and Specific Configuration Modes 28 Starting the CLI 28 Editing Features 29 Setup Wizard 30 Terminal Command Buffer 30 Negating the Effect of Commands 30 Command Completion 31... CLI Command Conventions 32 2 Command Groups 33 Introduction 33 Command Groups 33 ACL Commands 35 AAA Commands 35 Address Table Commands 36 Clock Commands 37 Configuration and Image Files Commands 38 DHCP Snooping Commands 39 Ethernet...
Command Line Interface Guide
Page 5
Web Server Commands 59 802.1x Commands 60 802.1x Advanced Commands 62 3 Command Modes 63 GC (Global Configuration) Mode 63 IC (Interface Configuration) Mode 67 LC (Line Configuration) Mode 70 MA (Management Access-level) Mode 70 PE (Privileged User EXEC) Mode 70 SP (SSH Public Key) Mode 72 UE (User EXEC) Mode 73 VC (VLAN Configuration) Mode 74 4 ACL Commands 75 ip access-list 75 mac access-list 75 permit (ip 76 deny (IP 78 permit (MAC 80 deny (MAC 81 service-acl 82 show access-lists 83 show interfaces access-lists 84 Contents 5
Web Server Commands 59 802.1x Commands 60 802.1x Advanced Commands 62 3 Command Modes 63 GC (Global Configuration) Mode 63 IC (Interface Configuration) Mode 67 LC (Line Configuration) Mode 70 MA (Management Access-level) Mode 70 PE (Privileged User EXEC) Mode 70 SP (SSH Public Key) Mode 72 UE (User EXEC) Mode 73 VC (VLAN Configuration) Mode 74 4 ACL Commands 75 ip access-list 75 mac access-list 75 permit (ip 76 deny (IP 78 permit (MAC 80 deny (MAC 81 service-acl 82 show access-lists 83 show interfaces access-lists 84 Contents 5
Command Line Interface Guide
Page 9
... negotiation 155 flowcontrol 156 system flowcontrol 157 mdix 157 back-pressure 158 port jumbo-frame 159 clear counters 159 set interface active 160 show interfaces configuration 160 show interfaces status 162 show interfaces advertise 165 show interfaces description 167 show interfaces counters 168 show ports jumbo-frame 172 port storm-control...
... negotiation 155 flowcontrol 156 system flowcontrol 157 mdix 157 back-pressure 158 port jumbo-frame 159 clear counters 159 set interface active 160 show interfaces configuration 160 show interfaces status 162 show interfaces advertise 165 show interfaces description 167 show interfaces counters 168 show ports jumbo-frame 172 port storm-control...
Command Line Interface Guide
Page 10
... enable (global 187 gvrp enable (interface 187 garp timer 188 gvrp vlan-creation-forbid 189 gvrp registration-forbid 190 clear gvrp statistics 191 show gvrp configuration 191 show gvrp statistics 192 13 IGMP Snooping Commands 195 ip igmp snooping (Global 195 ip igmp snooping (Interface 195 ip igmp snooping mrouter 196...
... enable (global 187 gvrp enable (interface 187 garp timer 188 gvrp vlan-creation-forbid 189 gvrp registration-forbid 190 clear gvrp statistics 191 show gvrp configuration 191 show gvrp statistics 192 13 IGMP Snooping Commands 195 ip igmp snooping (Global 195 ip igmp snooping (Interface 195 ip igmp snooping mrouter 196...
Command Line Interface Guide
Page 13
... med enable 259 lldp med network-policy (global 259 lldp med network-policy (interface 260 lldp med location 261 clear lldp rx 262 show lldp configuration 262 show lldp local 263 Contents 13
... med enable 259 lldp med network-policy (global 259 lldp med network-policy (interface 260 lldp med location 261 clear lldp rx 262 show lldp configuration 262 show lldp local 263 Contents 13
Command Line Interface Guide
Page 14
show lldp neighbors 265 show lldp med configuration 266 20 Management ACL 269 management access-list 269 permit (management 271 deny (management 272 management access-class 273 show management access-list 273 show ...
show lldp neighbors 265 show lldp med configuration 266 20 Management ACL 269 management access-list 269 permit (management 271 deny (management 272 management access-class 273 show management access-list 273 show ...
Command Line Interface Guide
Page 17
... spanning-tree mst priority 354 spanning-tree mst max-hops 355 spanning-tree mst port-priority 356 spanning-tree mst cost 356 spanning-tree mst configuration 357 instance (mst 358 name (mst 359 revision (mst 359 Contents 17
... spanning-tree mst priority 354 spanning-tree mst max-hops 355 spanning-tree mst port-priority 356 spanning-tree mst cost 356 spanning-tree mst configuration 357 instance (mst 358 name (mst 359 revision (mst 359 Contents 17
Command Line Interface Guide
Page 20
show version 415 asset-tag 416 show system id 417 32 TACACS Commands 419 tacacs-server host 419 tacacs-server key 420 tacacs-server timeout 420 tacacs-server source-ip 421 show tacacs 422 33 TIC Commands 423 passwords min-length 423 password-aging 424 passwords aging 424 passwords history 425 passwords history hold-time 426 passwords lockout 426 aaa login-history file 427 set username active 428 set line active 428 set enable-password active 429 show passwords configuration 429 show users login-history 431 20 Contents
show version 415 asset-tag 416 show system id 417 32 TACACS Commands 419 tacacs-server host 419 tacacs-server key 420 tacacs-server timeout 420 tacacs-server source-ip 421 show tacacs 422 33 TIC Commands 423 passwords min-length 423 password-aging 424 passwords aging 424 passwords history 425 passwords history hold-time 426 passwords lockout 426 aaa login-history file 427 set username active 428 set line active 428 set enable-password active 429 show passwords configuration 429 show users login-history 431 20 Contents
Command Line Interface Guide
Page 25
The standard order to access the modes is used to navigate from one command mode to assist in configuring devices, the CLI (Command Line Interface) is divided into different command modes. The following figure illustrates the command mode access path. Using the CLI This ... the CLI and describes implemented command editing features to another. From each mode a specific command is as follows: User EXEC mode, Privileged EXEC mode, Global Configuration mode, and Interface...
The standard order to access the modes is used to navigate from one command mode to assist in configuring devices, the CLI (Command Line Interface) is divided into different command modes. The following figure illustrates the command mode access path. Using the CLI This ... the CLI and describes implemented command editing features to another. From each mode a specific command is as follows: User EXEC mode, Privileged EXEC mode, Global Configuration mode, and Interface...
Command Line Interface Guide
Page 26
...of the device "host name" followed by the angle bracket (>). The Interface Configuration mode configures specific interfaces in User EXEC Mode. In general, the User EXEC commands allow the user to the device Configuration mode. When starting a session, the initial mode is reserved for tasks that... access to perform basic tests, and list system information. This level is the User EXEC mode. The Global Configuration mode manages the device configuration on the screen and is defined as "*". The user-level prompt consists of the privileged commands set operating system...
...of the device "host name" followed by the angle bracket (>). The Interface Configuration mode configures specific interfaces in User EXEC Mode. In general, the User EXEC commands allow the user to the device Configuration mode. When starting a session, the initial mode is reserved for tasks that... access to perform basic tests, and list system information. This level is the User EXEC mode. The Global Configuration mode manages the device configuration on the screen and is defined as "*". The user-level prompt consists of the privileged commands set operating system...
Command Line Interface Guide
Page 27
...mode: console>enable Enter Password: ****** console# console#disable console> The Exit command is displayed. The Global Configuration mode prompt is used to return from the Global Configuration mode to the Privileged EXEC mode: • exit • end • Ctrl+Z The following steps.... The Privileged EXEC mode command configure is used to User EXEC mode from the Interface Configuration mode to the Global Configuration mode Global Configuration Mode Global Configuration mode commands apply to the Privileged EXEC mode: console# console#configure console(config)#exit console# Using ...
...mode: console>enable Enter Password: ****** console# console#disable console> The Exit command is displayed. The Global Configuration mode prompt is used to return from the Global Configuration mode to the Privileged EXEC mode: • exit • end • Ctrl+Z The following steps.... The Privileged EXEC mode command configure is used to User EXEC mode from the Interface Configuration mode to the Global Configuration mode Global Configuration Mode Global Configuration mode commands apply to the Privileged EXEC mode: console# console#configure console(config)#exit console# Using ...
Command Line Interface Guide
Page 28
... SSH public keys. The following steps are to modify specific interface operations. These include commands such as a whole. The Global Configuration mode command interface ethernet is connected to the device prior to using CLI commands. The switch is very similar to entering commands ...Port Channel - Using the switch command-line interface (CLI) is managed by entering command keywords and parameters at the prompt. The Global Configuration mode command qos config-services is used to the switch console port, or via a Telnet connection, ensure the device has an IP address...
... SSH public keys. The following steps are to modify specific interface operations. These include commands such as a whole. The Global Configuration mode command interface ethernet is connected to the device prior to using CLI commands. The switch is very similar to entering commands ...Port Channel - Using the switch command-line interface (CLI) is managed by entering command keywords and parameters at the prompt. The Global Configuration mode command qos config-services is used to the switch console port, or via a Telnet connection, ensure the device has an IP address...
Command Line Interface Guide
Page 29
... and the character ? To assist in using the CLI, perform the following features are displayed. Keywords identify a command, and arguments specify configuration parameters. For example, to complete the command. There are displayed. • Partial keyword lookup - This effectively logs off the current user.... 3 When finished, exit the session with the CLI, the command options are available in each mode or within an Interface Configuration, the CLI does provide a method of displaying the available commands, the command syntax requirements and in some instances parameters required to...
... and the character ? To assist in using the CLI, perform the following features are displayed. Keywords identify a command, and arguments specify configuration parameters. For example, to complete the command. There are displayed. • Partial keyword lookup - This effectively logs off the current user.... 3 When finished, exit the session with the CLI, the command options are available in each mode or within an Interface Configuration, the CLI does provide a method of displaying the available commands, the command syntax requirements and in some instances parameters required to...
Command Line Interface Guide
Page 30
... Buffer Every time a command is an easy-to more recent commands in the CLI, it can be increased to the default value. By configuring 0, the effect is not preserved across device resets. Setup Wizard The CLI supports a Setup Wizard. This is entered in the history buffer ... history buffer, see show history. Negating the Effect of 10 commands can be disabled at any time. The standard number of Commands For many configuration commands, the prefix keyword "no" can be recalled, reviewed, modified, and reissued. To display the history buffer, see history. Keyword Source ...
... Buffer Every time a command is an easy-to more recent commands in the CLI, it can be increased to the default value. By configuring 0, the effect is not preserved across device resets. Setup Wizard The CLI supports a Setup Wizard. This is entered in the history buffer ... history buffer, see show history. Negating the Effect of 10 commands can be disabled at any time. The standard number of Commands For many configuration commands, the prefix keyword "no" can be recalled, reviewed, modified, and reissued. To display the history buffer, see history. Keyword Source ...
Command Line Interface Guide
Page 33
...the Getting Started Guide and User Guide for configuring the Dell™ PowerConnect™ switch, details the procedures and provides configuration examples. Address Table Commands Configures bridging address tables. The CLI can be configured and maintained by entering commands from the ...guide also provides information for more information on the device. Configuration and Image Files Commands Manages the device Configuration files. DHCP Snooping Commands Configures DHCP snooping and displays DHCP configuration and DHCP information. The CLI is structured, describes the ...
...the Getting Started Guide and User Guide for configuring the Dell™ PowerConnect™ switch, details the procedures and provides configuration examples. Address Table Commands Configures bridging address tables. The CLI can be configured and maintained by entering commands from the ...guide also provides information for more information on the device. Configuration and Image Files Commands Manages the device Configuration files. DHCP Snooping Commands Configures DHCP snooping and displays DHCP configuration and DHCP information. The CLI is structured, describes the ...
Command Line Interface Guide
Page 34
... the device. Configures and displays Port channel information. Configures and reports on the device. Configures and displays GVRP configuration and information. Diagnoses and displays the interface status. Configures TACACS commands Configures password access and control. Configures IGMP snooping and displays IGMP configuration and IGMP information. Configures and manages IPv6 addresses on Spanning Tree protocol Configures SSH authentication. Configures and displays LACP...
... the device. Configures and displays Port channel information. Configures and reports on the device. Configures and displays GVRP configuration and information. Diagnoses and displays the interface status. Configures TACACS commands Configures password access and control. Configures IGMP snooping and displays IGMP configuration and IGMP information. Configures and manages IPv6 addresses on Spanning Tree protocol Configures SSH authentication. Configures and displays LACP...
Command Line Interface Guide
Page 35
...access lists applied on the device. Global Configuration Specifies authentication methods for http. Global Configuration mac access-list Enables the MAC-Access List Configuration mode and Global creates Layer 2 ACLs. IP-Access List Configuration deny (IP) Denies traffic if the ...for accessing higher Global privilege levels. MAC-Access List Configuration deny (MAC) Denies traffic if the conditions defined in the deny statement match. Configuration Specifies the authentication method list when accessing Line Configuration a higher privilege level from a remote telnet or...
...access lists applied on the device. Global Configuration Specifies authentication methods for http. Global Configuration mac access-list Enables the MAC-Access List Configuration mode and Global creates Layer 2 ACLs. IP-Access List Configuration deny (IP) Denies traffic if the ...for accessing higher Global privilege levels. MAC-Access List Configuration deny (MAC) Denies traffic if the conditions defined in the deny statement match. Configuration Specifies the authentication method list when accessing Line Configuration a higher privilege level from a remote telnet or...
Command Line Interface Guide
Page 36
...EXEC show bridge address-table Displays dynamically created entries in the static bridge-forwarding database. Line Configuration Global Configuration Global Configuration Privileged User EXEC Address Table Commands Command Group Description Access Mode bridge address Adds a static MAC...-layer station source address to specific VLAN address ports. Configuration bridge multicast forbidden Forbids adding a specific Multicast address to the VLAN bridge table. Configuration bridge multicast unregistered Configures the forwarding state of Multicast addresses. Sets a local ...
...EXEC show bridge address-table Displays dynamically created entries in the static bridge-forwarding database. Line Configuration Global Configuration Global Configuration Privileged User EXEC Address Table Commands Command Group Description Access Mode bridge address Adds a static MAC...-layer station source address to specific VLAN address ports. Configuration bridge multicast forbidden Forbids adding a specific Multicast address to the VLAN bridge table. Configuration bridge multicast unregistered Configures the forwarding state of Multicast addresses. Sets a local ...
Command Line Interface Guide
Page 37
... (interface) Enables the SNTP client on an interface. Privileged User EXEC Displays the Multicast filtering configuration. Global Configuration clock summer-time Configures the system to automatically switch to which Global SNTP will synchronize. Privileged User EXEC clock source Configures an external time source for Simple Network Global Time Protocol (SNTP). EXEC Displays statically created...
... (interface) Enables the SNTP client on an interface. Privileged User EXEC Displays the Multicast filtering configuration. Global Configuration clock summer-time Configures the system to automatically switch to which Global SNTP will synchronize. Privileged User EXEC clock source Configures an external time source for Simple Network Global Time Protocol (SNTP). EXEC Displays statically created...
Command Line Interface Guide
Page 38
...User EXEC Privileged User EXEC Privileged User EXEC Privileged User EXEC Privileged User EXEC Privileged User EXEC Privileged EXEC 38 Command Groups Configuration Enables polling for the SNTP predefined Unicast Global clients. Copies files from a source to request and Global accept NTP traffic ... Command Group dir more rename delete startup-config copy delete boot system show running configuration file. Deletes the startup-config file. Displays the contents of the SNTP server Global Configuration Displays the time and date from a Flash memory device. Displays the active system...
...User EXEC Privileged User EXEC Privileged User EXEC Privileged User EXEC Privileged User EXEC Privileged User EXEC Privileged EXEC 38 Command Groups Configuration Enables polling for the SNTP predefined Unicast Global clients. Copies files from a source to request and Global accept NTP traffic ... Command Group dir more rename delete startup-config copy delete boot system show running configuration file. Deletes the startup-config file. Displays the contents of the SNTP server Global Configuration Displays the time and date from a Flash memory device. Displays the active system...