Command Line Interface Guide
Page 3
Contents 1 Using the CLI 25 CLI Command Modes 25 Introduction 25 User EXEC Mode 26 Privileged EXEC Mode 26 Global Configuration Mode 27 Interface Configuration Mode and Specific Configuration Modes 28 Starting the CLI 28 Editing Features 29 Setup Wizard 30 Terminal Command Buffer 30 Negating the Effect of Commands 30 Command Completion 31... CLI Command Conventions 32 2 Command Groups 33 Introduction 33 Command Groups 33 ACL Commands 35 AAA Commands 35 Address Table Commands 36 Clock Commands 37 Configuration and Image Files Commands 38 DHCP Snooping Commands 39 Ethernet...
Contents 1 Using the CLI 25 CLI Command Modes 25 Introduction 25 User EXEC Mode 26 Privileged EXEC Mode 26 Global Configuration Mode 27 Interface Configuration Mode and Specific Configuration Modes 28 Starting the CLI 28 Editing Features 29 Setup Wizard 30 Terminal Command Buffer 30 Negating the Effect of Commands 30 Command Completion 31... CLI Command Conventions 32 2 Command Groups 33 Introduction 33 Command Groups 33 ACL Commands 35 AAA Commands 35 Address Table Commands 36 Clock Commands 37 Configuration and Image Files Commands 38 DHCP Snooping Commands 39 Ethernet...
Command Line Interface Guide
Page 5
Web Server Commands 59 802.1x Commands 60 802.1x Advanced Commands 62 3 Command Modes 63 GC (Global Configuration) Mode 63 IC (Interface Configuration) Mode 67 LC (Line Configuration) Mode 70 MA (Management Access-level) Mode 70 PE (Privileged User EXEC) Mode 70 SP (SSH Public Key) Mode 72 UE (User EXEC) Mode 73 VC (VLAN Configuration) Mode 74 4 ACL Commands 75 ip access-list 75 mac access-list 75 permit (ip 76 deny (IP 78 permit (MAC 80 deny (MAC 81 service-acl 82 show access-lists 83 show interfaces access-lists 84 Contents 5
Web Server Commands 59 802.1x Commands 60 802.1x Advanced Commands 62 3 Command Modes 63 GC (Global Configuration) Mode 63 IC (Interface Configuration) Mode 67 LC (Line Configuration) Mode 70 MA (Management Access-level) Mode 70 PE (Privileged User EXEC) Mode 70 SP (SSH Public Key) Mode 72 UE (User EXEC) Mode 73 VC (VLAN Configuration) Mode 74 4 ACL Commands 75 ip access-list 75 mac access-list 75 permit (ip 76 deny (IP 78 permit (MAC 80 deny (MAC 81 service-acl 82 show access-lists 83 show interfaces access-lists 84 Contents 5
Command Line Interface Guide
Page 9
... negotiation 155 flowcontrol 156 system flowcontrol 157 mdix 157 back-pressure 158 port jumbo-frame 159 clear counters 159 set interface active 160 show interfaces configuration 160 show interfaces status 162 show interfaces advertise 165 show interfaces description 167 show interfaces counters 168 show ports jumbo-frame 172 port storm-control...
... negotiation 155 flowcontrol 156 system flowcontrol 157 mdix 157 back-pressure 158 port jumbo-frame 159 clear counters 159 set interface active 160 show interfaces configuration 160 show interfaces status 162 show interfaces advertise 165 show interfaces description 167 show interfaces counters 168 show ports jumbo-frame 172 port storm-control...
Command Line Interface Guide
Page 10
... enable (global 187 gvrp enable (interface 187 garp timer 188 gvrp vlan-creation-forbid 189 gvrp registration-forbid 190 clear gvrp statistics 191 show gvrp configuration 191 show gvrp statistics 192 13 IGMP Snooping Commands 195 ip igmp snooping (Global 195 ip igmp snooping (Interface 195 ip igmp snooping mrouter 196...
... enable (global 187 gvrp enable (interface 187 garp timer 188 gvrp vlan-creation-forbid 189 gvrp registration-forbid 190 clear gvrp statistics 191 show gvrp configuration 191 show gvrp statistics 192 13 IGMP Snooping Commands 195 ip igmp snooping (Global 195 ip igmp snooping (Interface 195 ip igmp snooping mrouter 196...
Command Line Interface Guide
Page 13
... med enable 259 lldp med network-policy (global 259 lldp med network-policy (interface 260 lldp med location 261 clear lldp rx 262 show lldp configuration 262 show lldp local 263 Contents 13
... med enable 259 lldp med network-policy (global 259 lldp med network-policy (interface 260 lldp med location 261 clear lldp rx 262 show lldp configuration 262 show lldp local 263 Contents 13
Command Line Interface Guide
Page 14
show lldp neighbors 265 show lldp med configuration 266 20 Management ACL 269 management access-list 269 permit (management 271 deny (management 272 management access-class 273 show management access-list 273 show ...
show lldp neighbors 265 show lldp med configuration 266 20 Management ACL 269 management access-list 269 permit (management 271 deny (management 272 management access-class 273 show management access-list 273 show ...
Command Line Interface Guide
Page 17
... spanning-tree mst priority 354 spanning-tree mst max-hops 355 spanning-tree mst port-priority 356 spanning-tree mst cost 356 spanning-tree mst configuration 357 instance (mst 358 name (mst 359 revision (mst 359 Contents 17
... spanning-tree mst priority 354 spanning-tree mst max-hops 355 spanning-tree mst port-priority 356 spanning-tree mst cost 356 spanning-tree mst configuration 357 instance (mst 358 name (mst 359 revision (mst 359 Contents 17
Command Line Interface Guide
Page 20
show version 415 asset-tag 416 show system id 417 32 TACACS Commands 419 tacacs-server host 419 tacacs-server key 420 tacacs-server timeout 420 tacacs-server source-ip 421 show tacacs 422 33 TIC Commands 423 passwords min-length 423 password-aging 424 passwords aging 424 passwords history 425 passwords history hold-time 426 passwords lockout 426 aaa login-history file 427 set username active 428 set line active 428 set enable-password active 429 show passwords configuration 429 show users login-history 431 20 Contents
show version 415 asset-tag 416 show system id 417 32 TACACS Commands 419 tacacs-server host 419 tacacs-server key 420 tacacs-server timeout 420 tacacs-server source-ip 421 show tacacs 422 33 TIC Commands 423 passwords min-length 423 password-aging 424 passwords aging 424 passwords history 425 passwords history hold-time 426 passwords lockout 426 aaa login-history file 427 set username active 428 set line active 428 set enable-password active 429 show passwords configuration 429 show users login-history 431 20 Contents
Command Line Interface Guide
Page 25
...command mode access path. CLI Command Modes Introduction To assist in using the CLI and describes implemented command editing features to assist in configuring devices, the CLI (Command Line Interface) is divided into different command modes. Entering a question mark "?" From each mode a ...specific command is as follows: User EXEC mode, Privileged EXEC mode, Global Configuration mode, and Interface Configuration mode. at the system prompt (console prompt) displays a list of specific commands. Each command mode has its own set of...
...command mode access path. CLI Command Modes Introduction To assist in using the CLI and describes implemented command editing features to assist in configuring devices, the CLI (Command Line Interface) is divided into different command modes. Entering a question mark "?" From each mode a ...specific command is as follows: User EXEC mode, Privileged EXEC mode, Global Configuration mode, and Interface Configuration mode. at the system prompt (console prompt) displays a list of specific commands. Each command mode has its own set of...
Command Line Interface Guide
Page 26
... and is displayed. console> The default host name is reserved for tasks that are available in the Global Configuration mode. The Global Configuration mode manages the device configuration on EXEC mode and provides access to perform basic tests, and list system information. The user-level prompt ...CLI Only a limited subset of the device "host name" followed by "#". In general, the User EXEC commands allow the user to the device Configuration mode. console# To return from the User EXEC mode, perform the following steps: 1 At the prompt enter the command enable and press ....
... and is displayed. console> The default host name is reserved for tasks that are available in the Global Configuration mode. The Global Configuration mode manages the device configuration on EXEC mode and provides access to perform basic tests, and list system information. The user-level prompt ...CLI Only a limited subset of the device "host name" followed by "#". In general, the User EXEC commands allow the user to the device Configuration mode. console# To return from the User EXEC mode, perform the following steps: 1 At the prompt enter the command enable and press ....
Command Line Interface Guide
Page 27
...return from any mode to the previous mode except when returning to User EXEC mode from the Interface Configuration mode to the Global Configuration mode Global Configuration Mode Global Configuration mode commands apply to features that affect the system as a whole, rather than just a specific ...and "#". The following example illustrates how to access Global Configuration mode and returns to the Privileged EXEC mode: console# console#configure console(config)#exit console# Using the CLI 27 The Privileged EXEC mode command configure is displayed. For example, the Exit command is ...
...return from any mode to the previous mode except when returning to User EXEC mode from the Interface Configuration mode to the Global Configuration mode Global Configuration Mode Global Configuration mode commands apply to features that affect the system as a whole, rather than just a specific ...and "#". The following example illustrates how to access Global Configuration mode and returns to the Privileged EXEC mode: console# console#configure console(config)#exit console# Using the CLI 27 The Privileged EXEC mode command configure is displayed. For example, the Exit command is ...
Command Line Interface Guide
Page 28
... via a Telnet connection, ensure the device has an IP address defined, corresponding management access is used to enter the Interface Configuration mode to enter the QoS services configuration mode. Contains commands to manage the member ports as a whole. Most of these commands are the same as line speed..., timeout settings, etc. The Global Configuration mode command crypto key pubkey-chain ssh is managed by entering command keywords and parameters at the prompt. Starting the CLI The switch can...
... via a Telnet connection, ensure the device has an IP address defined, corresponding management access is used to enter the Interface Configuration mode to enter the QoS services configuration mode. Contains commands to manage the member ports as a whole. Most of these commands are the same as line speed..., timeout settings, etc. The Global Configuration mode command crypto key pubkey-chain ssh is managed by entering command keywords and parameters at the prompt. Starting the CLI The switch can...
Command Line Interface Guide
Page 29
...of all valid commands and corresponding help information can be displayed: • Keyword lookup - When a different user is displayed. 2 Configure the device and enter the necessary commands to log onto the system, in some instances parameters required to set a password for this command... is ? For example, in using the CLI, perform the following features are displayed. Keywords identify a command, and arguments specify configuration parameters. To start using the CLI, there is an argument that require parameters, enter the required parameters after the command keyword. ...
...of all valid commands and corresponding help information can be displayed: • Keyword lookup - When a different user is displayed. 2 Configure the device and enter the necessary commands to log onto the system, in some instances parameters required to set a password for this command... is ? For example, in using the CLI, perform the following features are displayed. Keywords identify a command, and arguments specify configuration parameters. To start using the CLI, there is an argument that require parameters, enter the required parameters after the command keyword. ...
Command Line Interface Guide
Page 30
...applicable commands. 30 Using the CLI For information about the command syntax for configuring the command history buffer, see history size. The standard number of a command or reset the configuration to the default value. By configuring 0, the effect is recorded on an internally managed Command History buffer. For...be disabled at any time. By default, the history buffer system is an easy-to 256. Negating the Effect of Commands For many configuration commands, the prefix keyword "no" can be entered to cancel the effect of 10 commands can be increased to -use user interface ...
...applicable commands. 30 Using the CLI For information about the command syntax for configuring the command history buffer, see history size. The standard number of a command or reset the configuration to the default value. By configuring 0, the effect is recorded on an internally managed Command History buffer. For...be disabled at any time. By default, the history buffer system is an easy-to 256. Negating the Effect of Commands For many configuration commands, the prefix keyword "no" can be entered to cancel the effect of 10 commands can be increased to -use user interface ...
Command Line Interface Guide
Page 33
... Interface (CLI) is invoked. The CLI is a basic command-line interpreter similar to the Getting Started Guide and User Guide for configuring the Dell™ PowerConnect™ switch, details the procedures and provides configuration examples. Refer to the UNIX C shell. Command Groups Introduction The Command Language Interface (CLI) is a network management application operated through...
... Interface (CLI) is invoked. The CLI is a basic command-line interpreter similar to the Getting Started Guide and User Guide for configuring the Dell™ PowerConnect™ switch, details the procedures and provides configuration examples. Refer to the UNIX C shell. Command Groups Introduction The Command Language Interface (CLI) is a network management application operated through...
Command Line Interface Guide
Page 34
..., name and authorized users. Describes user commands used for example ports, storm control, port speed and auto-negotiation. Configures commands related to the device. Configures tunnel routing configurations. Configures and manages IP addresses on the device. Configures and manages Internet Small Computer Interface System Information (iSCSI). Diagnoses and displays the interface status. Displays RMON statistics...
..., name and authorized users. Describes user commands used for example ports, storm control, port speed and auto-negotiation. Configures commands related to the device. Configures tunnel routing configurations. Configures and manages IP addresses on the device. Configures and manages Internet Small Computer Interface System Information (iSCSI). Diagnoses and displays the interface status. Displays RMON statistics...
Command Line Interface Guide
Page 35
...channel) show access-lists Displays access control lists (ACLs) defined on interfaces. Global Configuration Displays information about the authentication methods. IP-Access List Configuration deny (IP) Denies traffic if the conditions defined in the deny statement match. ...if the conditions defined in the deny statement match. Configuration permit (ip) Permits traffic if the conditions defined in IPv4 Access List Configuration mode. Configuration Specifies the authentication method list when accessing Line Configuration a higher privilege level from a remote telnet or ...
...channel) show access-lists Displays access control lists (ACLs) defined on interfaces. Global Configuration Displays information about the authentication methods. IP-Access List Configuration deny (IP) Denies traffic if the conditions defined in the deny statement match. ...if the conditions defined in the deny statement match. Configuration permit (ip) Permits traffic if the conditions defined in IPv4 Access List Configuration mode. Configuration Specifies the authentication method list when accessing Line Configuration a higher privilege level from a remote telnet or ...
Command Line Interface Guide
Page 36
... a password on an interface. Sets a local password to control access to the VLAN bridge table. Line Configuration Global Configuration Global Configuration Privileged User EXEC Address Table Commands Command Group Description Access Mode bridge address Adds a static MAC-layer station source...the bridge VLAN table, and adds static ports to specific VLAN address ports. Establishes a username-based authentication system. Configuration bridge multicast forbidden Forbids adding a specific Multicast address to the group. Privileged User EXEC show bridge address-table Displays...
... a password on an interface. Sets a local password to control access to the VLAN bridge table. Line Configuration Global Configuration Global Configuration Privileged User EXEC Address Table Commands Command Group Description Access Mode bridge address Adds a static MAC-layer station source...the bridge VLAN table, and adds static ports to specific VLAN address ports. Establishes a username-based authentication system. Configuration bridge multicast forbidden Forbids adding a specific Multicast address to the group. Privileged User EXEC show bridge address-table Displays...
Command Line Interface Guide
Page 37
...clock set Manually sets the system clock. Configuration sntp authentication-key Defines an authentication key for the SNTP client. Global Configuration sntp broadcast client enable Enables the SNTP Broadcast clients. Interface Configuration Command Groups 37 Privileged User EXEC Displays the...or at a Privileged User specific VLAN. Privileged User EXEC clock source Configures an external time source for display purposes. Privileged User EXEC Displays the Multicast filtering configuration. EXEC clock timezone Sets the time zone for the system Privileged User...
...clock set Manually sets the system clock. Configuration sntp authentication-key Defines an authentication key for the SNTP client. Global Configuration sntp broadcast client enable Enables the SNTP Broadcast clients. Interface Configuration Command Groups 37 Privileged User EXEC Displays the...or at a Privileged User specific VLAN. Privileged User EXEC clock source Configures an external time source for display purposes. Privileged User EXEC Displays the Multicast filtering configuration. EXEC clock timezone Sets the time zone for the system Privileged User...
Command Line Interface Guide
Page 38
...startup. Displays the contents of the currently running -config show startup-config show bootvar Description Displays list of the SNTP server Global Configuration Displays the time and date from a source to request and Global accept NTP traffic from a Flash memory device. Deletes the ...startup-config file. Copies files from the system clock. Configuration Specifies SNTP UDP port of files on a flash file system Displays a file Renames a file. Privileged User EXEC Shows the status of ...
...startup. Displays the contents of the currently running -config show startup-config show bootvar Description Displays list of the SNTP server Global Configuration Displays the time and date from a source to request and Global accept NTP traffic from a Flash memory device. Deletes the ...startup-config file. Copies files from the system clock. Configuration Specifies SNTP UDP port of files on a flash file system Displays a file Renames a file. Privileged User EXEC Shows the status of ...