Page i
Table of Contents
Preface ................................................................................................................................... 1
Intended Audience...........................................................................................................................2
Document Conventions ...................................................................................................................3
Contacting Allied Telesis .................................................................................................................4
Chapter 1.Using the CLI ....................................................................................................... 5
Overview ................................................................................................................................................5
CLI Command Modes......................................................................................................................5
Introduction................................................................................................................................................5
User EXEC Mode ......................................................................................................................................5
Privileged EXEC Mode ..............................................................................................................................5
Global Configuration Mode........................................................................................................................6
Interface Configuration and Specific Configuration Modes........................................................................7
Starting the CLI................................................................................................................................8
Editing Features ..............................................................................................................................9
Entering Commands..................................................................................................................................9
Terminal Command Buffer...................................................................................................................9
Negating the Effect of Commands .....................................................................................................10
Command Completion........................................................................................................................10
Nomenclature.....................................................................................................................................10
Keyboard Shortcuts............................................................................................................................10
CLI Command Conventions ...............................................................................................................11
Copying and Pasting Text........................................................................................................................11
Chapter 2.ACL Commands ................................................................................................ 12
ip access-list.........................................................................................................................................12
permit (ip).............................................................................................................................................12
deny (IP)...............................................................................................................................................15
mac access-list.....................................................................................................................................17
permit (MAC)........................................................................................................................................18
deny (MAC)..........................................................................................................................................19
service-acl............................................................................................................................................20
show access-lists .................................................................................................................................20
show interfaces access-lists.................................................................................................................21
Chapter 3.AAA Commands ................................................................................................ 23
aaa authentication login .......................................................................................................................23
aaa authentication enable....................................................................................................................24
login authentication ..............................................................................................................................25
enable authentication...........................................................................................................................26
ip http authentication............................................................................................................................26