Page 2
Table of Contents
Preface ................................................................................................................................. 14
Intended Audience......................................................................................................................... 15
Document Conventions .................................................................................................................15
Contacting Allied Telesis ...............................................................................................................16
Chapter 1.Using the CLI ..................................................................................................... 17
Overview ..............................................................................................................................................17
CLI Command Modes....................................................................................................................17
Introduction..............................................................................................................................................17
User EXEC Mode ....................................................................................................................................17
Privileged EXEC Mode ............................................................................................................................17
Global Configuration Mode......................................................................................................................18
Interface Configuration and Specific Configuration Modes......................................................................19
Starting the CLI..............................................................................................................................20
Editing Features ............................................................................................................................20
Entering Commands................................................................................................................................20
Terminal Command Buffer .................................................................................................................21
Negating the Effect of Commands .....................................................................................................21
Command Completion........................................................................................................................21
Nomenclature.....................................................................................................................................22
Keyboard Shortcuts............................................................................................................................22
CLI Command Conventions ...............................................................................................................22
Copying and Pasting Text........................................................................................................................23
Chapter 2.ACL Commands ................................................................................................ 24
ip access-list.........................................................................................................................................24
permit (ip) .............................................................................................................................................24
deny (IP)...............................................................................................................................................27
ipv6 access-list.....................................................................................................................................29
permit (IPv6).........................................................................................................................................30
deny (IPv6)...........................................................................................................................................32
mac access-list.....................................................................................................................................34
permit (MAC)........................................................................................................................................35
deny (MAC)..........................................................................................................................................35
service-acl ............................................................................................................................................36
show access-lists .................................................................................................................................37
show interfaces access-lists.................................................................................................................38
Chapter 3.AAA Commands ................................................................................................ 39
aaa authentication login .......................................................................................................................39
aaa authentication enable ....................................................................................................................40
login authentication ..............................................................................................................................41
enable authentication...........................................................................................................................42