UMN:CLI User Manual
V5808
4
Contents
1 Introduction ....................................................................................... 32
1.1 Audience ............................................................................................. 32
1.2 Document Structure............................................................................. 32
1.3 Document Convention ......................................................................... 33
1.4 Document Notation .............................................................................. 33
1.5 Virus Protection ................................................................................... 34
1.6 GPL/LGPL Warranty and Liability Exclusion ........................................ 34
2 System Overview .............................................................................. 36
2.1 System Features ................................................................................. 37
3 Command Line Interface (CLI) ......................................................... 40
3.1 Configuration Mode ............................................................................. 40
3.1.1 Privileged EXEC View Mode ...................................................................... 40
3.1.2 Privileged EXEC Enable Mode .................................................................. 41
3.1.3 Global Configuration Mode ........................................................................ 41
3.1.4 Bridge Configuration Mode ........................................................................ 42
3.1.5 DHCP Pool Configuration Mode ................................................................ 43
3.1.6 DHCP Option Configuration Mode ............................................................. 43
3.1.7 DHCP Option 82 Configuration Mode ........................................................ 43
3.1.8 Interface Configuration Mode ..................................................................... 44
3.1.9 IP Tunnel Configuration Mode.................................................................... 44
3.1.10 Rule Configuration Mode ........................................................................... 45
3.1.11 RMON Configuration Mode ........................................................................ 45
3.1.12 Router Configuration Mode ........................................................................ 46
3.1.13 Route-Map Configuration Mode ................................................................. 46
3.1.14 GPON Configuration Mode ........................................................................ 47
3.1.14.1 GPON-OLT Configuration Mode .................................................................... 47
3.1.14.2 ONU Profile Configuration Mode ................................................................... 47
3.2 Configuration Mode Overview ............................................................. 49
3.3 Useful Tips .......................................................................................... 50
3.3.1 Listing Available Command ........................................................................ 50
3.3.2 Calling Command History .......................................................................... 52
3.3.3 Using Abbreviation ..................................................................................... 54
3.3.4 Using Command of Privileged EXEC Enable Mode .................................. 54
3.3.5 Exit Current Command Mode .................................................................... 54
3.3.6 The Command Execution Limit .................................................................. 55
4 System Connection and IP Address ................................................ 56
4.1 System Connection ............................................................................. 56
4.1.1 System Login ............................................................................................. 56
4.1.2 Password for Privileged EXEC Enable Mode ............................................ 56
4.1.3 Changing Login Password ......................................................................... 57
4.1.4 Login Password Recovery Process ........................................................... 58
4.1.5 Management for System Account .............................................................. 59
4.1.5.1 Creating System Account............................................................................... 59
4.1.5.2 Security Level ................................................................................................ 59
4.1.6 Limiting the Number of Users .................................................................... 63