i
Table of Contents
1 Applicable Models and Software Versions.............................................................................................1-1
2 Feature Matrix ............................................................................................................................................2-1
3 Command/Parameter Matrix.....................................................................................................................3-1
4 CLI Configuration ......................................................................................................................................4-1
What Is CLI? ...........................................................................................................................................4-1
Entering the CLI ......................................................................................................................................4-2
Entering CLI Through the Console Port ..........................................................................................4-2
Entering the CLI Through Telnet.....................................................................................................4-6
CLI Description........................................................................................................................................4-7
Command Conventions...................................................................................................................4-7
CLI View Description .......................................................................................................................4-8
Using the CLI ..........................................................................................................................................4-9
Using the CLI Online Help...............................................................................................................4-9
Command Line Error Information..................................................................................................4-10
Typing and Editing Commands .....................................................................................................4-11
Displaying and Executing History Commands ..............................................................................4-11
Undo Form of a Command............................................................................................................4-12
Controlling CLI Display..................................................................................................................4-12
Configuring the CLI...............................................................................................................................4-15
Configuring CLI Hotkeys................................................................................................................4-15
Configuring Command Aliases......................................................................................................4-16
Synchronous Information Output...................................................................................................4-17
Configuring Command Levels.......................................................................................................4-18
Saving Configurations ...................................................................................................................4-19
5 Controlling Login Users............................................................................................................................5-1
Introduction .............................................................................................................................................5-1
Controlling Telnet Users .........................................................................................................................5-1
Prerequisites....................................................................................................................................5-1
Controlling Telnet Users by SSIDs..................................................................................................5-2
Controlling Telnet Users by Source IP Addresses..........................................................................5-2
Controlling Telnet Users by Source and Destination IP Addresses................................................5-3
Controlling Telnet Users by Source MAC Addresses .....................................................................5-3
Configuration Example ....................................................................................................................5-4
Controlling Network Management Users by Source IP Addresses ........................................................5-4
Prerequisites....................................................................................................................................5-5
Controlling Network Management Users by Source IP Addresses.................................................5-5
Configuration Example ....................................................................................................................5-5
Controlling Web Users by Source IP Addresses ....................................................................................5-6
Prerequisites....................................................................................................................................5-6
Controlling Web Users by Source IP Addresses.............................................................................5-6