i 
Table of Contents 
1 Applicable Models and Software Versions.............................................................................................1-1 
2 Feature Matrix ............................................................................................................................................2-1 
3 Command/Parameter Matrix.....................................................................................................................3-1 
4 CLI Configuration ......................................................................................................................................4-1 
What Is CLI? ...........................................................................................................................................4-1 
Entering the CLI ......................................................................................................................................4-2 
Entering CLI Through the Console Port ..........................................................................................4-2 
Entering the CLI Through Telnet.....................................................................................................4-6 
CLI Description........................................................................................................................................4-7 
Command Conventions...................................................................................................................4-7 
CLI View Description .......................................................................................................................4-8 
Using the CLI ..........................................................................................................................................4-9 
Using the CLI Online Help...............................................................................................................4-9 
Command Line Error Information..................................................................................................4-10 
Typing and Editing Commands .....................................................................................................4-11 
Displaying and Executing History Commands ..............................................................................4-11 
Undo Form of a Command............................................................................................................4-12 
Controlling CLI Display..................................................................................................................4-12 
Configuring the CLI...............................................................................................................................4-15 
Configuring CLI Hotkeys................................................................................................................4-15 
Configuring Command Aliases......................................................................................................4-16 
Synchronous Information Output...................................................................................................4-17 
Configuring Command Levels.......................................................................................................4-18 
Saving Configurations ...................................................................................................................4-19 
5 Controlling Login Users............................................................................................................................5-1 
Introduction .............................................................................................................................................5-1 
Controlling Telnet Users .........................................................................................................................5-1 
Prerequisites....................................................................................................................................5-1 
Controlling Telnet Users by SSIDs..................................................................................................5-2 
Controlling Telnet Users by Source IP Addresses..........................................................................5-2 
Controlling Telnet Users by Source and Destination IP Addresses................................................5-3 
Controlling Telnet Users by Source MAC Addresses .....................................................................5-3 
Configuration Example ....................................................................................................................5-4 
Controlling Network Management Users by Source IP Addresses ........................................................5-4 
Prerequisites....................................................................................................................................5-5 
Controlling Network Management Users by Source IP Addresses.................................................5-5 
Configuration Example ....................................................................................................................5-5 
Controlling Web Users by Source IP Addresses ....................................................................................5-6 
Prerequisites....................................................................................................................................5-6 
Controlling Web Users by Source IP Addresses.............................................................................5-6