CLI Reference Guide-R01

Table Of Contents
Chapter 2
| Using the Command Line Interface
CLI Command Groups
– 83 –
CLI Command Groups
The system commands can be broken down into the functional groups shown
below
.
Table 7: Command Group Index
Command Group Description Page
General Basic commands for entering privileged access mode,
restarting the system, or quitting the CLI
85
System Management Display and setting of system information, basic modes of
operation, maximum frame size, file management, console
port and telnet settings, system logs, SMTP alerts, the system
clock, and switch clustering
93
Simple Network
Management Protocol
Activates authentication failure traps; configures community
access strings, and trap receivers
177
Remote Monitoring Supports statistics, history, alarm and event groups 203
Flow Sampling Used with a remote sFlow Collector to provide an accurate,
detailed and real-time overview of the types and levels of
traffic present on the network
211
User Authentication Configures user names and passwords, command privilege
levels, logon access using local or remote authentication,
management access through the web server, Telnet server
and Secure Shell; as well as port security, IEEE 802.1X port
access control, and restricted access based on specified IP
addresses
217
General Security Measures Segregates traffic for clients attached to common data ports;
and prevents unauthorized access by configuring valid static
or dynamic addresses, MAC address authentication, filtering
DHCP requests and replies, and discarding invalid ARP
responses
283
Access Control List Provides filtering for IPv4 frames (based on address, protocol,
TCP/UDP port number or TCP control code), IPv6 frames
(based on address, DSCP traffic class, or next header), or non-
IP frames (based on MAC address or Ethernet type)
369
Interface Configures the connection parameters for all Ethernet ports,
aggregated links, and VLANs
395
Link Aggregation Statically groups multiple ports into a single logical trunk;
configures Link Aggregation Control Protocol for port trunks
427
Mirror Port Mirrors data to another port for analysis without affecting the
data passing through or the performance of the monitored
port
441
Congestion Control Sets the input/output rate limits, traffic storm thresholds, and
thresholds for broadcast and multicast storms which can be
used to trigger configured rate limits or to shut down a port.
451
Loopback Detection Detects general loopback conditions caused by hardware
problems or faulty protocol settings
469
Address Table Configures the address table for filtering specified addresses,
displays current entries, clears the table, or sets the aging time
483
Spanning Tree Configures Spanning Tree settings for the switch 493