COMMANDO E2000 Series Switches Command Line Interface (CLI)

SOLDIER-E2000 switches

1 Introduction

COMMANDO Soldier E2000 Series Switches are fully managed, PoE+ Gigabit Ethernet L2+ switch with network resiliency and high availability, delivering robust performance and intelligent switching for growing networks

Read More

2 Administration

General commands used in E2000 Series Switches are described in the Administration. The switch administration is to perform some basic switch administration tasks

Read More

3 AAA (Authentication, Authorization, Accounting)

The AAA feature allows you to verify the identity of, grant access to, and track the actions of users managing E2000 Series switches. The E2000 Series switches support Remote Access Dial-In User Service (RADIUS)

Read More

4 ACL (Access Control List)

An ACL is a sequential collection of permit and deny conditions that apply to packets. Packet filtering can help limit network traffic and restrict network use by certain users or devices

Read More

5 Authentication Manager

You can control access to your network through Switch by using authentication methods such as 802.1X, MAC Based and Web Based. Authentication manager implementation that delegates responsibility

Read More

6 Diagnostics

E2000 Series Switches Diagnostics offer proactive diagnostics and real-time alerts and provides higher network availability and increased operational efficiency. Log files of a switch are classified into: user log files and diagnostic log files

Read More

7 DHCP (Dynamic Host Configuration Protocol)

The example shows how to set write-delay timer to 60 seconds. You can verify settings by the following show ip dhcp snooping database command

Read More

8 DOS Denial-of-Service (DoS)

A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash

Read More

9 Dynamic Arp Inspection

A switch can use DAI (Dynamic ARP Inspection) to prevent certain types of attacks that leverage the use of IP ARP messages. DAI is a security feature that validates ARP packets in a network

Read More

10 GVRP (GARP VLAN Registration Protocol)

GARP VLAN Registration Protocol (GVRP) is a Generic Attribute Registration Protocol (GARP) application that provides 802.1Q-compliant VLAN pruning and dynamic VLAN creation on 802.1Q trunk ports

Read More

11 IGMP Snooping

none Show ip igmp router include dynamic and static and forbidden (dynamic | forbidden | static) Display Ip igmp router info for different type

Read More

12 IP Source Guard

IP Source Guard is a security feature that restricts IP traffic on untrusted Layer 2 ports by filtering traffic based on the DHCP snooping binding database or manually configured IP source bindings

Read More

13 Link Aggregation

LACP, a sub component of IEEE 802.3ad, provides additional functionality for link aggregation groups (LAGs). Use the link aggregation feature to aggregate one or more Ethernet interfaces to form a logical point-to-point link, known as a LAG, virtual link, or bundle

Read More

14 LLDP

LLDP (Link Layer Discovery Protocol) is an IEEE (Institute of Electrical and Electronics Engineers) standard protocol (IEEE 802.1AB) that defines messages, encapsulated in Ethernet frames for the purpose of giving devices a means of announcing basic device information

Read More

15 Logging

Almost all information technology systems generate a log, which serves as a record of all the activity that the system conducted in its operation. Such logs are generated by network infrastructure devices (firewalls, switches, domain name service devices, routers, load balancers)

Read More

16 MAC Address Table

A MAC address table, sometimes called a Content Addressable Memory (CAM) table, is used on Ethernet switches to determine where to forward traffic on a LAN. Now let's break this down a little bit to understand how the MAC address table is built and used by an Ethernet switch to help traffic move along the path to its destination

Read More

17 MAC VLAN

MAC VLAN :-The MAC-based VLAN feature allows incoming untagged packets to be assigned to a VLAN and thus classify traffic based on the source MAC address of the packet. You define a MAC to VLAN mapping by configuring an entry in the MAC to VLAN table

Read More

18 Management ACL

An Access Control List (ACL) is a set of rules that is usually used to filter network traffic. ACLs can be configured on network devices with packet filtering compatibilities, such as routers and firewalls. ACLs contain a list of conditions that categorize packets and help you determine when to allow or deny network traffic

Read More

19 Mirror

You can analyze network traffic passing through ports by using Switched Port Analyzer (SPAN). This sends a copy of the traffic to another port on the switch that has been connected to a SwitchProbe device, another Remote Monitoring (RMON) probe or security device

Read More

20 MLD Snooping

Use the ipv6 mld max-groups command to limit port learning max group number. When the port has reach limitation, new group will not add this port. Static group is excluded. Use the “no” form of this command to restore to default. You can verify settings by the show ipv6 mld max-groups command

Read More

21 Multicast VLAN Registration (MVR)

The switch comes with default port settings that should allow you to connect to the Ethernet Ports without any necessary configuration. Should there be a need to change the name of the ports, Port State, negotiation settings or flow control settings etc

Read More

22 Port Error Disable

When a port is in error-disabled state, it is effectively shut down and no traffic is sent or received on that port. The ErrDisable feature is implemented to handle critical situations where the switch detected excessive or late collisions on a port

Read More

23 PORT Security

Port Security helps secure the network by preventing unknown devices from forwarding packets. When a link goes down, all dynamically locked addresses are freed. The port security feature offers the following benefits

Read More

24 QoS

A communications network forms the backbone of any successful organization. These networks transport a multitude of applications and data, including high-quality video and delay-sensitive data such as real-time voice

Read More

25 Rate Limit

Rate-limiting for all traffic operates on a per-port basis to allow only the specified bandwidth to be used for inbound or outbound traffic. When traffic exceeds the configured limit, it is dropped

Read More