COMMANDO IE2000 Series Switches Command Line Interface (CLI)

SOLDIER-IE2000 switches

1 Introduction

COMMANDO Solider IE2000 Series Industrial Ethernet, Managed Switches are fully managed, PoE+ Gigabit Ethernet switch with network resiliency and high availability, delivering robust performance and intelligent switching for growing networks

Read More

2 Administration

In User EXEC mode, user only allows to do a few actions. Most of commands are only available in privileged EXEC mode. Use “enable” command to enter the privileged mode to do more actions on switch

Read More

3 AAA (Authentication, Authorization, Accounting)

Different access methods are allowed to bind different login authentication lists. Use “login authentication” command to bind the list to specific line (console, telnet, ssh).

Read More

4 ACL (Access Control List)

Use the show acl utilization command to show the usage of PIE of ASIC. When an ACL bind to interface, it needs ASIC resource to help to filter packet. An ASIC has limited resource

Read More

5 Authentication Manager

Use “authentication guest-vlan” command to enable the port setting of guest VLAN. Use the “no” form of this command to disable guest VLAN.

Read More

6 Diagnostics

IE2000 Series Switches Diagnostics offer proactive diagnostics and real-time alerts and provides higher network availability and increased operational efficiency

Read More

7 DHCP (Dynamic Host Configuration Protocol)

The example shows how to set DHCP VLAN Interface Group setting for Management VLAN . You can verify settings by the following show run command.

Read More

8 DOS Denial-of-Service (DoS)

The following example shows the global DoS protection configuration. Switch# show dos

Read More

9 Dynamic Arp Inspection

The example shows how to set interface gi1 to validate “src-mac”,“dst-mac” and “ip”,“allow zeros”. You can verify settings by the following show ip arp inspection interface command

Read More

10 GVRP (GARP VLAN Registration Protocol)

This command will display the ports configuration info. none [interfaces IF_PORTS] Display all ports configuration Display Specifies posts configuration

Read More

11 IGMP Snooping

Use the ip igmp snooping version command to change IGMP support version. Only basic mode is supported in v3. When change version from v3 to v2, all querier version will update to version 2.You can verify settings by the show ip igmp snooping command

Read More

12 IP Source Guard

IP Source Guard is a security feature that restricts IP traffic on untrusted Layer 2 ports by filtering traffic based on the DHCP snooping binding database or manually configured IP source bindings

Read More

13 Link Aggregation

Use “show lag” command to show current LAG load balance algorithm and members active/inactive status. Switch# show lag

Read More

14 LLDP

Use “lldp med” to configure the LLDP MED enable status. If LLDP MED is enabled, LLDP MED capability TLV and other selected MED TLV would be attached. The configuration could be shown by “show lldp med” command. Use the “no” form of this command to disable the LLDP MED status

Read More

15 Logging

Almost all information technology systems generate a log, which serves as a record of all the activity that the system conducted in its operation. Such logs are generated by network infrastructure devices (firewalls, switches, domain name service devices

Read More

16 MAC Address Table

MAC Address Table

Read More

17 MAC VLAN

MAC VLAN :-The MAC-based VLAN feature allows incoming untagged packets to be assigned to a VLAN and thus classify traffic based on the source MAC address of the packet

Read More

18 Management ACL

An Access Control List (ACL) is a set of rules that is usually used to filter network traffic. ACLs can be configured on network devices with packet filtering compatibilities, such as routers and firewalls

Read More

19 Mirror

You can analyze network traffic passing through ports by using Switched Port Analyzer (SPAN). This sends a copy of the traffic to another port on the switch that has been connected to a SwitchProbe device, another Remote Monitoring (RMON) probe or security device

Read More

20 MLD Snooping

In IPv4, Layer 2 switches can use IGMP snooping to limit the flooding of multicast traffic by dynamically configuring Layer 2 interfaces so that multicast traffic is forwarded to only those interfaces associated with IP multicast address

Read More

21 Multicast VLAN Registration (MVR)

The following example specifies that set mvr static group test. The configure must configure mvr receiver port firstly.(eg. mvr port type) Switch(config)# mvr vlan

Read More

22 PORT

The switch comes with default port settings that should allow you to connect to the Ethernet Ports without any necessary configuration. Should there be a need to change the name of the ports, Port State, negotiation settings or flow control settings etc

Read More

23 PORT Error Disable

When a port is in error-disabled state, it is effectively shut down and no traffic is sent or received on that port. The ErrDisable feature is implemented to handle critical situations where the switch detected excessive or late collisions on a port, port duplex misconfiguration

Read More

24 PORT Security

Port Security helps secure the network by preventing unknown devices from forwarding packets. When a link goes down, all dynamically locked addresses are freed. The port security feature offers the following benefits

Read More

25 Protocol VLAN

Protocol-based VLAN processes traffic based on protocol. You can use a protocol-based VLAN to define filtering criteria for untagged packets. If you do not change the port configuration or configure a protocol-based VLAN, switch assigns untagged packets to VLAN 1

Read More