
3
Table of Contents
Preface .................................................................................................................................................................................7
Safety Symbols Used in this Document ....................................................................................................................... 8
Contact Allied Telesis ................................................................................................................................................... 9
Chapter 1: Command-Line Interface Overview................................................................................................................11
Initially Configuring a Device .........................................................................................................................................11
Accessing the CLI .........................................................................................................................................................11
Understanding Command Syntax .................................................................................................................................12
Understanding Enable and Enable Secret Passwords..................................................................................................12
Abbreviating Commands ...............................................................................................................................................12
Using Aliases for CLI Commands..................................................................................................................................12
Chapter 2: Layer 2 Features ..............................................................................................................................................15
Port Configuration .........................................................................................................................................................15
Flow Control ..................................................................................................................................................................18
Port Mirror .....................................................................................................................................................................18
Link Aggregation ...........................................................................................................................................................19
802.1Q VLAN ................................................................................................................................................................22
MAC Address Table ......................................................................................................................................................24
Q-in-Q............................................................................................................................................................................27
GARP ............................................................................................................................................................................28
GVRP ............................................................................................................................................................................28
802.3az Energy Efficient Ethernet (EEE) ......................................................................................................................29
Multicast ........................................................................................................................................................................30
MLD Snooping...............................................................................................................................................................35
Jumbo Frame ................................................................................................................................................................39
Spanning Tree...............................................................................................................................................................40
X-Ring Elite ...................................................................................................................................................................44
Loop Detection / Prevention ..........................................................................................................................................45
Chapter 3: Security.............................................................................................................................................................47
Storm Control ................................................................................................................................................................47
Port Security..................................................................................................................................................................48
802.1X ...........................................................................................................................................................................49
Account Manager ..........................................................................................................................................................50
DoS Attack Prevention ..................................................................................................................................................50
IP Security .....................................................................................................................................................................52
Chapter 4: Quality of Service.............................................................................................................................................53
QoS ...............................................................................................................................................................................53
Rate Limit ......................................................................................................................................................................55
Chapter 5: Management.....................................................................................................................................................57
IP Management .............................................................................................................................................................57
LLDP .............................................................................................................................................................................59
SNMP ............................................................................................................................................................................61
Power Over Ethernet.....................................................................................................................................................62
Configuration Management ...........................................................................................................................................64
Firmware Management .................................................................................................................................................65
DHCP Server.................................................................................................................................................................65
DHCP Client Option 82 .................................................................................................................................................66
System Log (SYSLOG) .................................................................................................................................................68