UMN:CLI User Manual
SURPASS hiD 6615 S223/S323 R1.5
4 A50010-Y3-C150-2-7619
This document consists of a total 381 pages. All pages are issue 2.
Contents
1
Introduction ....................................................................................................... 20
1.1
Audience........................................................................................................... 20
1.2
Document Structure.......................................................................................... 20
1.3
Document Convention ...................................................................................... 21
1.4
Document Notation ........................................................................................... 21
1.5
CE Declaration of Conformity ........................................................................... 21
1.6
GPL/LGPL Warranty and Liability Exclusion .................................................... 22
2
System Overview.............................................................................................. 23
2.1
System Features............................................................................................... 24
3
Command Line Interface (CLI) ......................................................................... 27
3.1
Command Mode ............................................................................................... 27
3.1.1
Privileged EXEC View Mode ............................................................................ 29
3.1.2
Privileged EXEC Enable Mode......................................................................... 29
3.1.3
Global Configuration Mode............................................................................... 29
3.1.4
Bridge Configuration Mode............................................................................... 30
3.1.5
Rule Configuration Mode.................................................................................. 31
3.1.6
DHCP Configuration Mode ............................................................................... 32
3.1.7
DHCP Option 82 Configuration Mode .............................................................. 32
3.1.8
Interface Configuration Mode ........................................................................... 33
3.1.9
RMON Configuration Mode .............................................................................. 33
3.1.10
Router Configuration Mode .............................................................................. 34
3.1.11
VRRP Configuration Mode ............................................................................... 34
3.1.12
Route-Map Configuration Mode ....................................................................... 35
3.2
Useful Tips ........................................................................................................ 36
3.2.1
Listing Available Commands ............................................................................ 36
3.2.2
Calling Command History................................................................................. 37
3.2.3
Using Abbreviation............................................................................................ 38
3.2.4
Using Command of Privileged EXEC Enable Mode......................................... 38
3.2.5
Exit Current Command Mode ........................................................................... 39
4
System Connection and IP Address ................................................................. 40
4.1
System Connection........................................................................................... 40
4.1.1
System Login .................................................................................................... 40
4.1.2
Password for Privileged EXEC Mode............................................................... 41
4.1.3
Changing Login Password................................................................................ 42
4.1.4
Management for System Account..................................................................... 42
4.1.4.1
Creating System Account ................................................................................. 42
4.1.4.2
Configuring Security Level................................................................................ 43
4.1.5
Limiting Number of User................................................................................... 47
4.1.6
Telnet Access.................................................................................................... 47
4.1.7
Auto Log-out ..................................................................................................... 48
4.1.8
System Rebooting ............................................................................................ 48
4.1.8.1
Manual System Rebooting ............................................................................... 48
4.1.8.2
Auto System Rebooting.................................................................................... 49
4.2
System Authentication ...................................................................................... 49
4.2.1
Authentication Method...................................................................................... 50