3com 4210 PWR 9-Port 3CR17341-91-ME 用户手册
产品代码
3CR17341-91-ME
1
CLI C
ONFIGURATION
Introduction to the CLI
A command line interface (CLI) is a user interface to interact with a switch.
Through the CLI on a switch, you can enter commands to configure the switch
and check output information to verify the configuration. Each Switch 4210
provides an easy-to-use CLI and a set of configuration commands for configuring
and managing your switch.
Through the CLI on a switch, you can enter commands to configure the switch
and check output information to verify the configuration. Each Switch 4210
provides an easy-to-use CLI and a set of configuration commands for configuring
and managing your switch.
The CLI on the Switch 4210 Family provides the following features:
■
Hierarchical command protection: You can control the commands that
specific users can execute to prevent unauthorized users from configuring the
switch.
specific users can execute to prevent unauthorized users from configuring the
switch.
■
Online help: Users can gain online help at any time by entering a question
mark (?) at the command line prompt.
mark (?) at the command line prompt.
■
Debugging: Detailed debugging information is provided to help diagnose and
locate network problems.
locate network problems.
■
Command history function: This features enables users to check most
recently executed commands and makes it easier to execute those commands
again.
recently executed commands and makes it easier to execute those commands
again.
■
Partial matching of commands: The system allows you to enter partially
matching text to search for commands. This allows you to execute a command
by entering partially-spelled command keywords as long as the system can
uniquely identify the keywords entered.
matching text to search for commands. This allows you to execute a command
by entering partially-spelled command keywords as long as the system can
uniquely identify the keywords entered.
Command Hierarchy
The Switch 4210 uses hierarchical command protection for command lines, to
prevent users with fewer access rights from using higher-level commands to
change the switch’s configuration. Based on user privilege, commands are
classified in four levels:
prevent users with fewer access rights from using higher-level commands to
change the switch’s configuration. Based on user privilege, commands are
classified in four levels:
■
Visitor level (level 0): Commands at this level are mainly used to diagnose
the network, and cannot be saved in a configuration file. For example, ping,
tracert, and telnet are level 0 commands.
the network, and cannot be saved in a configuration file. For example, ping,
tracert, and telnet are level 0 commands.
■
Monitor level (level 1): Commands at this level are mainly used to maintain
the system and diagnose service faults, They cannot be saved in a configuration
file. Such commands include debugging and terminal.
the system and diagnose service faults, They cannot be saved in a configuration
file. Such commands include debugging and terminal.
■
System level (level 2): Commands at this level are mainly used to configure
services and include routing and network layer commands. These commands
can be used to provide network services directly.
services and include routing and network layer commands. These commands
can be used to provide network services directly.
■
Manage level (level 3): Commands at this level are associated with the basic
operation and support modules of the system. These commands provide
operation and support modules of the system. These commands provide