Allied Telesis AT-S95 CLI User Manual
Page 3

Page i
Table of Contents
Intended Audience...........................................................................................................................2
Document Conventions ...................................................................................................................3
Contacting Allied Telesis .................................................................................................................4
Introduction ................................................................................................................................................5
User EXEC Mode ......................................................................................................................................5
Privileged EXEC Mode ..............................................................................................................................5
Global Configuration Mode ........................................................................................................................6
Interface Configuration and Specific Configuration Modes........................................................................7
Starting the CLI................................................................................................................................8
Editing Features ..............................................................................................................................9
Terminal Command Buffer ...................................................................................................................9
Negating the Effect of Commands .....................................................................................................10
Command Completion........................................................................................................................10
Nomenclature .....................................................................................................................................10
Keyboard Shortcuts............................................................................................................................10
CLI Command Conventions ...............................................................................................................11
ip access-list.........................................................................................................................................13
permit (ip) .............................................................................................................................................13
deny (IP)...............................................................................................................................................16
mac access-list.....................................................................................................................................18
permit (MAC)........................................................................................................................................19
deny (MAC) ..........................................................................................................................................20
service-acl ............................................................................................................................................21
show access-lists .................................................................................................................................22
show interfaces access-lists.................................................................................................................22
aaa authentication login .......................................................................................................................24
aaa authentication enable ....................................................................................................................25
login authentication ..............................................................................................................................26
enable authentication ...........................................................................................................................27
ip http authentication ............................................................................................................................27