CTS FOS-5152 User manual

Type
User manual
1
FOS-5152 Series
48-port 100/1000Base-X SFP + 4-port
1G/10GBase-R SFP+ L2 Managed Fiber
Switch
Network Management
Users Manual
Version 1.0
2
Revision History
Version
F/W
Date
Description
1.0
1.00.00
2020/11/20
First release
3
Trademarks
CTS is a registered trademark of Connection Technology Systems Inc..
Contents are subject to revision without prior notice.
All other trademarks remain the property of their owners.
Copyright Statement
Copyright Connection Technology Systems Inc..
This publication may not be reproduced as a whole or in part, in any way whatsoever unless prior consent has been obtained from
Connection Technology Systems Inc..
FCC Warning
This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC
Rules. These limitations are designed to provide reasonable protection against harmful interference in a residential installation.
This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the
instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not
occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the
following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
Consult your local distributors or an experienced radio/TV technician for help.
Shielded interface cables must be used in order to comply with emission limits.
Changes or modifications to the equipment, which are not approved by the party responsible for compliance, could affect the user’s
authority to operate the equipment.
Copyright © 2020 All Rights Reserved.
Company has an on-going policy of upgrading its products and it may be possible that information in this document is not up-to-
date. Please check with your local distributors for the latest information. No part of this document can be copied or reproduced in
any form without written consent from the company.
Trademarks:
All trade names and trademarks are the properties of their respective companies.
4
CTS Contact Information
Headquarters/Manufacturer:
Connection Technology Systems Inc.
18F-6, No.79, Sec.1, Xintai 5th Rd.,
Xizhi Dist., New Taipei City 221, Taiwan(R.O.C.)
Tel: +886-2-2698-9661
Fax: +886-2-2698-3960
Sales Direct Line:+886-2-2698-9201
www.ctsystem.com
Connection Technology USA
40538 La Purissima Way,
Fremont, CA 94539, USA
Tel: +1-510-509-0304
Sales Direct Line: +1-510-509-0305
Connection Technology Systems
Japan
Higobashi Bldg. No.3 R201, 1-23-13,
Edobori, Nishi-ku, Osaka 550-0002, Japan
Tel: +81-6-6450-8890
E-mail: cts_japan@ctsystem.com
Connection Technology Systems NE
AB
August Barks Gata 21,
421 32 Västra Frölunda, Sweden
Tel: +46-31-221980
E-mail:
Connection Technology Systems
Central Europe (COMPONET
Handels GmbH)
Hirschstettner Straße 19-21/Stiege I
A-1220 Vienna, Austria
Tel: +43-1-235 05 66-0
CTS Connection Technology
Systems DE GmbH
An den Bergen 17, 60437 Frankfurt am Main,
Germany
Tel: +491711051295
E-mail: cts_de@ctsystem.com
5
Table of Content
CTS Contact Information ..................................................................................................... 4
1. INTRODUCTION ............................................................................................................. 10
1.1 Management Options ................................................................................................. 10
1.2 Management Software ............................................................................................... 12
1.3 Management Preparations ......................................................................................... 13
2. Command Line Interface (CLI) ...................................................................................... 15
2.1 Using the Local Console ............................................................................................. 15
2.2 Remote Console Management - Telnet ...................................................................... 16
2.3 Navigating CLI ............................................................................................................ 16
2.3.1 General Commands ............................................................................................. 17
2.3.2 Quick Keys ........................................................................................................... 17
2.3.3 Command Format ................................................................................................ 18
2.3.4 Login Username & Password .............................................................................. 19
2.4 User Mode .................................................................................................................. 20
2.4.1 Loopback Command ............................................................................................ 20
2.4.2 Ping Command .................................................................................................... 21
2.4.3 Traceroute Command .......................................................................................... 21
2.5 Privileged Mode .......................................................................................................... 22
2.5.1 Copy-cfg Command ............................................................................................. 22
2.5.2 Firmware Command ............................................................................................ 23
2.5.3 IP Command ........................................................................................................ 24
2.5.4 Loopback Command ............................................................................................ 24
2.5.5 Ping Command .................................................................................................... 25
2.5.6 Reload Command ................................................................................................ 25
2.5.7 Traceroute Command .......................................................................................... 26
2.5.8 Write Command ................................................................................................... 26
2.5.9 Configure Command ............................................................................................ 26
2.5.10 Show Command ................................................................................................ 27
2.6 Configuration Mode .................................................................................................... 29
2.6.1 Entering Interface Numbers ................................................................................. 29
2.6.2 No Command ....................................................................................................... 30
2.6.3 Show Command .................................................................................................. 30
2.6.4 ACL Command ..................................................................................................... 32
2.6.5 Archive Command................................................................................................ 35
2.6.6 Channel-group Command .................................................................................... 36
6
2.6.7 Dot1x Command .................................................................................................. 41
2.6.8 Digital Input Command ........................................................................................ 44
2.6.9 IP Command ........................................................................................................ 44
2.6.10 IPv6 Command .................................................................................................. 55
2.6.11 LLDP Command ................................................................................................. 57
2.6.12 Loop Detection Command ................................................................................. 59
2.6.13 l2protocol-tunnel Command ............................................................................... 61
2.6.14 MAC Command ................................................................................................. 63
2.6.15 Management Command .................................................................................... 65
2.6.16 Mirror Command ................................................................................................ 66
2.6.17 MVR Command ................................................................................................. 67
2.6.18 NTP Command .................................................................................................. 71
2.6.19 QoS Command .................................................................................................. 72
2.6.20 Security Command ............................................................................................ 81
2.6.21 SNMP-Server Command ................................................................................... 85
2.6.22 Spanning-tree Command ................................................................................... 91
2.6.23 Switch Command ............................................................................................. 101
2.6.24 Switch-info Command ...................................................................................... 101
2.6.25 Syslog Command ............................................................................................. 103
2.6.26 Terminal Length Command .............................................................................. 104
2.6.27 User Command ................................................................................................ 105
2.6.28 VLAN Command .............................................................................................. 108
2.6.28.1 Port-Based VLAN ...................................................................................... 108
2.6.28.2 802.1Q VLAN ............................................................................................ 108
2.6.28.3 Introduction to Q-in-Q (DOT1Q-Tunnel) .................................................... 111
2.6.29 Interface Command ......................................................................................... 129
2.6.30 Show interface statistics Command ................................................................. 137
2.6.31 Show sfp Command ......................................................................................... 138
2.6.32 Show running-config & start-up-config & default-config Command .................. 138
2.6.33 Show log Command ......................................................................................... 139
3. SNMP NETWORK MANAGEMENT .............................................................................. 140
4. WEB MANAGEMENT.................................................................................................... 141
4.1 System Setup ........................................................................................................... 144
4.1.1 Switch Information ............................................................................................. 144
4.1.2 IP Setup ............................................................................................................. 146
4.1.3 IP Source Binding .............................................................................................. 149
4.1.4 Time Server Setup ............................................................................................. 149
7
4.1.5 Syslog Configuration .......................................................................................... 150
4.2 Port Management ..................................................................................................... 152
4.2.1 Port Setup & Status ............................................................................................ 152
4.2.2 Port Traffic Statistics .......................................................................................... 154
4.2.3 Port Packet Error Statistics ................................................................................ 155
4.2.4 Port Packet Analysis Statistics ........................................................................... 156
4.2.5 Port Mirroring ..................................................................................................... 157
4.3 Link Aggregation ....................................................................................................... 159
4.3.1 Distribution Rule................................................................................................. 160
4.3.2 Static Port Trunking ............................................................................................ 160
4.3.3 Link Aggregation Setup ...................................................................................... 161
4.3.4 LACP Port Status ............................................................................................... 163
4.3.5 LACP Port Statistics ........................................................................................... 164
4.4 VLAN Setup .............................................................................................................. 165
4.4.1 Port Based VLAN ............................................................................................... 165
4.4.2 802.1Q VLAN ..................................................................................................... 166
4.4.3 Introduction to Q-in-Q (DOT1Q-Tunnel) ............................................................. 168
4.4.4 IEEE 802.1q Tag VLAN ...................................................................................... 169
4.4.4.1 Trunk VLAN Setup ...................................................................................... 170
4.4.4.2 VLAN Interface ............................................................................................ 171
4.4.4.3 IEEE 802.1q VLAN Table ............................................................................ 172
4.4.5 VLAN Translation Configuration ......................................................................... 173
4.4.6 Selective Q-in-Q Configuration .......................................................................... 175
4.5 Rapid Spanning Tree ................................................................................................ 178
4.5.1 RSTP Switch Setup ........................................................................................... 179
4.5.2 RSTP Port Setup ............................................................................................... 180
4.5.3 RSTP Status ...................................................................................................... 181
4.6 MAC Address Management ...................................................................................... 182
4.6.1 MAC Table Learning .......................................................................................... 183
4.6.2 Static MAC Table Setup ..................................................................................... 183
4.6.3 MAC Address Table ........................................................................................... 185
4.7 QoS Setup ................................................................................................................ 187
4.7.1 QoS Priority ....................................................................................................... 187
4.7.2 QoS Remarking ................................................................................................. 189
4.7.3 QoS Rate Limit................................................................................................... 191
4.8 Multicast Configuration ............................................................................................. 193
4.8.1 IGMP/MLD Snooping ......................................................................................... 193
8
4.8.1.1 IGMP/MLD Setup ........................................................................................ 194
4.8.1.2 IGMP/MLD VLAN Setup .............................................................................. 195
4.8.1.3 IPMC Segment ............................................................................................ 196
4.8.1.4 IPMC Profile ................................................................................................ 197
4.8.1.5 IGMP/MLD Filtering ..................................................................................... 198
4.8.1.6 IGMP Snooping Status ................................................................................ 199
4.8.1.7 IGMP Group Table ...................................................................................... 200
4.8.1.8 MLD Snooping Status ................................................................................. 200
4.8.1.9 MLD Group Table ........................................................................................ 201
4.8.2 Static Multicast Configuration ............................................................................. 201
4.8.3 MVR Configuration ............................................................................................. 202
4.8.3.1 MVR Sytstem Setup .................................................................................... 203
4.8.3.2 MVR Port Setup .......................................................................................... 204
4.8.3.3 Multicast Group Setup ................................................................................. 206
4.9 Access Control List (ACL) Setup .............................................................................. 207
4.10 Security Setup ........................................................................................................ 211
4.10.1 DHCP Snooping Configuration ........................................................................ 212
4.10.1.1 DHCP Snooping Setup .............................................................................. 212
4.10.1.2 DHCP Option 82 / DHCPv6 Option 37 Setup ............................................ 213
4.10.1.3 DHCP Snooping Table .............................................................................. 215
4.10.2 IP Source Guard Setup .................................................................................... 216
4.10.3 Port Isolation .................................................................................................... 217
4.10.4 Static IPv4/IPv6 Table Setup ............................................................................ 218
4.10.4.1 Configure DHCP Snooping........................................................................ 219
4.10.5 Storm Control ................................................................................................... 220
4.10.6 MAC Limiters ................................................................................................... 221
4.10.7 Loop Detection Configuration .......................................................................... 223
4.10.8 L2 Control Protocol Filter Setup ....................................................................... 225
4.11 802.1X Setup .......................................................................................................... 227
4.11.1 802.1X System Setup ...................................................................................... 227
4.11.2 802.1X Port Setup ............................................................................................ 228
4.11.3 802.1X Port Status ........................................................................................... 230
4.12 LLDP Configuration ................................................................................................ 231
4.12.1 LLDP Setup ...................................................................................................... 231
4.12.2 LLDP Status ..................................................................................................... 232
4.13 Layer 2 Protocol Tunneling Configuration............................................................... 234
4.13.1 Layer 2 Protocol Tunneling Setup .................................................................... 235
9
4.13.2 Layer 2 Protocol Tunneling Status ................................................................... 236
4.14 Maintenance ........................................................................................................... 237
4.14.1 CPU and Memory Statistics ............................................................................. 238
4.14.2 CPU Temperature Status ................................................................................. 239
4.14.3 FAN State ......................................................................................................... 242
4.14.4 System Voltage ................................................................................................ 243
4.14.5 Ping .................................................................................................................. 244
4.14.6 Loopback Test .................................................................................................. 245
4.14.7 Event Log ......................................................................................................... 246
4.14.8 SFP Information ............................................................................................... 246
4.14.8.1 SFP Port Info ............................................................................................. 247
4.14.8.2 SFP Port State .......................................................................................... 248
4.14.9 Digital Input ...................................................................................................... 249
4.14.9.1 Digital Input Configuration ......................................................................... 249
4.14.9.2 Digital Input Status .................................................................................... 250
4.15 Management .......................................................................................................... 250
4.15.1 Management Access Setup ............................................................................. 251
4.15.2 User Authentication .......................................................................................... 253
4.15.2.1 RADIUS/TACACS+ Configuration ............................................................. 255
4.15.3 SNMP .............................................................................................................. 256
4.15.3.1 SNMPv3 USM User ................................................................................... 256
4.15.3.2 Device Community .................................................................................... 259
4.15.3.3 Trap Destination ........................................................................................ 260
4.15.3.4 Trap Setup................................................................................................. 260
4.15.4 Firmware Upgrade ........................................................................................... 262
4.15.4.1 Configuration Backup/Restore via HTTP ................................................... 262
4.15.4.2 Firmware Upgrade via HTTP ..................................................................... 263
4.15.4.3 Configuration Backup/Restore via FTP/TFTP ........................................... 263
4.15.4.4 Firmware Upgrade via FTP/TFTP ............................................................. 264
4.15.5 Load Factory Settings ...................................................................................... 265
4.15.6 Auto-Backup Setup .......................................................................................... 265
4.15.7 Save Configuration .......................................................................................... 267
4.15.8 Reset System................................................................................................... 267
APPENDIX A: Free RADIUS readme ............................................................................... 269
APPENDIX B: Set Up DHCP Auto-Provisioning ............................................................. 270
APPENDIX C: VLAN Application Note ............................................................................ 278
APPENDIX D: SFP/SFP+ Port Threshold ....................................................................... 298
10
1. INTRODUCTION
Thank you for using the 48 100/1000Base-X SFP ports plus 4 1G/10GBase-R SFP+ uplink ports
Managed Switch that is specifically designed for FTTx applications. The Managed Switch provides
a built-in management module that enables users to configure and monitor the operational status
both locally and remotely. This user’s manual will explain how to use command-line interface and
web management to configure your Managed Switch. The readers of this manual should have
knowledge about their network typologies and about basic networking concepts so as to make the
best of this user’s manual and maximize the Managed Switch’s performance for your personalized
networking environment.
1.1 Management Options
Switch management options available are listed below:
Local Console Management
Telnet Management
SNMP Management
WEB Management
SSH Management
Local Console Management
Local Console Management is done through the RS-232 RJ-45 Console port located on the front
panel of the Managed Switch. Direct RS-232 cable connection between the PC and the Managed
switch is required for this type of management.
Telnet Management
Telnet runs over TCP/IP and allows you to establish a management session through the network.
Once the Managed switch is on the network with proper IP configurations, you can use Telnet to
login and monitor its status remotely.
SNMP Management
SNMP is also done over the network. Apart from standard MIB (Management Information Bases),
an additional private MIB is also provided for SNMP-based network management system to
compile and control.
Web Management
Web Management is done over the network and can be accessed via a standard web browser,
such as Microsoft Internet Explorer. Once the Managed Switch is available on the network, you
can login and monitor the status of it through a web browser remotely or locally. Web management
in the local site, especially for the first time use of the Managed Switch to set up the needed IP,
can be done through one of the SFP/SFP+ ports located on the front panel of the Managed Switch.
A converter and direct RJ-45 LAN cable connection between a PC and the Managed Switch are
required for Web Management.
11
SSH Management
SSH Management supports encrypted data transfer to prevent the data from being stolen for
remote management. You can use PuTTY, a free and open source terminal emulator application
which can act as a client for the SSH, to gain access to the Managed Switch.
12
1.2 Management Software
The following is a list of management software options provided by this Managed Switch:
Managed Switch CLI interface
SNMP-based Management Software
Web Browser Application
Console Program
The Managed Switch has a built-in Command Line Interface called the CLI which you can use to:
Configure the system
Monitor the status
Reset the system
You can use CLI as the only management system. However, other network management options,
SNMP-based management system, are also available.
You can access the text-mode Console Program locally by connecting a VT-100 terminal - or a
workstation running VT100 emulation software - to the Managed Switch RS-232 RJ-45 Console
port directly. Or, you can use Telnet to login and access the CLI through network connection
remotely.
SNMP Management System
Standard SNMP-based network management system is used to manage the Managed Switch
through the network remotely. When you use a SNMP-based network management system, the
Managed Switch becomes one of the managed devices (network elements) in that system. The
Managed Switch management module contains an SNMP agent that will respond to the requests
from the SNMP-based network management system. These requests, which you can control, can
vary from getting system information to setting the device attribute values.
The Managed Switch’s private MIB is provided for you to be installed in your SNMP-based
network management system.
Web Browser Application
You can manage the Managed Switch through a web browser, such as Internet Explorer or
Google Chrome, etc.. (The default IP address of the Managed Switch port can be reached at
http://192.168.0.1”.) For your convenience, you can use either this Web-based Management
Browser Application program or other network management options, for example SNMP-based
management system as your management system.
13
1.3 Management Preparations
After you have decided how to manage your Managed Switch, you are required to connect cables
properly, determine the Managed switch IP address and, in some cases, install MIB shipped with
your Managed Switch.
Connecting the Managed Switch
It is very important that the proper cables with the correct pin arrangement are used when
connecting the Managed switch to other switches, hubs, workstations, etc..
1000Base-X/100Base-FX SFP Port, 1G/10GBase-R SFP+ Port
The small form-factor pluggable (SFP) or the enhanced small form-factor pluggable (SFP+)
transceiver is a compact optical transceiver used in optical data communication applications.
It interfaces a network device mother board (for a switch, router or similar device) to a fiber
optic or unshielded twisted pair networking cable. It is a popular industry format supported by
several fiber optic component vendors. SFP+ transceiver can bring speeds up to 10 Gbit/s.
SFP/SFP+ transceivers are available with a variety of different transmitter and receiver types,
allowing users to select the appropriate transceiver for each link to provide the required
optical reach over the available optical fiber type.
SFP/SFP+ slot supports hot swappable SFP/SFP+ fiber transceiver. Before connecting the
other switches, workstation or Media Converter, make sure both side of the SFP/SFP+
transfer are with the same media type, for example, 1000Base-SX to 1000Base-SX,
1000Base-LX to 1000Base-LX, 10GBASE-LR to 10GBASE-LR, and check the fiber-optic
cable type matches the SFP/SFP+ transfer model. To connect to 1000Base-SX transceiver,
use the multi-mode fiber cable with male duplex LC connector type for one side. To connect
to 1000Base-LX transfer, use the single-mode fiber cable with male duplex LC connector type
for one side.
RS-232 RJ-45 Port (Console Port)
The RS-232 RJ-45 port is located at the front of the Managed Switch. This RJ-45 port is used
for local, out-of-band management. Since this RJ-45 port of the Managed switch is DTE, a
null modem is also required to be connected to the Managed Switch and the PC. By
connecting this RJ-45 port, it allows you to configure & check the status of Managed Switch
even when the network is down.
14
IP Addresses
IP addresses have the format n.n.n.n, (The default factory setting is 192.168.0.1).
IP addresses are made up of two parts:
The first part (for example 192.168.n.n) refers to network address that identifies the network
where the device resides. Network addresses are assigned by three allocation organizations.
Depending on your location, each allocation organization assigns a globally unique network
number to each network which intends to connect to the Internet.
The second part (for example n.n.0.1) identifies the device within the network.
Assigning unique device numbers is your responsibility. If you are unsure of the IP addresses
allocated to you, consult with the allocation organization where your IP addresses were
obtained.
Remember that an address can be assigned to only one device on a network. If you connect to
the outside network, you must change all the arbitrary IP addresses to comply with those you have
been allocated by the allocation organization. If you do not do this, your outside communications
will not be performed.
A subnet mask is a filtering system for IP addresses. It allows you to further subdivide your
network. You must use the proper subnet mask for the proper operation of a network with subnets
defined.
MIB for Network Management Systems
Private MIB (Management Information Bases) is provided for managing the Managed Switch
through the SNMP-based network management system. You must install the private MIB into
your SNMP-based network management system first.
The MIB file is shipped together with the Managed Switch. The file name extension is .mib that
allows SNMP-based compiler can read and compile.
15
2. Command Line Interface (CLI)
This chapter introduces you how to use Command Line Interface CLI, specifically in:
Local Console
Telnet
Configuring the system
Resetting the system
The interface and options in Local Console and Telnet are the same. The major difference is the
type of connection and the port that is used to manage the Managed Switch.
2.1 Using the Local Console
Local Console is always done through the RS-232 RJ-45 port and requires a direct connection
between the switch and a PC. This type of management is useful especially when the network is
down and the switch cannot be reached by any other means.
You also need the Local Console Management to setup the Switch network configuration for the
first time. You can setup the IP address and change the default configuration to the desired
settings to enable Telnet or SNMP services.
Follow these steps to begin a management session using Local Console Management:
Step 1. Attach the serial cable to the RS-232 RJ-45 port located at the front of the Switch.
Step 2. Attach the other end to the serial port of a PC or workstation.
Step 3. Run a terminal emulation program using the following settings:
Emulation VT-100/ANSI compatible
BPS 9600
Data bits 8
Parity None
Stop bits 1
Flow Control None
Enable Terminal keys
Step 4. Press Enter to access the CLI (Command Line Interface) mode.
16
2.2 Remote Console Management - Telnet
You can manage the Managed Switch via Telnet session. However, you must first assign a unique
IP address to the Switch before doing so. Use the Local Console to login the Managed Switch
and assign the IP address for the first time.
Follow these steps to manage the Managed Switch through Telnet session:
Step 1. Use Local Console to assign an IP address to the Managed Switch
IP address
Subnet Mask
Default gateway IP address, if required
Step 2. Run Telnet
Step 3. Log into the Switch CLI
Limitations: When using Telnet, keep the following in mind:
Only 5 active Telnet sessions can access the Managed Switch at the same time.
2.3 Navigating CLI
When you successfully access the Managed Switch, you will be asked for a login username. Enter
your authorized username and password, and then you will be directed to User mode. In CLI
management, the User mode only provides users with basic functions to operate the Managed
Switch. If you would like to configure advanced features of the Managed Switch, such as, VLAN,
QoS, Rate limit control, you must enter the Configuration mode. The following table provides an
overview of modes available in this Managed Switch.
Command Mode
Access Method
Prompt Displayed
Exit Method
User mode
Login username &
password
Switch>
logout, exit
Privileged mode
From User mode, enter
the enable command
Switch#
disable, exit, logout
Configuration
mode
From Privileged mode,
enter the config or
configure command
Switch(config)#
exit, Ctrl + Z
NOTE: By default, the model name will be used for the prompt display. You can change
the prompt display to the one that is ideal for your network environment using the
hostname command. However, for convenience, the prompt display Switchwill be used
throughout this users manual.
17
2.3.1 General Commands
This section introduces you some general commands that you can use in User, Privileged, and
Configuration modes, including “help”, “exit”, “history” and “logout”.
Entering the command…
To do this…
Available Modes
help
Obtain a list of available
commands in the current mode.
User Mode
Privileged Mode
Configuration Mode
exit
Return to the previous mode or
login screen.
User Mode
Privileged Mode
Configuration Mode
history
List all commands that have been
used.
User Mode
Privileged Mode
Configuration Mode
logout
Logout from the CLI or terminate
Console or Telnet session.
User Mode
Privileged Mode
2.3.2 Quick Keys
In CLI, there are several quick keys that you can use to perform several functions. The following
table summarizes the most frequently used quick keys in CLI.
Keys
Purpose
tab
Enter an unfinished command and press Tab key to complete the
command.
?
Press ? key in each mode to get available commands.
Unfinished
command
followed by ?
Enter an unfinished command or keyword and press ? key to complete
the command and get command syntax help.
Example: List all available commands starting with the characters that
you enter.
Switch#h?
help Show available commands
history Show history commands
A space
followed by ?
Enter a command and then press Spacebar followed by a ? key to view
the next parameter.
Up arrow
Use Up arrow key to scroll through the previous entered commands,
beginning with the most recent key-in commands.
Down arrow
Use Down arrow key to scroll through the previous entered commands,
beginning with the commands that are entered first.
18
2.3.3 Command Format
While in CLI, you will see several symbols very often. As mentioned above, you might already
know what >, # and (config)# represent. However, to perform what you intend the device to do,
you have to enter a string of complete command correctly. For example, if you want to assign IP
address for the Managed Switch, you need to enter the following command with the required
parameter and IP, subnet mask and default gateway:
IP command syntax: Switch(config)#ip address [A.B.C.D] [255.X.X.X] [A.B.C.D]
Switch(config)#ip address 192.168.1.198 255.255.255.255 192.168.1.254
The following table lists common symbols and syntax that you will see very frequently in this
Users Manual for your reference:
Symbols
Brief Description
>
Currently, the device is in User mode.
#
Currently, the device is in Privileged mode.
(config)#
Currently, the device is in Global
Configuration mode.
Syntax
Brief Description
[ ]
Reference parameter.
[-s size] [-r repeat] [-t timeout]
These three parameters are used in ping
command and are optional, which means
that you can ignore these three parameters
if they are unnecessary when executing
ping command.
[A.B.C.D ]
Brackets represent that this is a required
field. Enter an IP address or gateway
address.
[255.X.X.X]
Brackets represent that this is a required
field. Enter the subnet mask.
[port]
Enter one port number. See Section 2.6.29
for detailed explanations.
[port_list]
Enter a range of port numbers or several
discontinuous port numbers. See Section
2.6.29 for detailed explanations.
[forced_true | forced_false | auto]
There are three options that you can
choose. Specify one of them.
[1-8191]
Specify a value between 1 and 8191.
[0-7] 802.1p_list
[0-63] dscp_list
Specify one value, more than one value or a
range of values.
Example 1: specifying one value
Switch(config)#qos 802.1p-map 1 0
Switch(config)#qos dscp-map 10 3
This means that
you are in Global
Configuration
mode
This allows you to
assign IP address.
Enter the IP address, subnet mask, and
default gateway address.
Hostname
19
Example 2: specifying three values
(separated by commas)
Switch(config)#qos 802.1p-map 1,3 0
Switch(config)#qos dscp-map 10,13,15 3
Example 3: specifying a range of values
(separated by a hyphen)
Switch(config)#qos 802.1p-map 1-3 0
Switch(config)#qos dscp-map 10-15 3
2.3.4 Login Username & Password
Default Login
When you enter Console session, a login prompt for username and password will appear to
request a valid and authorized username and password combination. For first-time users, enter
the default login username admin and press Enter key in password field (no password is
required for default setting). When system prompt shows Switch>”, it means that the user has
successfully entered the User mode.
For security reasons, it is strongly recommended that you add a new login username and
password using User command in Configuration mode. When you create your own login
username and password, you can delete the default username (admin) to prevent unauthorized
accesses.
Privileged Mode Password
Privileged mode is password-protected. When you try to enter Privileged mode, a password
prompt will appear to request the user to provide the legitimate passwords. Privileged mode
password is the same as the one entered after login password prompt. By default, no password is
required. Therefore, press Enter key in password prompt.
Forgot Your Login Username & Password
If you forgot your login username and password, you can use the “reset button” on the front panel
to set all configurations back to factory defaults. Once you have performed system reset to
defaults, you can login with default username and password. Please note that if you use this
method to gain access to the Managed Switch, all configurations saved in Flash will be lost. It is
strongly recommended that a copy of configurations is backed up in your local hard-drive or file
server from time to time so that previously-configured settings can be reloaded to the Managed
Switch for use when you gain access again to the device.
20
2.4 User Mode
In User mode, only a limited set of commands are provided. Please note that in User mode, you
have no authority to configure advanced settings. You need to enter Privileged mode and
Configuration mode to set up advanced functions of the Switch. For a list of commands available
in User mode, enter the question mark (?) or help command after the system prompt displays
Switch>.
Command
Description
exit
Quit the User mode or close the terminal connection.
help
Display a list of available commands in User mode.
history
Display the command history.
logout
Logout from the Managed Switch.
loopback
Test whether the connectivity of the networking cable between devices works
normally or not.
ping
Test whether a specified network device or host is reachable or not.
traceroute
Trace the route to HOST
enable
Enter the Privileged mode.
2.4.1 Loopback Command
Loopback is used to test the networking cable connectivity between devices. Enter the loopback
command in User mode. In this command, you need to specify the diagnostic port, accompany
port, VLAN ID and the time value for the loopback test.
Command
Parameter
Description
Switch> loopback
diagnostic
[port_number]
accompany
[port_number] vid
[1-4094] time [1-10]
[port_number]
Specify the diagnostic port for the loopback test.
[port_number]
Specify the accompany port for the loopback test.
[1-4094]
Specify the VLAN ID.
[1-10]
Configure the loopback test time in miniutes.
Example of Loopback Test
Switch> loopback diagnostic 1
accompany 2 vid 300 time 3
Configure Port 1 as the diagnostic port, Port 2 as
the accompany port, VLAN ID as 300 for the
loopback test that will last for 3 miniutes.
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244
  • Page 245 245
  • Page 246 246
  • Page 247 247
  • Page 248 248
  • Page 249 249
  • Page 250 250
  • Page 251 251
  • Page 252 252
  • Page 253 253
  • Page 254 254
  • Page 255 255
  • Page 256 256
  • Page 257 257
  • Page 258 258
  • Page 259 259
  • Page 260 260
  • Page 261 261
  • Page 262 262
  • Page 263 263
  • Page 264 264
  • Page 265 265
  • Page 266 266
  • Page 267 267
  • Page 268 268
  • Page 269 269
  • Page 270 270
  • Page 271 271
  • Page 272 272
  • Page 273 273
  • Page 274 274
  • Page 275 275
  • Page 276 276
  • Page 277 277
  • Page 278 278
  • Page 279 279
  • Page 280 280
  • Page 281 281
  • Page 282 282
  • Page 283 283
  • Page 284 284
  • Page 285 285
  • Page 286 286
  • Page 287 287
  • Page 288 288
  • Page 289 289
  • Page 290 290
  • Page 291 291
  • Page 292 292
  • Page 293 293
  • Page 294 294
  • Page 295 295
  • Page 296 296
  • Page 297 297
  • Page 298 298
  • Page 299 299
  • Page 300 300
  • Page 301 301
  • Page 302 302
  • Page 303 303
  • Page 304 304
  • Page 305 305
  • Page 306 306
  • Page 307 307

CTS FOS-5152 User manual

Type
User manual

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI