Professional Documents
Culture Documents
AT 8000S
Marvell Confidential
Agenda
AT - 8000S CLI
CLI structure Displaying System Information File Management
AT - 8000S Telnet AT - 8000S Web Server (EWS) AT - 8000S SNMP AT - 8000S Secure Management
Marvell Confidential
Marvell Confidential
AT - 8000S CLI
Marvell Confidential
AT - 8000S CLI
The Command-Line Interface (CLI or LCLI) on the AT 8000S device is used to control and define the devices parameters and configuration. The CLI is hierarchically and modularly structured. This way the user has better control and insight into the various commands and levels of configuration The CLI module is Pyramid shaped in which command interfaces start from the more general configuration/ commands and go down to the more specific ones. To achieve this, the commands are divided into several command blocks (or command modes). Each command mode has its own set of specific commands. The available commands depend on the mode.
Marvell Confidential
Command Modes
Example of command modes: EXEC; Global Configuration; Ethernet interface; Port channel interface; VLAN database etc Example of the mode access sequence:
User EXEC Mode; Privileged EXEC Mode, Global Configuration Mode, Interface Configuration Mode.
Marvell Confidential
Marvell Confidential
Marvell Confidential
Marvell Confidential
Marvell Confidential
Marvell Confidential
CLI do Command
The do command Allows the user to use User EXEC mode from any configuration mode context Useful to check device setting while performing configuration
Marvell Confidential
CLI do Command
console# show vlan tag 2 Vlan Name Ports Type Authorization ---- ----------------- --------------------------- ------------ ------------2 2 permanent Required console# con console(config)# interface ethernet 1/e1 console(config-if)# switchport access vlan 2 console(config-if)# show vlan tag 2
Marvell Confidential
Marvell Confidential
Marvell Confidential
Marvell Confidential
File Management
Marvell Confidential
The Flash
The file system supports dynamic creation and deletion of files. All the files are stored in the device flash memory All access to the flash will be done through the file system interface The flash is divided to two major sections: static and dynamic
Marvell Confidential
Software images
There are two images that stored in the flash memory, the files are called image-1 and image-2. Only one image is used during boot, the user can choose the image that will be used by the command:
Boot system image {number} To check what is the active image use the command: Show bootvar
console# show bootvar Images currently available on the FLASH image-1 active (selected for next boot) image-2 not active
Marvell Confidential
The Flash
The static section includes the booton & boot sectors. This sections is invisible to the file system. However, the boot code will allow the file system to use its resources when decompressing the application image file The dynamic section will include the rest of the flash:
2 image files all other files defined by core module. This section is fully controlled by the file system (syslog, configuration files etc)
Marvell Confidential
Configuration Files
AT - 8000S supports 3 types of configuration files. Running configuration file the active configuration, stored in the RAM. Startup configuration file kept in the flash. Used whenever the system reboots. Backup configuration file.
Factory default configuration - if no configuration file is available upon the system boot, this is the default settings of the system These default setting will not appear when using the show running or show startup commands Marvell Confidential
Use the following EXEC mode command format to copy a file from a source to a destination: copy source-url destination-url The source and destination url parameter can be a valid url or reserved keyword (like boot, image, unit, startup-config, running config etc)
Marvell Confidential
Startup-config
Image
Boot
Marvell Confidential
Keyword Tftp://
Source Source URL (tftp://ip address/filename) for a file on a TFTP network server from which to download (configuration, image or boot file) Examples: #copy tftp://10.1.2.3/saved-config startup-config #copy tftp://10.4.5.6/file.dos image #copy tftp://10.7.8.9/boot.rfb boot Copy a software image or boot-image file from a serial connection that uses the Xmodem protocol Example: #copy xmodem: image URL prefixes
Xmodem
WORD
Marvell Confidential
Startup-config
Marvell Confidential
Keyword Image
Source Copy to the non-active software image file from xmodem or a TFTP server. #copy tftp://10.1.2.3/file.ros image Note when copying to device image in order to run the new image, active image has to be changed (show bootvar and then boot system image-x command) and then system rebooted Copy to the devices BOOT file - Only from TFTP server or xmodem Examples: #copy tftp://10.1.2.3/boot.rfb boot Copy to null destination (do the copy, discard any result) Example: #copy tftp://10.0.1.1 null: Destination URL (tftp://ip address/filename) to upload to a file (config, image or boot) to a TFTP network server Example: #copy image tftp://10.1.2.3/saved-image-file URL prefixes
Boot
Null: Tftp://
WORD
Marvell Confidential
Invalid Combinations
The source file and destination file cannot be the same file. xmodem: cant be a destination. tftp: cant be both source and destination.
Marvell Confidential
Marvell Confidential
Marvell Confidential
! For transfers, an exclamation mark indicates that the copy process is taking place. Each exclamation mark indicates the successful transfer of ten packets (512 bytes each). . For network transfers, a period indicates that the copy process is timed out. Many periods in a row typically mean that the copy process may fail. E An uppercase E indicates an error. The copy process may fail.
Marvell Confidential
Examples
Copying an Image from a Server to Device The following example copies a system image named image-10022.ros from the TFTP server with an IP address of 172.16.101.101 to non active image file. console# copy tftp://172.16.101.101/image-10022.ros image !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!! Copy: XXXXX bytes copied in XX:XX:XX [hh:mm:ss]
Marvell Confidential
Console# show bootvar Images currently available on the FLASH image-1 active (selected for next boot) image-2 not active
Marvell Confidential
Marvell Confidential
Other Commands
To delete the startup-config file, use the following privileged EXEC command: delete startup-config Show commands
show running-config show startup-config
Marvell Confidential
AT - 8000S Telnet
Marvell Confidential
Telnet
The user can connect to the device via telnet and work as if working via the terminal. The user must configure a user name and password in order to be able to connect via telnet To allow full configuration capabilities, level must be set to 15. Level 1 allows only limited device view and configuration.
console> enable console# configure console(config)# username myuser password mypassword level 15 console(config)#
Marvell Confidential
Marvell Confidential
Marvell Confidential
Marvell Confidential
AT - 8000S SNMP
Marvell Confidential
Marvell Confidential
Marvell Confidential
Marvell Confidential
Telnetd
This telnet connection is transmitted in the clear data and passwords are insecure!
23 2023
Client
SSH
Router
SSHd
2023
App
Secure
22
App
Never Trnamitted!
Loopback I/F
Loopback I/F
Never Trnamitted!
Loopback I/F
Network I/F
Network I/F
Client
Router
Loopback I/F
Network I/F
Network I/F
Client
SSH
Router
SSHd
App
Secure
22
App
Telnet
Network I/F Network I/F
Telnetd
23
Loopback I/F
Loopback I/F
SSL/TLS
Not secure
Secure HTTP
HTTP TCP IP
TLS TCP IP
Marvell Confidential
Marvell Confidential