EasyManua.ls Logo

ELTEX MES1000 User Manual

ELTEX MES1000
231 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #46 background imageLoading...
Page #46 background image
46 MES1000, MES2000 Ethernet Switches
port-channel group}] |
name macro-name]
macro-name:
(1..32) characters
Interface configuration mode commands
Command line request in interface configuration mode appears as follows:
console(config-if)#
Table 5.9 Interface configuration mode commands
Command
Action
macro apply word
(1..32) characters
Apply the selected macro.
macro trace word
(1..32) characters
Validate the selected macro.
macro description word
(1..160) characters
Specify macro descriptor string.
no macro description
Delete the descriptor string.
5.5 System management commands
EXEC mode commands
Command line request in EXEC mode appears as follows:
console>
Table 5.10 System management commands in EXEC mode
Command
Value/Default value
Action
ping [ip] {A.B.C.D|host} [size
size]
[count count] [timeout
timeout]
host (1..158) symbols;
size (64..1518)/64 Byte;
count (0..65535)/4;
timeout (50..65535) /2000
ms
This command is used for transmission of ICMP requests (ICMP
Echo-Request) to the specified network node, and for reply
management (ICMP Echo-Reply).
- A.B.C.DIPv4 address of the network node
- hostdomain name of the network node
- sizesize of the packet to be sent, the quantity of bytes in a
packet
- countquantity of packets to be sent
- timeouttimeout of the request
ping ipv6 {A.B.C.D.E.F|host}
[size size]
[count count] [timeout
timeout]
host (1..158) symbols;
size (68..1518)/68 Byte;
count (0..65535)/4;
timeout (50..65535) /2000
ms
This command is used for transmission of ICMP requests (ICMP
Echo-Request) to the specified network node, and for reply
management (ICMP Echo-Reply).
- A.B.C.D.E.FIPv6 address of the network node
- hostdomain name of the network node
- sizesize of the packet to be sent, the quantity of bytes in a
packet
- countquantity of packets to be sent
- timeouttimeout of the request
traceroute ip {A.B.C.D |host}
[size size]
[ttl ttl]
[count count] [timeout
timeout] [source ip_address]
[tos tos]
host (1..158) symbols;
size (64..1518)/64 Byte;
ttl (1..255)/30;
count (1..10)/3;
timeout (1..60) /3 с;
tos(0..255)/0
Detection of the traffic route to the destination node. -
A.B.C.DIPv4 address of the network node
- hostdomain name of the network node
- sizesize of the packet to be sent, the quantity of bytes in a
packet
- ttlmaximum quantity of route portions
- countmaximum quantity of packet transmission attempts
for each portion
- timeouttimeout of the request
- ip_address switch interface IP address, used for packet
transmission
- tostype of service sent in the IP protocol header.
For description of errors, occurring during the
execution of commands, see tables 5.12, 5.13

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the ELTEX MES1000 and is the answer not in the manual?

ELTEX MES1000 Specifications

General IconGeneral
ModelMES1000
LayerL2
VLANNot supported
TypeUnmanaged
Power SupplyExternal 5V DC
Operating Temperature0°C to +40°C
Storage Temperature-40°C to +70°C
Humidity10 to 90% (non-condensing)

Summary

2 PRODUCT DESCRIPTION

2.2 Device Functions

Lists and describes the basic, MAC address processing, and second-layer OSI functions of the switches.

3 INSTALLATION AND CONNECTION

4 DEVICE STARTUP, INITIAL CONFIGURATION

4.3 Configuration procedure

Outlines the necessary information and steps for initial device configuration.

5 DEVICE MANAGEMENT COMMAND LINE INTERFACE

5.2 Basic commands

Lists and describes fundamental commands available in EXEC and Privileged EXEC modes.

5.10 Interface configuration

Covers configuration of Ethernet interfaces, port channels, and VLAN interfaces.

5.27 Security functions

Explains security functions, including port security, port-based authentication (802.1x), DHCP snooping, ARP inspection, and MAC address notification.

5.31 ACL Configuration (Access Control Lists)

Explains Access Control Lists for filtering traffic based on IP, MAC addresses, and TCP/UDP ports.

6 SERVICE MENU, CHANGE OF SOFTWARE

Related product manuals