Support

What Is CLI of Huawei Switch and Comparison between CLI login methods

You can manage a Huawei switch through the command-line interface (CLI) or web system.

Command Line Interface (CLI) is one of the most prevailing configuration methods to manage network devices, after logging in to the CLI of a switch through a console port, mini USB port, Telnet, or STelnet, you can run the commands provided by the switch to manage and configure the switch. Typically, a user interface is required for each access method. Before using the CLI, configure a user page for the corresponding login mode.

For web system, the internal web server of a switch provides a GUI, on which you can easily manage and maintain the switch after login. The web system provides only basic maintenance and management functions. You still need to use the CLI to implement fine-grained management.

The device has many functions; therefore various configuration commands and query commands are provided to facilitate device management and maintenance. Huawei switch registers commands to different command views based on the functions of the commands so that users can easily use them. To configure a function, enter the corresponding command view and then run corresponding commands.

Common Command Views

Name How To Enter Function
User view When a user logs in to the device, the user enters the user view and the following prompt is displayed:

<HUAWEI>

In the user view, you can view the running status and statistics of the device.
System view Run the system-view command and press Enter in the user view. The system view is displayed.

<HUAWEI> system-view

Enter system view, return user view with Ctrl+Z.

[HUAWEI]

In the system view, you can set the system parameters of the device, and enter other function views from this view.
Interface view Run the interface command and specify an interface type and number to enter the interface view.

[HUAWEI] interface gigabitethernet X/Y/Z

[HUAWEI-GigabitEthernetX/Y/Z]

X/Y/Z indicates the number of an interface that needs to be specified. It is in the format of stack ID/card number/interface sequence number.

The interface GigabitEthernet is used as an example.

You can configure interface parameters in the interface view. Interface parameters include physical attributes, link layer protocols, and IP addresses.

Comparison between CLI login methods:

Login Method Advantage Disadvantage Applicable Scenario Description
Login Through the Console Port A dedicated console cable is used for effective device control. You cannot remotely log in to a switch to maintain it. ·         You need to configure a switch that is powered on for the first time.

·         You cannot remotely log in to a switch.

·         A switch fails to start and you need to enter the BootROM menu to diagnose the fault or upgrade the switch.

Console port login is the basis for other login methods.

By default, you can log in to a switch through the console port and have the user level of 15 after login.

Login Through a Mini USB Port Use a Mini USB cable to connect the USB port on the PC to the Mini USB port on the device for effective device control. You cannot remotely log in to a switch to maintain it. You need to configure a switch that is powered on for the first time but no console port is available on your PC. The device connection method for mini USB port login is different from that for console port login but the communication parameters during login and configurations after login are the same.
Login Through Telnet ·         Facilitate remote management and maintenance of switches.

·         You do not need to connect each switch to a terminal, simplifying operations.

Data is transmitted using TCP in plain text, posing potential security risks. You need to configure a switch remotely on a network that does not require high security. By default, you cannot log in to a switch directly using Telnet. Before using Telnet to log in, you must locally log in to the switch through the console port or mini USB port.
Login Through STelnet The Secure Shell (SSH) protocol provides secure remote logins on insecure networks to ensure data integrity and reliability, and secure data transmission.

NOTE:

SSH in this document refers to SSH 2.0 unless otherwise stated.

The configuration is complex. You need to configure a switch remotely on a network that requires high security. STelnet, based on the SSH protocol, provides powerful authentication functions to ensure information security and protect devices against attacks, such as IP spoofing attacks. By default, you cannot log in to a switch directly using STelnet. Before using STelnet to log in, you must locally log in to the switch through the console port or mini USB port or remotely log in using Telnet.

Related Posts