T1500-28PCT
Smart PoE Switch
1255
COPYRIGHT & TRADEMARKS
Specifications are subject to change without notice. is a registered trademark of
TP-LINK TECHNOLOGIES CO., LTD. Other brands and product names are trademarks or
registered trademarks of their respective holders.
No part of the specifications may be reproduced in any form or by any means or used to make any
derivative such as translation, transformation, or adaptation without permission from TP-LINK
TECHNOLOGIES CO., LTD. Copyright © 2015 TP-LINK TECHNOLOGIES CO., LTD. All rights
reserved.
http://www.tp-link.com
I
CONTENTS
Preface ............................................................................................................................ 1
Chapter 1 Using the CLI .................................................................................................. 3
1.1 Accessing the CLI ........................................................................................................... 3
1.1.1. Logon by Telnet ............................................................................................... 3
1.1.2. Logon by SSH ................................................................................................. 4
1.2 CLI Command Modes ..................................................................................................... 9
1.3 Security Levels ............................................................................................................. 12
1.4 Conventions.................................................................................................................. 12
1.4.1 Format Conventions............................................................................................ 12
1.4.2 Special Characters.............................................................................................. 13
1.4.3 Parameter Format............................................................................................... 13
Chapter 2 User Interface ............................................................................................... 14
enable ................................................................................................................................ 14
service password-encryption............................................................................................... 14
enable password ................................................................................................................ 15
enable secret ...................................................................................................................... 16
disable ................................................................................................................................ 17
configure ............................................................................................................................ 17
exit ..................................................................................................................................... 17
end ..................................................................................................................................... 18
show history ....................................................................................................................... 18
clear history ........................................................................................................................ 19
Chapter 3 IEEE 802.1Q VLAN Commands ................................................................ 20
vlan .................................................................................................................................... 20
interface vlan ...................................................................................................................... 20
name .................................................................................................................................. 21
switchport general allowed vlan .......................................................................................... 21
switchport pvid.................................................................................................................... 22
show vlan summary ............................................................................................................ 22
show vlan brief.................................................................................................................... 23
show vlan ........................................................................................................................... 23
show interface switchport.................................................................................................... 24
Chapter 4 Voice VLAN Commands ............................................................................. 25
II
voice vlan ........................................................................................................................... 25
voice vlan aging time .......................................................................................................... 25
voice vlan priority ................................................................................................................ 26
voice vlan mac-address ...................................................................................................... 27
switchport voice vlan mode ................................................................................................. 27
switchport voice vlan security.............................................................................................. 28
show voice vlan .................................................................................................................. 28
show voice vlan oui............................................................................................................. 29
show voice vlan switchport ................................................................................................. 29
Chapter 5 Etherchannel Commands .......................................................................... 31
channel-group .................................................................................................................... 31
port-channel load-balance .................................................................................................. 32
lacp system-priority............................................................................................................. 32
lacp port-priority .................................................................................................................. 33
show etherchannel ............................................................................................................. 33
show etherchannel load-balance ........................................................................................ 34
show lacp ........................................................................................................................... 34
show lacp sys-id ................................................................................................................. 35
Chapter 6 User Management Commands................................................................. 36
user name (password) ........................................................................................................ 36
user name (secret) ............................................................................................................. 37
user access-control ip-based .............................................................................................. 38
user access-control mac-based .......................................................................................... 39
user access-control port-based ........................................................................................... 39
user max-number ............................................................................................................... 40
user idle-timeout ................................................................................................................. 41
show user account-list ........................................................................................................ 41
show user configuration ...................................................................................................... 42
Chapter 7 System Log Commands............................................................................. 43
logging buffer...................................................................................................................... 43
logging file flash .................................................................................................................. 44
logging file flash frequency ................................................................................................. 44
logging file flash level.......................................................................................................... 45
logging host index............................................................................................................... 45
clear logging ....................................................................................................................... 46
show logging local-config.................................................................................................... 47
III
show logging loghost .......................................................................................................... 47
show logging buffer............................................................................................................. 48
show logging flash .............................................................................................................. 48
Chapter 8 SSH Commands ........................................................................................... 50
ip ssh server ....................................................................................................................... 50
ip ssh version ..................................................................................................................... 50
ip ssh timeout ..................................................................................................................... 51
ip ssh max-client ................................................................................................................. 51
ip ssh download .................................................................................................................. 52
show ip ssh......................................................................................................................... 52
Chapter 9 SSL Commands............................................................................................ 54
ip http secure-server ........................................................................................................... 54
ip http secure-server download certificate ........................................................................... 54
ip http secure-server download key..................................................................................... 55
show ip http secure-server .................................................................................................. 56
Chapter 10 MAC Address Commands ......................................................................... 57
mac address-table static ..................................................................................................... 57
mac address-table aging-time ............................................................................................. 58
mac address-table filtering .................................................................................................. 58
mac address-table max-mac-count ..................................................................................... 59
show mac address-table ..................................................................................................... 60
show mac address-table aging-time.................................................................................... 60
show mac address-table max-mac-count interface ............................................................. 61
show mac address-table interface....................................................................................... 61
show mac address-table count ........................................................................................... 62
show mac address-table address........................................................................................ 62
show mac address-table vlan.............................................................................................. 63
Chapter 11 System Commands ..................................................................................... 64
system-time manual............................................................................................................ 64
system-time ntp .................................................................................................................. 64
system-time dst predefined ................................................................................................. 66
system-time dst date........................................................................................................... 67
system-time dst recurring.................................................................................................... 68
hostname ........................................................................................................................... 69
location ............................................................................................................................... 69
IV
contact-info ......................................................................................................................... 70
ip management-vlan ........................................................................................................... 70
ip address........................................................................................................................... 71
ip address-alloc dhcp .......................................................................................................... 71
ip address-alloc bootp......................................................................................................... 72
reset ................................................................................................................................... 72
reboot ................................................................................................................................. 73
copy running-config startup-config ...................................................................................... 73
copy startup-config tftp........................................................................................................ 74
copy tftp startup-config........................................................................................................ 74
firmware upgrade................................................................................................................ 75
ping .................................................................................................................................... 75
tracert ................................................................................................................................. 76
loopback interface .............................................................................................................. 77
show system-info ................................................................................................................ 77
show running-config............................................................................................................ 78
show system-time ............................................................................................................... 78
show system-time dst ......................................................................................................... 78
show system-time ntp ......................................................................................................... 79
show cable-diagnostics interface ........................................................................................ 79
Chapter 12 Ethernet Configuration Commands........................................................ 81
interface fastEthernet.......................................................................................................... 81
interface range fastEthernet................................................................................................ 81
interface gigabitEthernet ..................................................................................................... 82
interface range gigabitEthernet ........................................................................................... 82
description .......................................................................................................................... 83
shutdown ............................................................................................................................ 84
flow-control ......................................................................................................................... 84
media-type.......................................................................................................................... 85
duplex................................................................................................................................. 85
speed ................................................................................................................................. 86
storm-control broadcast ...................................................................................................... 86
storm-control multicast........................................................................................................ 87
storm-control unicast .......................................................................................................... 88
bandwidth ........................................................................................................................... 88
clear counters ..................................................................................................................... 89
show interface status .......................................................................................................... 89
V
show interface counters ...................................................................................................... 90
show interface description .................................................................................................. 90
show interface flowcontrol................................................................................................... 91
show interface configuration ............................................................................................... 91
show storm-control ............................................................................................................. 92
show bandwidth .................................................................................................................. 92
Chapter 13 QoS Commands ........................................................................................... 94
qos ..................................................................................................................................... 94
qos cos ............................................................................................................................... 94
qos dscp ............................................................................................................................. 95
qos queue cos-map ............................................................................................................ 96
qos queue dscp-map .......................................................................................................... 96
qos queue mode ................................................................................................................. 97
show qos interface.............................................................................................................. 98
show qos cos-map.............................................................................................................. 99
show qos dscp-map............................................................................................................ 99
show qos queue mode...................................................................................................... 100
show qos status ................................................................................................................ 100
Chapter 14 Port Mirror Commands.............................................................................101
monitor session destination interface ................................................................................ 101
monitor session source interface ...................................................................................... 102
show monitor session ....................................................................................................... 103
Chapter 15 Port Isolation Commands........................................................................104
port isolation ..................................................................................................................... 104
show port isolation interface ............................................................................................. 104
Chapter 16 Loopback Detection Commands ...........................................................106
loopback-detection(global) ................................................................................................ 106
loopback-detection interval ............................................................................................... 106
loopback-detection recovery-time ..................................................................................... 107
loopback-detection(interface)............................................................................................ 107
loopback-detection config ................................................................................................. 108
loopback-detection recover ............................................................................................... 109
show loopback-detection global ........................................................................................ 109
show loopback-detection interface .....................................................................................110
Chapter 17 ACL Commands ......................................................................................... 111
VI
access-list create ............................................................................................................... 111
mac access-list .................................................................................................................. 111
access-list standard ...........................................................................................................112
access-list extended ..........................................................................................................113
access-list combined .........................................................................................................114
rule ....................................................................................................................................115
access-list policy name ......................................................................................................116
access-list policy action .....................................................................................................116
access-list bind(interface) ..................................................................................................11 7
access-list bind(vlan) .........................................................................................................118
show access-list ................................................................................................................118
show access-list policy ......................................................................................................119
show access-list bind .........................................................................................................119
Chapter 18 DHCP Filtering Commands .....................................................................120
ip dhcp filtering ................................................................................................................. 120
ip dhcp filtering trust.......................................................................................................... 120
show ip dhcp filtering ........................................................................................................ 121
show ip dhcp filtering interface .......................................................................................... 121
Chapter 19 PoE Commands .........................................................................................122
power inline consumption (global)..................................................................................... 122
power profile ..................................................................................................................... 122
power time-range.............................................................................................................. 123
power holiday ................................................................................................................... 124
absolute............................................................................................................................ 125
periodic............................................................................................................................. 125
holiday .............................................................................................................................. 126
power inline consumption (interface)................................................................................. 127
power inline priority........................................................................................................... 127
power inline supply ........................................................................................................... 128
power inline profile............................................................................................................ 128
power inline time-range .................................................................................................... 129
show power inline ............................................................................................................. 130
show power inline configuration interface.......................................................................... 130
show power inline information interface ............................................................................ 130
show power profile............................................................................................................ 131
show power holiday .......................................................................................................... 131
VII
show power time-range .................................................................................................... 132
Chapter 20 MSTP Commands ......................................................................................133
spanning-tree(global) ........................................................................................................ 133
spanning-tree(interface).................................................................................................... 133
spanning-tree common-config........................................................................................... 134
spanning-tree mode .......................................................................................................... 135
spanning-tree mst configuration ........................................................................................ 136
instance ............................................................................................................................ 136
name ................................................................................................................................ 137
revision ............................................................................................................................. 137
spanning-tree mst instance ............................................................................................... 138
spanning-tree mst ............................................................................................................. 138
spanning-tree priority ........................................................................................................ 139
spanning-tree tc-defend .................................................................................................... 140
spanning-tree timer ........................................................................................................... 140
spanning-tree hold-count .................................................................................................. 141
spanning-tree max-hops ................................................................................................... 142
spanning-tree bpdufilter .................................................................................................... 142
spanning-tree bpduguard .................................................................................................. 143
spanning-tree guard loop .................................................................................................. 143
spanning-tree guard root................................................................................................... 144
spanning-tree guard tc ...................................................................................................... 144
spanning-tree mcheck ...................................................................................................... 145
show spanning-tree active ................................................................................................ 146
show spanning-tree bridge................................................................................................ 146
show spanning-tree interface ............................................................................................ 146
show spanning-tree interface-security............................................................................... 147
show spanning-tree mst.................................................................................................... 148
Chapter 21 IGMP Commands .......................................................................................149
ip igmp snooping(global)................................................................................................... 149
ip igmp snooping(interface)............................................................................................... 149
ip igmp snooping immediate-leave.................................................................................... 150
ip igmp snooping drop-unknown ....................................................................................... 150
ip igmp snooping vlan-config ............................................................................................ 151
ip igmp snooping multi-vlan-config .................................................................................... 152
ip igmp snooping filter add-id ............................................................................................ 153
VIII
ip igmp snooping filter(global) ........................................................................................... 154
ip igmp snooping filter(interface) ....................................................................................... 154
ip igmp snooping filter maxgroup ...................................................................................... 155
ip igmp snooping filter mode ............................................................................................. 156
show ip igmp snooping ..................................................................................................... 156
show ip igmp snooping interface ....................................................................................... 157
show ip igmp snooping vlan .............................................................................................. 157
show ip igmp snooping multi-vlan ..................................................................................... 158
show ip igmp snooping groups.......................................................................................... 158
show ip igmp snooping filter.............................................................................................. 159
Chapter 22 SNMP Commands......................................................................................161
snmp-server ..................................................................................................................... 161
snmp-server view ............................................................................................................. 161
snmp-server group ........................................................................................................... 162
snmp-server user.............................................................................................................. 163
snmp-server community.................................................................................................... 165
snmp-server host .............................................................................................................. 165
snmp-server engineID ...................................................................................................... 167
snmp-server traps snmp ................................................................................................... 168
snmp-server traps............................................................................................................. 168
snmp-server traps power .................................................................................................. 169
snmp-server traps mac ..................................................................................................... 170
snmp-server traps vlan ..................................................................................................... 171
rmon history...................................................................................................................... 172
rmon event ....................................................................................................................... 173
rmon alarm ....................................................................................................................... 174
show snmp-server ............................................................................................................ 175
show snmp-server view .................................................................................................... 176
show snmp-server group .................................................................................................. 176
show snmp-server user .................................................................................................... 176
show snmp-server community .......................................................................................... 177
show snmp-server host..................................................................................................... 177
show snmp-server engineID ............................................................................................. 177
show rmon history ............................................................................................................ 178
show rmon event .............................................................................................................. 178
show rmon alarm .............................................................................................................. 179
Chapter 23 LLDP Commands .......................................................................................180
IX
lldp ................................................................................................................................... 180
lldp hold-multiplier............................................................................................................. 180
lldp timer........................................................................................................................... 181
lldp med-fast-count ........................................................................................................... 182
lldp receive ....................................................................................................................... 182
lldp transmit ...................................................................................................................... 183
lldp snmp-trap................................................................................................................... 183
lldp tlv-select..................................................................................................................... 184
lldp med-location .............................................................................................................. 185
lldp med-status ................................................................................................................. 185
lldp med-tlv-select............................................................................................................. 186
show lldp .......................................................................................................................... 187
show lldp interface ............................................................................................................ 187
show lldp local-information interface ................................................................................. 188
show lldp neighbor-information interface ........................................................................... 188
show lldp traffic interface .................................................................................................. 189
X
Preface
This Guide is intended for network administrator to provide referenced information about CLI
(Command Line Interface). The device mentioned in this Guide stands for T1500-28PCT Smart
PoE Swit c h.
Overview of this Guide
Chapter 1: Using the CLI
Provide information about how to use the CLI, CLI Command Modes, Security Levels and some
Conventions.
Chapter 2: User Interface
Provide information about the commands used to switch between five CLI Command Modes.
Chapter 3: IEEE 802.1Q VLAN Commands
Provide information about the commands used for configuring IEEE 802.1Q VLAN.
Chapter 4: Voice VLAN Commands
Provide information about the commands used for configuring Voice VLAN.
Chapter 5: EtherChannel Commands
Provide information about the commands used for configuring LAG (Link Aggregation Group) and
LACP (Link Aggregation Control Protocol)..
Chapter 6: User M anage Commands
Provide information about the commands used for user management.
Chapter 7: Syste m Log Commands
Provide information about the commands used for configuring system log.
Chapter 8: SSH Commands
Provide information about the commands used for configuring and managing SSH (Security
Shell).
Chapter 9: SSL Commands
Provide information about the commands used for configuring and managing SSL (Secure
Sockets Layer).
Chapter 10: M AC Address Commands
Provide information about the commands used for Address configuration.
Chapter 11: Syste m Commands
Provide information about the commands used for configuring the System information and System
IP, reboot and reset the switch, upgrade the switch system and other operations.
1
Chapter 12: Ethe r net Configuration Commands
Provide information about the commands used for configuring the Bandwidth Control, Negotiation
Mode, and Storm Control for Ethernet ports.
Chapter 13: QoS Commands
Provide information about the commands used for configuring the QoS function.
Chapter 14: Port Mirror Commands
Provide information about the commands used for configuring the Port Mirror function.
Chapter 15: Port Isolation Commands
Provide information about the commands used for configuring the Port Isolation function.
Chapter 16: Loopback Detection Commands
Provide information about the commands used for configuring the Loopback Detection function.
Chapte r 17: ACL Commands
Provide information about the commands used for configuring the ACL (Access Control List).
Chapter 18: DHCP Filtering Commands
Provide information about the commands used for configuring the DHCP Filtering function.
Chapter 19: PoE Commands
Provide information about the commands used for configuring PoE function.
Chapter 20: MSTP Commands
Provide information about the commands used for configuring the MSTP (Multiple Spanning Tree
Protocol).
Chapter 21: IGMP Commands
Provide information about the commands used for configuring the IGMP Snooping (Internet Group
Management Protocol Snooping).
Chapter 22: SNMP Commands
Provide information about the commands used for configuring the SNMP (Simple Network
Management Protocol) functions.
Chapter 23: LLDP Commands
Provide information about the commands used for configuring LLDP function.
2
Chapter 1 Using the CLI
1.1 Accessing the CLI
You can log on to the switch and access the CLI by logging on to the switch remotely by a Telnet or
SSH connection through an Ethernet port.
1.1.1. Logon by Telnet
To log on to the switch by a Telnet connection, please take the following steps:
1. Click Start and type in cmd in the Search programs and files window and press the Ente r
button.
Figure 1-1 Run Window
2. Type in telnet 192.168.0.1 in the prompt cmd window and press Enter.
Figure 1-2 Type in the telnet command
3
3. Type in the User name and Password (the factory default value for both of them are admin)
and press the Ente r button to enter User EXEC Mode , which is shown as Figure 1-3.
Figure 1-3 Log in the Switch
4. Type in enable command to enter Privileged EXEC Mode.
Figure 1-4 Enter into Priviledged EXEC Mode
1.1.2. Logon by SSH
To log on by SSH, a Putty client software is recommended. There are two authentication modes to
set up an SSH connection:
Password Authentication Mode : It requires username and password, which are both admin by
default.
Ke y Authe ntication M ode : It requires a public key for the switch and a private key for the SSH
client software. You can generate the public key and the private key through Putty Key Generator.
Note:
Before SSH login, please follow the steps shown in Figure 1-4 to enable the SSH function through
Telnet connection.
4
Figure 1-5 Enable SSH function
Password Authentication Mode
1. Open the software to log on to the interface of PuTTY. Enter the IP address of the switch into
Host Name field; keep the default value 22 in the Port field; select SSH as the Connection
type.
Figure 1-6 SSH Connection Config
2. Click the Open button in the above figure to log on to the switch. Enter the login user name
and password to log on the switch, and then enter enable to enter Privileged EXEC Mode, so
you can continue to configure the switch.
5
Figure 1-7 Log on the Switch
Key Authentication Mod e
1. Select the key type and key length, and generate SSH key.
Figure 1-8 Generate SSH Key
Note:
1. The key length is in the range of 512 to 3072 bits.
2. During the key generation, randomly moving the mouse quickly can accelerate the key
generation.
6
2. After the key is successfully generated, please save the public key and private key to a TFTP
server.
Figure 1-9 Save the Generated Key
3. Log on to the switch by Telnet and download the public key file from the TFTP server to the
switch, as the following figure shows:
Figure 1-10 Download the Public Key
7
Note:
1. The key type should accord with the type of the key file.
2. The SSH key downloading can not be interrupted.
4. After the public key is downloaded, please log on to the interface of PuTTY and enter the IP
address for login.
Figure 1-11 SSH Connection Config
8
5. Click Au t h under the SSH menu in the left Category list, and click Bro wse to do wnload the
private key file to SSH client software and click Ope n .
Figure 1-12 Download the Private Key
6. After successful authentication, please enter the login user name. If you log on to the switch
without entering password, it indicates that the key has been successfully downloaded.
Figure 1-13 Log on the Switch
1.2 CLI Command Modes
The CLI is divided into different command modes: User EXEC Mode, Privileged EXEC Mode,
Global Configuration Mode, Interface Configuration Mode and VLAN Configuration Mode.
Interface Configuration Mode can also be divided into Interface fastEthernet, Interface
9
command to
enter this mode from User
command to return to User
gigabitEthernet, Interface link-aggregation and some other modes, which is shown as the following
diagram.
Interface Configuration Mode
Interface gigabitEthernet
Interface link-aggregation
Interface range gigabitEthernet
Interface range link-aggregation
Interface vlan
Privileged EXEC
Mode
Global C
Mode
The following table gives detailed information about the Accessing path, Prompt of each mode and
how to e xit the current mode and access the next mode.
Logout or Access the
Mode Accessing Path Prompt
next mode
Use the ex it
Use r E XEC
connected with the switch.
disconnect the switch.
T1500-28PCT>
Mode
Privileged
EXEC Mode
Use the enable
EXEC mode.
T1500-28PCT#
Use the enable
acces s Privileged EXEC mode.
Enter the disable or the exit
EXEC m ode.
Enter the configure com ma nd
to access
mode.
Global
Configuration
Mode
Use the configure co mm and
Privileged EXEC mode.
T1500-28PCT (config)#
10
Use the exit or the end
command or press Ctrl+Z to
return to
mode.
Use the interface
fastEthernet / gi gabit Ethernet
port or interface range
fastEthernet/ gigab it Ethernet
port-list
interface Configuration mode.
Use the vlan vlan-list to access
VLAN Configuration mode.
command to enter this mode
Mode Accessing Path Prompt
Use the interface
Interface
Configuration
Mode
fastEthernet /gigab it Ethernet
port or interface range
fastEthernet/
gigabit Ethernet port-list
command t
from
mode.
Use the vlan vlan-list
T1500-28PCT
(config-if)#
T1500-28PCT
(config-if-range)#
VL A N
Configuration
from
mode.
T1500-28PCT
(config-vlan)#
Mode
or
Logout or Access the
next mode
Use the end
Ctr l+Z to return to Pri vileged
EXEC mode.
Enter the exit command or the
# command to return to Global
Configuration mode.
specified in the int e r f a ce
command.
Use the end
Ctr l+Z to return to Pri vileged
EXEC mode.
Enter the exit command
# command to return to Global
configuration mode.
Note:
1. The user is automatically in User EXEC Mode after the connection between the PC and the
switch is established by a Telnet/SSH connection.
2. Each command mode has its own set of specific commands. To configure some commands,
you should access the corresponding command mode firstly.
Global Configuration M ode : In this mode, global commands are provided, such as the
Spanning Tree, Schedule Mode and so on.
Interface Configuration Mode: In this mode, users can configure one or several ports,
different ports corresponds to different commands
a). Interface fastEthernet/gigabitEthernet: Configure parameters for a Fast/Gigabit
Ethernet port, such as Duplex-mode, flow control status.
b). Interface range fastEthernet/gigabitEthernet: The commands contained are the
same as that of the Interface fastEthernet/gigabitEthernet. Configure parameters for
several Ethernet ports.
c). Interface link-aggregation: Configure parameters for a link-aggregation, such as
broadcast storm.
d). Interface range link-aggregation: Configure parameters for multi-trunks.
e). Interface vlan: Configure parameters for the vlan-port.
11
Vlan Configuration Mode: In this mode, users can create a VLAN and add a specified
port to the VLAN.
3. Some commands are global, that means they can be performed in all modes:
show: display all information of switch, for example: statistic information, port information,
VLAN information.
1.3 Security Levels
This switch’s security is divided into two levels: User level and Admin level.
User level only allows users to do some simple operations in User EXEC Mode; Admin level
allows you to monitor, configure and manage the switch in Privileged EXEC Mode, Global
Configuration Mode, Interface Configuration Mode and VLAN Configuration Mode.
Users get the privilege to the User level once logging in by Telnet. However, Guest users are
restricted to access the CLI.
Users can enter Privileged EXEC mode from User EXEC mode by using the enable command. In
default case, no password is needed. In Global Configuration Mode, you can configure password
for Admin level by e nable password command. Once password is configured, you ar e r equir ed to
enter it to access Privileged EXEC mode.
1.4 Conventions
1.4.1 Format Conventions
The following conventions are used in this Guide:
Items in square brackets [ ] are optional
Items in braces { } are required
Alternative items are grouped in braces and separated by vertical bars. For example: speed
{10 | 100 | 1000 }
Bold indicates an unalterable keyword. For example: show logging
Normal Font indicates a constant (several options are enumerated and only one can be
selected). For example: mode {dynamic | static | permanent}
Italic Font indicates a variable (an actual value must be assigned). For example: bridge
aging-time aging-time
12
1.4.2 Special Characters
You should pay attentions to the description below if the variable is a character string:
These six characters ” < > , \ & can not be input.
If a blank is contained in a character string, single or double quotation marks should be used,
for example ’hello world’, ”hello world”, and the words in the quotation marks will be identified
as a string. Otherwise, the words will be identified as several strings.
1.4.3 Parameter Format
Some parameters must be entered in special formats which are shown as follows:
MAC address must be enter in the format of xx:xx:xx:xx:xx:xx
One or several values can be typed for a port-list or a vlan-list using comma to separate. Use
a hyphen to designate a range of values, for instance,1/0/1,1/0/3-5,1/0/7 indicates choosing
port 1/0/1,1/0/3,1/0/4,1/0/5,1/0/7.
13
Chapter 2 User Interface
enable
Description
The enable command is used to access Privileged EXEC Mode from Use r
EXEC Mode.
Syntax
enable
Command Mode
User EXEC Mode
Example
If you have set the password to access Privileged EXEC Mode from Use r E XEC
Mode:
T1500-28PCT>enable
Enter password:
T1500-28PCT#
service password-encryption
Description
The service password-encryption command is used to encrypt the password
when the password is defined or when the configuration is written, using the
symmetric encryption algorithm. Encryption prevents the password from being
readable in the configuration file. To disable the global encryption function,
please use no se rvice password-encryption command.
Syntax
service password-encryption
no service password-encryption
Command Mode
Global Configuration Mode
Example
Enable the global encryption function:
T1500-28PCT(config)# service password-encryption
14
enable password
Description
The enable password command is used to set or change the password for
users to access Privileged EXEC Mode from Us er EXEC Mode. To remove the
password, please use no enable password command. This command uses the
symmetric encryption.
Syntax
enable password { [ 0 ] password | 7 encrypted-password }
no enable password
Parameter
0 —— Specify the encryption type. 0 indicates that an unencrypted password
will follow. By default, the encryption type is 0.
password —— Super password, a string from 1 to 31 alphanumeric characters
or symbols. The password is case sensitive, allows digits, English letters (case
sensitive), underlines and sixteen special characters ( !$%'()*,-./[]{|} ). By default,
it is empty.
7 —— Indicates a symmetric encrypted password with fixed length will follow.
encrypted-password —— A symmetric encrypted password with fixed length,
which you can copy from another switch’s configuration file. After the encrypted
password is configured, you should use the corresponding unencrypted
password if you re-enter this mode.
Command Mode
Global Configuration Mode
User Guidelines
If the password you configured here is unencrypted and the global encryption
function is enabled in service password-en cr ypt i on, the password in the
configuration file will be displayed in the symmetric encrypted form.
Example
Set the super password as “admin” and unencrypted to access Privileged EXEC
Mode from User EXEC Mode:
T1500-28PCT(config)#enable password 0 admin
15
enable secret
Description
The enable secret command is used to set a secret password, which is using
an MD5 encryption algorithm, for users to access Privileged EXEC Mode from
User E XEC Mode. To return to the default configuration, please use no enable
secret command. This command uses the MD5 encryption.
Syntax
enable secret { [ 0 ] password | 5 encrypted-password }
no enable secret
Parameter
0 —— Specify the encryption type. 0 indicates that an unencrypted password
will follow. By default, the encryption type is 0.
password —— Super password, a string from 1 to 31 alphanumeric characters
or symbols. The password is case sensitive, allows digits, English letters (case
sensitive), underlines and sixteen special characters ( !$%'()*,-./[]{|} ). By default,
it is empty. The password in the configuration file will be displayed in the MD5
encrypted form.
5 —— Indicates an MD5 encrypted password with fixed length will follow.
encrypted-password —— An MD5 encrypted password with fixed length, which
you can copy from another switch’s configuration file. After the encrypted
password is configured, you should use the corresponding unencrypted
password if you re-enter this mode.
Command Mode
Global Configuration Mode
User Guidelines
If both the enable password and enable secret are defined, you must enter the
password set in enable secret .
Example
Set the secret password as “admin” and unencrypted to access Privileged
E XEC Mode from Use r E XEC Mode. The password will be displayed in the
encrypted form.
T1500-28PCT(config)#enable secret 0 admin
16
disable
Description
Syntax
Command Mode
Example
The disable command is used to return to User EXEC Mode from Privileged
EXEC Mode.
disable
Privileged EXEC Mode
Return to User EXEC Mode from Privileged EXEC Mode:
T1500-28PCT# disable
T1500-28PCT>
configure
Description
Syntax
Command Mode
Example
exit
The configure command is used to access Global Configuration Mode from
Privileged EXEC Mode.
configure
Privileged EXEC Mode
Access Global Configuration Mode from Privileged EXEC Mode:
T1500-28PCT# configure
T1500-28PCT(config)#
Description
The exit command is used to return to the previous Mode from the current
Mode.
Syntax
exit
17
end
Command Mode
Privileged EXEC Mode and Any Configuration Mode
Example
Return to Global Configuration Mode from Interface Configuration Mode, and
then return to Privileged EXEC Mode:
T1500-28PCT(config-if)# exit
T1500-28PCT(config)#exit
T1500-28PCT#
Description
The end command is used to return to Privileged EXEC Mode.
Syntax
end
Command Mode
Privileged EXEC Mode and Any Configuration Mode
Example
Return to Privileged EXEC Mode from Interface Configuration Mode:
T1500-28PCT(config-if)#end
T1500-28PCT#
show history
Description
The hist ory command is used to show the latest 20 commands you entered in
the current mode since the switch is powered.
Syntax
show history
Command Mode
Privileged EXEC Mode and any Configuration Mode
18
Example
Show the commands you have entered in the current mode:
T1500-28PCT (config)# history
clear history
Description
The cle ar history command is used to clear the commands you have entered in
the current mode, therefore these commands will not be shown ne xt time you
use the show history command.
Syntax
clear history
1 history
Command Mode
Privileged EXEC Mode and any Configuration Mode
Example
Clear the commands you have entered in the current mode:
T1500-28PCT(config)#clear history
19