TP-Link T1600-28TS, T1600G-52TS, T1600G-28PS, T1600G-52PS Cli Reference Manual

REV2.0.0
1910011957
CLI Reference Guide
T1600G Series Switches
COPYRIGHT & TRADEMARKS
Specifications are subject to change without notice. is a registered trademark of
TP-Link Technologies CO., LTD. Other brands and product names are trademarks or registered
trademarks of their respective holders.
No part of the specifications may be reproduced in any form or by any means or used to make
any derivative such as translation, transformation, or adaptation without permission from
TP-Link Technologies CO., LTD CO., LTD. Copyright © 2016 Technologies CO., LTD CO., LTD.
All rights reserved.
http://www.tp-link.com
CONTENTS
Preface ............................................................................................................................ 1
Chapter 1 Using the CLI ................................................................................................... 4
1.1 Accessing the CLI ..................................................................................................................................... 4
1.1.1 Logon by Telnet ...................................................................................................................... 4
1.1.2 Logon by SSH .......................................................................................................................... 5
1.2 CLI Command Modes ............................................................................................................................ 10
1.3 Privilege Restrictions ............................................................................................................................. 13
1.4 Conventions .............................................................................................................................................. 14
1.4.1 Format Conventions ........................................................................................................... 14
1.4.2 Special Characters .............................................................................................................. 14
1.4.3 Parameter Format ................................................................................................................ 14
Chapter 2 User Interface .............................................................................................. 15
2.1 enable ............................................................................................................................................... 15
2.2 service password-encryption .................................................................................................. 15
2.3 enable password ........................................................................................................................... 16
2.4 enable secret ................................................................................................................................. 17
2.5 configure .......................................................................................................................................... 18
2.6 exit...................................................................................................................................................... 19
2.7 end ..................................................................................................................................................... 19
2.8 history ............................................................................................................................................... 20
2.9 history clear .................................................................................................................................... 20
Chapter 3 IEEE 802.1Q VLAN Commands ................................................................ 22
3.1 vlan ..................................................................................................................................................... 22
3.2 interface vlan .................................................................................................................................. 23
3.3 name .................................................................................................................................................. 23
3.4 switchport general allowed vlan .............................................................................................. 24
3.5 switchport pvid .............................................................................................................................. 25
3.6 show vlan summary...................................................................................................................... 25
3.7 show vlan brief ............................................................................................................................... 26
3.8 show vlan ......................................................................................................................................... 26
3.9 show interface switchport ......................................................................................................... 27
Chapter 4 MAC-based VLAN Commands ................................................................. 28
4.1 mac-vlan mac-address ............................................................................................................... 28
I
4.2 mac-vlan .......................................................................................................................................... 29
4.3 show mac-vlan ............................................................................................................................... 29
4.4 show mac-vlan interface ............................................................................................................ 30
Chapter 5 Protocol VLAN Commands ....................................................................... 31
5.1 protocol-vlan template ............................................................................................................... 31
5.2 protocol-vlan vlan ......................................................................................................................... 32
5.3 protocol-vlan group ..................................................................................................................... 33
5.4 show protocol-vlan template .................................................................................................... 33
5.5 show protocol-vlan vlan ............................................................................................................. 34
Chapter 6 Voice VLAN Commands ............................................................................ 35
6.1 voice vlan ......................................................................................................................................... 35
6.2 voice vlan aging ............................................................................................................................. 35
6.3 voice vlan priority .......................................................................................................................... 36
6.4 voice vlan mac-address ............................................................................................................. 37
6.5 switchport voice vlan mode ...................................................................................................... 38
6.6 switchport voice vlan security ................................................................................................. 38
6.7 show voice vlan ............................................................................................................................. 39
6.8 show voice vlan oui ...................................................................................................................... 39
6.9 show voice vlan switchport ....................................................................................................... 40
Chapter 7 Etherchannel Commands ......................................................................... 42
7.1 channel-group ............................................................................................................................... 42
7.2 port-channel load-balance ........................................................................................................ 43
7.3 lacp system-priority ..................................................................................................................... 44
7.4 lacp port-priority ........................................................................................................................... 45
7.5 show etherchannel ....................................................................................................................... 45
7.6 show etherchannel load-balance ............................................................................................ 46
7.7 show lacp ......................................................................................................................................... 47
7.8 show lacp sys-id ............................................................................................................................ 47
Chapter 8 User Management Commands ................................................................ 49
8.1 user name (password) ................................................................................................................. 49
8.2 user name (secret) ........................................................................................................................ 50
8.3 user access-control ip-based .................................................................................................. 51
8.4 user access-control mac-based ............................................................................................. 52
8.5 user access-control port-based ............................................................................................. 53
8.6 telnet ................................................................................................................................................. 54
8.7 show user account-list................................................................................................................ 54
II
8.8 show user configuration ............................................................................................................. 55
8.9 show telnet-status........................................................................................................................ 55
Chapter 9 HTTP and HTTPS Commands .................................................................. 57
9.1 ip http server .................................................................................................................................. 57
9.2 ip http max-users .......................................................................................................................... 58
9.3 ip http session timeout ............................................................................................................... 58
9.4 ip http secure-server ................................................................................................................... 59
9.5 ip http secure-protocol............................................................................................................... 60
9.6 ip http secure-ciphersuite ......................................................................................................... 60
9.7 ip http secure-max-users .......................................................................................................... 61
9.8 ip http secure-session timeout ................................................................................................ 62
9.9 ip http secure-server download certificate ......................................................................... 63
9.10 ip http secure-server download key ...................................................................................... 64
9.11 show ip http configuration ......................................................................................................... 65
9.12 show ip http secure-server ....................................................................................................... 65
Chapter 10 Binding Table Commands ......................................................................... 66
10.1 ip source binding .......................................................................................................................... 66
10.2 ip dhcp snooping .......................................................................................................................... 67
10.3 ip dhcp snooping vlan ................................................................................................................. 68
10.4 ip dhcp snooping information option ..................................................................................... 69
10.5 ip dhcp snooping information strategy ................................................................................. 69
10.6 ip dhcp snooping information remote-id .............................................................................. 70
10.7 ip dhcp snooping information circuit-id ................................................................................ 71
10.8 ip dhcp snooping trust ................................................................................................................ 72
10.9 ip dhcp snooping mac-verify .................................................................................................... 72
10.10 ip dhcp snooping limit rate ........................................................................................................ 73
10.11 ip dhcp snooping decline rate .................................................................................................. 74
10.12 show ip source binding ............................................................................................................... 75
10.13 show ip dhcp snooping ............................................................................................................... 75
10.14 show ip dhcp snooping interface ............................................................................................ 76
10.15 show ip dhcp snooping information interface .................................................................... 76
Chapter 11 ARP Inspection Commands ...................................................................... 78
11.1 ip arp inspection(global) ............................................................................................................. 78
11.2 ip arp inspection trust ................................................................................................................. 78
11.3 ip arp inspection(interface)........................................................................................................ 79
11.4 ip arp inspection limit-rate ......................................................................................................... 80
11.5 ip arp inspection recover ........................................................................................................... 81
III
11.6 show ip arp inspection ................................................................................................................ 81
11.7 show ip arp inspection interface ............................................................................................. 82
11.8 show ip arp inspection statistics ............................................................................................. 82
11.9 clear ip arp inspection statistics .............................................................................................. 83
Chapter 12 DoS Defend Commands ............................................................................ 84
12.1 ip dos-prevent ............................................................................................................................... 84
12.2 ip dos-prevent type...................................................................................................................... 84
12.3 show ip dos-prevent .................................................................................................................... 86
Chapter 13 System Log Commands ............................................................................ 87
13.1 logging buffer ................................................................................................................................. 87
13.2 logging buffer level ....................................................................................................................... 87
13.3 logging file flash ............................................................................................................................ 88
13.4 logging file flash frequency ....................................................................................................... 89
13.5 logging file flash level .................................................................................................................. 90
13.6 logging host index ........................................................................................................................ 90
13.7 logging monitor ............................................................................................................................. 91
13.8 logging monitor level ................................................................................................................... 92
13.9 clear logging ................................................................................................................................... 93
13.10 show logging local-config.......................................................................................................... 93
13.11 show logging loghost .................................................................................................................. 94
13.12 show logging buffer ..................................................................................................................... 94
13.13 show logging flash ........................................................................................................................ 95
Chapter 14 SSH Commands ........................................................................................... 96
14.1 ip ssh server ................................................................................................................................... 96
14.2 ip ssh version ................................................................................................................................. 96
14.3 ip ssh algorithm ............................................................................................................................. 97
14.4 ip ssh timeout ................................................................................................................................. 98
14.5 ip ssh max-client ........................................................................................................................... 98
14.6 ip ssh download ............................................................................................................................. 99
14.7 remove public-key ..................................................................................................................... 100
14.8 show ip ssh................................................................................................................................... 100
Chapter 15 IEEE 802.1X Commands .......................................................................... 101
15.1 dot1x system-auth-control .................................................................................................... 101
15.2 dot1x handshake ....................................................................................................................... 102
15.3 dot1x auth-method ................................................................................................................... 102
15.4 dot1x accounting ....................................................................................................................... 103
IV
15.5 dot1x guest-vlan(global) .......................................................................................................... 104
15.6 dot1x quiet-period..................................................................................................................... 105
15.7 dot1x timeout .............................................................................................................................. 105
15.8 dot1x max-reauth-req .............................................................................................................. 106
15.9 dot1x .............................................................................................................................................. 107
15.10 dot1x guest-vlan(interface) .................................................................................................... 107
15.11 dot1x port-control ..................................................................................................................... 108
15.12 dot1x port-method .................................................................................................................... 109
15.13 show dot1x global ..................................................................................................................... 110
15.14 show dot1x interface ................................................................................................................ 110
Chapter 16 MAC Address Commands ....................................................................... 112
16.1 mac address-table static ........................................................................................................ 112
16.2 mac address-table aging-time .............................................................................................. 113
16.3 mac address-table filtering .................................................................................................... 113
16.4 mac address-table notification ............................................................................................. 114
16.5 mac address-table notification (interface) ........................................................................ 115
16.6 mac address-table max-mac-count ................................................................................... 116
16.7 mac address-table security ................................................................................................... 118
16.8 show mac address-table ......................................................................................................... 119
16.9 clear mac address-table ......................................................................................................... 119
16.10 show mac address-table aging-time .................................................................................. 120
16.11 show mac address-table max-mac-count ........................................................................ 120
16.12 show mac address-table interface ...................................................................................... 121
16.13 show mac address-table count ............................................................................................ 121
16.14 show mac address-table address ....................................................................................... 122
16.15 show mac address-table vlan ................................................................................................ 123
16.16 show mac address-table notification ................................................................................. 123
16.17 show mac address-table security ........................................................................................ 124
Chapter 17 System Configuration Commands ....................................................... 125
17.1 system-time manual ................................................................................................................. 125
17.2 system-time ntp ......................................................................................................................... 125
17.3 system-time dst predefined .................................................................................................. 127
17.4 system-time dst date ............................................................................................................... 128
17.5 system-time dst recurring ...................................................................................................... 129
17.6 hostname ...................................................................................................................................... 130
17.7 location .......................................................................................................................................... 131
17.8 contact-info ................................................................................................................................. 131
V
17.9 ip address ..................................................................................................................................... 132
17.10 ip address-alloc .......................................................................................................................... 133
17.11 reset ............................................................................................................................................... 134
17.12 reboot ............................................................................................................................................ 134
17.13 reboot-schedule ........................................................................................................................ 135
17.14 copy running-config startup-config .................................................................................... 136
17.15 copy startup-config tftp .......................................................................................................... 136
17.16 copy tftp startup-config .......................................................................................................... 137
17.17 boot application ......................................................................................................................... 138
17.18 remove backup-image ............................................................................................................. 138
17.19 firmware upgrade ....................................................................................................................... 139
17.20 ping ................................................................................................................................................. 140
17.21 tracert ............................................................................................................................................ 141
17.22 show system-info ...................................................................................................................... 142
17.23 show image-info ......................................................................................................................... 142
17.24 show boot ..................................................................................................................................... 143
17.25 show running-config ................................................................................................................. 143
17.26 show startup-config ................................................................................................................. 144
17.27 show system-time ..................................................................................................................... 144
17.28 show system-time dst .............................................................................................................. 145
17.29 show system-time ntp ............................................................................................................. 145
17.30 show cable-diagnostics interface gigabitEthernet ........................................................ 146
17.31 show cpu-utilization .................................................................................................................. 146
17.32 show memory-utilization ......................................................................................................... 147
Chapter 18 IPv6 Address Configuration Commands ............................................ 148
18.1 ipv6 enable ................................................................................................................................... 148
18.2 ipv6 address autoconfig.......................................................................................................... 148
18.3 ipv6 address link-local ............................................................................................................. 149
18.4 ipv6 address dhcp ..................................................................................................................... 150
18.5 ipv6 address ra ........................................................................................................................... 150
18.6 ipv6 address eui-64 .................................................................................................................. 151
18.7 ipv6 address ................................................................................................................................ 152
18.8 show ipv6 interface ................................................................................................................... 152
Chapter 19 Ethernet Configuration Commands ..................................................... 154
19.1 interface gigabitEthernet ........................................................................................................ 154
19.2 interface range gigabitEthernet............................................................................................ 154
19.3 description ................................................................................................................................... 155
VI
19.4 shutdown ...................................................................................................................................... 156
19.5 flow-control ................................................................................................................................. 156
19.6 duplex ............................................................................................................................................ 157
19.7 jumbo ............................................................................................................................................. 158
19.8 speed ............................................................................................................................................. 158
19.9 storm-control pps ..................................................................................................................... 159
19.10 storm-control .............................................................................................................................. 160
19.11 bandwidth ..................................................................................................................................... 161
19.12 clear counters ............................................................................................................................. 161
19.13 show interface status ............................................................................................................... 162
19.14 show interface counters ......................................................................................................... 163
19.15 show interface configuration ................................................................................................. 163
19.16 show storm-control .................................................................................................................. 164
19.17 show bandwidth ......................................................................................................................... 164
Chapter 20 QoS Commands ......................................................................................... 166
20.1 qos .................................................................................................................................................. 166
20.2 qos dscp ....................................................................................................................................... 167
20.3 qos queue cos-map .................................................................................................................. 167
20.4 qos queue dscp-map ............................................................................................................... 168
20.5 qos queue mode ........................................................................................................................ 169
20.6 qos queue weight ...................................................................................................................... 170
20.7 show qos interface .................................................................................................................... 172
20.8 show qos cos-map .................................................................................................................... 172
20.9 show qos dscp-map ................................................................................................................. 173
20.10 show qos queue mode ............................................................................................................. 173
20.11 show qos status ......................................................................................................................... 174
Chapter 21 Port Mirror Commands ............................................................................ 175
21.1 monitor session destination interface................................................................................ 175
21.2 monitor session source interface ........................................................................................ 176
21.3 show monitor session .............................................................................................................. 177
Chapter 22 Port Isolation Commands ....................................................................... 178
22.1 port isolation................................................................................................................................ 178
22.2 show port isolation interface ................................................................................................. 179
Chapter 23 Loopback Detection Commands .......................................................... 180
23.1 loopback-detection(global) .................................................................................................... 180
23.2 loopback-detection interval ................................................................................................... 180
VII
23.3 loopback-detection recovery-time ..................................................................................... 181
23.4 loopback-detection(interface) .............................................................................................. 182
23.5 loopback-detection config ..................................................................................................... 182
23.6 loopback-detection recover .................................................................................................. 183
23.7 show loopback-detection global.......................................................................................... 184
23.8 show loopback-detection interface .................................................................................... 184
Chapter 24 ACL Commands ......................................................................................... 186
24.1 access-list create ...................................................................................................................... 186
24.2 mac access-list .......................................................................................................................... 186
24.3 access-list standard ................................................................................................................. 187
24.4 access-list extended ................................................................................................................ 188
24.5 access-list ipv6 .......................................................................................................................... 189
24.6 rule .................................................................................................................................................. 190
24.7 access-list policy name ........................................................................................................... 191
24.8 access-list policy action .......................................................................................................... 192
24.9 access-list bind acl(interface) ............................................................................................... 193
24.10 access-list bind acl(vlan) ......................................................................................................... 193
24.11 access-list bind(interface) ...................................................................................................... 194
24.12 access-list bind(vlan) ................................................................................................................ 195
24.13 show access-list ........................................................................................................................ 195
24.14 show access-list policy ........................................................................................................... 196
24.15 show access-list bind ............................................................................................................... 196
Chapter 25 PoE Commands ......................................................................................... 197
25.1 power inline consumption (global) ....................................................................................... 197
25.2 power profile ............................................................................................................................... 197
25.3 power time-range ...................................................................................................................... 198
25.4 absolute ........................................................................................................................................ 199
25.5 periodic ......................................................................................................................................... 200
25.6 power holiday .............................................................................................................................. 201
25.7 holiday ........................................................................................................................................... 202
25.8 power inline consumption (interface) ................................................................................. 202
25.9 power inline priority ................................................................................................................... 203
25.10 power inline supply .................................................................................................................... 204
25.11 power inline profile .................................................................................................................... 204
25.12 power inline time-range ........................................................................................................... 205
25.13 show power inline ...................................................................................................................... 205
25.14 show power inline configuration interface ........................................................................ 206
VIII
25.15 show power inline information interface ........................................................................... 206
25.16 show power profile .................................................................................................................... 207
25.17 show power holiday .................................................................................................................. 207
25.18 show power time-range ........................................................................................................... 207
Chapter 26 MSTP Commands ...................................................................................... 209
26.1 debug spanning-tree ................................................................................................................ 209
26.2 spanning-tree(global) ............................................................................................................... 210
26.3 spanning-tree(interface) ......................................................................................................... 210
26.4 spanning-tree common-config ............................................................................................. 211
26.5 spanning-tree mode ................................................................................................................. 212
26.6 spanning-tree mst configuration ......................................................................................... 213
26.7 instance ......................................................................................................................................... 213
26.8 name ............................................................................................................................................... 214
26.9 revision .......................................................................................................................................... 215
26.10 spanning-tree mst instance ................................................................................................... 216
26.11 spanning-tree mst ..................................................................................................................... 216
26.12 spanning-tree priority .............................................................................................................. 217
26.13 spanning-tree tc-defend ......................................................................................................... 218
26.14 spanning-tree timer .................................................................................................................. 219
26.15 spanning-tree hold-count ....................................................................................................... 220
26.16 spanning-tree max-hops ......................................................................................................... 220
26.17 spanning-tree bpdufilter ......................................................................................................... 221
26.18 spanning-tree bpduguard ....................................................................................................... 221
26.19 spanning-tree guard loop ....................................................................................................... 222
26.20 spanning-tree guard root ........................................................................................................ 223
26.21 spanning-tree guard tc ............................................................................................................ 223
26.22 spanning-tree mcheck ............................................................................................................. 224
26.23 show spanning-tree active ..................................................................................................... 225
26.24 show spanning-tree bridge .................................................................................................... 225
26.25 show spanning-tree interface ............................................................................................... 226
26.26 show spanning-tree interface-security ............................................................................. 226
26.27 show spanning-tree mst ......................................................................................................... 227
Chapter 27 IGMP Snooping Commands.................................................................... 229
27.1 ip igmp snooping(global) ......................................................................................................... 229
27.2 ip igmp snooping(interface) ................................................................................................... 229
27.3 ip igmp snooping rtime ............................................................................................................ 230
27.4 ip igmp snooping mtime .......................................................................................................... 231
IX
27.5 ip igmp snooping report-suppression ................................................................................ 231
27.6 ip igmp snooping immediate-leave ..................................................................................... 232
27.7 ip igmp snooping drop-unknown ......................................................................................... 232
27.8 ip igmp snooping last-listener query-inteval .................................................................... 233
27.9 ip igmp snooping last-listener query-count ..................................................................... 234
27.10 ip igmp snooping vlan-config ................................................................................................ 234
27.11 ip igmp snooping vlan-config (router-ports-forbidden) ............................................... 236
27.12 ip igmp snooping multi-vlan-config ..................................................................................... 237
27.13 ip igmp snooping multi-vlan-config (router-ports-forbidden).................................... 238
27.14 ip igmp snooping multi-vlan-config (source-ip-replace) ............................................. 239
27.15 ip igmp snooping querier vlan ............................................................................................... 239
27.16 ip igmp snooping querier vlan (general query) ................................................................ 240
27.17 ip igmp snooping max-groups .............................................................................................. 241
27.18 ip igmp snooping authentication .......................................................................................... 242
27.19 ip igmp snooping accounting ................................................................................................ 243
27.20 ip igmp profile ............................................................................................................................. 244
27.21 deny ................................................................................................................................................ 244
27.22 permit ............................................................................................................................................. 245
27.23 range .............................................................................................................................................. 245
27.24 ip igmp filter ................................................................................................................................. 246
27.25 clear ip igmp snooping statistics ......................................................................................... 247
27.26 show ip igmp snooping ............................................................................................................ 247
27.27 show ip igmp snooping interface ......................................................................................... 248
27.28 show ip igmp snooping vlan ................................................................................................... 249
27.29 show ip igmp snooping multi-vlan ....................................................................................... 249
27.30 show ip igmp snooping groups ............................................................................................. 250
27.31 show ip igmp snooping querier ............................................................................................. 251
27.32 show ip igmp profile .................................................................................................................. 252
Chapter 28 MLD Snooping Commands ..................................................................... 253
28.1 ipv6 mld snooping(global) ....................................................................................................... 253
28.2 ipv6 mld snooping(interface) ................................................................................................. 253
28.3 ipv6 mld snooping rtime .......................................................................................................... 254
28.4 ipv6 mld snooping mtime ........................................................................................................ 254
28.5 ipv6 mld snooping report-suppression ............................................................................. 255
28.6 ipv6 mld snooping immediate-leave ................................................................................... 256
28.7 ipv6 mld snooping drop-unknown ....................................................................................... 256
28.8 ipv6 mld snooping last-listener query-inteval ................................................................. 257
28.9 ipv6 mld snooping last-listener query-count ................................................................... 257
X
28.10 ipv6 mld snooping vlan-config .............................................................................................. 258
28.11 ipv6 mld snooping vlan-config (router-ports-forbidden) ............................................. 259
28.12 ipv6 mld snooping multi-vlan-config .................................................................................. 260
28.13 ipv6 mld snooping multi-vlan-config (router-ports-forbidden) ................................. 261
28.14 ipv6 mld snooping multi-vlan-config (source-ip-replace) ........................................... 262
28.15 ipv6 mld snooping querier vlan ............................................................................................. 263
28.16 ipv6 mld snooping querier vlan (general query) .............................................................. 263
28.17 ipv6 mld snooping max-groups ............................................................................................ 264
28.18 ipv6 mld profile ........................................................................................................................... 266
28.19 deny ................................................................................................................................................ 266
28.20 permit ............................................................................................................................................. 267
28.21 range .............................................................................................................................................. 267
28.22 ipv6 mld filter ............................................................................................................................... 268
28.23 clear ipv6 mld snooping statistics ....................................................................................... 269
28.24 show ipv6 mld snooping .......................................................................................................... 269
28.25 show ipv6 mld snooping interface ....................................................................................... 270
28.26 show ipv6 mld snooping vlan ................................................................................................. 270
28.27 show ipv6 mld snooping multi-vlan ..................................................................................... 271
28.28 show ipv6 mld snooping groups .......................................................................................... 271
28.29 show ipv6 mld snooping querier .......................................................................................... 273
28.30 show ipv6 mld profile ................................................................................................................ 274
Chapter 29 SNMP Commands ..................................................................................... 275
29.1 snmp-server ................................................................................................................................ 275
29.2 snmp-server view ...................................................................................................................... 275
29.3 snmp-server group ................................................................................................................... 276
29.4 snmp-server user ...................................................................................................................... 278
29.5 snmp-server community ......................................................................................................... 279
29.6 snmp-server host ...................................................................................................................... 280
29.7 snmp-server engineID ............................................................................................................. 282
29.8 snmp-server traps snmp ......................................................................................................... 282
29.9 snmp-server traps link-status ............................................................................................... 283
29.10 snmp-server traps ..................................................................................................................... 284
29.11 snmp-server traps vlan ............................................................................................................ 285
29.12 rmon history ................................................................................................................................ 286
29.13 rmon event ................................................................................................................................... 287
29.14 rmon alarm ................................................................................................................................... 288
29.15 rmon statistics ............................................................................................................................ 289
29.16 show snmp-server..................................................................................................................... 290
XI
29.17 show snmp-server view ........................................................................................................... 291
29.18 show snmp-server group ........................................................................................................ 291
29.19 show snmp-server user ........................................................................................................... 292
29.20 show snmp-server community ............................................................................................. 292
29.21 show snmp-server host ........................................................................................................... 292
29.22 show snmp-server engineID .................................................................................................. 293
29.23 show rmon history ..................................................................................................................... 293
29.24 show rmon event ....................................................................................................................... 294
29.25 show rmon alarm ........................................................................................................................ 295
29.26 show rmon statistics ................................................................................................................ 295
Chapter 30 LLDP Commands ....................................................................................... 297
30.1 lldp................................................................................................................................................... 297
30.2 lldp hold-multiplier ..................................................................................................................... 297
30.3 lldp timer ....................................................................................................................................... 298
30.4 lldp receive ................................................................................................................................... 299
30.5 lldp transmit ................................................................................................................................. 300
30.6 lldp snmp-trap ............................................................................................................................. 300
30.7 lldp tlv-select ............................................................................................................................... 301
30.8 lldp med-fast-count .................................................................................................................. 302
30.9 lldp med-status ........................................................................................................................... 302
30.10 lldp med-tlv-select .................................................................................................................... 303
30.11 lldp med-location ....................................................................................................................... 304
30.12 show lldp ....................................................................................................................................... 305
30.13 show lldp interface .................................................................................................................... 305
30.14 show lldp local-information interface ................................................................................. 306
30.15 show lldp neighbor-information interface ......................................................................... 306
30.16 show lldp traffic interface ....................................................................................................... 307
Chapter 31 ARP Commands ......................................................................................... 308
31.1 arp ................................................................................................................................................... 308
31.2 clear arp-cache .......................................................................................................................... 309
31.3 arp timeout ................................................................................................................................... 309
31.4 show arp ........................................................................................................................................ 310
31.5 show ip arp (interface) .............................................................................................................. 310
31.6 show ip arp summary................................................................................................................ 311
Chapter 32 Static Routes Commands ....................................................................... 312
32.1 interface vlan ............................................................................................................................... 312
32.2 interface loopback .................................................................................................................... 312
XII
32.3 switchport .................................................................................................................................... 313
32.4 interface range port-channel ................................................................................................. 314
32.5 description ................................................................................................................................... 314
32.6 shutdown ...................................................................................................................................... 315
32.7 interface port-channel ............................................................................................................. 316
32.8 ip route .......................................................................................................................................... 316
32.9 ipv6 routing .................................................................................................................................. 317
32.10 ipv6 route ...................................................................................................................................... 318
32.11 show interface vlan ................................................................................................................... 318
32.12 show ip interface ........................................................................................................................ 319
32.13 show ip interface brief .............................................................................................................. 320
32.14 show ip route ............................................................................................................................... 320
32.15 show ip route specify ............................................................................................................... 321
32.16 show ip route summary ........................................................................................................... 322
32.17 show ipv6 interface ................................................................................................................... 322
32.18 show ipv6 route .......................................................................................................................... 323
32.19 show ipv6 route summary ...................................................................................................... 323
Chapter 33 SDM Template Commands ..................................................................... 325
33.1 sdm prefer .................................................................................................................................... 325
33.2 show sdm prefer ........................................................................................................................ 326
Chapter 34 AAA Commands ........................................................................................ 327
34.1 aaa enable .................................................................................................................................... 327
34.2 tacacas-server host .................................................................................................................. 328
34.3 show tacacs-server .................................................................................................................. 329
34.4 radius-server host ..................................................................................................................... 329
34.5 show radius-server ................................................................................................................... 331
34.6 aaa group ...................................................................................................................................... 331
34.7 server ............................................................................................................................................. 332
34.8 show aaa group .......................................................................................................................... 333
34.9 aaa authentication login .......................................................................................................... 333
34.10 aaa authentication enable....................................................................................................... 334
34.11 aaa authentication dot1x default .......................................................................................... 335
34.12 aaa accounting dot1x default ................................................................................................ 336
34.13 show aaa authentication ......................................................................................................... 337
34.14 show aaa accounting ................................................................................................................ 337
34.15 line telnet ...................................................................................................................................... 338
34.16 login authentication(telnet)..................................................................................................... 338
XIII
34.17 line ssh ........................................................................................................................................... 339
34.18 login authentication(ssh) ......................................................................................................... 339
34.19 enable authentication(telnet) ................................................................................................. 340
34.20 enable authentication(ssh) ..................................................................................................... 341
34.21 ip http login authentication ..................................................................................................... 342
34.22 ip http enable authentication ................................................................................................. 342
34.23 show aaa global .......................................................................................................................... 343
Chapter 35 DHCP Relay Commands .......................................................................... 344
35.1 service dhcp relay ..................................................................................................................... 344
35.2 ip helper-address....................................................................................................................... 344
35.3 ip dhcp relay information ........................................................................................................ 345
35.4 ip dhcp relay information policy ........................................................................................... 346
35.5 ip dhcp relay information custom ........................................................................................ 346
35.6 ip dhcp relay information circuit-id ...................................................................................... 347
35.7 ip dhcp relay information remote-id .................................................................................... 348
35.8 show ip dhcp relay ..................................................................................................................... 348
XIV
Preface
This Guide is intended for network administrator to provide referenced information about CLI (Command Line Interface). The device mentioned in this Guide stands for T1600-28TS/T1600G-52TS/T1600G-28PS/T1600G-52PS JetStream Gigabit Smart Switch without any explanation. The commands in this guilde apply to these models if not specially noted, and T1600G-52TS is taken as an example model in the example commands.
Overview of this Guide
Chapter 1: Using the CLI
Provide information about how to use the CLI, CLI Command Modes, Security Levels and some
Conventions.
Chapter 2: User Interface
Provide information about the commands used to switch between five CLI Command Modes.
Chapter 3: IEEE 802.1Q VLAN Commands
Provide information about the commands used for configuring IEEE 802.1Q VLAN.
Chapter 4: MAC-based VLAN Commands
Provide information about the commands used for configuring MAC-based VLAN
Chapter 5: Protocol VLAN Commands
Provide information about the commands used for configuring Protocol VLAN.
Chapter 6: Voice VLAN Commands
Provide information about the commands used for configuring Voice VLAN.
Chapter 7: Etherchannel Commands
Provide information about the commands used for configuring LAG (Link Aggregation Group)
and LACP (Link Aggregation Control Protocol).
Chapter 8: User Management Commands
Provide information about the commands used for user management.
Chapter 9: HTTP and HTTPS Commands
Provide information about the commands used for configuring the HTTP and HTTPS logon.
Chapter 10: Binding Table Commands
Provide information about the commands used for binding the IP address, MAC address, VLAN
and the connected Port number of the Host together.
Chapter 11: ARP Inspection Commands
Provide information about the commands used for protecting the switch from the ARP
cheating or ARP Attack.
1
Chapter 12: DoS Defend Command
Provide information about the commands used for DoS defend and detecting the DoS attack.
Chapter 13: System Log Commands
Provide information about the commands used for configuring system log.
Chapter 14: SSH Commands
Provide information about the commands used for configuring and managing SSH (Security
Shell).
Chapter 15: IEEE 802.1X Commands
Provide information about the commands used for configuring IEEE 802.1X function.
Chapter 16: MAC Address Commands
Provide information about the commands used for Address configuration.
Chapter 17: System Configuration Commands
Provide information about the commands used for configuring the System information and
System IP, reboot and reset the switch, upgrade the switch system and commands used for
cable test.
Chapter 18: IPv6 Address Configuration Commands
Provide information about the commands used for configuring the System IPv6 addresses.
Chapter 19: Ethernet Configuration Commands
Provide information about the commands used for configuring the Bandwidth Control,
Negotiation Mode, and Storm Control for enthernet ports.
Chapter 20: QoS Commands
Provide information about the commands used for configuring the QoS function.
Chapter 21: Port Mirror Commands
Provide information about the commands used for configuring the Port Mirror function.
Chapter 22: Port Isolation Commands
Provide information about the commands used for configuring Port Isolation function.
Chapter 23: Loopback Detection Commands
Provide information about the commands used for configuring the Loopback Detection
function.
Chapter 24: ACL Commands
Provide information about the commands used for configuring the ACL (Access Control List).
Chapter 25: PoE Commands
Provide information about the commands used for configuring PoE function.
Chapter 26: MSTP Commands
2
Provide information about the commands used for configuring the MSTP (Multiple Spanning
Tree Protocol).
Chapter 27: IGMP Snooping Commands
Provide information about the commands used for configuring the IGMP Snooping (Internet
Group Management Protocol Snooping).
Chapter 28: MLD Snooping Commands
Provide information about the commands used for configuring the MLD Snooping (Multicast
Listener Discovery Snooping).
Chapter 29: SNMP Commands
Provide information about the commands used for configuring the SNMP (Simple Network
Management Protocol) functions.
Chapter 30: LLDP Commands
Provide information about the commands used for configuring LLDP function.
Chapter 31: ARP Commands
Provide information about the commands used for configuring the ARP (Address Resolution
Protocol) functions.
Chapter 32: Static Routes Commands
Provide information about the commands used for configuring the Static Route function.
Chapter 33: SDM Template Commands
Provide information about the commands used for configuring the SDM templates.
Chapter 34: AAA Commands
Provide information about the commands used for configuring AAA (authentication,
authorization and accounting).
Chapter 35: DHCP Relay Commands
Provide information about the commands used for configuring the DHCP Relay function.
3

Chapter 1 Using the CLI

1.1 Accessing the CLI

You can log on to the switch and access the CLI by logging on to the switch remotely by a
Telnet or SSH connection through an Ethernet port.

1.1.1 Logon by Telnet

To log on to the switch by a Telnet connection, please take the following steps:
1. Click Start and type in cmd in the Search programs and files window and press the Enter
button.
Figure 1-1 Run Window
2. Telnet the switch_IP (factory setting is 192.168.0.1) in the prompt cmd window and press
Enter.
Figure 1-2 Type in the telnet command
4
3. Type in the User name and Password (the factory default value for both of them are admin)
and press the Enter button to enter User EXEC Mode , which is shown as Figure 1-2.
Figure 1-2 Log in the Switch
4. Type in enable command to enter Privileged EXEC Mode.
Figure 1-3 Enter into Priviledged EXEC Mode

1.1.2 Logon by SSH

To log on by SSH, a Putty client software is recommended. There are two authentication modes
to set up an SSH connection:
Password Authentication Mode: It requires username and password, which are both admin by default.
Key Authentication Mode: It requires a public key for the switch and a private key for the SSH client software. You can generate the public key and the private key through Putty Key Generator.
Note:
Before SSH login, please follow the steps shown in Figure 1-4 to enable the SSH function through Telnet connection.
5
Figure 1-4 Enable SSH function
 Password Authentication Mode
1. Open the software to log on to the interface of PuTTY. Enter the IP address of the switch
into Host Name field; keep the default value 22 in the Port field; select SSH as the
Connection type.
Figure 1-5 SSH Connection Config
6
2. Click the Open button in the above figure to log on to the switch. Enter the login user name
and password to log on the switch, and then enter enable to enter Privileged EXEC Mode,
so you can continue to configure the switch.
Figure 1-6 Log on the Switch
 Key Authentication Mode
1. Select the key type and key length, and generate SSH key.
Figure 1-7 Generate SSH Key
Note:
1. The key length is in the range of 512 to 3072 bits.
2. During the key generation, randomly moving the mouse quickly can accelerate the key generation.
7
2. After the key is successfully generated, please save the public key and private key to a
TFTP server.
Figure 1-8 Save the Generated Key
3. Log on to the switch by Telnet and download the public key file from the TFTP server to the
switch, as the following figure shows:
Figure 1-9 Download the Public Key
8
Note:
1. The key type should accord with the type of the key file.
2. The SSH key downloading can not be interrupted.
4. After the public key is downloaded, please log on to the interface of PuTTY and enter the IP
address for login.
Figure 1-10 SSH Connection Config
9
5. Click Browse to download the private key file to SSH client software and click Open.
Figure 1-11 Download the Private Key
6. After successful authentication, please enter the login user name. If you log on to the
switch without entering password, it indicates that the key has been successfully
downloaded.
Figure 1-12 Log on the Switch

1.2 CLI Command Modes

The CLI is divided into different command modes: User EXEC Mode, Privileged EXEC Mode,
Global Configuration Mode, Interface Configuration Mode and VLAN Configuration Mode.
10
access Privileged EXEC mode.
mode.
VLAN Configuration mode.
User EXEC Mode
……
VLAN Configuration Mode
Interface Configuration Mode can also be divided into Interface Ethernet, Interface
link-aggregation and some other modes, which is shown as the following diagram.
Interface Configuration Mode
Interface gigabitEthernet
Interface link-aggregation
Interface range gigabitEthernet
Interface range link-aggregation
Interface vlan
Privileged EXEC
Mode
Global Configuration
Mode
The following table gives detailed information about the Accessing path, Prompt of each mode and how to exit the current mode and access the next mode.
Logout or Access the next
Mode Accessing Path Prompt
mode
User EXEC
Mode
Privileged
EXEC Mode
Primary mode once it
is connected with the
switch.
Use the enable
command to enter
this mode from User
EXEC mode.
T1600G-52TS>
T1600G-52TS#
Use the exit command to
disconnect the switch.
Use the enable command to
Enter the exit command to return
to User EXEC mode.
Enter configure command to
access Global Configuration
Global
Configuration
Mode
Use the configure
command to enter
this mode from
Privileged EXEC
mode.
T1600G-52TS (config)#
11
Use the exit or the end command
or press Ctrl+Z to return to
Privileged EXEC mode.
Use the interface
port
gigabitEthernet
interface range gigabitEthernet
port-list
interface Configuration mode.
Use the vlan
command to access
vlan-list
or
to access
mode.
Configuration mode.
configuration mode.
Mode Accessing Path Prompt
Layer 2 Interface:
Use the interface
Interface
Configuration
Mode
Interface
Configuration
Mode
gigabitEthernet
port,
interface
port-channel
interface range
gigabitEthernet
port-list
enter this mode from
Global Configuration
Layer 3 Interface:
Use the no
switchport
command to enter Routed Port mode from Interface Configuration mode.
Use the interface
vlan-id
vlan command to enter VLAN Interface mode from Global Configuration mode.
Use the interface
loopback
command to enter
Loopback Interface
mode from Global
lagid
command to
id
T1600G-52TS (config-if)#
or
T1600G-52TS(config-if-rang
T1600G-52TS (config-if)#
T1600G-52TS(config-if-rang
or
e)#
or
e)#
Logout or Access the next
mode
Use the end command or press Ctrl+Z to return to Privileged
EXEC mode.
Enter the exit or the # command to return to Global Configuration mode.
A port number must be specified
in the interface command.
Use the switchport command to switch to the Layer 2 interface mode.
Use the end command or press Ctrl+Z to return to Privileged EXEC mode.
Enter the exit or the # command
to return to Global Configuration
mode.
VLAN
Configuration
Mode
1. The user is automatically in User EXEC Mode after the connection between the PC and the
2. Each command mode has its own set of specific commands. To configure some
Use the vlan
command to enter
this mode from
Global Configuration
mode.
vlan-list
T1600G-52TS (config-vlan)#
Use the end command or press
Ctrl+Z to return to Privileged
EXEC mode.
Enter the exit command or the #
command to return to Global
Note:
switch is established by a Telnet/SSH connection.
commands, you should access the corresponding command mode firstly.
12
Global Configuration Mode: In this mode, global commands are provided, such as the
Spanning Tree, Schedule Mode and so on.
Interface Configuration Mode: In this mode, users can configure one or several ports,
different ports corresponds to different commands
a). Interface gigabitEthernet: Configure parameters for an Ethernet port, such as
Duplex-mode, flow control status.
b). Interface range gigabitEthernet: Configure parameters for several Ethernet ports.
c). Interface link-aggregation: Configure parameters for a link-aggregation, such as
broadcast storm.
d). Interface range link-aggregation: Configure parameters for multi-trunks.
e). Interface vlan: Configure parameters for the vlan-port.
VLAN Configuration Mode: In this mode, users can create a VLAN and add a specified
port to the VLAN.
3. Some commands are global, that means they can be performed in all modes:
show: display all information of switch, for example: statistic information, port
information, VLAN information.
history: Display the commands history.

1.3 Privilege Restrictions

This switch’s security is divided into four privilege levels: User level, Power User level, Operator
level and Admin level. You can define username and password pairs, and assign a specific
privilege level to each pair. Different privilege levels have access to specified commands,
which is illustrated in the Privilege Requirement in each command. For details about how to
configure usename and password pairs, please refer to user name (password) and
(secret).
Users can enter Privileged EXEC mode from User EXEC mode by using the enable command. In
default case, no password is needed. In Global Configuration Mode, you can configure
user name
password for Admin level by enable password command. Once password is configured, you
are required to enter it to access Privileged EXEC mode.
13

1.4 Conventions

1.4.1 Format Conventions

The following conventions are used in this Guide:
 Items in square brackets [ ] are optional
 Items in braces { } are required
Alternative items are grouped in braces and separated by vertical bars. For example:
speed {10 | 100 | 1000 }
 Bold indicates an unalterable keyword. For example: show logging
Normal Font indicates a constant (several options are enumerated and only one can be
selected). For example: mode {dynamic | static | permanent}
Italic Font indicates a variable (an actual value must be assigned). For example: bridge
aging-time
aging-time

1.4.2 Special Characters

You should pay attentions to the description below if the variable is a character string:
These six characters ” < > , \ & can not be input.
If a blank is contained in a character string, single or double quotation marks should be
used, for example ’hello world’, ”hello world”, and the words in the quotation marks will be
identified as a string. Otherwise, the words will be identified as several strings.

1.4.3 Parameter Format

Some parameters must be entered in special formats which are shown as follows:
MAC address must be enter in the format of xx:xx:xx:xx:xx:xx.
One or several values can be typed for a port-list or a vlan-list using comma to separate.
Use a hyphen to designate a range of values, for instance,1/0/1,1/0/3-5,1/0/7 indicates
choosing port 1/0/1,1/0/3,1/0/4,1/0/5,1/0/7.
14
Loading...
+ 335 hidden pages