2.7 end ..................................................................................................................................................... 19
2.8 history ............................................................................................................................................... 20
2.9 history clear .................................................................................................................................... 20
3.3 name .................................................................................................................................................. 23
3.4 switchport general allowed vlan .............................................................................................. 24
3.6 show vlan summary...................................................................................................................... 25
3.7 show vlan brief ............................................................................................................................... 26
3.8 show vlan ......................................................................................................................................... 26
3.9 show interface switchport ......................................................................................................... 27
7.5 show etherchannel ....................................................................................................................... 45
7.6 show etherchannel load-balance ............................................................................................ 46
7.7 show lacp ......................................................................................................................................... 47
7.8 show lacp sys-id ............................................................................................................................ 47
Chapter 8 User Management Commands ................................................................ 49
8.1 user name (password) ................................................................................................................. 49
8.2 user name (secret) ........................................................................................................................ 50
8.3 user access-control ip-based .................................................................................................. 51
8.4 user access-control mac-based ............................................................................................. 52
8.5 user access-control port-based ............................................................................................. 53
8.7 show user account-list................................................................................................................ 54
II
8.8 show user configuration ............................................................................................................. 55
8.9 show telnet-status........................................................................................................................ 55
Chapter 9 HTTP and HTTPS Commands .................................................................. 57
9.1 ip http server .................................................................................................................................. 57
9.2 ip http max-users .......................................................................................................................... 58
9.3 ip http session timeout ............................................................................................................... 58
9.4 ip http secure-server ................................................................................................................... 59
9.5 ip http secure-protocol............................................................................................................... 60
9.6 ip http secure-ciphersuite ......................................................................................................... 60
9.7 ip http secure-max-users .......................................................................................................... 61
9.8 ip http secure-session timeout ................................................................................................ 62
9.9 ip http secure-server download certificate ......................................................................... 63
9.10 ip http secure-server download key ...................................................................................... 64
9.11 show ip http configuration ......................................................................................................... 65
9.12 show ip http secure-server ....................................................................................................... 65
14.1 ip ssh server ................................................................................................................................... 96
14.2 ip ssh version ................................................................................................................................. 96
14.3 ip ssh algorithm ............................................................................................................................. 97
14.4 ip ssh timeout ................................................................................................................................. 98
14.5 ip ssh max-client ........................................................................................................................... 98
14.6 ip ssh download ............................................................................................................................. 99
14.8 show ip ssh................................................................................................................................... 100
17.9 ip address ..................................................................................................................................... 132
17.10 ip address-alloc .......................................................................................................................... 133
17.22 show system-info ...................................................................................................................... 142
17.23 show image-info ......................................................................................................................... 142
17.24 show boot ..................................................................................................................................... 143
17.25 show running-config ................................................................................................................. 143
17.26 show startup-config ................................................................................................................. 144
17.27 show system-time ..................................................................................................................... 144
17.28 show system-time dst .............................................................................................................. 145
17.29 show system-time ntp ............................................................................................................. 145
17.30 show cable-diagnostics interface gigabitEthernet ........................................................ 146
17.31 show cpu-utilization .................................................................................................................. 146
17.32 show memory-utilization ......................................................................................................... 147
21.3 show monitor session .............................................................................................................. 177
Chapter 22 Port Isolation Commands ....................................................................... 178
22.1 port isolation................................................................................................................................ 178
22.2 show port isolation interface ................................................................................................. 179
26.8 name ............................................................................................................................................... 214
27.23 range .............................................................................................................................................. 245
27.24 ip igmp filter ................................................................................................................................. 246
27.25 clear ip igmp snooping statistics ......................................................................................... 247
27.26 show ip igmp snooping ............................................................................................................ 247
27.27 show ip igmp snooping interface ......................................................................................... 248
27.28 show ip igmp snooping vlan ................................................................................................... 249
27.29 show ip igmp snooping multi-vlan ....................................................................................... 249
27.30 show ip igmp snooping groups ............................................................................................. 250
27.31 show ip igmp snooping querier ............................................................................................. 251
27.32 show ip igmp profile .................................................................................................................. 252
28.21 range .............................................................................................................................................. 267
29.12 rmon history ................................................................................................................................ 286
30.12 show lldp ....................................................................................................................................... 305
30.13 show lldp interface .................................................................................................................... 305
30.14 show lldp local-information interface ................................................................................. 306
30.15 show lldp neighbor-information interface ......................................................................... 306
30.16 show lldp traffic interface ....................................................................................................... 307
31.4 show arp ........................................................................................................................................ 310
31.5 show ip arp (interface) .............................................................................................................. 310
31.6 show ip arp summary................................................................................................................ 311
32.8 ip route .......................................................................................................................................... 316
32.11 show interface vlan ................................................................................................................... 318
32.12 show ip interface ........................................................................................................................ 319
32.13 show ip interface brief .............................................................................................................. 320
32.14 show ip route ............................................................................................................................... 320
32.15 show ip route specify ............................................................................................................... 321
32.16 show ip route summary ........................................................................................................... 322
32.17 show ipv6 interface ................................................................................................................... 322
32.18 show ipv6 route .......................................................................................................................... 323
32.19 show ipv6 route summary ...................................................................................................... 323
34.5 show radius-server ................................................................................................................... 331
34.6 aaa group ...................................................................................................................................... 331
34.7 server ............................................................................................................................................. 332
34.8 show aaa group .......................................................................................................................... 333
34.13 show aaa authentication ......................................................................................................... 337
34.14 show aaa accounting ................................................................................................................ 337
34.15 line telnet ...................................................................................................................................... 338
34.17 line ssh ........................................................................................................................................... 339
35.1 service dhcp relay ..................................................................................................................... 344
35.2 ip helper-address....................................................................................................................... 344
35.3 ip dhcp relay information ........................................................................................................ 345
35.4 ip dhcp relay information policy ........................................................................................... 346
35.5 ip dhcp relay information custom ........................................................................................ 346
35.6 ip dhcp relay information circuit-id ...................................................................................... 347
35.7 ip dhcp relay information remote-id .................................................................................... 348
35.8 show ip dhcp relay ..................................................................................................................... 348
XIV
Preface
This Guide is intended for network administrator to provide referenced information about CLI
(Command Line Interface). The device mentioned in this Guide stands for
T1600-28TS/T1600G-52TS/T1600G-28PS/T1600G-52PS JetStream Gigabit Smart Switch
without any explanation. The commands in this guilde apply to these models if not specially
noted, and T1600G-52TS is taken as an example model in the example commands.
Overview of this Guide
Chapter 1: Using the CLI
Provide information about how to use the CLI, CLI Command Modes, Security Levels and some
Conventions.
Chapter 2: User Interface
Provide information about the commands used to switch between five CLI Command Modes.
Chapter 3:IEEE 802.1Q VLAN Commands
Provide information about the commands used for configuring IEEE 802.1Q VLAN.
Chapter 4: MAC-based VLAN Commands
Provide information about the commands used for configuring MAC-based VLAN
Chapter 5: Protocol VLAN Commands
Provide information about the commands used for configuring Protocol VLAN.
Chapter 6: Voice VLAN Commands
Provide information about the commands used for configuring Voice VLAN.
Chapter 7: Etherchannel Commands
Provide information about the commands used for configuring LAG (Link Aggregation Group)
and LACP (Link Aggregation Control Protocol).
Chapter 8: User Management Commands
Provide information about the commands used for user management.
Chapter 9: HTTP and HTTPS Commands
Provide information about the commands used for configuring the HTTP and HTTPS logon.
Chapter 10: Binding Table Commands
Provide information about the commands used for binding the IP address, MAC address, VLAN
and the connected Port number of the Host together.
Chapter 11: ARP Inspection Commands
Provide information about the commands used for protecting the switch from the ARP
cheating or ARP Attack.
1
Chapter 12: DoS Defend Command
Provide information about the commands used for DoS defend and detecting the DoS attack.
Chapter 13: System Log Commands
Provide information about the commands used for configuring system log.
Chapter 14: SSH Commands
Provide information about the commands used for configuring and managing SSH (Security
Shell).
Chapter 15: IEEE 802.1X Commands
Provide information about the commands used for configuring IEEE 802.1X function.
Chapter 16: MAC Address Commands
Provide information about the commands used for Address configuration.
Chapter 17: System Configuration Commands
Provide information about the commands used for configuring the System information and
System IP, reboot and reset the switch, upgrade the switch system and commands used for
cable test.
Chapter 18: IPv6 Address Configuration Commands
Provide information about the commands used for configuring the System IPv6 addresses.
Chapter 19: Ethernet Configuration Commands
Provide information about the commands used for configuring the Bandwidth Control,
Negotiation Mode, and Storm Control for enthernet ports.
Chapter 20: QoS Commands
Provide information about the commands used for configuring the QoS function.
Chapter 21: Port Mirror Commands
Provide information about the commands used for configuring the Port Mirror function.
Chapter 22: Port Isolation Commands
Provide information about the commands used for configuring Port Isolation function.
Chapter 23: Loopback Detection Commands
Provide information about the commands used for configuring the Loopback Detection
function.
Chapter 24: ACL Commands
Provide information about the commands used for configuring the ACL (Access Control List).
Chapter 25: PoE Commands
Provide information about the commands used for configuring PoE function.
Chapter 26: MSTP Commands
2
Provide information about the commands used for configuring the MSTP (Multiple Spanning
Tree Protocol).
Chapter 27: IGMP Snooping Commands
Provide information about the commands used for configuring the IGMP Snooping (Internet
Group Management Protocol Snooping).
Chapter 28: MLD Snooping Commands
Provide information about the commands used for configuring the MLD Snooping (Multicast
Listener Discovery Snooping).
Chapter 29: SNMP Commands
Provide information about the commands used for configuring the SNMP (Simple Network
Management Protocol) functions.
Chapter 30: LLDP Commands
Provide information about the commands used for configuring LLDP function.
Chapter 31: ARP Commands
Provide information about the commands used for configuring the ARP (Address Resolution
Protocol) functions.
Chapter 32: Static Routes Commands
Provide information about the commands used for configuring the Static Route function.
Chapter 33: SDM Template Commands
Provide information about the commands used for configuring the SDM templates.
Chapter 34: AAA Commands
Provide information about the commands used for configuring AAA (authentication,
authorization and accounting).
Chapter 35: DHCP Relay Commands
Provide information about the commands used for configuring the DHCP Relay function.
3
Chapter 1 Using the CLI
1.1 Accessing the CLI
You can log on to the switch and access the CLI by logging on to the switch remotely by a
Telnet or SSH connection through an Ethernet port.
1.1.1 Logon by Telnet
To log on to the switch by a Telnet connection, please take the following steps:
1. Click Start and type in cmd in the Search programs and files window and press the Enter
button.
Figure 1-1 Run Window
2. Telnet the switch_IP (factory setting is 192.168.0.1) in the prompt cmd window and press
Enter.
Figure 1-2 Type in the telnet command
4
3. Type in the User name and Password (the factory default value for both of them are admin)
and press the Enter button to enter User EXEC Mode , which is shown as Figure 1-2.
Figure 1-2 Log in the Switch
4. Type in enable command to enter Privileged EXEC Mode.
Figure 1-3 Enter into Priviledged EXEC Mode
1.1.2 Logon by SSH
To log on by SSH, a Putty client software is recommended. There are two authentication modes
to set up an SSH connection:
Password Authentication Mode: It requires username and password, which are both admin by
default.
Key Authentication Mode: It requires a public key for the switch and a private key for the SSH
client software. You can generate the public key and the private key through Putty Key
Generator.
Note:
Before SSH login, please follow the steps shown in Figure 1-4 to enable the SSH function
through Telnet connection.
5
Figure 1-4 Enable SSH function
Password Authentication Mode
1. Open the software to log on to the interface of PuTTY. Enter the IP address of the switch
into Host Name field; keep the default value 22 in the Port field; select SSH as the
Connection type.
Figure 1-5 SSH Connection Config
6
2. Click the Open button in the above figure to log on to the switch. Enter the login user name
and password to log on the switch, and then enter enable to enter Privileged EXEC Mode,
so you can continue to configure the switch.
Figure 1-6 Log on the Switch
Key Authentication Mode
1. Select the key type and key length, and generate SSH key.
Figure 1-7 Generate SSH Key
Note:
1. The key length is in the range of 512 to 3072 bits.
2. During the key generation, randomly moving the mouse quickly can accelerate the key
generation.
7
2. After the key is successfully generated, please save the public key and private key to a
TFTP server.
Figure 1-8 Save the Generated Key
3. Log on to the switch by Telnet and download the public key file from the TFTP server to the
switch, as the following figure shows:
Figure 1-9 Download the Public Key
8
Note:
1. The key type should accord with the type of the key file.
2. The SSH key downloading can not be interrupted.
4. After the public key is downloaded, please log on to the interface of PuTTY and enter the IP
address for login.
Figure 1-10 SSH Connection Config
9
5. Click Browse to download the private key file to SSH client software and click Open.
Figure 1-11 Download the Private Key
6. After successful authentication, please enter the login user name. If you log on to the
switch without entering password, it indicates that the key has been successfully
downloaded.
Figure 1-12 Log on the Switch
1.2 CLI Command Modes
The CLI is divided into different command modes: User EXEC Mode, Privileged EXEC Mode,
Global Configuration Mode, Interface Configuration Mode and VLAN Configuration Mode.
10
access Privileged EXEC mode.
mode.
VLAN Configuration mode.
User EXEC Mode
……
VLAN Configuration Mode
Interface Configuration Mode can also be divided into Interface Ethernet, Interface
link-aggregation and some other modes, which is shown as the following diagram.
Interface Configuration Mode
Interface gigabitEthernet
Interface link-aggregation
Interface range gigabitEthernet
Interface range link-aggregation
Interface vlan
Privileged EXEC
Mode
Global Configuration
Mode
The following table gives detailed information about the Accessing path, Prompt of each mode
and how to exit the current mode and access the next mode.
Logout or Access the next
Mode Accessing Path Prompt
mode
User EXEC
Mode
Privileged
EXEC Mode
Primary mode once it
is connected with the
switch.
Use the enable
command to enter
this mode from User
EXEC mode.
T1600G-52TS>
T1600G-52TS#
Use the exit command to
disconnect the switch.
Use the enable command to
Enter the exit command to return
to User EXEC mode.
Enter configure command to
access Global Configuration
Global
Configuration
Mode
Use the configure
command to enter
this mode from
Privileged EXEC
mode.
T1600G-52TS (config)#
11
Use the exit or the end command
or press Ctrl+Z to return to
Privileged EXEC mode.
Use the interface
port
gigabitEthernet
interface range gigabitEthernet
port-list
interface Configuration mode.
Use the vlan
command to access
vlan-list
or
to access
mode.
Configuration mode.
configuration mode.
Mode Accessing Path Prompt
Layer 2 Interface:
Use the interface
Interface
Configuration
Mode
Interface
Configuration
Mode
gigabitEthernet
port,
interface
port-channel
interface range
gigabitEthernet
port-list
enter this mode from
Global Configuration
Layer 3 Interface:
Use the no
switchport
command to enter
Routed Port mode
from Interface
Configuration mode.
Use the interface
vlan-id
vlan
command to enter
VLAN Interface mode
from Global
Configuration mode.
Use the interface
loopback
command to enter
Loopback Interface
mode from Global
lagid
command to
id
T1600G-52TS (config-if)#
or
T1600G-52TS(config-if-rang
T1600G-52TS (config-if)#
T1600G-52TS(config-if-rang
or
e)#
or
e)#
Logout or Access the next
mode
Use the end command or press
Ctrl+Z to return to Privileged
EXEC mode.
Enter the exit or the # command
to return to Global Configuration
mode.
A port number must be specified
in the interface command.
Use the switchport command to
switch to the Layer 2 interface
mode.
Use the end command or press
Ctrl+Z to return to Privileged
EXEC mode.
Enter the exit or the # command
to return to Global Configuration
mode.
VLAN
Configuration
Mode
1. The user is automatically in User EXEC Mode after the connection between the PC and the
2. Each command mode has its own set of specific commands. To configure some
Use the vlan
command to enter
this mode from
Global Configuration
mode.
vlan-list
T1600G-52TS (config-vlan)#
Use the end command or press
Ctrl+Z to return to Privileged
EXEC mode.
Enter the exit command or the #
command to return to Global
Note:
switch is established by a Telnet/SSH connection.
commands, you should access the corresponding command mode firstly.
12
Global Configuration Mode: In this mode, global commands are provided, such as the
Spanning Tree, Schedule Mode and so on.
Interface Configuration Mode: In this mode, users can configure one or several ports,
different ports corresponds to different commands
a). Interface gigabitEthernet: Configure parameters for an Ethernet port, such as
Duplex-mode, flow control status.
b). Interface range gigabitEthernet: Configure parameters for several Ethernet ports.
c). Interface link-aggregation: Configure parameters for a link-aggregation, such as
broadcast storm.
d). Interface range link-aggregation: Configure parameters for multi-trunks.
e). Interface vlan: Configure parameters for the vlan-port.
VLAN Configuration Mode: In this mode, users can create a VLAN and add a specified
port to the VLAN.
3. Some commands are global, that means they can be performed in all modes:
show: display all information of switch, for example: statistic information, port
information, VLAN information.
history: Display the commands history.
1.3 Privilege Restrictions
This switch’s security is divided into four privilege levels: User level, Power User level, Operator
level and Admin level. You can define username and password pairs, and assign a specific
privilege level to each pair. Different privilege levels have access to specified commands,
which is illustrated in the Privilege Requirement in each command. For details about how to
configure usename and password pairs, please refer to user name (password) and
(secret).
Users can enter Privileged EXEC mode from User EXEC mode by using the enable command. In
default case, no password is needed. In Global Configuration Mode, you can configure
user name
password for Admin level by enable password command. Once password is configured, you
are required to enter it to access Privileged EXEC mode.
13
1.4Conventions
1.4.1 Format Conventions
The following conventions are used in this Guide:
Items in square brackets [ ] are optional
Items in braces { } are required
Alternative items are grouped in braces and separated by vertical bars. For example:
speed {10 | 100 | 1000 }
Bold indicates an unalterable keyword. For example: show logging
Normal Font indicates a constant (several options are enumerated and only one can be
selected). For example: mode {dynamic | static | permanent}
Italic Font indicates a variable (an actual value must be assigned). For example: bridge
aging-time
aging-time
1.4.2 Special Characters
You should pay attentions to the description below if the variable is a character string:
These six characters ” < > , \ & can not be input.
If a blank is contained in a character string, single or double quotation marks should be
used, for example ’hello world’, ”hello world”, and the words in the quotation marks will be
identified as a string. Otherwise, the words will be identified as several strings.
1.4.3 Parameter Format
Some parameters must be entered in special formats which are shown as follows:
MAC address must be enter in the format of xx:xx:xx:xx:xx:xx.
One or several values can be typed for a port-list or a vlan-list using comma to separate.
Use a hyphen to designate a range of values, for instance,1/0/1,1/0/3-5,1/0/7 indicates
choosing port 1/0/1,1/0/3,1/0/4,1/0/5,1/0/7.
14
Loading...
+ 335 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.