2.7 end ..................................................................................................................................................... 20
2.9 history ............................................................................................................................................... 21
2.10 history clear .................................................................................................................................... 22
3.5 show switch .................................................................................................................................... 26
Chapter 4 User Management Commands ................................................................ 28
4.1 user name (password) ................................................................................................................. 28
4.2 user name (secret) ........................................................................................................................ 29
4.3 show user account-list................................................................................................................ 30
4.4 show user configuration ............................................................................................................. 31
II
Chapter 5 System Configuration Commands ......................................................... 32
5.9 ip address ........................................................................................................................................ 39
5.10 ip address-alloc ............................................................................................................................. 40
5.27 show system-info ......................................................................................................................... 52
5.28 show image-info ............................................................................................................................ 52
5.29 show boot ........................................................................................................................................ 53
5.30 show running-config .................................................................................................................... 53
5.31 show startup-config .................................................................................................................... 54
5.32 show system-time ........................................................................................................................ 54
5.33 show system-time dst ................................................................................................................. 55
5.34 show system-time ntp ................................................................................................................ 55
5.35 show cable-diagnostics interface........................................................................................... 56
5.36 show cpu-utilization ..................................................................................................................... 56
III
5.37 show memory-utilization ............................................................................................................ 57
8.6 show holiday ................................................................................................................................... 65
8.7 show time-range ........................................................................................................................... 66
Chapter 9 Port Configuration Commands ............................................................... 67
9.10 show interface status .................................................................................................................. 73
9.11 show interface counters ............................................................................................................ 73
9.12 show interface configuration .................................................................................................... 74
9.13 show fiber-ports ............................................................................................................................ 75
Chapter 10 Port Isolation Commands ......................................................................... 76
10.1 port isolation................................................................................................................................... 76
10.2 show port isolation interface .................................................................................................... 77
12.5 show etherchannel ....................................................................................................................... 87
12.6 show etherchannel load-balance ............................................................................................ 88
12.7 show lacp ......................................................................................................................................... 89
12.8 show lacp sys-id ............................................................................................................................ 89
Chapter 13 MAC Address Commands ......................................................................... 91
13.1 mac address-table static ........................................................................................................... 91
13.2 mac address-table aging-time ................................................................................................. 92
13.3 mac address-table filtering ....................................................................................................... 92
13.4 mac address-table max-mac-count ...................................................................................... 93
13.5 show mac address-table ............................................................................................................ 95
13.6 clear mac address-table ............................................................................................................ 95
13.7 show mac address-table aging-time ..................................................................................... 96
13.8 show mac address-table max-mac-count ........................................................................... 96
13.9 show mac address-table interface ......................................................................................... 97
13.10 show mac address-table count ............................................................................................... 97
13.11 show mac address-table address .......................................................................................... 98
13.12 show mac address-table vlan ................................................................................................... 99
14.2 name ............................................................................................................................................... 101
14.3 switchport general allowed vlan ........................................................................................... 101
14.7 show vlan summary................................................................................................................... 104
14.8 show vlan brief ............................................................................................................................ 105
14.9 show vlan ...................................................................................................................................... 105
14.10 show interface switchport ...................................................................................................... 106
17.18 range .............................................................................................................................................. 127
17.19 ip igmp filter ................................................................................................................................. 128
17.20 clear ip igmp snooping statistics ......................................................................................... 128
VI
17.21 show ip igmp snooping ............................................................................................................ 129
17.22 show ip igmp snooping interface ......................................................................................... 129
17.23 show ip igmp snooping vlan ................................................................................................... 130
17.24 show ip igmp snooping groups ............................................................................................. 131
17.25 show ip igmp profile .................................................................................................................. 132
18.16 range .............................................................................................................................................. 145
19.2 mvr group ..................................................................................................................................... 150
19.7 mvr type ........................................................................................................................................ 154
19.10 show mvr ...................................................................................................................................... 156
19.11 show mvr interface .................................................................................................................... 157
19.12 show mvr members .................................................................................................................. 157
19.13 show mvr traffic .......................................................................................................................... 158
20.8 name ............................................................................................................................................... 164
21.14 show lldp ....................................................................................................................................... 188
21.15 show lldp interface .................................................................................................................... 188
21.16 show lldp local-information interface ................................................................................. 189
21.17 show lldp neighbor-information interface ......................................................................... 190
21.18 show lldp traffic interface ....................................................................................................... 190
22.1 ip routing ....................................................................................................................................... 192
22.9 ip route .......................................................................................................................................... 197
22.12 show interface vlan ................................................................................................................... 199
22.13 show ip interface ........................................................................................................................ 199
22.14 show ip interface brief .............................................................................................................. 200
22.15 show ip route ............................................................................................................................... 200
22.16 show ip route specify ............................................................................................................... 201
22.17 show ip route summary ........................................................................................................... 202
IX
22.18 show ipv6 interface ................................................................................................................... 202
22.19 show ipv6 route .......................................................................................................................... 203
22.20 show ipv6 route summary ...................................................................................................... 203
24.9 ip proxy-arp.................................................................................................................................. 216
24.10 ip local-proxy-arp ...................................................................................................................... 216
24.11 show arp ........................................................................................................................................ 217
24.12 show ip arp (interface) .............................................................................................................. 218
24.13 show ip arp summary................................................................................................................ 218
24.14 show gratuitous-arp ................................................................................................................. 219
24.15 show ip proxy-arp ...................................................................................................................... 219
Chapter 25 DHCP Server Commands ........................................................................ 221
25.1 service dhcp server .................................................................................................................. 221
25.2 ip dhcp server extend-option capwap-ac-ip.................................................................... 221
25.3 ip dhcp server extend-option vendor-class-id ............................................................... 222
25.4 ip dhcp server exclude-address ........................................................................................... 223
25.5 ip dhcp server pool ................................................................................................................... 224
25.6 ip dhcp server ping timeout ................................................................................................... 224
25.7 ip dhcp server ping packets ................................................................................................... 225
31.8 auto-voip data priority .............................................................................................................. 280
31.9 show auto-voip ........................................................................................................................... 280
Chapter 32 Access Control Commands ................................................................... 282
32.1 user access-control ip-based enable ................................................................................. 282
32.2 user access-control ip-based ............................................................................................... 282
32.3 user access-control mac-based enable ............................................................................ 283
32.4 user access-control mac-based .......................................................................................... 284
32.5 user access-control port-based enable ............................................................................ 285
32.6 user access-control port-based .......................................................................................... 285
Chapter 33 HTTP and HTTPS Commands ................................................................ 287
33.1 ip http server ............................................................................................................................... 287
33.2 ip http port .................................................................................................................................... 288
33.3 ip http max-users ....................................................................................................................... 288
33.4 ip http session timeout ............................................................................................................ 289
33.5 ip http secure-server ................................................................................................................ 290
33.6 ip http secure-port .................................................................................................................... 290
33.7 ip http secure-protocol............................................................................................................ 291
33.8 ip http secure-ciphersuite ...................................................................................................... 292
33.9 ip http secure-max-users ....................................................................................................... 293
33.10 ip http secure-session timeout ............................................................................................. 294
33.11 ip http secure-server download certificate ...................................................................... 294
33.12 ip http secure-server download key ................................................................................... 295
33.13 show ip http configuration ...................................................................................................... 296
33.14 show ip http secure-server .................................................................................................... 296
34.1 ip ssh server ................................................................................................................................ 298
34.2 ip ssh port ..................................................................................................................................... 298
34.3 ip ssh version .............................................................................................................................. 299
34.4 ip ssh algorithm .......................................................................................................................... 300
34.5 ip ssh timeout .............................................................................................................................. 300
34.6 ip ssh max-client ........................................................................................................................ 301
34.7 ip ssh download .......................................................................................................................... 302
34.9 show ip ssh................................................................................................................................... 303
35.2 telnet port ..................................................................................................................................... 304
35.3 show telnet-status..................................................................................................................... 305
36.4 show radius-server ................................................................................................................... 309
36.5 aaa group ...................................................................................................................................... 310
36.6 server ............................................................................................................................................. 311
36.7 show aaa group .......................................................................................................................... 311
36.12 show aaa authentication ......................................................................................................... 315
36.13 show aaa accounting ................................................................................................................ 316
36.14 line telnet ...................................................................................................................................... 316
36.16 line ssh ........................................................................................................................................... 318
37.6 dot1x mab .................................................................................................................................... 330
40.3 access-list mac .......................................................................................................................... 346
40.4 access-list ip ............................................................................................................................... 348
48.5 show dldp ..................................................................................................................................... 399
48.6 show dldp interface................................................................................................................... 400
49.15 rmon history ................................................................................................................................ 414
52.12 show logging local-config....................................................................................................... 446
52.13 show logging loghost ............................................................................................................... 446
52.14 show logging buffer .................................................................................................................. 447
52.15 show logging flash ..................................................................................................................... 447
XIX
Preface
This Guide is intended for network administrator to provide referenced information about CLI
(Command Line Interface). The device mentioned in this Guide stands for T1700G-28TQ
without any explanation.
Some models featured in this guide may be unavailable in your country or region. For local
sales information, visit https://www.tp-link.com.
Overview of this Guide
Chapter 1: Using the CLI
Provide information about how to use the CLI, CLI Command Modes, Security Levels and some
Conventions.
Chapter 2: User Interface
Provide information about the commands used to switch between five CLI Command Modes.
Chapter 3: Stack
Provide information about the commands used for configuring stack.
Chapter 4: User Management Commands
Provide information about the commands used for user management.
Chapter 5: System Configuration Commands
Provide information about the commands used for configuring the System information and
System IP, reboot and reset the switch, upgrade the switch system and commands used for
cable test.
Chapter 6:EEE Configuration Commands
Provide information about the commands used for configuring EEE.
Chapter 7: SDM Template Commands
Provide information about the commands used for configuring the SDM templates.
Chapter 8: Time Range Commands
Provide information about the commands used for configuring the time range.
Chapter 9: Port Configuration Commands
Provide information about the commands used for configuring the Speed, Negotiation Mode,
and Flow Control for Ethernet ports.
Chapter 10: Port Isolation Commands
Provide information about the commands used for configuring Port Isolation function.
1
Chapter 11: Loopback Detection Commands
Provide information about the commands used for configuring the Loopback Detection
function.
Chapter 12: Etherchannel Commands
Provide information about the commands used for configuring LAG (Link Aggregation Group)
and LACP (Link Aggregation Control Protocol).
Chapter 13: MAC Address Commands
Provide information about the commands used for Address configuration.
Chapter 14:IEEE 802.1Q VLAN Commands
Provide information about the commands used for configuring IEEE 802.1Q VLAN.
Chapter 15: MAC-based VLAN Commands
Provide information about the commands used for configuring MAC-based VLAN.
Chapter 16: Protocol-based VLAN Commands
Provide information about the commands used for configuring Protocol VLAN.
Chapter 17: IGMP Snooping Commands
Provide information about the commands used for configuring the IGMP Snooping (Internet
Group Management Protocol Snooping).
Chapter 18: MLD Snooping Commands
Provide information about the commands used for configuring the MLD Snooping (Multicast
Listener Discovery Snooping).
Chapter 19: MVR Commands
Provide information about the commands used for configuring the MVR.
Chapter 20: MSTP Commands
Provide information about the commands used for configuring the MSTP (Multiple Spanning
Tree Protocol).
Chapter 21: LLDP Commands
Provide information about the commands used for configuring LLDP function.
Chapter 21: Static Routes Commands
Provide information about the commands used for configuring the Static Route function.
Chapter 23: IPv6 Address Configuration Commands
Provide information about the commands used for configuring the System IPv6 addresses.
Chapter 24: ARP Commands
Provide information about the commands used for configuring the ARP (Address Resolution
Protocol) functions.
2
Chapter 25: DHCP Server Commands
Provide information about the commands used for configuring the DHCP Server function.
Chapter 26: DHCP Relay Commands
Provide information about the commands used for configuring the DHCP Relay function.
Chapter 27: DHCP L2 Relay Commands
Provide information about the commands used for configuring the DHCP L2 Relay function.
Chapter 28: QoS Commands
Provide information about the commands used for configuring the QoS function.
Chapter 29: Bandwidth Commands
Provide information about the commands used for configuring the Bandwidth Control.
Chapter 30: Voice VLAN Commands
Provide information about the commands used for configuring Voice VLAN.
Chapter 31 Auto VoIP Commands
Provide information about the commands used for configuring Auto VoIP.
Chapter 32 Access Control Commands
Provide information about the commands used for configuring Access Control.
Chapter 33: HTTP and HTTPS Commands
Provide information about the commands used for configuring the HTTP and HTTPS logon.
Chapter 34: SSH Commands
Provide information about the commands used for configuring and managing SSH (Security
Shell).
Chapter 35: Telnet Commands
Provide information about the commands used for configuring and managing SSH (Security
Shell).
Chapter 36: AAA Commands
Provide information about the commands used for configuring AAA (authentication,
authorization and accounting).
Chapter 37: IEEE 802.1X Commands
Provide information about the commands used for configuring IEEE 802.1X function.
Chapter 38 Port Security Commands
Provide information about the commands used for configuring Port Security.
Chapter 39: Port Mirroring Commands
Provide information about the commands used for configuring the Port Mirror function.
3
Chapter 40: ACL Commands
Provide information about the commands used for configuring the ACL (Access Control List).
Chapter 41: IPv4 IMPB Commands
Provide information about the commands used for binding the IP address, MAC address, VLAN
and the connected Port number of the Host together.
Chapter 42: IPv6 IMPB Commands
Provide information about the commands used for binding the IPv6 address, MAC address,
VLAN and the connected Port number of the Host together.
Chapter 43: IP Verify Source Commands
Provide information about the commands used for guarding the IP Source by filtering the IP
packets based on the IP-MAC Binding entries.
Chapter 44: IPv6 Verify Source Commands
Provide information about the commands used for guarding the IPv6 Source by filtering the IP
packets based on the IP-MAC Binding entries.
Chapter 45: DHCPv4 Filter Commands
Provide information about the commands used for configuring the DHCPv4 Filter.
Chapter 46: DHCPv6 Filter Commands
Provide information about the commands used for configuring the DHCPv6 Filter.
Chapter 47: DoS Defend Command
Provide information about the commands used for DoS defend and detecting the DoS attack.
Chapter 48: DLDP Commands
Provide information about the commands used for configuring the DLDP (Device Link
Detection Protocol).
Chapter 49: SNMP Commands
Provide information about the commands used for configuring the SNMP (Simple Network
Management Protocol) functions.
Chapter 50: ARP Inspection Commands
Provide information about the commands used for protecting the switch from the ARP
cheating or ARP Attack.
Chapter 51: ND Detection Commands
Provide information about the commands used for configuring ND detection.
Chapter 52: System Log Commands
Provide information about the commands used for configuring system log.
4
Chapter 1 Using the CLI
1.1 Accessing the CLI
You can log on to the switch and access the CLI by logging on to the switch remotely by a
Telnet or SSH connection through an Ethernet port.
1.1.1 Logon by Telnet
To log on to the switch by a Telnet connection, please take the following steps:
1. Click Start and type in cmd in the Search programs and files window and press the Enter
button.
Figure 1-1 Run Window
2. Type in telnet 192.168.0.1 in the cmd window and press Enter.
Figure 1-2 Type in the telnet command
5
3. Type in the login username and password (both admin by default). Press Enter and you will
enter User EXEC Mode.
Figure 1 3 Log in the Switch
Note: The first time you log in, change the password to better protect your network and
devices.
4. Type in enable command and you will enter Privileged EXEC Mode. By default no password
is needed. Later you can set a password for users who want to access the Privileged EXEC
Mode.
Figure 1-4 Enter into Priviledged EXEC Mode
1.1.2 Logon by SSH
To log on by SSH, a Putty client software is recommended. There are two authentication modes
to set up an SSH connection:
Password Authentication Mode: It requires username and password, which are both admin by
default.
Key Authentication Mode: It requires a public key for the switch and a private key for the SSH
client software. You can generate the public key and the private key through Putty Key
Generator.
Note:
1. Before SSH login, please follow the steps shown in Figure 1-5 to enable the SSH function
through Telnet connection.
2. The first time you log in, change the password to better protect your network and devices.
6
Figure 1-5 Enable SSH function
• Password Authentication Mode
1. Open the software to log on to the interface of PuTTY. Enter the IP address of the switch
into Host Name field; keep the default value 22 in the Port field; select SSH as the
Connection type.
Figure 1-6 SSH Connection Config
2. Click the Open button in the above figure to log on to the switch. Enter the login user name
and password to log on the switch, and then enter enable to enter Privileged EXEC Mode,
so you can continue to configure the switch.
7
Figure 1-7 Log on the Switch
• Key Authentication Mode
1. Select the key type and key length, and generate SSH key.
Figure 1-8 Generate SSH Key
Note:
1. The key length is in the range of 512 to 3072 bits.
2. During the key generation, randomly moving the mouse quickly can accelerate the key
generation.
8
2. After the key is successfully generated, please save the public key and private key to a
TFTP server.
Figure 1-9 Save the Generated Key
3. Log on to the switch by Telnet and download the public key file from the TFTP server to the
switch, as the following figure shows:
Figure 1-10 Download the Public Key
9
Note:
1. The key type should accord with the type of the key file.
2. The SSH key downloading can not be interrupted.
4. After the public key is downloaded, please log on to the interface of PuTTY and enter the IP
address for login.
Figure 1-11 SSH Connection Config
10
5. Click Browse to download the private key file to SSH client software and click Open.
Figure 1-12 Download the Private Key
6. After successful authentication, please enter the login user name. If you log on to the
switch without entering password, it indicates that the key has been successfully
downloaded.
Figure 1-13 Log on the Switch
1.2 CLI Command Modes
The CLI is divided into different command modes: User EXEC Mode, Privileged EXEC Mode,
Global Configuration Mode, Interface Configuration Mode and VLAN Configuration Mode.
Interface Configuration Mode can also be divided into Interface Ethernet, Interface
link-aggregation and some other modes, which is shown as the following diagram.
The following table gives detailed information about the Accessing path, Prompt of each mode
and how to exit the current mode and access the next mode.
11
mode.
VLAN Configuration mode.
Configuration mode.
Mode Accessing Path Prompt
User EXEC
Mode
Privileged
EXEC Mode
Global
Configuration
Mode
Primary mode once
it is connected with
the switch.
Use the enable
command to enter
this mode from User
EXEC mode.
Use the configure
command to enter
this mode from
Privileged EXEC
mode.
T1700G-28TQ>
T1700G-28TQ#
T1700G-28TQ(config)#
Logout or Access the next
mode
Use the exit command to
disconnect the switch.
Use the enable command to
access Privileged EXEC mode.
Enter the disable or the exit
command to return to User
EXEC mode.
Enter configure command to
access Global Configuration
Use the exit or the end
command or press Ctrl+Z to
return to Privileged EXEC mode.
Use the interface
port
gigabitEthernet
interface range
gigabitEthernet
command to access interface
Configuration mode.
or
port-list
Interface
Configuration
Mode
Layer 2 Interface:
Use the interface
gigabitEthernet
port,
interface
port-channel
port-channel-id
interface range
gigabitEthernet
port-list
to enter this mode
from Global
or
command
T1700G-28TQ (config-if)#
or
T1700G-28TQ(config-if-range)#
Use the vlan
Use the end command or press
Ctrl+Z to return to Privileged
EXEC mode.
Enter the exit or the # command
to return to Global Configuration
mode.
A port number must be
specified in the interface
command.
vlan-list
to access
12
Configuration mode.
list
configuration mode.
Mode Accessing Path Prompt
Layer 3 Interface:
Use the no
switchport
command to enter
Routed Port mode
from Interface
Configuration mode.
Interface
Configuration
Mode
Use the interface
vlan-id
vlan
command to enter
VLAN Interface
mode from Global
Configuration mode.
Use the interface
loopback
command to enter
Loopback Interface
mode from Global
id
T1700G-28TQ (config-if)#
T1700G-28TQ(config-if-range)#
or
Logout or Access the next
mode
Use the switchport command
to switch to the Layer 2
interface mode.
Use the end command or press
Ctrl+Z to return to Privileged
EXEC mode.
Enter the exit or the # command
to return to Global Configuration
mode.
VLAN
Configuration
Mode
Use the vlan
command to enter
this mode from
Global Configuration
mode.
vlan-
T1700G-28TQ (config-vlan)#
Use the end command or press
Ctrl+Z to return to Privileged
EXEC mode.
Enter the exit command or the #
command to return to Global
13
Each command mode has its own set of specific commands. To configure some
Interface gigabitEthernet: Configure parameters for an Ethernet port, such as
Display all information of switch, for example: statistic information, port
• history: Display the commands history.
Note:
1. The user is automatically in User EXEC Mode after the connection between the PC and the
switch is established by a Telnet/SSH connection.
2.
commands, you should access the corresponding command mode firstly.
• Global Configuration Mode: In this mode, global commands are provided, such as the
Spanning Tree, Schedule Mode and so on.
• Interface Configuration Mode: In this mode, users can configure one or several ports,
different ports corresponds to different commands
a).
Duplex-mode, flow control status.
b). Interface range gigabitEthernet: Configure parameters for several Ethernet ports.
c). Interface link-aggregation: Configure parameters for a link-aggregation, such as
broadcast storm.
d). Interface range link-aggregation: Configure parameters for multi-trunks.
e). Interface vlan: Configure parameters for the vlan-port.
• VLAN Configuration Mode: In this mode, users can create a VLAN and add a specified
port to the VLAN.
3. Some commands are global, that means they can be performed in all modes:
• show:
information, VLAN information.
1.3 Privilege Restrictions
This switch’s security is divided into four privilege levels: User level, Power User level, Operator
level and Admin level. You can define username and password pairs, and assign a specific
privilege level to each pair. Different privilege levels have access to specified commands,
which is illustrated in the Privilege Requirement in each command. For details about how to
configure usename and password pairs, please refer to user name (password) and
(secret).
Users can enter Privileged EXEC mode from User EXEC mode by using the enable command. In
default case, no password is needed. In Global Configuration Mode, you can configure
user name
14
password for Admin level by enable password command. Once password is configured, you
are required to enter it to access Privileged EXEC mode.
1.4 Conventions
1.4.1 Format Conventions
The following conventions are used in this Guide:
• Items in square brackets [ ] are optional
• Items in braces { } are required
• Alternative items are grouped in braces and separated by vertical bars. For example:
speed {10 | 100 | 1000 }
• Bold indicates an unalterable keyword. For example: show logging
• Normal Font indicates a constant (several options are enumerated and only one can be
selected). For example: mode {dynamic | static | permanent}
• Italic Font indicates a variable (an actual value must be assigned). For example: bridge
aging-time
aging-time
1.4.2 Special Characters
You should pay attentions to the description below if the variable is a character string:
• These six characters ” < > , \ & cannot be input.
• If a blank is contained in a character string, single or double quotation marks should be
used, for example ’hello world’, ”hello world”, and the words in the quotation marks will be
identified as a string. Otherwise, the words will be identified as several strings.
1.4.3 Parameter Format
Some parameters must be entered in special formats which are shown as follows:
• MAC address must be enter in the format of xx:xx:xx:xx:xx:xx.
• One or several values can be typed for a port-list or a vlan-list using comma to separate.
Use a hyphen to designate a range of values, for instance, 1/0/1, 1/0/3-5, 1/0/7 indicates
choosing port 1/0/1, 1/0/3, 1/0/4, 1/0/5, 1/0/7.
15
Chapter 2 User Interface
2.1 enable
Description
The enable command is used to access Privileged EXEC Mode from User
EXEC Mode.
Syntax
enable
Command Mode
User EXEC Mode
Privilege Requirement
None.
Example
If you have set the password to access Privileged EXEC Mode from User
EXEC Mode:
T1700G-28TQ>enable
Enter password
T1700G-28TQ#
2.2 service password-encryption
Description
The service password-encryption command is used to encrypt the
password when the password is defined or when the configuration is written,
using the symmetric encryption algorithm. Encryption prevents the password
from being readable in the configuration file. To disable the global encryption
Syntax
function, please use no service password-encryption command.
service password-encryption
no service password-encryption
16
Command Mode
Global Configuration Mode
Privilege Requirement
Only Admin level users have access to these commands.
Example
Enable the global encryption function:
T1700G-28TQ(config)# service password-encryption
2.3 enable password
Description
The enable password command is used to set or change the password for
users to access Privileged EXEC Mode from User EXEC Mode. To remove the
password, please use no enable password command. This command uses
the symmetric encryption.
Syntax
enable password { [ 0 ]
no enable password
Parameter
0 —— Specify the encryption type. 0 indicates that an unencrypted password
will follow. By default, the encryption type is 0.
password
can contain only English letters (case-sensitive), digits and 17 kinds of special
characters. The special characters are !$%’()*,-./[]_{|}. By default, it is empty.
7 —— Indicates a symmetric encrypted password with fixed length will follow.
encrypted-password
which you can copy from another switch’s configuration file. After the
password
—— Super password, a string with 31 characters at most, which
—— A symmetric encrypted password with fixed length,
| 7
encrypted-password
}
encrypted password is configured, you should use the corresponding
unencrypted password if you re-enter this mode.
Command Mode
Global Configuration Mode
Privilege Requirement
Only Admin level users have access to these commands.
17
User Guidelines
If the password you configured here is unencrypted and the global
encryption function is enabled in service password-encryption
in the configuration file will be displayed in the symmetric encrypted form.
If both the enable password and enable secret are defined, only the latest
configured password will take effect.
Example
Set the super password as “admin” and unencrypted to access Privileged
EXEC Mode from User EXEC Mode:
T1700G-28TQ(config)#enable password 0 admin
2.4 enable secret
Description
The enable secret command is used to set a secret password, which is using
an MD5 encryption algorithm, for users to access Privileged EXEC Mode from
, the password
User EXEC Mode. To return to the default configuration, please use no enable
secret command. This command uses the MD5 encryption.
Syntax
enable secret { [ 0 ]
no enable secret
Parameter
0 —— Specify the encryption type. 0 indicates that an unencrypted password
will follow. By default, the encryption type is 0.
password
can contain only English letters (case-sensitive), digits and 17 kinds of special
characters. The special characters are !$%’()*,-./[]_{|}. By default, it is empty.
5 —— Indicates an MD5 encrypted password with fixed length will follow.
encrypted-password
which you can copy from another switch’s configuration file. After the
password
—— Super password, a string with 31 characters at most, which
—— An MD5 encrypted password with fixed length,
| 5
encrypted-password
}
encrypted password is configured, you should use the corresponding
unencrypted password if you re-enter this mode.
Command Mode
Global Configuration Mode
18
Privilege Requirement
Only Admin level users have access to these commands.
User Guidelines
If both the enable password and enable secret are defined, only the latest
configured password will take effect.
Example
Set the secret password as “admin” and unencrypted to access Privileged
EXEC Mode from User EXEC Mode. The password will be displayed in the
encrypted form.
T1700G-28TQ(config)#enable secret 0 admin
2.5 configure
Description
The configure command is used to access Global Configuration Mode from
Privileged EXEC Mode.
Syntax
configure
Command Mode
Privileged EXEC Mode
Privilege Requirement
Only Admin, Operator and Power User level users have access to these
commands.
Example
Access Global Configuration Mode from Privileged EXEC Mode:
T1700G-28TQ# configure
T1700G-28TQ(config)#
2.6 exit
Description
The exit command is used to return to the previous Mode from the current
Mode.
19
Syntax
exit
Command Mode
Privileged EXEC Mode and Any Configuration Mode
Privilege Requirement
None.
Example
Return to Global Configuration Mode from Interface Configuration Mode, and
then return to Privileged EXEC Mode:
T1700G-28TQ(config-if)# exit
T1700G-28TQ(config)#exit
T1700G-28TQ#
2.7 end
Description
The end command is used to return to Privileged EXEC Mode.
Syntax
end
Command Mode
Privileged EXEC Mode and Any Configuration Mode
Privilege Requirement
Only Admin level users have access to these commands.
Example
Return to Privileged EXEC Mode from Interface Configuration Mode:
T1700G-28TQ(config-if)#end
T1700G-28TQ#
2.8 clipaging
Description
The clipaging command is used to enable the pause function for the screen
display. If you want to display all the related information of the switch at once
when using the show command, please use no clipaging command.
20
Syntax
clipaging
no clipaging
Command Mode
Privileged EXEC Mode and Any Configuration Mode
Privilege Requirement
None.
Example
Disable the pause function for the screen display:
T1700G-28TQ(config)#no clipaging
2.9 history
Description
The history command is used to show the latest 20 commands you entered
in the current mode since the switch is powered.
Syntax
history
Command Mode
Privileged EXEC Mode and any Configuration Mode
Privilege Requirement
None.
Example
Show the commands you have entered in the current mode:
T1700G-28TQ (config)# history
1 history
21
2.10 history clear
Description
The history clear command is used to clear the commands you have entered
in the current mode; therefore, these commands will not be shown next time
you use the history command.
Syntax
history clear
Command Mode
Privileged EXEC Mode and any Configuration Mode
Privilege Requirement
Only Admin, Operator and Power User level users have access to these
commands.
Example
Clear the commands you have entered in the current mode:
T1700G-28TQ(config)#history clear
22
Chapter 3 Stack
The stack technology is to connect multiple stackable devices through their StackWise ports,
forming a stack which works as a unified system and presents as a single entity to the network.
This chapter describes how to manage the switch stacks.
3.1 switch priority
Description
The switch priority command is used to specify a new priority value for the
stack member. By default, the priority value is 5. To restore the priority of the
specified stack member to the default value, please use no switch priority
command.
Syntax
swtich
no switch
unitid
unitid
priority
priority
Parameter
unitid
—— Specify the unit ID of the stack member whose priority value need
to be changed. Valid values are from 1 to 6.
priority
A higher priority value for a stack member increases its likelihood of being
elected the stack master.
—— Specify the member’s priority value. Valid values are from 1 to 15.
Command Mode
Global Configuration Mode
Privilege Requirement
Only Admin, Operator and Power User level users have access to these
priority
commands.
User Guidelines
The new priority value takes effect immediately but does not affect the
current stack master. The new priority helps determine which stack member
is elected as the new stack master when a re-election occurs.
23
Example
Specify the unit 1’s priority as 10 in the stack:
T1700G-28TQ(config)# switch 1 priority 10
3.2 switch renumber
Description
The switch renumber command is modify the member number of a specified
stack member.
Syntax
swtich
unitid
renumber {
Parameter
unitid
—— Specify the unit ID of the stack member that you want to renumber.
Valid values are from 1 to 6.
newid
from 1 to 6.
auto-numbering —— The specified member will obtain its stack number
through auto-numbering.
—— Specify the new unit ID for the stack member. Valid values are
Command Mode
Global Configuration Mode
Privilege Requirement
Only Admin, Operator and Power User level users have access to these
commands.
newid
| auto-numbering }
Example
Modify the unit 1’s new member number as 2:
T1700G-28TQ(config)# switch 1 renumber 2
3.3 switch stack-port
Description
The switch stack-port command is used to enable the stack port. To switch
the stack port to Ethernet port, please use no switch stack-port command.
24
Port 1/0/25 and port 1/0/26 are in Stack Port Group 0 and 1/0/27 and 1/0/28
are in Stack Group 1. Stack feature can only be enabled in one group at a
time.
Syntax
swtich stack-port interface ten-gigabitEthernet
no switch stack-port interface ten-gigabitEthernet
Parameter
port
—— Specify the port number of a ten-gigabit port to configure.
Command Mode
Global Configuration Mode
Privilege Requirement
Only Admin, Operator and Power User level users have access to these
commands.
Example
Specify the ten-gigabit port 1/0/28 as a stack port:
The system-time ntp command is used to configure the time zone and the IP
address for the NTP Server. The switch will get UTC automatically if it has
connected to an NTP Server.
Syntax
system-time ntp {
fetching-rate
{
Parameter
timezone
UTC+13:00.
timezone
}
—— Your local time-zone, and it ranges from UTC-12:00 to
32
} {
ntp-server
} {
backup-ntp-server
}
The detailed information that each time-zone means are displayed as follow:
UTC-12:00 —— TimeZone for International Date Line West.
UTC-11:00 —— TimeZone for Coordinated Universal Time-11.
UTC-10:00 —— TimeZone for Hawaii.
UTC-09:00 —— TimeZone for Alaska.
UTC-08:00 —— TimeZone for Pacific Time(US Canada).
UTC-07:00 —— TimeZone for Mountain Time(US Canada).
UTC-06:00 —— TimeZone for Central Time(US Canada).
UTC-05:00 —— TimeZone for Eastern Time(US Canada).
UTC-04:30 —— TimeZone for Caracas.
UTC-04:00 —— TimeZone for Atlantic Time(Canada).
UTC-03:30 —— TimeZone for Newfoundland.
UTC-03:00 —— TimeZone for Buenos Aires, Salvador, Brasilia.
UTC-02:00 —— TimeZone for Mid-Atlantic.
UTC-01:00 —— TimeZone for Azores, Cape Verde Is.
UTC —— TimeZone for Dublin, Edinburgh, Lisbon, London.
UTC+01:00 —— TimeZone for Amsterdam, Berlin, Bern, Rome, Stockholm,
Vienna.
UTC+02:00 —— TimeZone for Cairo, Athens, Bucharest, Amman, Beirut,
Jerusalem.
UTC+03:00 —— TimeZone for Kuwait, Riyadh, Baghdad.
UTC+03:30 —— TimeZone for Tehran.
UTC+04:00 —— TimeZone for Moscow, St.Petersburg, Volgograd, Tbilisi,
Port Louis.
UTC+04:30 —— TimeZone for Kabul.
UTC+05:00 —— TimeZone for Islamabad, Karachi, Tashkent.
UTC+05:30 —— TimeZone for Chennai, Kolkata, Mumbai, New Delhi.
UTC+05:45 —— TimeZone for Kathmandu.
UTC+06:00 —— TimeZone for Dhaka,Astana, Ekaterinburg.
UTC+06:30 —— TimeZone for Yangon (Rangoon).
UTC+07:00 —— TimeZone for Novosibrisk, Bangkok, Hanoi, Jakarta.
UTC+08:00—— TimeZone for Beijing, Chongqing, Hong Kong, Urumqi,
Singapore.
UTC+09:00 —— TimeZone for Seoul, Irkutsk, Osaka, Sapporo, Tokyo.
UTC+09:30 —— TimeZone for Darwin, Adelaide.
UTC+10:00 —— TimeZone for Canberra, Melbourne, Sydney, Brisbane.
UTC+11:00 —— TimeZone for Solomon Is., New Caledonia, Vladivostok.
UTC+12:00 —— TimeZone for Fiji, Magadan, Auckland, Welington.
UTC+13:00 —— TimeZone for Nuku'alofa, Samoa.
ntp-server
—— The IP address for the Primary NTP Server.
33
backup-ntp-server
fetching-rate
—— Specify the rate fetching time from NTP server.
Command Mode
Global Configuration Mode
Privilege Requirement
Only Admin and Operator level users have access to these commands.
Example
Configure the system time mode as NTP, the time zone is UTC-12:00, the
primary NTP server is 133.100.9.2 and the secondary NTP server is