2.7 end ..................................................................................................................................................... 20
2.9 history ............................................................................................................................................... 21
2.10 history clear .................................................................................................................................... 22
Chapter 3 User Management Commands ................................................................ 23
3.1 user name (password) ................................................................................................................. 23
3.2 user name (secret) ........................................................................................................................ 24
3.3 show user account-list................................................................................................................ 25
3.4 show user configuration ............................................................................................................. 26
Chapter 4 System Configuration Commands ......................................................... 27
4.9 ip address ........................................................................................................................................ 34
4.10 ip address-alloc ............................................................................................................................. 35
4.28 show system-info ......................................................................................................................... 47
4.29 show image-info ............................................................................................................................ 48
4.30 show boot ........................................................................................................................................ 48
4.31 show running-config .................................................................................................................... 49
4.32 show startup-config .................................................................................................................... 49
4.33 show system-time ........................................................................................................................ 50
4.34 show system-time dst ................................................................................................................. 50
4.35 show system-time ntp ................................................................................................................ 51
4.36 show cable-diagnostics interface........................................................................................... 51
4.37 show cpu-utilization ..................................................................................................................... 52
4.38 show memory-utilization ............................................................................................................ 52
7.6 show holiday ................................................................................................................................... 61
7.7 show time-range ........................................................................................................................... 62
Chapter 8 Port Configuration Commands ............................................................... 63
8.10 show interface status .................................................................................................................. 69
8.11 show interface counters ............................................................................................................ 69
8.12 show interface configuration .................................................................................................... 70
Chapter 9 Port Isolation Commands ......................................................................... 71
9.1 port isolation................................................................................................................................... 71
9.2 show port isolation interface .................................................................................................... 72
11.5 show etherchannel ....................................................................................................................... 82
11.6 show etherchannel load-balance ............................................................................................ 83
11.7 show lacp ......................................................................................................................................... 84
11.8 show lacp sys-id ............................................................................................................................ 84
Chapter 12 MAC Address Commands ......................................................................... 86
12.1 mac address-table static ........................................................................................................... 86
12.2 no mac address-table dynamic ............................................................................................... 87
12.3 mac address-table aging-time ................................................................................................. 87
12.4 mac address-table filtering ....................................................................................................... 88
12.5 mac address-table max-mac-count ...................................................................................... 89
12.6 show mac address-table ............................................................................................................ 90
12.7 clear mac address-table ............................................................................................................ 91
12.8 show mac address-table aging-time ..................................................................................... 91
12.9 show mac address-table max-mac-count ........................................................................... 92
12.10 show mac address-table interface ......................................................................................... 92
12.11 show mac address-table count ............................................................................................... 93
12.12 show mac address-table address .......................................................................................... 93
12.13 show mac address-table vlan ................................................................................................... 94
13.2 name .................................................................................................................................................. 96
13.9 show vlan summary................................................................................................................... 100
13.10 show vlan brief ............................................................................................................................ 101
13.11 show vlan ...................................................................................................................................... 101
V
13.12 show interface switchport ...................................................................................................... 102
17.18 range .............................................................................................................................................. 128
17.19 ip igmp filter ................................................................................................................................. 129
17.20 clear ip igmp snooping statistics ......................................................................................... 129
17.21 show ip igmp snooping ............................................................................................................ 130
17.22 show ip igmp snooping interface ......................................................................................... 130
17.23 show ip igmp snooping vlan ................................................................................................... 131
17.24 show ip igmp snooping groups ............................................................................................. 132
17.25 show ip igmp profile .................................................................................................................. 133
18.16 range .............................................................................................................................................. 146
19.2 mvr group ..................................................................................................................................... 151
19.7 mvr type ........................................................................................................................................ 155
19.10 show mvr ...................................................................................................................................... 157
19.11 show mvr interface .................................................................................................................... 158
19.12 show mvr members .................................................................................................................. 158
20.8 name ............................................................................................................................................... 165
21.14 show lldp ....................................................................................................................................... 189
21.15 show lldp interface .................................................................................................................... 189
21.16 show lldp local-information interface ................................................................................. 190
21.17 show lldp neighbor-information interface ......................................................................... 191
21.18 show lldp traffic interface ....................................................................................................... 191
22.1 ip routing ....................................................................................................................................... 193
22.9 ip route .......................................................................................................................................... 198
22.12 show interface vlan ................................................................................................................... 200
22.13 show ip interface ........................................................................................................................ 200
22.14 show ip interface brief .............................................................................................................. 201
IX
22.15 show ip route ............................................................................................................................... 201
22.16 show ip route specify ............................................................................................................... 202
22.17 show ip route summary ........................................................................................................... 203
22.18 show ipv6 interface ................................................................................................................... 203
22.19 show ipv6 route .......................................................................................................................... 204
22.20 show ipv6 route summary ...................................................................................................... 204
24.9 ip proxy-arp.................................................................................................................................. 218
24.10 ip local-proxy-arp ...................................................................................................................... 218
24.11 show arp ........................................................................................................................................ 219
24.12 show ip arp (interface) .............................................................................................................. 220
24.13 show ip arp summary................................................................................................................ 220
24.14 show gratuitous-arp ................................................................................................................. 221
24.15 show ip proxy-arp ...................................................................................................................... 221
Chapter 25 DHCP Server Commands ........................................................................ 223
25.1 service dhcp server .................................................................................................................. 223
25.2 ip dhcp server extend-option capwap-ac-ip.................................................................... 223
25.3 ip dhcp server extend-option vendor-class-id ............................................................... 224
X
25.4 ip dhcp server exclude-address ........................................................................................... 225
25.5 ip dhcp server pool ................................................................................................................... 226
25.6 ip dhcp server ping timeout ................................................................................................... 226
25.7 ip dhcp server ping packets ................................................................................................... 227
31.8 auto-voip data priority .............................................................................................................. 281
31.9 show auto-voip ........................................................................................................................... 281
Chapter 32 Access Control Commands ................................................................... 283
32.1 user access-control ip-based enable ................................................................................. 283
32.2 user access-control ip-based ............................................................................................... 283
32.3 user access-control mac-based enable ............................................................................ 284
32.4 user access-control mac-based .......................................................................................... 285
32.5 user access-control port-based enable ............................................................................ 286
32.6 user access-control port-based .......................................................................................... 286
Chapter 33 HTTP and HTTPS Commands ................................................................ 288
33.1 ip http server ............................................................................................................................... 288
33.2 ip http port .................................................................................................................................... 288
33.3 ip http max-users ....................................................................................................................... 289
33.4 ip http session timeout ............................................................................................................ 290
33.5 ip http secure-server ................................................................................................................ 291
33.6 ip http secure-port .................................................................................................................... 291
33.7 ip http secure-protocol............................................................................................................ 292
33.8 ip http secure-ciphersuite ...................................................................................................... 293
33.9 ip http secure-max-users ....................................................................................................... 293
XIII
33.10 ip http secure-session timeout ............................................................................................. 294
33.11 ip http secure-server download certificate ...................................................................... 295
33.12 ip http secure-server download key ................................................................................... 296
33.13 show ip http configuration ...................................................................................................... 297
33.14 show ip http secure-server .................................................................................................... 297
34.1 ip ssh server ................................................................................................................................ 299
34.2 ip ssh port ..................................................................................................................................... 299
34.3 ip ssh version .............................................................................................................................. 300
34.4 ip ssh algorithm .......................................................................................................................... 301
34.5 ip ssh timeout .............................................................................................................................. 301
34.6 ip ssh max-client ........................................................................................................................ 302
34.7 ip ssh download .......................................................................................................................... 303
34.9 show ip ssh................................................................................................................................... 304
35.3 telnet port ..................................................................................................................................... 306
35.4 show telnet-status..................................................................................................................... 306
36.4 show radius-server ................................................................................................................... 311
36.5 aaa group ...................................................................................................................................... 312
36.6 server ............................................................................................................................................. 313
36.7 show aaa group .......................................................................................................................... 313
36.12 show aaa authentication ......................................................................................................... 317
36.13 show aaa accounting ................................................................................................................ 318
36.14 line telnet ...................................................................................................................................... 318
36.16 line ssh ........................................................................................................................................... 320
37.6 dot1x mab .................................................................................................................................... 332
40.3 access-list mac .......................................................................................................................... 349
40.4 access-list ip ............................................................................................................................... 351
48.5 show dldp ..................................................................................................................................... 404
48.6 show dldp interface................................................................................................................... 405
49.16 rmon history ................................................................................................................................ 421
52.12 show logging local-config....................................................................................................... 453
52.13 show logging loghost ............................................................................................................... 453
52.14 show logging buffer .................................................................................................................. 454
52.15 show logging flash ..................................................................................................................... 454
XX
Preface
This Guide is intended for network administrator to provide referenced information about CLI
(Command Line Interface). The device mentioned in this Guide stands for T1700X-16TS
without any explanation. The commands in this guide apply to these models if not specially
noted.
Some models featured in this guide may be unavailable in your country or region. For local
sales information, visit https://www.tp-link.com.
Overview of this Guide
Chapter 1: Using the CLI
Provide information about how to use the CLI, CLI Command Modes, Security Levels and some
Conventions.
Chapter 2: User Interface
Provide information about the commands used to switch between five CLI Command Modes.
Chapter 3: User Management Commands
Provide information about the commands used for user management.
Chapter 4: System Configuration Commands
Provide information about the commands used for configuring the System information and
System IP, reboot and reset the switch, upgrade the switch system and commands used for
cable test.
Chapter 5:EEE Configuration Commands
Provide information about the commands used for configuring EEE.
Chapter 6: SDM Template Commands
Provide information about the commands used for configuring the SDM templates.
Chapter 7: Time Range Commands
Provide information about the commands used for configuring the time range.
Chapter 8: Port Configuration Commands
Provide information about the commands used for configuring the Speed, Negotiation Mode,
and Flow Control for Ethernet ports.
Chapter 9: Port Isolation Commands
Provide information about the commands used for configuring Port Isolation function.
Chapter 10: Loopback Detection Commands
Provide information about the commands used for configuring the Loopback Detection
function.
1
Chapter 11: Etherchannel Commands
Provide information about the commands used for configuring LAG (Link Aggregation Group)
and LACP (Link Aggregation Control Protocol).
Chapter 12: MAC Address Commands
Provide information about the commands used for Address configuration.
Chapter 13:IEEE 802.1Q VLAN Commands
Provide information about the commands used for configuring IEEE 802.1Q VLAN.
Chapter 14: MAC-based VLAN Commands
Provide information about the commands used for configuring MAC-based VLAN.
Chapter 15: Protocol-based VLAN Commands
Provide information about the commands used for configuring Protocol VLAN.
Chapter 16: GVRP Commands
Provide information about the commands used for configuring GVRP (GARP VLAN registration
protocol).
Chapter 17: IGMP Snooping Commands
Provide information about the commands used for configuring the IGMP Snooping (Internet
Group Management Protocol Snooping).
Chapter 18: MLD Snooping Commands
Provide information about the commands used for configuring the MLD Snooping (Multicast
Listener Discovery Snooping).
Chapter 19: MVR Commands
Provide information about the commands used for configuring the MVR.
Chapter 20: MSTP Commands
Provide information about the commands used for configuring the MSTP (Multiple Spanning
Tree Protocol).
Chapter 21: LLDP Commands
Provide information about the commands used for configuring LLDP function.
Chapter 22: Static Routes Commands
Provide information about the commands used for configuring the Static Route function.
Chapter 23: IPv6 Address Configuration Commands
Provide information about the commands used for configuring the System IPv6 addresses.
Chapter 24: ARP Commands
Provide information about the commands used for configuring the ARP (Address Resolution
Protocol) functions.
2
Chapter 25: DHCP Server Commands
Provide information about the commands used for configuring the DHCP Server function.
Chapter 26: DHCP Relay Commands
Provide information about the commands used for configuring the DHCP Relay function.
Chapter 27: DHCP L2 Relay Commands
Provide information about the commands used for configuring the DHCP L2 Relay function.
Chapter 28: QoS Commands
Provide information about the commands used for configuring the QoS function.
Chapter 29: Bandwidth Commands
Provide information about the commands used for configuring the Bandwidth Control.
Chapter 30: Voice VLAN Commands
Provide information about the commands used for configuring Voice VLAN.
Chapter 31 Auto VoIP Commands
Provide information about the commands used for configuring Auto VoIP.
Chapter 32: Access Control Commands
Provide information about the commands used for configuring Access Control.
Chapter 33: HTTP and HTTPS Commands
Provide information about the commands used for configuring the HTTP and HTTPS logon.
Chapter 34: SSH Commands
Provide information about the commands used for configuring and managing SSH (Security
Shell).
Chapter 35: Telnet Commands
Provide information about the commands used for configuring and managing SSH (Security
Shell).
Chapter 36: AAA Commands
Provide information about the commands used for configuring AAA (authentication,
authorization and accounting).
Chapter 37: IEEE 802.1X Commands
Provide information about the commands used for configuring IEEE 802.1X function.
Chapter 38 Port Security Commands
Provide information about the commands used for configuring Port Security.
Chapter 39: Port Mirroring Commands
Provide information about the commands used for configuring the Port Mirror function.
3
Chapter 40: ACL Commands
Provide information about the commands used for configuring the ACL (Access Control List).
Chapter 41: IPv4 IMPB Commands
Provide information about the commands used for binding the IP address, MAC address, VLAN
and the connected Port number of the Host together.
Chapter 42: IPv6 IMPB Commands
Provide information about the commands used for binding the IPv6 address, MAC address,
VLAN and the connected Port number of the Host together.
Chapter 43: IP Verify Source Commands
Provide information about the commands used for guarding the IP Source by filtering the IP
packets based on the IP-MAC Binding entries.
Chapter 44: IPv6 Verify Source Commands
Provide information about the commands used for guarding the IPv6 Source by filtering the IP
packets based on the IP-MAC Binding entries.
Chapter 45: DHCPv4 Filter Commands
Provide information about the commands used for configuring the DHCPv4 Filter.
Chapter 46: DHCPv6 Filter Commands
Provide information about the commands used for configuring the DHCPv6 Filter.
Chapter 47: DoS Defend Command
Provide information about the commands used for DoS defend and detecting the DoS attack.
Chapter 48: DLDP Commands
Provide information about the commands used for configuring the DLDP (Device Link
Detection Protocol).
Chapter 49: SNMP Commands
Provide information about the commands used for configuring the SNMP (Simple Network
Management Protocol) functions.
Chapter 50: ARP Inspection Commands
Provide information about the commands used for protecting the switch from the ARP
cheating or ARP Attack.
Chapter 51: ND Detection Commands
Provide information about the commands used for configuring ND detection.
Chapter 52: System Log Commands
Provide information about the commands used for configuring system log.
4
Chapter 1 Using the CLI
1.1 Accessing the CLI
You can log on to the switch and access the CLI by logging on to the switch remotely by a
Telnet or SSH connection through an Ethernet port.
1.1.1 Logon by Telnet
To log on to the switch by a Telnet connection, please take the following steps:
1. Click Start and type in cmd in the Search programs and files window and press the Enter
button.
Figure 1-1 Run Window
2. Type in telnet 192.168.0.1 in the cmd window and press Enter.
Figure 1-2 Type in the telnet command
5
Note:
3. Type in the login username and password (both admin by default). Press Enter and you will
enter User EXEC Mode.
igure 1-3 Log in the Switch
F
The first time you log in, change the password to better protect your network and
devices.
4. Type in enable command and you will enter Privileged EXEC Mode. By default no password
is needed. Later you can set a password for users who want to access the Privileged EXEC
Mode.
Figure 1-4 Enter into Priviledged EXEC Mode
1.1.2 Logon by SSH
To log on by SSH, a Putty client software is recommended. There are two authentication modes
to set up an SSH connection:
Password Authentication Mode: It requires username and password, which are both admin by
default.
Key Authentication Mode: It requires a public key for the switch and a private key for the SSH
client software. You can generate the public key and the private key through Putty Key
Generator.
Note:
1. Before SSH login, please follow the steps shown in Figure 1-5 to enable the SSH function
through Telnet connection.
2. The first time you log in, change the password to better protect your network and devices.
6
Figure 1-5 Enable SSH function
• Password Authentication Mode
1. Open the software to log on to the interface of PuTTY. Enter the IP address of the switch
into Host Name field; keep the default value 22 in the Port field; select SSH as the
Connection type.
Figure 1-6 SSH Connection Config
2. Click the Open button in the above figure to log on to the switch. Enter the login user name
and password to log on the switch, and then enter enable to enter Privileged EXEC Mode,
so you can continue to configure the switch.
7
Figure 1-7 Log on the Switch
• Key Authentication Mode
1. Select the key type and key length, and generate SSH key.
Figure 1-8 Generate SSH Key
Note:
1. The key length is in the range of 512 to 3072 bits.
2. During the key generation, randomly moving the mouse quickly can accelerate the key
generation.
8
2. After the key is successfully generated, please save the public key and private key to a
TFTP server.
Figure 1-9 Save the Generated Key
3. Log on to the switch by Telnet and download the public key file from the TFTP server to the
switch, as the following figure shows:
Figure 1-10 Download the Public Key
9
Loading...
+ 446 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.