CLI Guide
JetStream 24-Port 10/100Mbps + 4-Port Gigabit L2 Managed Switch
T2500-28TC (TL-SL5428E)
REV2.0.0
1910011988
COPYRIGHT & TRADEMARKS
Specifications are subject to change without notice. is a registered trademark of TP-Link Technologies Co., Ltd. Other brands and product names are trademarks or registered trademarks of their respective holders.
No part of the specifications may be reproduced in any form or by any means or used to make any derivative such as translation, transformation, or adaptation without permission from TP-Link Technologies Co., Ltd. Copyright © 2016 TP-Link Technologies Co., Ltd. All rights reserved.
http://www.tp-link.com
I
CONTENTS
Preface |
.............................................................................................................. |
1 |
|
Chapter 1 Using the CLI ....................................................................................... |
5 |
||
1.1 |
Accessing the CLI............................................................................................................. |
5 |
|
|
1.1.1 Logon by a console port...................................................................................... |
5 |
|
|
1.1.2 |
Logon by Telnet ................................................................................................... |
6 |
|
1.1.3 |
Logon by SSH ................................................................................................... |
10 |
1.2 |
CLI Command Modes .................................................................................................... |
15 |
|
1.3 |
Security Levels ............................................................................................................... |
18 |
|
1.4 |
Conventions.................................................................................................................... |
18 |
|
|
1.4.1 |
Format Conventions............................................................................................. |
18 |
|
1.4.2 |
Special Characters............................................................................................... |
18 |
|
1.4.3 |
Parameter Format................................................................................................ |
19 |
Chapter 2 |
User Interface .................................................................................... |
20 |
|
enable...................................................................................................................................... |
|
20 |
|
enable password ..................................................................................................................... |
20 |
||
disable ..................................................................................................................................... |
|
21 |
|
configure.................................................................................................................................. |
|
21 |
|
exit........................................................................................................................................... |
|
|
22 |
end........................................................................................................................................... |
|
|
22 |
history...................................................................................................................................... |
|
23 |
|
history clear............................................................................................................................. |
23 |
||
Chapter 3 IEEE 802.1Q VLAN Commands ........................................................ |
24 |
||
vlan.......................................................................................................................................... |
|
|
24 |
interface vlan........................................................................................................................... |
25 |
||
name ....................................................................................................................................... |
|
25 |
|
switchport mode ...................................................................................................................... |
26 |
||
switchport access vlan ............................................................................................................ |
26 |
||
switchport trunk allowed vlan .................................................................................................. |
27 |
||
switchport general allowed vlan.............................................................................................. |
28 |
||
switchport pvid ........................................................................................................................ |
28 |
||
show vlan summary ................................................................................................................ |
29 |
||
show vlan brief ........................................................................................................................ |
29 |
||
show vlan ................................................................................................................................ |
|
30 |
II
Chapter 4 MAC-based VLAN Commands.......................................................... |
31 |
mac-vlan mac-address............................................................................................................ |
31 |
mac-vlan.................................................................................................................................. |
32 |
show mac-vlan ........................................................................................................................ |
32 |
show mac-vlan interface ......................................................................................................... |
33 |
Chapter 5 Protocol-based VLAN Commands ................................................... |
34 |
protocol-vlan template............................................................................................................. |
34 |
protocol-vlan vlan .................................................................................................................... |
35 |
protocol-vlan............................................................................................................................ |
35 |
show protocol-vlan template ................................................................................................... |
36 |
show protocol-vlan vlan........................................................................................................... |
36 |
show protocol-vlan interface ................................................................................................... |
37 |
Chapter 6 VLAN-VPN Commands...................................................................... |
38 |
dot1q-tunnel ............................................................................................................................ |
38 |
dot1q-tunnel tpid ..................................................................................................................... |
38 |
dot1q-tunnel mapping ............................................................................................................. |
39 |
switchport dot1q-tunnel mapping............................................................................................ |
40 |
switchport dot1q-tunnel mode uplink ...................................................................................... |
40 |
show dot1q-tunnel................................................................................................................... |
41 |
show dot1q-tunnel mapping.................................................................................................... |
41 |
show dot1q-tunnel mapping interface..................................................................................... |
42 |
show dot1q-tunnel uplink ........................................................................................................ |
42 |
Chapter 7 Voice VLAN Commands.................................................................... |
43 |
voice vlan ................................................................................................................................ |
43 |
voice vlan aging time............................................................................................................... |
43 |
voice vlan priority .................................................................................................................... |
44 |
voice vlan mac-address .......................................................................................................... |
45 |
switchport voice vlan mode..................................................................................................... |
45 |
switchport voice vlan security ................................................................................................. |
46 |
show voice vlan....................................................................................................................... |
47 |
show voice vlan oui................................................................................................................. |
47 |
show voice vlan switchport ..................................................................................................... |
48 |
Chapter 8 Private VLAN Commands ................................................................. |
49 |
private-vlan primary................................................................................................................. |
49 |
private-vlan community ........................................................................................................... |
49 |
III |
|
private-vlan association........................................................................................................... |
50 |
|
switchport private-vlan ............................................................................................................ |
50 |
|
switchport private-vlan host-association................................................................................. |
51 |
|
switchport private-vlan mapping ............................................................................................. |
52 |
|
show vlan private-vlan............................................................................................................. |
53 |
|
Chapter 9 |
GVRP Commands.............................................................................. |
54 |
gvrp.......................................................................................................................................... |
|
54 |
gvrp (interface) ........................................................................................................................ |
54 |
|
gvrp registration ...................................................................................................................... |
55 |
|
gvrp timer ................................................................................................................................ |
|
56 |
show gvrp global ..................................................................................................................... |
57 |
|
show gvrp interface................................................................................................................. |
57 |
|
Chapter 10 |
Etherchannel Commands ................................................................. |
58 |
channel-group ......................................................................................................................... |
58 |
|
port-channel load-balance ...................................................................................................... |
59 |
|
lacp system-priority ................................................................................................................. |
59 |
|
lacp port-priority ...................................................................................................................... |
60 |
|
show etherchannel.................................................................................................................. |
60 |
|
show etherchannel load-balance ............................................................................................ |
61 |
|
show lacp ................................................................................................................................ |
|
61 |
show lacp sys-id...................................................................................................................... |
62 |
|
Chapter 11 User Manage Commands.................................................................. |
63 |
|
user name |
............................................................................................................................... |
63 |
user access-control ip-based .................................................................................................. |
64 |
|
user access-control mac-based.............................................................................................. |
64 |
|
user access-control port-based............................................................................................... |
65 |
|
user max-number .................................................................................................................... |
66 |
|
user idle-timeout...................................................................................................................... |
66 |
|
line........................................................................................................................................... |
|
67 |
password ................................................................................................................................. |
|
68 |
login......................................................................................................................................... |
|
69 |
login local ................................................................................................................................ |
|
69 |
show user account-list............................................................................................................. |
70 |
|
show user configuration .......................................................................................................... |
70 |
|
Chapter 12 Binding Table Commands................................................................. |
71 |
|
|
|
IV |
ip source binding ..................................................................................................................... |
71 |
ip source binding index ........................................................................................................... |
72 |
ip dhcp snooping ..................................................................................................................... |
73 |
ip dhcp snooping global .......................................................................................................... |
73 |
ip dhcp snooping information option ....................................................................................... |
74 |
ip dhcp snooping information strategy.................................................................................... |
75 |
ip dhcp snooping information remote-id.................................................................................. |
76 |
ip dhcp snooping information circuit-id ................................................................................... |
76 |
ip dhcp snooping trust............................................................................................................. |
77 |
ip dhcp snooping mac-verify ................................................................................................... |
78 |
ip dhcp snooping limit rate ...................................................................................................... |
78 |
ip dhcp snooping decline ........................................................................................................ |
79 |
show ip source binding............................................................................................................ |
79 |
show ip dhcp snooping............................................................................................................ |
80 |
show ip dhcp snooping information interface ......................................................................... |
80 |
show ip dhcp snooping interface............................................................................................. |
81 |
Chapter 13 ARP Inspection Commands.............................................................. |
82 |
ip arp inspection(global).......................................................................................................... |
82 |
ip arp inspection trust.............................................................................................................. |
82 |
ip arp inspection(interface)...................................................................................................... |
83 |
ip arp inspection limit-rate ....................................................................................................... |
84 |
ip arp inspection recover......................................................................................................... |
84 |
show ip arp inspection............................................................................................................. |
85 |
show ip arp inspection interface.............................................................................................. |
85 |
show ip arp inspection statistics.............................................................................................. |
86 |
clear ip arp inspection statistics .............................................................................................. |
86 |
Chapter 14 IP Verify Source Commands............................................................. |
87 |
ip verify source ........................................................................................................................ |
87 |
show ip verify source............................................................................................................... |
88 |
Chapter 15 DoS Defend Command...................................................................... |
89 |
ip dos-prevent ......................................................................................................................... |
89 |
ip dos-prevent ping-rate .......................................................................................................... |
89 |
ip dos-prevent syn-rate ........................................................................................................... |
90 |
ip dos-prevent type.................................................................................................................. |
91 |
ip dos-prevent detect............................................................................................................... |
92 |
clear ip dos-prevent detect statistics....................................................................................... |
92 |
|
V |
show ip dos-prevent................................................................................................................ |
93 |
Chapter 16 IEEE 802.1X Commands ................................................................... |
94 |
dot1x system-auth-control....................................................................................................... |
94 |
dot1x auth-method .................................................................................................................. |
95 |
dot1x guest-vlan(global).......................................................................................................... |
95 |
dot1x accounting ..................................................................................................................... |
96 |
dot1x quiet-period ................................................................................................................... |
97 |
dot1x timeout........................................................................................................................... |
97 |
dot1x max-reauth-req.............................................................................................................. |
98 |
dot1x........................................................................................................................................ |
98 |
dot1x guest-vlan(interface) ..................................................................................................... |
99 |
dot1x port-control .................................................................................................................. |
100 |
dot1x port-method ................................................................................................................. |
100 |
show dot1x global ................................................................................................................. |
101 |
show dot1x interface ............................................................................................................. |
102 |
Chapter 17 PPPoE Circuit-ID Insertion Commands ......................................... |
103 |
pppoe circuit-id(global).......................................................................................................... |
103 |
pppoe circuit-id(interface) ..................................................................................................... |
103 |
pppoe circuit-id type .............................................................................................................. |
104 |
show pppoe circuit-id global.................................................................................................. |
105 |
show pppoe circuit-id interface ............................................................................................. |
105 |
Chapter 18 System Log Commands.................................................................. |
107 |
logging buffer......................................................................................................................... |
107 |
logging file flash .................................................................................................................... |
108 |
logging file flash frequency ................................................................................................... |
108 |
logging file flash level............................................................................................................ |
109 |
clear logging........................................................................................................................... |
110 |
logging host index .................................................................................................................. |
110 |
show logging local-config....................................................................................................... |
111 |
show logging loghost.............................................................................................................. |
111 |
show logging buffer ................................................................................................................ |
112 |
show logging flash.................................................................................................................. |
112 |
Chapter 19 SSH Commands................................................................................ |
114 |
ip ssh server........................................................................................................................... |
114 |
ip ssh version ......................................................................................................................... |
114 |
VI |
|
ip ssh timeout ......................................................................................................................... |
115 |
ip ssh max-client .................................................................................................................... |
115 |
ip ssh download ..................................................................................................................... |
116 |
show ip ssh............................................................................................................................. |
117 |
Chapter 20 SSL Commands................................................................................ |
118 |
ip http secure-server .............................................................................................................. |
118 |
ip http secure-server download certificate ............................................................................. |
118 |
ip http secure-server download key ....................................................................................... |
119 |
show ip http secure-server.................................................................................................... |
120 |
Chapter 21 MAC Address Commands............................................................... |
121 |
mac address-table static ....................................................................................................... |
121 |
mac address-table aging-time............................................................................................... |
122 |
mac address-table filtering.................................................................................................... |
122 |
mac address-table max-mac-count....................................................................................... |
123 |
show mac address-table ....................................................................................................... |
124 |
show mac address-table aging-time ..................................................................................... |
125 |
show mac address-table max-mac-count interface.............................................................. |
125 |
show mac address-table interface ........................................................................................ |
126 |
show mac address-table count ............................................................................................. |
126 |
show mac address-table address ......................................................................................... |
126 |
show mac address-table vlan ............................................................................................... |
127 |
Chapter 22 System Configuration Commands................................................. |
128 |
system-time manual.............................................................................................................. |
128 |
system-time ntp..................................................................................................................... |
128 |
system-time dst predefined................................................................................................... |
130 |
system-time dst date............................................................................................................. |
131 |
system-time dst recurring...................................................................................................... |
132 |
hostname............................................................................................................................... |
133 |
location .................................................................................................................................. |
133 |
contact-info............................................................................................................................ |
134 |
ip management-vlan.............................................................................................................. |
134 |
ip address.............................................................................................................................. |
135 |
ip address-alloc dhcp ............................................................................................................ |
135 |
ip address-alloc bootp........................................................................................................... |
136 |
reset ...................................................................................................................................... |
136 |
reboot .................................................................................................................................... |
137 |
VII |
|
copy running-config startup-config........................................................................................ |
137 |
copy startup-config tftp.......................................................................................................... |
138 |
copy tftp startup-config.......................................................................................................... |
138 |
firmware upgrade .................................................................................................................. |
139 |
ping........................................................................................................................................ |
140 |
tracert .................................................................................................................................... |
141 |
loopback interface ................................................................................................................. |
142 |
show system-time ................................................................................................................. |
142 |
show system-time dst............................................................................................................ |
143 |
show system-time ntp ........................................................................................................... |
143 |
show system-info .................................................................................................................. |
143 |
show running-config.............................................................................................................. |
144 |
show cable-diagnostics interface.......................................................................................... |
144 |
Chapter 23 IPv6 Address Configuration Commands....................................... |
146 |
ipv6 enable............................................................................................................................ |
146 |
ipv6 address autoconfig ........................................................................................................ |
146 |
ipv6 address link-local........................................................................................................... |
147 |
ipv6 address dhcp ................................................................................................................. |
148 |
ipv6 address ra...................................................................................................................... |
148 |
ipv6 address eui-64............................................................................................................... |
149 |
ipv6 address.......................................................................................................................... |
149 |
show ipv6 interface vlan........................................................................................................ |
150 |
Chapter 24 Ethernet Configuration Commands............................................... |
151 |
interface fastEthernet............................................................................................................ |
151 |
interface range fastEthernet.................................................................................................. |
151 |
interface gigabitEthernet ....................................................................................................... |
152 |
interface range gigabitEthernet............................................................................................. |
152 |
description............................................................................................................................. |
153 |
shutdown ............................................................................................................................... |
154 |
flow-control............................................................................................................................ |
154 |
media-type............................................................................................................................. |
155 |
duplex.................................................................................................................................... |
155 |
speed..................................................................................................................................... |
156 |
storm-control broadcast ........................................................................................................ |
156 |
storm-control multicast.......................................................................................................... |
157 |
storm-control unicast............................................................................................................. |
158 |
VIII |
|
bandwidth .............................................................................................................................. |
158 |
clear counters........................................................................................................................ |
159 |
show interface status ............................................................................................................ |
159 |
show interface counters ........................................................................................................ |
160 |
show interface description .................................................................................................... |
161 |
show interface flowcontrol..................................................................................................... |
161 |
show interface configuration ................................................................................................. |
162 |
show storm-control................................................................................................................ |
162 |
show bandwidth..................................................................................................................... |
163 |
Chapter 25 QoS Commands............................................................................... |
164 |
qos......................................................................................................................................... |
164 |
qos cos .................................................................................................................................. |
164 |
qos dscp ................................................................................................................................ |
165 |
qos queue cos-map............................................................................................................... |
166 |
qos queue dscp-map............................................................................................................. |
166 |
qos queue mode ................................................................................................................... |
167 |
show qos interface ................................................................................................................ |
168 |
show qos cos-map ................................................................................................................ |
169 |
show qos dscp-map .............................................................................................................. |
169 |
show qos queue mode.......................................................................................................... |
170 |
show qos status..................................................................................................................... |
170 |
Chapter 26 Port Mirror Commands ................................................................... |
171 |
monitor session destination interface ................................................................................... |
171 |
monitor session source interface .......................................................................................... |
172 |
show monitor session............................................................................................................ |
173 |
Chapter 27 Port isolation Commands ............................................................... |
174 |
port isolation.......................................................................................................................... |
174 |
show port isolation ................................................................................................................ |
175 |
Chapter 28 Loopback Detection Commands.................................................... |
176 |
loopback-detection(global).................................................................................................... |
176 |
loopback-detection interval ................................................................................................... |
176 |
loopback-detection recovery-time......................................................................................... |
177 |
loopback-detection(interface)................................................................................................ |
177 |
loopback-detection config ..................................................................................................... |
178 |
loopback-detection recover................................................................................................... |
179 |
IX |
|
show loopback-detection global............................................................................................ |
179 |
show loopback-detection interface ....................................................................................... |
180 |
Chapter 29 DDM Commands.............................................................................. |
181 |
ddm state enable................................................................................................................... |
181 |
ddm shutdown....................................................................................................................... |
181 |
ddm temperature_threshold.................................................................................................. |
182 |
ddm voltage_threshold.......................................................................................................... |
183 |
ddm bias_current_threshold ................................................................................................. |
184 |
ddm tx_power_threshold....................................................................................................... |
185 |
ddm rx_power_threshold ...................................................................................................... |
186 |
show ddm configuration ........................................................................................................ |
187 |
show ddm status ................................................................................................................... |
188 |
Chapter 30 ACL Commands............................................................................... |
189 |
time-range ............................................................................................................................. |
189 |
absolute................................................................................................................................. |
189 |
periodic.................................................................................................................................. |
190 |
holiday ................................................................................................................................... |
191 |
holiday(global)....................................................................................................................... |
191 |
access-list create .................................................................................................................. |
192 |
mac access-list...................................................................................................................... |
192 |
access-list standard .............................................................................................................. |
193 |
access-list extended.............................................................................................................. |
194 |
access-list combined............................................................................................................. |
195 |
rule......................................................................................................................................... |
197 |
access-list policy name ......................................................................................................... |
198 |
access-list policy action......................................................................................................... |
199 |
redirect interface ................................................................................................................... |
199 |
redirect vlan........................................................................................................................... |
200 |
s-condition............................................................................................................................. |
200 |
s-mirror .................................................................................................................................. |
201 |
qos-remark ............................................................................................................................ |
201 |
access-list bind(interface) ..................................................................................................... |
202 |
access-list bind(vlan)............................................................................................................. |
203 |
show time-range.................................................................................................................... |
203 |
show holiday.......................................................................................................................... |
203 |
show access-list .................................................................................................................... |
204 |
|
X |
show access-list policy.......................................................................................................... |
204 |
show access-list bind ............................................................................................................ |
205 |
Chapter 31 MSTP Commands ............................................................................ |
206 |
spanning-tree(global) ............................................................................................................ |
206 |
spanning-tree(interface)........................................................................................................ |
206 |
spanning-tree common-config .............................................................................................. |
207 |
spanning-tree mode .............................................................................................................. |
208 |
spanning-tree mst configuration............................................................................................ |
209 |
instance ................................................................................................................................. |
209 |
name ..................................................................................................................................... |
210 |
revision .................................................................................................................................. |
210 |
spanning-tree mst instance.................................................................................................... |
211 |
spanning-tree mst ................................................................................................................. |
212 |
spanning-tree priority ............................................................................................................ |
212 |
spanning-tree tc-defend ........................................................................................................ |
213 |
spanning-tree timer ............................................................................................................... |
214 |
spanning-tree hold-count ...................................................................................................... |
214 |
spanning-tree max-hops ....................................................................................................... |
215 |
spanning-tree bpdufilter ........................................................................................................ |
216 |
spanning-tree bpduguard...................................................................................................... |
216 |
spanning-tree guard loop ...................................................................................................... |
217 |
spanning-tree guard root....................................................................................................... |
217 |
spanning-tree guard tc .......................................................................................................... |
218 |
spanning-tree mcheck........................................................................................................... |
218 |
show spanning-tree active .................................................................................................... |
219 |
show spanning-tree bridge.................................................................................................... |
219 |
show spanning-tree interface................................................................................................ |
220 |
show spanning-tree interface-security .................................................................................. |
220 |
show spanning-tree mst........................................................................................................ |
221 |
Chapter 32 Ethernet OAM Commands .............................................................. |
223 |
ethernet-oam......................................................................................................................... |
223 |
ethernet-oam mode............................................................................................................... |
223 |
ethernet-oam link-monitor symbol-period ............................................................................. |
224 |
ethernet-oam link-monitor frame........................................................................................... |
225 |
ethernet-oam link-monitor frame-period ............................................................................... |
226 |
ethernet-oam link-monitor frame-seconds............................................................................ |
227 |
|
XI |
ethernet-oam remote-failure ................................................................................................. |
228 |
ethernet-oam remote-loopback received-remote- loopback................................................. |
229 |
ethernet-oam remote-loopback............................................................................................. |
230 |
clear ethernet-oam statistics ................................................................................................. |
230 |
clear ethernet-oam event-log ................................................................................................ |
231 |
show ethernet-oam configuration ......................................................................................... |
232 |
show ethernet-oam event-log ............................................................................................... |
232 |
show ethernet-oam statistics ................................................................................................ |
233 |
show ethernet-oam status..................................................................................................... |
233 |
Chapter 33 DLDP Commands ............................................................................ |
235 |
dldp(global)............................................................................................................................ |
235 |
dldp interval........................................................................................................................... |
235 |
dldp shut-mode...................................................................................................................... |
236 |
dldp reset(global) .................................................................................................................. |
236 |
dldp(interface) ....................................................................................................................... |
237 |
dldp reset(interface) .............................................................................................................. |
237 |
show dldp .............................................................................................................................. |
238 |
show dldp interface ............................................................................................................... |
238 |
Chapter 34 IGMP Snooping Commands ........................................................... |
240 |
ip igmp snooping(global)....................................................................................................... |
240 |
ip igmp snooping(interface)................................................................................................... |
240 |
ip igmp snooping immediate-leave ....................................................................................... |
241 |
ip igmp snooping drop-unknown........................................................................................... |
241 |
ip igmp snooping vlan-config ................................................................................................ |
242 |
ip igmp snooping multi-vlan-config ....................................................................................... |
243 |
ip igmp snooping filter add-id................................................................................................ |
244 |
ip igmp snooping filter(global)............................................................................................... |
245 |
ip igmp snooping filter(interface)........................................................................................... |
245 |
ip igmp snooping filter maxgroup.......................................................................................... |
246 |
ip igmp snooping filter mode ................................................................................................. |
246 |
ip igmp snooping querier vlan............................................................................................... |
247 |
ip igmp snooping querier vlan (general query) ..................................................................... |
248 |
ip igmp snooping querier vlan (specific query) ..................................................................... |
249 |
ip igmp snooping authentication ........................................................................................... |
250 |
show ip igmp snooping.......................................................................................................... |
250 |
show ip igmp snooping interface........................................................................................... |
251 |
XII |
|
show ip igmp snooping vlan.................................................................................................. |
251 |
show ip igmp snooping multi-vlan......................................................................................... |
252 |
show ip igmp snooping groups ............................................................................................. |
252 |
show ip igmp snooping filter.................................................................................................. |
253 |
show ip igmp snooping querier vlan ..................................................................................... |
254 |
show ip igmp snooping querier ............................................................................................. |
254 |
show ip igmp snooping interface authentication................................................................... |
254 |
Chapter 35 MLD Snooping Commands............................................................. |
256 |
ipv6 mld snooping ................................................................................................................. |
256 |
ipv6 mld snooping router-aging-time .................................................................................... |
256 |
ipv6 mld snooping member-aging-time................................................................................. |
257 |
ipv6 mld snooping report-suppression.................................................................................. |
257 |
ipv6 mld snooping unknown-filter.......................................................................................... |
258 |
ipv6 mld snooping last-listener query-inteval........................................................................ |
258 |
ipv6 mld snooping last-listener query-count ......................................................................... |
259 |
ipv6 mld snooping multicast-vlan.......................................................................................... |
259 |
ipv6 mld snooping multicast-vlan vlan-id .............................................................................. |
260 |
ipv6 mld snooping vlan.......................................................................................................... |
260 |
ipv6 mld snooping vlan router-aging-time............................................................................. |
261 |
ipv6 mld snooping vlan member-aging-time......................................................................... |
261 |
ipv6 mld snooping vlan immediate-leave.............................................................................. |
262 |
ipv6 mld snooping vlan mrouter............................................................................................ |
262 |
ipv6 mld snooping vlan static ................................................................................................ |
263 |
ipv6 mld snooping querier vlan ............................................................................................. |
263 |
ipv6 mld snooping querier vlan max-response-time............................................................. |
264 |
ipv6 mld snooping querier vlan query-interval ...................................................................... |
265 |
ipv6 mld snooping querier vlan query-source....................................................................... |
265 |
ipv6 mld snooping filter(global) ............................................................................................. |
266 |
ipv6 mld snooping filter(interface)......................................................................................... |
266 |
ipv6 mld snooping filter-mode............................................................................................... |
267 |
ipv6 mld snooping filter-id ..................................................................................................... |
267 |
ipv6 mld snooping max-group............................................................................................... |
268 |
clear ipv6 mld snooping statistics ......................................................................................... |
268 |
show ipv6 mld snooping........................................................................................................ |
269 |
show ipv6 mld snooping vlan ................................................................................................ |
269 |
show ipv6 mld snooping static-mcast ................................................................................... |
270 |
show ipv6 mld snooping group ............................................................................................. |
270 |
XIII |
|
show ipv6 mld snooping filter................................................................................................ |
271 |
show ipv6 mld snooping interface......................................................................................... |
271 |
show ipv6 mld snooping interface filter................................................................................. |
271 |
show ipv6 mld snooping querier ........................................................................................... |
272 |
show ipv6 mld snooping statistics......................................................................................... |
272 |
Chapter 36 SNMP Commands............................................................................ |
274 |
snmp-server .......................................................................................................................... |
274 |
snmp-server view .................................................................................................................. |
274 |
snmp-server group ................................................................................................................ |
275 |
snmp-server user .................................................................................................................. |
276 |
snmp-server community........................................................................................................ |
278 |
snmp-server host .................................................................................................................. |
279 |
snmp-server engineID........................................................................................................... |
280 |
snmp-server traps snmp ....................................................................................................... |
281 |
snmp-server traps security.................................................................................................... |
282 |
snmp-server traps link-status................................................................................................ |
283 |
snmp-server traps ................................................................................................................. |
283 |
snmp-server traps ddm ......................................................................................................... |
284 |
snmp-server traps mac ......................................................................................................... |
285 |
snmp-server traps vlan.......................................................................................................... |
286 |
rmon history........................................................................................................................... |
287 |
rmon event ............................................................................................................................ |
288 |
rmon alarm ............................................................................................................................ |
289 |
show snmp-server................................................................................................................. |
291 |
show snmp-server view......................................................................................................... |
291 |
show snmp-server group ...................................................................................................... |
291 |
show snmp-server user......................................................................................................... |
292 |
show snmp-server community .............................................................................................. |
292 |
show snmp-server host......................................................................................................... |
293 |
show snmp-server engineID ................................................................................................. |
293 |
show rmon history ................................................................................................................. |
293 |
show rmon event................................................................................................................... |
294 |
show rmon alarm................................................................................................................... |
294 |
Chapter 37 LLDP Commands............................................................................. |
296 |
lldp......................................................................................................................................... |
296 |
lldp hold-multiplier ................................................................................................................. |
296 |
|
XIV |
lldp timer................................................................................................................................ |
297 |
lldp receive ............................................................................................................................ |
298 |
lldp transmit ........................................................................................................................... |
298 |
lldp snmp-trap........................................................................................................................ |
299 |
lldp tlv-select.......................................................................................................................... |
300 |
lldp med-fast-count................................................................................................................ |
300 |
lldp med-status...................................................................................................................... |
301 |
lldp med-tlv-select ................................................................................................................. |
301 |
lldp med-location ................................................................................................................... |
302 |
show lldp ............................................................................................................................... |
303 |
show lldp interface ................................................................................................................ |
303 |
show lldp local-information interface..................................................................................... |
304 |
show lldp neighbor-information interface.............................................................................. |
304 |
show lldp traffic interface....................................................................................................... |
305 |
Chapter 38 Cluster Commands.......................................................................... |
306 |
cluster ndp............................................................................................................................. |
306 |
cluster ntdp............................................................................................................................ |
307 |
cluster explore....................................................................................................................... |
308 |
cluster.................................................................................................................................... |
308 |
cluster ip pool ........................................................................................................................ |
309 |
cluster commander................................................................................................................ |
309 |
cluster manage...................................................................................................................... |
310 |
cluster member ..................................................................................................................... |
310 |
cluster candidate .................................................................................................................... |
311 |
cluster individual..................................................................................................................... |
311 |
show cluster ndp ................................................................................................................... |
312 |
show cluster ntdp .................................................................................................................. |
312 |
show cluster .......................................................................................................................... |
313 |
show cluster member............................................................................................................ |
313 |
show cluster manage role ..................................................................................................... |
314 |
show cluster neighbor ........................................................................................................... |
314 |
Chapter 39 AAA Commands .............................................................................. |
315 |
aaa enable............................................................................................................................. |
315 |
tacacs-server host................................................................................................................. |
316 |
show tacacs-server ............................................................................................................... |
317 |
radius-server host ................................................................................................................. |
317 |
|
XV |
show radius-server................................................................................................................ |
318 |
aaa group .............................................................................................................................. |
319 |
server .................................................................................................................................... |
320 |
show aaa group..................................................................................................................... |
320 |
aaa authentication login ........................................................................................................ |
321 |
aaa authentication enable..................................................................................................... |
322 |
aaa authentication dot1x default........................................................................................... |
323 |
aaa accounting dot1x default................................................................................................ |
323 |
show aaa authentication ....................................................................................................... |
324 |
show aaa accounting ............................................................................................................ |
324 |
line console ........................................................................................................................... |
325 |
login authentication(console) ................................................................................................ |
325 |
enable authentication(console)............................................................................................. |
326 |
line telnet ............................................................................................................................... |
327 |
login authentication(telnet).................................................................................................... |
327 |
enable authentication(telnet)................................................................................................. |
328 |
line ssh .................................................................................................................................. |
328 |
login authentication(ssh) ....................................................................................................... |
329 |
enable authentication(ssh).................................................................................................... |
329 |
ip http login authentication .................................................................................................... |
330 |
ip http enable authentication ................................................................................................. |
331 |
show aaa global .................................................................................................................... |
331 |
Chapter 40 DHCP Relay Commands ................................................................. |
332 |
ip dhcp relay.......................................................................................................................... |
332 |
ip dhcp relay helper-address................................................................................................. |
332 |
ip dhcp relay information option............................................................................................ |
333 |
ip dhcp relay information strategy......................................................................................... |
333 |
ip dhcp relay information circuit-id ........................................................................................ |
334 |
ip dhcp relay information remote-id ...................................................................................... |
334 |
show ip dhcp relay ................................................................................................................ |
335 |
show ip dhcp relay helper-address ....................................................................................... |
335 |
XVI
T2500-28TC JetStream L2 Managed Switch CLI Guide
This Guide is intended for network administrator to provide referenced information about CLI (Command Line Interface). The device mentioned in this Guide stands for T2500-28TC 24-Port 10/100Mbps + 4-Port Gigabit JetStream L2 Managed Switch.
When using this guide, please notice that features of the switch may vary slightly depending on the model and software version you have, and on your location, language, and Internet service provider. All parameters and descriptions documented in this guide are used for demonstration only.
The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute the warranty of any kind, express or implied. Users must take full responsibility for their application of any products.
Overview of this Guide
Chapter 1: Using the CLI
Provide information about how to use the CLI, CLI Command Modes, Security Levels and some Conventions.
Chapter 2: User Interface
Provide information about the commands used to switch between five CLI Command Modes.
Chapter 3: IEEE 802.1Q VLAN Commands
Provide information about the commands used for configuring IEEE 802.1Q VLAN.
Chapter 4: MAC-based VLAN Commands
Provide information about the commands used for configuring MAC-Based VLAN.
Chapter 5: Protocol-based VLAN Commands
Provide information about the commands used for configuring Protocol-based VLAN.
Chapter 6: VLAN-VPN Commands
Provide information about the commands used for configuring VLAN-VPN (Virtual Private Network) function.
Chapter 7: Voice VLAN Commands
Provide information about the commands used for configuring Voice VLAN.
Chapter 8: Private VLAN Commands
Provide information about the commands used for configuring Private VLAN.
Chapter 9: GVRP Commands
1
T2500-28TC JetStream L2 Managed Switch CLI Guide
Provide information about the commands used for configuring GVRP (GARP VLAN registration protocol).
Chapter 10: EtherChannel Commands
Provide information about the commands used for configuring LAG (Link Aggregation Group) and LACP (Link Aggregation Control Protocol).
Chapter 11: User Manage Commands
Provide information about the commands used for user management.
Chapter 12: Binding Table Commands
Provide information about the commands used for binding the IP address, MAC address, VLAN and the connected Port number of the Host together. Besides it also provide information about the commands used for monitoring the process of the Host obtaining the IP address from DHCP server, and record the IP address, MAC address, VLAN and the connected Port number of the Host for automatic binding.
Chapter 13: ARP Inspection Commands
Provide information about the commands used for protecting the switch from the ARP cheating or ARP Attack.
Chapter 14: IP Verify Source Commands
Provide information about the commands used for guarding the IP Source by filtering the IP packets based on the IP-MAC Binding entries.
Chapter 15: DoS Defend Command
Provide information about the commands used for DoS defend and detecting the DoS attack.
Chapter 16: IEEE 802.1X Commands
Provide information about the commands used for configuring IEEE 802.1X function.
Chapter 17: PPPoE Circuit-ID Insertion Commands
Provide information about the commands used for configuring PPPoE Circuit-ID function.
Chapter 18: System Log Commands
Provide information about the commands used for configuring system log.
Chapter 19: SSH Commands
Provide information about the commands used for configuring and managing SSH (Security Shell).
Chapter 20: SSL Commands
Provide information about the commands used for configuring and managing SSL (Secure Sockets Layer).
Chapter 21: MAC Address Commands
2
T2500-28TC JetStream L2 Managed Switch CLI Guide
Provide information about the commands used for MAC address configuration.
Chapter 22: System Configuration Commands
Provide information about the commands used for configuring the System information and System IP, reboot and reset the switch, upgrade the switch system and commands used for device diagnose, including loopback test and cable test.
Chapter 23: IPv6 Address Configuration Commands
Provide information about the commands used for configuring the System IPv6 addresses.
Chapter 24: Ethernet Configuration Commands
Provide information about the commands used for configuring the Bandwidth Control, Negotiation Mode, and Storm Control for ethernet ports.
Chapter 25: QoS Commands
Provide information about the commands used for configuring the QoS function.
Chapter 26: Port Mirror Commands
Provide information about the commands used for configuring the Port Mirror function.
Chapter 27: Port isolation Commands
Provide information about the commands used for configuring the Port isolation function.
Chapter 28: Loopback Detection Commands
Provide information about the commands used for loopback detection.
Chapter 29: DDM Commands
Provide information about the commands used for DDM (Digtal Diagnostic Monitoring) function.
Chapter 30: ACL Commands
Provide information about the commands used for configuring the ACL (Access Control List).
Chapter 31: MSTP Commands
Provide information about the commands used for configuring the MSTP (Multiple Spanning Tree Protocol).
Chapter 32: Ethernet OAM Commands
Provide information about the commands used for configuring the Ethernet OAM (Operation, Administration, and Maintenance) function.
Chapter 33: DLDP Commands
Provide information about the commands used for configuring the DLDP (Device Link Detection Protocol).
Chapter 34: IGMP Snooping Commands
Provide information about the commands used for configuring the IGMP Snooping (Internet Group Management Protocol Snooping).
3
T2500-28TC JetStream L2 Managed Switch CLI Guide
Chapter 35: MLD Snooping Commands
Provide information about the commands used for configuring the MLD Snooping (Multicast Listener Discovery Snooping).
Chapter 36: SNMP Commands
Provide information about the commands used for configuring the SNMP (Simple Network Management Protocol) functions.
Chapter 37: LLDP Commands
Provide information about the commands used for configuring the LLDP functions.
Chapter 38: Cluster Commands
Provide information about the commands used for configuring the Cluster Management function.
Chapter 39: AAA Commands
Provide information about the commands used for configuring the AAA function.
Chapter 40: DHCP Relay Commands
Provide information about the commands used for configuring the DHCP Relay function.
4
T2500-28TC JetStream L2 Managed Switch CLI Guide
You can log on to the switch and access the CLI by the following three methods:
1.Log on to the switch by the console port on the switch.
2.Log on to the switch remotely by a Telnet connection through an Ethernet port.
3.Log on to the switch remotely by an SSH connection through an Ethernet port.
Take the following steps to log on to the switch by the console port.
1.Connect the PCs or Terminals to the console port on the switch by the provided cable.
2.Start the terminal emulation program (such as the HyperTerminal) on the PC.
3.Configure the terminal emulation program or the terminal to use the following settings:
Baud rate: 38400 bps
Data bits: 8
Parity: none
Stop bits: 1
Flow control: none
4.The DOS prompt “T2500-28TC>” will appear after pressing the Enter button as shown in Figure 1-1. It indicates that you can use the CLI now.
5
T2500-28TC JetStream L2 Managed Switch CLI Guide
Figure 1-1 Log in the Switch
For Telnet connection, you should also configure the Telnet login mode and login authentication information through console connection.
Telnet login has the following two modes. You can choose one according to your needs:
Login local Mode: It requires username and password, which are both admin by default.
Login Mode: It doesn’t require username and password, but a connection password is required.
Before Telnet login, you are required to configure Telnet login mode and login authentication information through console connection.
Login Local Mode
Firstly, configure the Telnet login mode as “login local” in the prompted DOS screen shown in Figure 1-2.
Figure 1-2 Configure login local mode
6
T2500-28TC JetStream L2 Managed Switch CLI Guide
Now, you can logon by Telnet in login local mode.
1.Make sure the switch and the PC are in the same LAN. Click Start and type in cmd in the Search programs and files window and press the Enter button.
Figure 1-3 Run Window
2. Type telnet 192.168.0.1 in the command prompt shown as Figure 1-4, and press the Enter button.
Figure 1-4 Connecting to the Switch
3. Type the default user name and password (both of them are admin), then press the Enter button so as to enter User EXEC Mode.
Figure 1-5 Enter into the User EXEC Mode
7
T2500-28TC JetStream L2 Managed Switch CLI Guide
4.Type enable command to enter Privileged EXEC Mode.
Figure 1-6 Enter into the Priviledged EXEC Mode
Now you can manage your switch with CLI commands through Telnet connection.
Login Mode
Firstly configure the Telnet login mode as “login” and the connection password as 456 in the prompted DOS screen shown in Figure 1-7.
Figure 1-7 Configure login mode
Now, you can logon by Telnet in login mode:
1.Make sure the switch and the PC are in the same LAN. Click Start and type in cmd in the Search programs and files window and press the Enter button.
8
T2500-28TC JetStream L2 Managed Switch CLI Guide
Figure 1-8 Run Window
2.Type telnet 192.168.0.1 in the command prompt shown as Figure 1-9, and press the Enter button.
Figure 1-9 Connecting to the Switch
3.You are prompted to enter the connection password 456 you have set through Console port connection, and then you are in User EXEC Mode.
Figure 1-10 Enter into the User EXEC Mode
9
T2500-28TC JetStream L2 Managed Switch CLI Guide
4.Type enable command to enter Privileged EXEC Mode.
Figure 1-11 Enter into the Privileged EXEC Mode
Now you can manage your switch with CLI commands through Telnet connection.
Note:
You can refer to Chapter 11 User Management Commands for detailed commands information of the Telnet connection configuration.
To log on by SSH, a Putty client software is recommended. There are two authentication modes to set up an SSH connection:
Password Authentication Mode: It requires username and password, which are both admin by default.
Key Authentication Mode: It requires a public key for the switch and a private key for the SSH client software. You can generate the public key and the private key through Putty Key Generator.
Note:
Before SSH login, please follow the steps shown in Figure 1-12 to enable the SSH function through Telnet connection.
Figure 1-12 Enable SSH function
10
T2500-28TC JetStream L2 Managed Switch CLI Guide
Password Authentication Mode
1.Open the software to log on to the interface of PuTTY. Enter the IP address of the switch into Host Name field; keep the default value 22 in the Port field; select SSH as the Connection type.
Figure 1-13 SSH Connection Config
2.Click the Open button in the above figure to log on to the switch. Enter the login user name and password to log on the switch, and then enter enable to enter Privileged EXEC Mode, so you can continue to configure the switch.
Figure 1-14 Log on the Switch
11
T2500-28TC JetStream L2 Managed Switch CLI Guide
Key Authentication Mode
1.Select the key type and key length, and generate SSH key.
Figure 1-15 Generate SSH Key
Note:
1.The key length is in the range of 512 to 3072 bits.
2.During the key generation, randomly moving the mouse quickly can accelerate the key generation.
12
T2500-28TC JetStream L2 Managed Switch CLI Guide
2.After the key is successfully generated, please save the public key to a TFTP server and save the private key on the local host.
Figure 1-16 Save the Generated Key
3.Log on to the switch by Telnet and download the public key file from the TFTP server to the switch, as the following figure shows:
Figure 1-17 Download the Public Key
13