CLI Reference Guide
T2500G-10TS (TL-SG3210)
1910012494 REV2.0.0
November 2018
COPYRIGHT & TRADEMARKS
Specifications are subject to change without notice. is a registered trademark of
TP-Link Technologies Co., Ltd. Other brands and product names are trademarks or registered
trademarks of their respective holders.
No part of the specifications may be reproduced in any form or by any means or used to make
any derivative such as translation, transformation, or adaptation without permission from
TP-Link Technologies Co., Ltd. Copyright © 2018 TP-Link Technologies Co., Ltd. All rights
reserved.
https://www.tp-link.com
I
............................................................................................................................ 1
................................................................................................... 5
............................................................................................... 17
................................................................. 24
.......................................................... 28
CONTENTS
Preface
Chapter 1 Using the CLI
Chapter 2 User Interface
1.1 Accessing the CLI ......................................................................................................................... 5
1.1.1 Logon by Telnet ........................................................................................................... 5
1.1.2 Logon by SSH ............................................................................................................... 6
1.2 CLI Command Modes ................................................................................................................. 12
1.3 Privilege Restrictions .................................................................................................................. 15
1.4 Conventions ................................................................................................................................. 15
1.4.1 Format Conventions .................................................................................................. 15
1.4.2 Special Characters .................................................................................................... 16
1.4.3 Parameter Format ...................................................................................................... 16
2.1 enable ................................................................................................................................... 17
2.2 service password-encryption .......................................................................................... 17
2.3 enable password ................................................................................................................ 18
2.4 enable secret ...................................................................................................................... 19
2.5 configure ............................................................................................................................. 20
2.6 exit ........................................................................................................................................ 21
2.7 end ........................................................................................................................................ 21
2.8 clipaging .............................................................................................................................. 22
2.9 history .................................................................................................................................. 22
2.10 history clear ........................................................................................................................ 23
Chapter 3 User Management Commands
3.1 user name (password) ....................................................................................................... 24
3.2 user name (secret) ............................................................................................................. 25
3.3 show user account-list ...................................................................................................... 26
3.4 show user configuration ................................................................................................... 27
Chapter 4 System Configuration Commands
4.1 system-time manual .......................................................................................................... 28
4.2 system-time ntp ................................................................................................................. 28
4.3 system-time dst predefined............................................................................................. 30
4.4 system-time dst date ........................................................................................................ 31
4.5 system-time dst recurring ................................................................................................ 32
II
................................................................. 55
4.6 hostname ............................................................................................................................. 33
4.7 location ................................................................................................................................ 34
4.8 contact-info ........................................................................................................................ 34
4.9 ip address ............................................................................................................................ 35
4.10 ip management-vlan .......................................................................................................... 36
4.11 ip address-alloc .................................................................................................................. 36
4.12 reset ..................................................................................................................................... 37
4.13 reboot................................................................................................................................... 38
4.14 reboot-schedule ................................................................................................................ 38
4.15 copy running-config startup-config ............................................................................... 39
4.16 copy startup-config tftp ................................................................................................... 40
4.17 copy tftp startup-config ................................................................................................... 40
4.18 copy backup-config tftp ................................................................................................... 41
4.19 copy backup-config startup-config ............................................................................... 42
4.20 copy running-config backup-config ............................................................................... 42
4.21 copy tftp backup-config ................................................................................................... 43
4.22 boot application ................................................................................................................. 44
4.23 boot config .......................................................................................................................... 44
4.24 remove backup-image ...................................................................................................... 45
4.25 firmware upgrade ............................................................................................................... 46
4.26 ping ....................................................................................................................................... 47
4.27 tracert .................................................................................................................................. 48
4.28 show system-info............................................................................................................... 49
4.29 show image-info ................................................................................................................. 49
4.30 show boot ............................................................................................................................ 50
4.31 show running-config ......................................................................................................... 50
4.32 show startup-config .......................................................................................................... 51
4.33 show system-time ............................................................................................................. 51
4.34 show system-time dst ....................................................................................................... 52
4.35 show system-time ntp....................................................................................................... 52
4.36 show cable-diagnostics interface ................................................................................... 53
4.37 show cpu-utilization ...........................................................................................................
4.38 show memory-utilization .................................................................................................. 54
Chapter 5 EEE Configuration Commands
5.1 eee ........................................................................................................................................ 55
5.2 show interface eee ............................................................................................................ 55
III
53
........................................................................ 57
............................................................................. 59
................................................................ 64
.......................................................................... 73
............................................................. 75
Chapter 6 SDM Template Commands
6.1 sdm prefer ........................................................................................................................... 57
6.2 show sdm prefer ................................................................................................................ 58
Chapter 7 Time Range Commands
7.1 time-range ........................................................................................................................... 59
7.2 absolute ............................................................................................................................... 59
7.3 periodic ................................................................................................................................ 60
7.4 holiday (time-range mode) ............................................................................................... 61
7.5 holiday .................................................................................................................................. 62
7.6 show holiday ....................................................................................................................... 62
7.7 show time-range ................................................................................................................ 63
Chapter 8 Port Configuration Commands
8.1 interface gigabitEthernet .................................................................................................. 64
8.2 interface range gigabitEthernet ...................................................................................... 64
8.3 description .......................................................................................................................... 65
8.4 shutdown ............................................................................................................................. 66
8.5 flow-control ......................................................................................................................... 67
8.6 duplex ................................................................................................................................... 67
8.7 jumbo-size ........................................................................................................................... 68
8.8 speed ................................................................................................................................... 69
8.9 clear counters ..................................................................................................................... 69
8.10 show interface status ........................................................................................................ 70
8.11 show interface counters ................................................................................................... 71
8.12 show interface configuration ........................................................................................... 71
Chapter 9 Port Isolation Commands
9.1 port isolation ....................................................................................................................... 73
9.2 show port isolation interface ........................................................................................... 74
Chapter 10 Loopback Detection Commands
10.1 loopback-detection (global) ............................................................................................. 75
10.2 loopback-detection interval ............................................................................................. 75
10.3 loopback-detection recovery-time ................................................................................ 76
10.4 loopback-detection (interface) ........................................................................................ 77
10.5 loopback-detection config process-mode ................................................................... 77
10.6 loopback-detection recover ............................................................................................ 78
10.7 show loopback-detection global .................................................................................... 79
IV
.......................................................................................... 81
.......................................................................... 89
.......................................................................... 96
10.8 show loopback-detection interface ............................................................................... 79
Chapter 11 DDM Commands
11.1 ddm state enable ............................................................................................................... 81
11.2 ddm shutdown .................................................................................................................... 81
11.3 ddm temperature_threshold ............................................................................................ 82
11.4 ddm voltage_threshold ..................................................................................................... 83
11.5 ddm bias_current_threshold ............................................................................................ 84
11.6 ddm tx_power_threshold .................................................................................................. 85
11.7 ddm rx_power_threshold.................................................................................................. 86
11.8 show ddm configuration ................................................................................................... 87
11.9 show ddm status ................................................................................................................ 88
Chapter 12 Etherchannel Commands
12.1 channel-group .................................................................................................................... 89
12.2 port-channel load-balance ............................................................................................... 90
12.3 lacp system-priority .......................................................................................................... 91
12.4 lacp port-priority ................................................................................................................ 92
12.5 show etherchannel ............................................................................................................ 92
12.6 show etherchannel load-balance .................................................................................... 93
12.7 show lacp ............................................................................................................................. 94
12.8 show lacp sys-id ................................................................................................................. 94
Chapter 13 MAC Address Commands
13.1 mac address-table static .................................................................................................. 96
13.2 mac address-table aging-time ........................................................................................ 97
13.3 mac address-table filtering .............................................................................................. 97
13.4 mac address-table notification ....................................................................................... 98
13.5 mac address-table max-mac-count ............................................................................... 99
13.6 mac address-table notification (interface) .................................................................. 100
13.7 mac address-table security ........................................................................................... 101
13.8 mac address-table vlan-security .................................................................................. 102
13.9 show mac address-table ................................................................................................ 103
13.10 clear mac address-table ................................................................................................. 103
13.11 show mac address-table aging-time ............................................................................ 104
13.12 show mac address-table max-mac-count .................................................................. 104
13.13 show mac address-table interface ............................................................................... 105
13.14 show mac address-table count ..................................................................................... 106
13.15 show mac address-table address ................................................................................. 106
V
............................................................... 109
................................................................ 116
........................................................ 119
............................................................................. 123
13.16 show mac address-table vlan ........................................................................................ 107
13.17 show mac address-table notification ........................................................................... 107
13.18 show mac address-table vlan-security ........................................................................ 108
Chapter 14 IEEE 802.1Q VLAN Commands
14.1 vlan ..................................................................................................................................... 109
14.2 name ................................................................................................................................... 110
14.3 switchport general allowed vlan .................................................................................... 110
14.4 switchport pvid ................................................................................................................. 111
14.5 switchport check ingress ............................................................................................... 112
14.6 switchport acceptable frame ......................................................................................... 113
14.7 show vlan summary ......................................................................................................... 113
14.8 show vlan brief .................................................................................................................. 114
14.9 show vlan ........................................................................................................................... 114
14.10 show interface switchport .............................................................................................. 115
Chapter 15 MAC-based VLAN Commands
15.1 mac-vlan mac-address ................................................................................................... 116
15.2 mac-vlan ............................................................................................................................ 117
15.3 show mac-vlan .................................................................................................................. 117
15.4 show mac-vlan interface ................................................................................................ 118
Chapter 16 Protocol-based VLAN Commands
16.1 protocol-vlan template ................................................................................................... 119
16.2 protocol-vlan vlan ............................................................................................................ 120
16.3 protocol-vlan group ......................................................................................................... 121
16.4 show protocol-vlan template ......................................................................................... 122
16.5 show protocol-vlan vlan .................................................................................................. 122
Chapter 17 VLAN-VPN Commands
17.1 dot1q-tunnel ..................................................................................................................... 123
17.2 switchport dot1q-tunnel tpid ......................................................................................... 123
17.3 dot1q-tunnel mapping .................................................................................................... 124
17.4 switchport dot1q-tunnel mode ..................................................................................... 125
17.5 switchport dot1q-tunnel missdrop ............................................................................... 126
17.6 switchport dot1q-tunnel mapping ................................................................................ 126
17.7 show dot1q-tunnel........................................................................................................... 127
17.8 show dot1q-tunnel mapping .......................................................................................... 128
17.9 show dot1q-tunnel interface ......................................................................................... 128
VI
....................................................................................... 130
..................................................................... 135
Chapter 18 GVRP Commands
18.1 gvrp..................................................................................................................................... 130
18.2 gvrp (interface) ................................................................................................................. 130
18.3 gvrp registration ............................................................................................................... 131
18.4 gvrp timer .......................................................................................................................... 132
18.5 show gvrp interface ......................................................................................................... 133
18.6 show gvrp global .............................................................................................................. 134
Chapter 19 IGMP Snooping Commands
19.1 ip igmp snooping (global) ................................................................................................ 135
19.2 ip igmp snooping version ............................................................................................... 135
19.3 ip igmp snooping drop-unknown .................................................................................. 136
19.4 ip igmp snooping header-validation ............................................................................. 137
19.5 ip igmp snooping vlan-config ........................................................................................ 137
19.6 ip igmp snooping vlan-config (immediate-leave) ....................................................... 139
19.7 ip igmp snooping vlan-config (report-suppression) .................................................. 139
19.8 ip igmp snooping vlan-config (router-ports-forbidden) ............................................ 140
19.9 ip igmp snooping vlan-config (rport interface) ........................................................... 141
19.10 ip igmp snooping vlan-config (static) ........................................................................... 142
19.11 ip igmp snooping vlan-config (querier) ........................................................................ 143
19.12 ip igmp snooping (interface) .......................................................................................... 144
19.13 ip igmp snooping max-groups ....................................................................................... 145
19.14 ip igmp snooping immediate-leave............................................................................... 146
19.15 ip igmp snooping authentication ................................................................................... 147
19.16 ip igmp snooping accounting ........................................................................................ 147
19.17 ip igmp profile ................................................................................................................... 148
19.18 deny .................................................................................................................................... 149
19.19 permit ................................................................................................................................. 149
19.20 range .................................................................................................................................. 150
19.21 ip igmp filter ...................................................................................................................... 150
19.22 clear ip igmp snooping statistics .................................................................................. 151
19.23 show ip igmp snooping ................................................................................................... 151
19.24 show ip igmp snooping interface .................................................................................. 152
19.25 show ip igmp snooping vlan ........................................................................................... 153
19.26 show ip igmp snooping groups ..................................................................................... 153
19.27 show ip igmp profile ......................................................................................................... 154
VII
...................................................................... 156
......................................................................................... 174
Chapter 20 MLD Snooping Commands
20.1 ipv6 mld snooping (global) .............................................................................................. 156
20.2 ipv6 mld snooping drop-unknown ................................................................................ 156
20.3 ipv6 mld snooping vlan-config ...................................................................................... 157
20.4 ipv6 mld snooping vlan-config (immediate-leave) ..................................................... 158
20.5 ipv6 mld snooping vlan-config (report-suppression) ................................................ 159
20.6 ipv6 mld snooping vlan-config (router-ports-forbidden) .......................................... 160
20.7 ipv6 mld snooping vlan-config (rport interface) ......................................................... 161
20.8 ipv6 mld snooping vlan-config (static) ......................................................................... 161
20.9 ipv6 mld snooping vlan-config (querier) ...................................................................... 162
20.10 ipv6 mld snooping (interface) ........................................................................................ 164
20.11 ipv6 mld snooping max-groups ..................................................................................... 164
20.12 ipv6 mld snooping immediate-leave ............................................................................ 166
20.13 ipv6 mld profile ................................................................................................................. 166
20.14 deny .................................................................................................................................... 167
20.15 permit ................................................................................................................................. 167
20.16 range .................................................................................................................................. 168
20.17 ipv6 mld filter .................................................................................................................... 169
20.18 clear ipv6 mld snooping statistics ................................................................................ 169
20.19 show ipv6 mld snooping ................................................................................................. 170
20.20 show ipv6 mld snooping interface ................................................................................ 170
20.21 show ipv6 mld snooping vlan ......................................................................................... 171
20.22 show ipv6 mld snooping groups ................................................................................... 172
20.23 show ipv6 mld profile ...................................................................................................... 172
Chapter 21 MVR Commands
21.1 mvr (global) ........................................................................................................................ 174
21.2 mvr group .......................................................................................................................... 174
21.3 mvr mode........................................................................................................................... 175
21.4 mvr querytime ................................................................................................................... 176
21.5 mvr vlan .............................................................................................................................. 177
21.6 mvr (interface) ................................................................................................................... 177
21.7 mvr type ............................................................................................................................. 178
21.8 mvr immediate .................................................................................................................. 179
21.9 mvr vlan (group) ................................................................................................................ 179
21.10 show mvr ........................................................................................................................... 180
21.11 show mvr interface .......................................................................................................... 181
21.12 show mvr members ......................................................................................................... 181
VIII
....................................................................................... 183
........................................................................................ 203
21.13 show mvr traffic ................................................................................................................ 182
Chapter 22 MSTP Commands
22.1 debug spanning-tree ....................................................................................................... 183
22.2 spanning-tree (global) ..................................................................................................... 184
22.3 spanning-tree (interface) ................................................................................................ 184
22.4 spanning-tree common-config ..................................................................................... 185
22.5 spanning-tree mode ........................................................................................................ 186
22.6 spanning-tree mst configuration .................................................................................. 187
22.7 instance ............................................................................................................................. 188
22.8 name ................................................................................................................................... 188
22.9 revision .............................................................................................................................. 189
22.10 spanning-tree mst instance ........................................................................................... 190
22.11 spanning-tree mst ........................................................................................................... 190
22.12 spanning-tree priority ..................................................................................................... 191
22.13 spanning-tree timer ......................................................................................................... 192
22.14 spanning-tree hold-count .............................................................................................. 193
22.15 spanning-tree max-hops ................................................................................................ 193
22.16 spanning-tree bpdufilter ................................................................................................. 194
22.17 spanning-tree bpduflood ................................................................................................ 195
22.18 spanning-tree bpduguard .............................................................................................. 195
22.19 spanning-tree guard loop ............................................................................................... 196
22.20 spanning-tree guard root ............................................................................................... 197
22.21 spanning-tree guard tc ................................................................................................... 197
22.22 spanning-tree mcheck .................................................................................................... 198
22.23 show spanning-tree active ............................................................................................. 199
22.24 show spanning-tree bridge ............................................................................................ 199
22.25 show spanning-tree interface ........................................................................................ 200
22.26 show spanning-tree interface-security ....................................................................... 201
22.27 show spanning-tree mst ................................................................................................. 201
Chapter 23 LLDP Commands
23.1 lldp ...................................................................................................................................... 203
23.2 lldp forward_message ..................................................................................................... 203
23.3 lldp hold-multiplier ........................................................................................................... 204
23.4 lldp timer ............................................................................................................................ 205
23.5 lldp receive ........................................................................................................................ 206
23.6 lldp transmit ...................................................................................................................... 206
IX
........................................................................................ 216
............................................................. 220
........................................................................... 225
23.7 lldp snmp-trap .................................................................................................................. 207
23.8 lldp tlv-select .................................................................................................................... 208
23.9 lldp management-address ............................................................................................. 208
23.10 lldp med-fast-count ......................................................................................................... 209
23.11 lldp med-status ................................................................................................................ 210
23.12 lldp med-tlv-select ........................................................................................................... 210
23.13 lldp med-location ............................................................................................................. 211
23.14 show lldp ............................................................................................................................ 212
23.15 show lldp interface ........................................................................................................... 213
23.16 show lldp local-information interface ........................................................................... 213
23.17 show lldp neighbor-information interface ................................................................... 214
23.18 show lldp traffic interface ............................................................................................... 214
Chapter 24 L2PT Commands
24.1 l2protocol-tunnel ............................................................................................................. 216
24.2 l2protocol-tunnel type .................................................................................................... 216
24.3 show l2protocol-tunnel global ....................................................................................... 218
24.4 show l2protocol-tunnel interface .................................................................................. 218
Chapter 25 PPPoE ID-Insertion Commands
25.1 pppoe id-insertion (global) ............................................................................................. 220
25.2 pppoe circuit-id (interface) ............................................................................................. 221
25.3 pppoe circuit-id type ....................................................................................................... 221
25.4 pppoe remote-id .............................................................................................................. 222
25.5 show pppoe id-insertion global ..................................................................................... 223
25.6 show pppoe id-insertion interface ................................................................................ 223
Chapter 26 DHCP Relay Commands
26.1 service dhcp relay ............................................................................................................ 225
26.2 ip dhcp relay hops ............................................................................................................ 225
26.3 ip dhcp relay time ............................................................................................................. 226
26.4 ip dhcp relay vlan ............................................................................................................. 227
26.5 ip dhcp relay information ................................................................................................ 227
26.6 ip dhcp relay information strategy ................................................................................ 228
26.7 ip dhcp relay information format ................................................................................... 229
26.8 ip dhcp relay information circuit-id ............................................................................... 230
26.9 ip dhcp relay information remote-id ............................................................................. 230
26.10 ip dhcp relay default-interface ...................................................................................... 231
26.11 show ip dhcp relay ........................................................................................................... 232
X
..................................................................... 233
.......................................................................................... 239
.............................................................. 249
........................................................................... 255
Chapter 27 DHCP L2 Relay Commands
27.1 ip dhcp l2relay .................................................................................................................. 233
27.2 ip dhcp l2relay vlan .......................................................................................................... 233
27.3 ip dhcp l2relay information ............................................................................................. 234
27.4 ip dhcp l2relay information strategy ............................................................................. 234
27.5 ip dhcp l2relay information format ................................................................................ 235
27.6 ip dhcp l2relay information circuit-id ............................................................................ 236
27.7 ip dhcp l2relay information remote-id .......................................................................... 237
27.8 show ip dhcp l2relay ........................................................................................................ 237
27.9 show ip dhcp l2relay interface ....................................................................................... 238
Chapter 28 QoS Commands
28.1 qos trust mode ................................................................................................................. 239
28.2 qos port-priority ............................................................................................................... 240
28.3 qos cos-map ..................................................................................................................... 240
28.4 qos dot1p-remap ............................................................................................................. 241
28.5 qos dscp-map................................................................................................................... 242
28.6 qos dscp-remap ............................................................................................................... 243
28.7 qos queue mode .............................................................................................................. 243
28.8 show qos cos-map .......................................................................................................... 244
28.9 show qos dot1p-remap .................................................................................................. 245
28.10 show qos dscp-map ........................................................................................................ 245
28.11 show qos dscp-remap .................................................................................................... 246
28.12 show qos port-priority interface ................................................................................... 246
28.13 show qos trust interface ................................................................................................. 247
28.14 show qos queue interface .............................................................................................. 247
Chapter 29 Bandwidth Control Commands
29.1 storm-control rate-mode ............................................................................................... 249
29.2 storm-control.................................................................................................................... 250
29.3 storm-control exceed ..................................................................................................... 251
29.4 storm-control recover .................................................................................................... 251
29.5 bandwidth .......................................................................................................................... 252
29.6 show storm-control ......................................................................................................... 253
29.7 show bandwidth ............................................................................................................... 253
Chapter 30 Voice VLAN Commands
30.1 voice vlan ........................................................................................................................... 255
XI
............................................................................... 260
.................................................................... 266
................................................................. 271
30.2 voice vlan (interface) ....................................................................................................... 255
30.3 voice vlan priority ............................................................................................................. 256
30.4 voice vlan oui .................................................................................................................... 257
30.5 show voice vlan ................................................................................................................ 257
30.6 show voice vlan oui-table ............................................................................................... 258
30.7 show voice vlan interface ............................................................................................... 258
Chapter 31 Auto VoIP Commands
31.1 auto-voip ........................................................................................................................... 260
31.2 auto-voip (interface) ........................................................................................................ 260
31.3 auto-voip dot1p ................................................................................................................ 261
31.4 auto-voip untagged ......................................................................................................... 262
31.5 auto-voip none ................................................................................................................. 262
31.6 no auto-voip (interface) ................................................................................................... 263
31.7 auto-voip dscp ................................................................................................................. 263
31.8 auto-voip data priority ..................................................................................................... 264
31.9 show auto-voip ................................................................................................................. 265
Chapter 32 Access Control Commands
32.1 user access-control ip-based enable .......................................................................... 266
32.2 user access-control ip-based ....................................................................................... 266
32.3 user access-control mac-based enable ...................................................................... 267
32.4 user access-control mac-based ................................................................................... 268
32.5 user access-control port-based enable ...................................................................... 269
32.6 user access-control port-based ................................................................................... 269
Chapter 33 HTTP and HTTPS Commands
33.1 ip http server ..................................................................................................................... 271
33.2 ip http port ......................................................................................................................... 272
33.3 ip http max-users ............................................................................................................. 272
33.4 ip http session timeout ................................................................................................... 273
33.5 ip http secure-server ....................................................................................................... 274
33.6 ip http secure-port ........................................................................................................... 274
33.7 ip http secure-protocol ................................................................................................... 275
33.8 ip http secure-ciphersuite .............................................................................................. 276
33.9 ip http secure-max-users ............................................................................................... 277
33.10 ip http secure-session timeout ..................................................................................... 278
33.11 ip http secure-server download certificate ................................................................. 278
33.12 ip http secure-server download key ............................................................................. 279
XII
.......................................................................................... 282
...................................................................................... 288
.............................................................................. 290
......................................................................................... 291
33.13 show ip http configuration .............................................................................................. 280
33.14 show ip http secure-server ............................................................................................ 281
Chapter 34 SSH Commands
34.1 ip ssh server ...................................................................................................................... 282
34.2 ip ssh port .......................................................................................................................... 282
34.3 ip ssh version .................................................................................................................... 283
34.4 ip ssh algorithm ................................................................................................................ 284
34.5 ip ssh timeout ................................................................................................................... 284
34.6 ip ssh max-client .............................................................................................................. 285
34.7 ip ssh download ................................................................................................................ 286
34.8 remove public-key ........................................................................................................... 286
34.9 show ip ssh ........................................................................................................................ 287
Chapter 35 Telnet Commands
35.1 telnet enable ..................................................................................................................... 288
35.2 telnet port .......................................................................................................................... 288
35.3 show telnet-status ........................................................................................................... 289
Chapter 36 Serial Port Commands
36.1 serial_port baud-rate ....................................................................................................... 290
Chapter 37 AAA Commands
37.1 tacacas-server host ........................................................................................................ 291
37.2 show tacacs-server ......................................................................................................... 292
37.3 radius-server host ........................................................................................................... 293
37.4 show radius-server .......................................................................................................... 294
37.5 aaa group ........................................................................................................................... 295
37.6 server ................................................................................................................................. 296
37.7 show aaa group ................................................................................................................ 296
37.8 aaa authentication login .................................................................................................. 297
37.9 aaa authentication enable .............................................................................................. 298
37.10 aaa authentication dot1x default................................................................................... 299
37.11 aaa accounting dot1x default ........................................................................................ 300
37.12 show aaa authentication ................................................................................................. 300
37.13 show aaa accounting ....................................................................................................... 301
37.14 line telnet ........................................................................................................................... 301
37.15 login authentication (telnet) ............................................................................................ 302
37.16 line ssh ............................................................................................................................... 303
XIII
............................................................................ 309
......................................................................... 323
....................................................................... 325
.......................................................................................... 329
37.17 login authentication (ssh) ................................................................................................ 303
37.18 enable authentication (telnet) ........................................................................................ 304
37.19 enable authentication (ssh) ............................................................................................ 305
37.20 ip http login authentication............................................................................................. 305
37.21 ip http enable authentication ......................................................................................... 306
37.22 show aaa global ................................................................................................................ 307
37.23 enable-admin .................................................................................................................... 307
Chapter 38 IEEE 802.1x Commands
38.1 dot1x system-auth-control ............................................................................................ 309
38.2 dot1x handshake.............................................................................................................. 310
38.3 dot1x auth-protocol ........................................................................................................ 310
38.4 dot1x vlan-assignment ................................................................................................... 311
38.5 dot1x accounting ............................................................................................................. 312
38.6 dot1x mab ......................................................................................................................... 313
38.7 dot1x guest-vlan .............................................................................................................. 313
38.8 dot1x timeout quiet-period ............................................................................................ 314
38.9 dot1x timeout supp-timeout .......................................................................................... 315
38.10 dot1x max- req ................................................................................................................. 316
38.11 dot1x .................................................................................................................................. 317
38.12 dot1x port-control ........................................................................................................... 317
38.13 dot1x port-method .......................................................................................................... 318
38.14 dot1x auth-init .................................................................................................................. 319
38.15 dot1x auth-reauth ............................................................................................................ 320
38.16 show dot1x global ............................................................................................................ 320
38.17 show dot1x interface ....................................................................................................... 321
38.18 show dot1x auth-state .................................................................................................... 322
Chapter 39 Port Security Commands
39.1 mac address-table max-mac count .............................................................................. 323
39.2 show mac address-table max-mac-count .................................................................. 323
Chapter 40 Port Mirroring Commands
40.1 monitor session destination interface ......................................................................... 325
40.2 monitor session source .................................................................................................. 326
40.3 show monitor session ..................................................................................................... 327
Chapter 41 ACL Commands
41.1 access-list create ............................................................................................................ 329
XIV
............................................................................... 345
............................................................................... 351
41.2 access-list resequence .................................................................................................. 329
41.3 access-list mac ................................................................................................................ 330
41.4 access-list ip ..................................................................................................................... 332
41.5 access-list combined ...................................................................................................... 333
41.6 access-list ipv6 ................................................................................................................ 335
41.7 access-list action ............................................................................................................. 337
41.8 redirect interface ............................................................................................................. 338
41.9 s-condition ........................................................................................................................ 339
41.10 s-mirror .............................................................................................................................. 339
41.11 qos-remark ........................................................................................................................ 340
41.12 access bind ....................................................................................................................... 341
41.13 show access-list .............................................................................................................. 342
41.14 show access-list bind ...................................................................................................... 342
41.15 show access-list status .................................................................................................. 343
41.16 show access-list counter ............................................................................................... 343
41.17 clear access-list ............................................................................................................... 344
Chapter 42 IPv4 IMPB Commands
42.1 ip source binding .............................................................................................................. 345
42.2 ip dhcp snooping ............................................................................................................. 346
42.3 ip dhcp snooping vlan ..................................................................................................... 347
42.4 ip dhcp snooping max-entries ....................................................................................... 347
42.5 show ip source binding ................................................................................................... 348
42.6 show ip dhcp snooping ................................................................................................... 349
42.7 show ip dhcp snooping interface .................................................................................. 349
Chapter 43 IPv6 IMPB Commands
43.1 Ipv6 source binding ......................................................................................................... 351
43.2 ipv6 dhcp snooping ......................................................................................................... 352
43.3 ipv6 dhcp snooping vlan ................................................................................................. 353
43.4 ipv6 dhcp snooping max-entries .................................................................................. 353
43.5 ipv6 nd snooping .............................................................................................................. 354
43.6 ipv6 nd snooping vlan ..................................................................................................... 355
43.7 ipv6 nd snooping max-entries ....................................................................................... 355
43.8 show ipv6 source binding ............................................................................................... 356
43.9 show ipv6 dhcp snooping............................................................................................... 357
43.10 show ipv6 dhcp snooping interface ............................................................................. 357
43.11 show ipv6 nd snooping ................................................................................................... 358
XV
................................................................... 359
.............................................................. 362
....................................................................... 365
....................................................................... 372
........................................................................... 378
....................................................................................... 382
Chapter 44 IP Verify Source Commands
44.1 ip verify source ................................................................................................................. 359
44.2 ip verify source logging ................................................................................................... 360
44.3 show ip verify source ...................................................................................................... 360
44.4 show ip verify source interface ..................................................................................... 361
Chapter 45 IPv6 Verify Source Commands
45.1 ipv6 verify source ............................................................................................................. 362
45.2 show ipv6 verify source .................................................................................................. 363
45.3 show ipv6 verify source interface ................................................................................. 363
Chapter 46 DHCPv4 Filter Commands
46.1 ip dhcp filter ...................................................................................................................... 365
46.2 ip dhcp filter (interface) ................................................................................................... 365
46.3 ip dhcp filter mac-verify .................................................................................................. 366
46.4 ip dhcp filter limit rate ...................................................................................................... 367
46.5 ip dhcp filter decline rate ................................................................................................ 368
46.6 ip dhcp filter server permit-entry .................................................................................. 368
46.7 show ip dhcp filter ............................................................................................................ 369
46.8 show ip dhcp filter interface ........................................................................................... 370
46.9 show ip dhcp filter server permit-entry ........................................................................ 370
Chapter 47 DHCPv6 Filter Commands
47.1 ipv6 dhcp filter .................................................................................................................. 372
47.2 ipv6 dhcp filter (interface) ............................................................................................... 372
47.3 ipv6 dhcp filter limit rate ................................................................................................. 373
47.4 ipv6 dhcp filter decline rate ............................................................................................ 374
47.5 ipv6 dhcp filter server permit-entry .............................................................................. 375
47.6 show ipv6 dhcp filter ....................................................................................................... 376
47.7 show ipv6 dhcp filter interface ...................................................................................... 376
47.8 show ip dhcp filter server permit-entry ........................................................................ 377
Chapter 48 DoS Defend Commands
48.1 ip dos-prevent .................................................................................................................. 378
48.2 ip dos-prevent type ......................................................................................................... 378
48.3 show ip dos-prevent ........................................................................................................ 380
Chapter 49 DLDP Commands
49.1 dldp (global) ....................................................................................................................... 382
XVI
...................................................................................... 386
49.2 dldp interval....................................................................................................................... 382
49.3 dldp shut-mode ................................................................................................................ 383
49.4 dldp(interface) .................................................................................................................. 384
49.5 show dldp .......................................................................................................................... 384
49.6 show dldp interface ......................................................................................................... 385
Chapter 50 SNMP Commands
50.1 snmp-server...................................................................................................................... 386
50.2 snmp-server view ............................................................................................................ 386
50.3 snmp-server group .......................................................................................................... 387
50.4 snmp-server user ............................................................................................................. 389
50.5 snmp-server community ................................................................................................ 390
50.6 snmp-server host............................................................................................................. 391
50.7 snmp-server engineID .................................................................................................... 393
50.8 snmp-server traps snmp ................................................................................................ 393
50.9 snmp-server traps ........................................................................................................... 394
50.10 snmp-server traps ddm .................................................................................................. 396
50.11 snmp-server traps vlan ................................................................................................... 397
50.12 snmp-server traps security ............................................................................................ 398
50.13 snmp-server traps acl ..................................................................................................... 399
50.14 snmp-server traps ip ....................................................................................................... 399
50.15 snmp-server traps link-status ....................................................................................... 400
50.16 rmon history ...................................................................................................................... 400
50.17 rmon event ........................................................................................................................ 401
50.18 rmon alarm ........................................................................................................................ 402
50.19 rmon statistics .................................................................................................................. 404
50.20 show snmp-server ........................................................................................................... 405
50.21 show snmp-server view .................................................................................................. 405
50.22 show snmp-server group ............................................................................................... 406
50.23 show snmp-server user .................................................................................................. 406
50.24 show snmp-server community ...................................................................................... 407
50.25 show snmp-server host .................................................................................................. 407
50.26 show snmp-server engineID .......................................................................................... 407
50.27 show rmon history ........................................................................................................... 408
50.28 show rmon event .............................................................................................................. 408
50.29 show rmon alarm .............................................................................................................. 409
50.30 show rmon statistics ....................................................................................................... 410
XVII
..................................................................... 411
........................................................................ 420
........................................................................... 424
Chapter 51 ARP Inspection Commands
51.1 ip arp inspection ............................................................................................................... 411
51.2 ip arp inspection validate ................................................................................................ 411
51.3 ip arp inspection vlan ...................................................................................................... 412
51.4 ip arp inspection vlan logging ........................................................................................ 413
51.5 ip arp inspection trust ..................................................................................................... 414
51.6 ip arp inspection limit-rate .............................................................................................. 414
51.7 ip arp inspection burst-interval ..................................................................................... 415
51.8 ip arp inspection recover ................................................................................................ 416
51.9 show ip arp inspection .................................................................................................... 416
51.10 show ip arp inspection interface ................................................................................... 417
51.11 show ip arp inspection vlan ............................................................................................ 418
51.12 show ip arp inspection statistics ................................................................................... 418
51.13 clear ip arp inspection statistics ................................................................................... 419
Chapter 52 ND Detection Commands
52.1 ipv6 nd detection ............................................................................................................. 420
52.2 ipv6 nd detection vlan ..................................................................................................... 420
52.3 ipv6 nd detection vlan logging....................................................................................... 421
52.4 ipv6 nd detection trust .................................................................................................... 421
52.5 show ipv6 nd detection ................................................................................................... 422
52.6 show ipv6 nd detection interface .................................................................................. 422
52.7 show ipv6 nd detection vlan .......................................................................................... 423
Chapter 53 System Log Commands
53.1 logging buffer ................................................................................................................... 424
53.2 logging buffer level .......................................................................................................... 424
53.3 logging file flash ............................................................................................................... 425
53.4 logging file flash frequency ............................................................................................ 426
53.5 logging file flash level ...................................................................................................... 427
53.6 logging host index ............................................................................................................ 427
53.7 logging console ................................................................................................................ 428
53.8 logging console level ....................................................................................................... 429
53.9 logging monitor ................................................................................................................ 430
53.10 logging monitor level ....................................................................................................... 430
53.11 clear logging ..................................................................................................................... 431
53.12 show logging local-config .............................................................................................. 432
53.13 show logging loghost ...................................................................................................... 432
XVIII
53.14 show logging buffer ......................................................................................................... 433
53.15 show logging flash ........................................................................................................... 433
XIX
Preface
This Guide is intended for network administrator to provide referenced information about CLI
(Command Line Interface). The device mentioned in this Guide stands for T2500G-10TS
JetStream 8-Port Gigabit L2 Managed Switch with 2 SFP Slots without any explanation.
Overview of this Guide
Chapter 1: Using the CLI
Provide information about how to use the CLI, CLI Command Modes, Security Levels and some
Conventions.
Chapter 2: User Interface
Provide information about the commands used to switch between five CLI Command Modes.
Chapter 3: User Management Commands
Provide information about the commands used for user management.
Chapter 4: System Configuration Commands
Provide information about the commands used for configuring the System information and
System IP, reboot and reset the switch, upgrade the switch system and commands used for
cable test.
Chapter 5: EEE Configuration Commands
Provide information about the commands used for configuring EEE.
Chapter 6: SDM Template Commands
Provide information about the commands used for configuring the SDM templates.
Chapter 7: Time Range Commands
Provide information about the commands used for configuring the time range.
Chapter 8: Port Configuration Commands
Provide information about the commands used for configuring the Speed, Negotiation Mode,
and Flow Control for Ethernet ports.
Chapter 9: Port Isolation Commands
Provide information about the commands used for configuring Port Isolation function.
Chapter 10: Loopback Detection Commands
Provide information about the commands used for configuring the Loopback Detection
function.
Chapter 11: DDM Commands
Provide information about the commands used for DDM (Digital Diagnostic Monitoring)
function.
1
Chapter 12: Etherchannel Commands
Provide information about the commands used for configuring LAG (Link Aggregation Group)
and LACP (Link Aggregation Control Protocol).
Chapter 13: MAC Address Commands
Provide information about the commands used for Address configuration.
Chapter 14 IEEE 802.1Q VLAN Commands
Provide information about the commands used for configuring IEEE 802.1Q VLAN.
Chapter 15: MAC-based VLAN Commands
Provide information about the commands used for configuring MAC-based VLAN.
Chapter 16: Protocol-based VLAN Commands
Provide information about the commands used for configuring Protocol VLAN.
Chapter 17: VLAN-VPN Commands
Provide information about the commands used for configuring VLAN-VPN (Virtual Private
Network) function.
Chapter 18: GVRP Commands
Provide information about the commands used for configuring GVRP (GARP VLAN registration
protocol).
Chapter 19: IGMP Snooping Commands
Provide information about the commands used for configuring the IGMP Snooping (Internet
Group Management Protocol Snooping).
Chapter 20: MLD Snooping Commands
Provide information about the commands used for configuring the MLD Snooping (Multicast
Listener Discovery Snooping).
Chapter 21: MVR Commands
Provide information about the commands used for configuring the MVR.
Chapter 22: MSTP Commands
Provide information about the commands used for configuring the MSTP (Multiple Spanning
Tree Protocol).
Chapter 23: LLDP Commands
Provide information about the commands used for configuring LLDP function.
Chapter 24: L2PT Commands
Provide information about the commands used for configuring L2PT (Layer 2 Protocol
Tunneling).
Chapter 25: PPPoE ID-Insertion Commands
Provide information about the commands used for configuring PPPoE ID-Insertion.
2
Chapter 26: DHCP Relay Commands
Provide information about the commands used for configuring the DHCP Relay function.
Chapter 27: DHCP L2 Relay Commands
Provide information about the commands used for configuring the DHCP L2 Relay function.
Chapter 28: QoS Commands
Provide information about the commands used for configuring the QoS function.
Chapter 29: Bandwidth Commands
Provide information about the commands used for configuring the Bandwidth Control.
Chapter 30: Voice VLAN Commands
Provide information about the commands used for configuring Voice VLAN.
Chapter 31: Auto VoIP Commands
Provide information about the commands used for configuring Auto VoIP.
Chapter 32: Access Control Commands
Provide information about the commands used for configuring Access Control.
Chapter 33: HTTP and HTTPS Commands
Provide information about the commands used for configuring the HTTP and HTTPS logon.
Chapter 34: SSH Commands
Provide information about the commands used for configuring and managing SSH (Security
Shell).
Chapter 35: Telnet Commands
Provide information about the commands used for configuring and managing SSH (Security
Shell).
Chapter 36: Serial Port Commands
Provide information about the commands used for configuring and managing SSH (Security
Shell).
Chapter 37: AAA Commands
Provide information about the commands used for configuring AAA (authentication,
authorization and accounting).
Chapter 38: IEEE 802.1X Commands
Provide information about the commands used for configuring IEEE 802.1X function.
Chapter 39: Port Security Commands
Provide information about the commands used for configuring Port Security.
3
Chapter 40: Port Mirroring Commands
Provide information about the commands used for configuring the Port Mirror function.
Chapter 41: ACL Commands
Provide information about the commands used for configuring the ACL (Access Control List).
Chapter 42: IPv4 IMPB Commands
Provide information about the commands used for binding the IP address, MAC address, VLAN
and the connected Port number of the Host together.
Chapter 43: IPv6 IMPB Commands
Provide information about the commands used for binding the IPv6 address, MAC address,
VLAN and the connected Port number of the Host together.
Chapter 44: IP Verify Source Commands
Provide information about the commands used for guarding the IP Source by filtering the IP
packets based on the IP-MAC Binding entries.
Chapter 45: IPv6 Verify Source Commands
Provide information about the commands used for guarding the IPv6 Source by filtering the IP
packets based on the IP-MAC Binding entries.
Chapter 46: DHCPv4 Filter Commands
Provide information about the commands used for configuring the DHCPv4 Filter.
Chapter 47: DHCPv6 Filter Commands
Provide information about the commands used for configuring the DHCPv6 Filter.
Chapter 48: DoS Defend Command
Provide information about the commands used for DoS defend and detecting the DoS attack.
Chapter 49: DLDP Commands
Provide information about the commands used for configuring the DLDP (Device Link
Detection Protocol).
Chapter 50: SNMP Commands
Provide information about the commands used for configuring the SNMP (Simple Network
Management Protocol) functions.
Chapter 51: ARP Inspection Commands
Provide information about the commands used for protecting the switch from the ARP
cheating or ARP Attack.
Chapter 52: ND Detection Commands
Provide information about the commands used for configuring ND detection.
Chapter 53: System Log Commands
Provide information about the commands used for configuring system log.
4
Logon by Telnet
Chapter 1 Using the CLI
1.1 Accessing the CLI
You can log on to the switch and access the CLI by logging on to the switch remotely by a
Telnet or SSH connection through an Ethernet port.
1.1.1
To log on to the switch by a Telnet connection, please take the following steps:
1. Click Start and type in cmd in the Search programs and files window and press the Enter
2. Telnet the switch’s IP address (factory setting is 192.168.0.1) in the prompt cmd window
button.
Figure 1-1 Run Window
and press Enter.
Figure 1-2 Type in the telnet command
5
Logon by SSH
3. Type in the User name and Password (the factory default value for both of them are admin)
and press the Enter button to enter User EXEC Mode , which is shown as Figure 1-3.
Figure 1-3 Log in the Switch
4. Type in enable command to enter Privileged EXEC Mode.
Figure 1-4 Enter into Priviledged EXEC Mode
1.1.2
To log on by SSH, a Putty client software is recommended. There are two authentication modes
to set up an SSH connection:
Password Authentication Mode : It requires username and password, which are both admin by
default.
Key Authentication Mode : It requires a public key for the switch and a private key for the SSH
client software. You can generate the public key and the private key through Putty Key
Generator.
Before SSH login, please follow the steps shown in Figure 1-5 to enable the SSH function
through Telnet connection.
Note:
6
Figure 1-5 Enable SSH function
Password Authentication Mode
1. Open the software to log on to the interface of PuTTY. Enter the IP address of the switch
into Host Name field; keep the default value 22 in the Port field; select SSH as the
Connection type.
Figure 1-6 SSH Connection Config
7
2. Click the Open button in the above figure to log on to the switch. Enter the login user name
and password to log on the switch, and then enter enable to enter Privileged EXEC Mode,
so you can continue to configure the switch.
Figure 1-7 Log on the Switch
Key Authentication Mode
1. Select the key type and key length, and generate SSH key.
Figure 1-8 Generate SSH Key
Note:
1. The key length is in the range of 512 to 3072 bits.
8
2. During the key generation, randomly moving the mouse quickly can accelerate the key
generation.
2. After the key is successfully generated, please save the public key and private key to a
TFTP server.
Figure 1-9 Save the Generated Key
9
3. Log on to the switch by Telnet and download the public key file from the TFTP server to the
switch, as the following figure shows:
Figure 1-10 Download the Public Key
Note:
1. The key type should accord with the type of the key file.
2. The SSH key downloading can not be interrupted.
10