TP-Link T2500G-10TS REV2.0.0 CLI Reference Guide

0 (0)

CLI Reference Guide

T2500G-10TS (TL-SG3210) 1910012494 REV2.0.0 November 2018

COPYRIGHT & TRADEMARKS

Specifications are subject to change without notice. is a registered trademark of

TP-Link Technologies Co., Ltd. Other brands and product names are trademarks or registered trademarks of their respective holders.

No part of the specifications may be reproduced in any form or by any means or used to make any derivative such as translation, transformation, or adaptation without permission from TP-Link Technologies Co., Ltd. Copyright © 2018 TP-Link Technologies Co., Ltd. All rights reserved.

https://www.tp-link.com

I

 

 

CONTENTS

 

Preface

............................................................................................................................

 

1

Chapter 1 Using the CLI ...................................................................................................

5

1.1 Accessing the CLI .........................................................................................................................

5

1.1.1

Logon by Telnet ...........................................................................................................

5

1.1.2

Logon by SSH ...............................................................................................................

6

1.2 CLI Command Modes .................................................................................................................

12

1.3 Privilege Restrictions..................................................................................................................

15

1.4 Conventions .................................................................................................................................

15

1.4.1

Format Conventions..................................................................................................

15

1.4.2

Special Characters ....................................................................................................

16

1.4.3

Parameter Format......................................................................................................

16

Chapter 2

User Interface...............................................................................................

17

2.1

enable...................................................................................................................................

17

2.2

service password-encryption..........................................................................................

17

2.3

enable password................................................................................................................

18

2.4

enable secret ......................................................................................................................

19

2.5

configure .............................................................................................................................

20

2.6

exit ........................................................................................................................................

 

21

2.7

end........................................................................................................................................

 

21

2.8

clipaging ..............................................................................................................................

22

2.9

history ..................................................................................................................................

22

2.10

history clear ........................................................................................................................

23

Chapter 3 User Management Commands .................................................................

24

3.1

user name (password).......................................................................................................

24

3.2

user name (secret) .............................................................................................................

25

3.3

show user account-list......................................................................................................

26

3.4

show user configuration ...................................................................................................

27

Chapter 4 System Configuration Commands ..........................................................

28

4.1

system-time manual..........................................................................................................

28

4.2

system-time ntp .................................................................................................................

28

4.3

system-time dst predefined.............................................................................................

30

4.4

system-time dst date ........................................................................................................

31

4.5

system-time dst recurring................................................................................................

32

II

4.6

hostname.............................................................................................................................

33

4.7

location ................................................................................................................................

34

4.8

contact-info ........................................................................................................................

34

4.9

ip address............................................................................................................................

35

4.10

ip management-vlan..........................................................................................................

36

4.11

ip address-alloc..................................................................................................................

36

4.12

reset .....................................................................................................................................

37

4.13

reboot...................................................................................................................................

38

4.14

reboot-schedule ................................................................................................................

38

4.15

copy running-config startup-config ...............................................................................

39

4.16

copy startup-config tftp ...................................................................................................

40

4.17

copy tftp startup-config ...................................................................................................

40

4.18

copy backup-config tftp ...................................................................................................

41

4.19

copy backup-config startup-config ...............................................................................

42

4.20

copy running-config backup-config...............................................................................

42

4.21

copy tftp backup-config ...................................................................................................

43

4.22

boot application .................................................................................................................

44

4.23

boot config..........................................................................................................................

44

4.24

remove backup-image......................................................................................................

45

4.25

firmware upgrade...............................................................................................................

46

4.26

ping.......................................................................................................................................

47

4.27

tracert ..................................................................................................................................

48

4.28

show system-info...............................................................................................................

49

4.29

show image-info.................................................................................................................

49

4.30

show boot............................................................................................................................

50

4.31

show running-config .........................................................................................................

50

4.32

show startup-config ..........................................................................................................

51

4.33

show system-time .............................................................................................................

51

4.34

show system-time dst.......................................................................................................

52

4.35

show system-time ntp.......................................................................................................

52

4.36

show cable-diagnostics interface...................................................................................

53

4.37

show cpu-utilization...........................................................................................................

53

4.38

show memory-utilization ..................................................................................................

54

Chapter 5 EEE Configuration Commands .................................................................

55

5.1

eee........................................................................................................................................

55

5.2

show interface eee ............................................................................................................

55

III

Chapter 6 SDM Template Commands........................................................................

57

6.1

sdm prefer...........................................................................................................................

57

6.2

show sdm prefer ................................................................................................................

58

Chapter 7 Time Range Commands .............................................................................

59

7.1

time-range...........................................................................................................................

59

7.2

absolute...............................................................................................................................

59

7.3

periodic................................................................................................................................

60

7.4

holiday (time-range mode) ...............................................................................................

61

7.5

holiday..................................................................................................................................

62

7.6

show holiday .......................................................................................................................

62

7.7

show time-range ................................................................................................................

63

Chapter 8 Port Configuration Commands ................................................................

64

8.1

interface gigabitEthernet..................................................................................................

64

8.2

interface range gigabitEthernet ......................................................................................

64

8.3

description ..........................................................................................................................

65

8.4

shutdown.............................................................................................................................

66

8.5

flow-control.........................................................................................................................

67

8.6

duplex...................................................................................................................................

67

8.7

jumbo-size...........................................................................................................................

68

8.8

speed ...................................................................................................................................

69

8.9

clear counters.....................................................................................................................

69

8.10

show interface status........................................................................................................

70

8.11

show interface counters...................................................................................................

71

8.12

show interface configuration...........................................................................................

71

Chapter 9 Port Isolation Commands ..........................................................................

73

9.1

port isolation.......................................................................................................................

73

9.2

show port isolation interface ...........................................................................................

74

Chapter 10 Loopback Detection Commands.............................................................

75

10.1

loopback-detection (global).............................................................................................

75

10.2

loopback-detection interval.............................................................................................

75

10.3

loopback-detection recovery-time ................................................................................

76

10.4

loopback-detection (interface)........................................................................................

77

10.5

loopback-detection config process-mode...................................................................

77

10.6

loopback-detection recover............................................................................................

78

10.7

show loopback-detection global ....................................................................................

79

 

IV

 

10.8

show loopback-detection interface ...............................................................................

79

Chapter 11 DDM Commands ..........................................................................................

81

11.1

ddm state enable ...............................................................................................................

81

11.2

ddm shutdown....................................................................................................................

81

11.3

ddm temperature_threshold............................................................................................

82

11.4

ddm voltage_threshold.....................................................................................................

83

11.5

ddm bias_current_threshold............................................................................................

84

11.6

ddm tx_power_threshold..................................................................................................

85

11.7

ddm rx_power_threshold..................................................................................................

86

11.8

show ddm configuration...................................................................................................

87

11.9

show ddm status................................................................................................................

88

Chapter 12 Etherchannel Commands ..........................................................................

89

12.1

channel-group ....................................................................................................................

89

12.2

port-channel load-balance...............................................................................................

90

12.3

lacp system-priority ..........................................................................................................

91

12.4

lacp port-priority ................................................................................................................

92

12.5

show etherchannel ............................................................................................................

92

12.6

show etherchannel load-balance....................................................................................

93

12.7

show lacp.............................................................................................................................

94

12.8

show lacp sys-id.................................................................................................................

94

Chapter 13 MAC Address Commands..........................................................................

96

13.1

mac address-table static..................................................................................................

96

13.2

mac address-table aging-time ........................................................................................

97

13.3

mac address-table filtering ..............................................................................................

97

13.4

mac address-table notification .......................................................................................

98

13.5

mac address-table max-mac-count...............................................................................

99

13.6

mac address-table notification (interface) ..................................................................

100

13.7

mac address-table security ...........................................................................................

101

13.8

mac address-table vlan-security ..................................................................................

102

13.9

show mac address-table ................................................................................................

103

13.10

clear mac address-table.................................................................................................

103

13.11

show mac address-table aging-time............................................................................

104

13.12

show mac address-table max-mac-count ..................................................................

104

13.13

show mac address-table interface ...............................................................................

105

13.14

show mac address-table count.....................................................................................

106

13.15

show mac address-table address.................................................................................

106

 

V

 

13.16

show mac address-table vlan........................................................................................

107

13.17

show mac address-table notification...........................................................................

107

13.18

show mac address-table vlan-security........................................................................

108

Chapter 14 IEEE 802.1Q VLAN Commands ...............................................................

109

14.1

vlan .....................................................................................................................................

109

14.2

name...................................................................................................................................

110

14.3

switchport general allowed vlan....................................................................................

110

14.4

switchport pvid.................................................................................................................

111

14.5

switchport check ingress ...............................................................................................

112

14.6

switchport acceptable frame.........................................................................................

113

14.7

show vlan summary .........................................................................................................

113

14.8

show vlan brief..................................................................................................................

114

14.9

show vlan...........................................................................................................................

114

14.10

show interface switchport..............................................................................................

115

Chapter 15 MAC-based VLAN Commands................................................................

116

15.1

mac-vlan mac-address ...................................................................................................

116

15.2

mac-vlan ............................................................................................................................

117

15.3

show mac-vlan..................................................................................................................

117

15.4

show mac-vlan interface ................................................................................................

118

Chapter 16 Protocol-based VLAN Commands ........................................................

119

16.1

protocol-vlan template ...................................................................................................

119

16.2

protocol-vlan vlan ............................................................................................................

120

16.3

protocol-vlan group.........................................................................................................

121

16.4

show protocol-vlan template.........................................................................................

122

16.5

show protocol-vlan vlan..................................................................................................

122

Chapter 17 VLAN-VPN Commands .............................................................................

123

17.1

dot1q-tunnel .....................................................................................................................

123

17.2

switchport dot1q-tunnel tpid.........................................................................................

123

17.3

dot1q-tunnel mapping ....................................................................................................

124

17.4

switchport dot1q-tunnel mode .....................................................................................

125

17.5

switchport dot1q-tunnel missdrop...............................................................................

126

17.6

switchport dot1q-tunnel mapping ................................................................................

126

17.7

show dot1q-tunnel...........................................................................................................

127

17.8

show dot1q-tunnel mapping..........................................................................................

128

17.9

show dot1q-tunnel interface .........................................................................................

128

 

VI

 

Chapter 18 GVRP Commands.......................................................................................

130

18.1

gvrp.....................................................................................................................................

130

18.2

gvrp (interface) .................................................................................................................

130

18.3

gvrp registration...............................................................................................................

131

18.4

gvrp timer ..........................................................................................................................

132

18.5

show gvrp interface.........................................................................................................

133

18.6

show gvrp global..............................................................................................................

134

Chapter 19 IGMP Snooping Commands.....................................................................

135

19.1

ip igmp snooping (global)................................................................................................

135

19.2

ip igmp snooping version ...............................................................................................

135

19.3

ip igmp snooping drop-unknown ..................................................................................

136

19.4

ip igmp snooping header-validation.............................................................................

137

19.5

ip igmp snooping vlan-config ........................................................................................

137

19.6

ip igmp snooping vlan-config (immediate-leave) .......................................................

139

19.7

ip igmp snooping vlan-config (report-suppression) ..................................................

139

19.8

ip igmp snooping vlan-config (router-ports-forbidden)............................................

140

19.9

ip igmp snooping vlan-config (rport interface) ...........................................................

141

19.10

ip igmp snooping vlan-config (static) ...........................................................................

142

19.11

ip igmp snooping vlan-config (querier) ........................................................................

143

19.12

ip igmp snooping (interface) ..........................................................................................

144

19.13

ip igmp snooping max-groups.......................................................................................

145

19.14

ip igmp snooping immediate-leave...............................................................................

146

19.15

ip igmp snooping authentication...................................................................................

147

19.16

ip igmp snooping accounting ........................................................................................

147

19.17

ip igmp profile ...................................................................................................................

148

19.18

deny....................................................................................................................................

149

19.19

permit.................................................................................................................................

149

19.20

range ..................................................................................................................................

150

19.21

ip igmp filter ......................................................................................................................

150

19.22

clear ip igmp snooping statistics ..................................................................................

151

19.23

show ip igmp snooping ...................................................................................................

151

19.24

show ip igmp snooping interface..................................................................................

152

19.25

show ip igmp snooping vlan...........................................................................................

153

19.26

show ip igmp snooping groups .....................................................................................

153

19.27

show ip igmp profile.........................................................................................................

154

VII

Chapter 20 MLD Snooping Commands......................................................................

156

20.1

ipv6 mld snooping (global)..............................................................................................

156

20.2

ipv6 mld snooping drop-unknown ................................................................................

156

20.3

ipv6 mld snooping vlan-config ......................................................................................

157

20.4

ipv6 mld snooping vlan-config (immediate-leave) .....................................................

158

20.5

ipv6 mld snooping vlan-config (report-suppression)................................................

159

20.6

ipv6 mld snooping vlan-config (router-ports-forbidden)..........................................

160

20.7

ipv6 mld snooping vlan-config (rport interface) .........................................................

161

20.8

ipv6 mld snooping vlan-config (static) .........................................................................

161

20.9

ipv6 mld snooping vlan-config (querier) ......................................................................

162

20.10

ipv6 mld snooping (interface) ........................................................................................

164

20.11

ipv6 mld snooping max-groups.....................................................................................

164

20.12

ipv6 mld snooping immediate-leave ............................................................................

166

20.13

ipv6 mld profile.................................................................................................................

166

20.14

deny....................................................................................................................................

167

20.15

permit.................................................................................................................................

167

20.16

range ..................................................................................................................................

168

20.17

ipv6 mld filter ....................................................................................................................

169

20.18

clear ipv6 mld snooping statistics ................................................................................

169

20.19

show ipv6 mld snooping .................................................................................................

170

20.20

show ipv6 mld snooping interface................................................................................

170

20.21

show ipv6 mld snooping vlan.........................................................................................

171

20.22

show ipv6 mld snooping groups ...................................................................................

172

20.23

show ipv6 mld profile ......................................................................................................

172

Chapter 21 MVR Commands.........................................................................................

174

21.1

mvr (global)........................................................................................................................

174

21.2

mvr group ..........................................................................................................................

174

21.3

mvr mode...........................................................................................................................

175

21.4

mvr querytime...................................................................................................................

176

21.5

mvr vlan..............................................................................................................................

177

21.6

mvr (interface)...................................................................................................................

177

21.7

mvr type.............................................................................................................................

178

21.8

mvr immediate..................................................................................................................

179

21.9

mvr vlan (group)................................................................................................................

179

21.10

show mvr ...........................................................................................................................

180

21.11

show mvr interface ..........................................................................................................

181

21.12

show mvr members .........................................................................................................

181

 

VIII

 

21.13

show mvr traffic................................................................................................................

182

Chapter 22 MSTP Commands.......................................................................................

183

22.1

debug spanning-tree.......................................................................................................

183

22.2

spanning-tree (global) .....................................................................................................

184

22.3

spanning-tree (interface)................................................................................................

184

22.4

spanning-tree common-config .....................................................................................

185

22.5

spanning-tree mode........................................................................................................

186

22.6

spanning-tree mst configuration ..................................................................................

187

22.7

instance .............................................................................................................................

188

22.8

name...................................................................................................................................

188

22.9

revision ..............................................................................................................................

189

22.10

spanning-tree mst instance ...........................................................................................

190

22.11

spanning-tree mst ...........................................................................................................

190

22.12

spanning-tree priority .....................................................................................................

191

22.13

spanning-tree timer.........................................................................................................

192

22.14

spanning-tree hold-count ..............................................................................................

193

22.15

spanning-tree max-hops ................................................................................................

193

22.16

spanning-tree bpdufilter.................................................................................................

194

22.17

spanning-tree bpduflood................................................................................................

195

22.18

spanning-tree bpduguard ..............................................................................................

195

22.19

spanning-tree guard loop...............................................................................................

196

22.20

spanning-tree guard root ...............................................................................................

197

22.21

spanning-tree guard tc ...................................................................................................

197

22.22

spanning-tree mcheck....................................................................................................

198

22.23

show spanning-tree active.............................................................................................

199

22.24

show spanning-tree bridge ............................................................................................

199

22.25

show spanning-tree interface........................................................................................

200

22.26

show spanning-tree interface-security .......................................................................

201

22.27

show spanning-tree mst.................................................................................................

201

Chapter 23 LLDP Commands........................................................................................

203

23.1

lldp ......................................................................................................................................

203

23.2

lldp forward_message.....................................................................................................

203

23.3

lldp hold-multiplier ...........................................................................................................

204

23.4

lldp timer............................................................................................................................

205

23.5

lldp receive........................................................................................................................

206

23.6

lldp transmit ......................................................................................................................

206

 

IX

 

23.7

lldp snmp-trap ..................................................................................................................

207

23.8

lldp tlv-select ....................................................................................................................

208

23.9

lldp management-address .............................................................................................

208

23.10

lldp med-fast-count.........................................................................................................

209

23.11

lldp med-status ................................................................................................................

210

23.12

lldp med-tlv-select...........................................................................................................

210

23.13

lldp med-location .............................................................................................................

211

23.14

show lldp............................................................................................................................

212

23.15

show lldp interface...........................................................................................................

213

23.16

show lldp local-information interface...........................................................................

213

23.17

show lldp neighbor-information interface ...................................................................

214

23.18

show lldp traffic interface...............................................................................................

214

Chapter 24 L2PT Commands ........................................................................................

216

24.1

l2protocol-tunnel .............................................................................................................

216

24.2

l2protocol-tunnel type ....................................................................................................

216

24.3

show l2protocol-tunnel global.......................................................................................

218

24.4

show l2protocol-tunnel interface..................................................................................

218

Chapter 25 PPPoE ID-Insertion Commands .............................................................

220

25.1

pppoe id-insertion (global) .............................................................................................

220

25.2

pppoe circuit-id (interface).............................................................................................

221

25.3

pppoe circuit-id type.......................................................................................................

221

25.4

pppoe remote-id ..............................................................................................................

222

25.5

show pppoe id-insertion global.....................................................................................

223

25.6

show pppoe id-insertion interface................................................................................

223

Chapter 26 DHCP Relay Commands ...........................................................................

225

26.1

service dhcp relay............................................................................................................

225

26.2

ip dhcp relay hops............................................................................................................

225

26.3

ip dhcp relay time.............................................................................................................

226

26.4

ip dhcp relay vlan .............................................................................................................

227

26.5

ip dhcp relay information................................................................................................

227

26.6

ip dhcp relay information strategy................................................................................

228

26.7

ip dhcp relay information format...................................................................................

229

26.8

ip dhcp relay information circuit-id...............................................................................

230

26.9

ip dhcp relay information remote-id .............................................................................

230

26.10

ip dhcp relay default-interface ......................................................................................

231

26.11

show ip dhcp relay ...........................................................................................................

232

 

X

 

Chapter 27 DHCP L2 Relay Commands .....................................................................

233

27.1

ip dhcp l2relay ..................................................................................................................

233

27.2

ip dhcp l2relay vlan ..........................................................................................................

233

27.3

ip dhcp l2relay information.............................................................................................

234

27.4

ip dhcp l2relay information strategy.............................................................................

234

27.5

ip dhcp l2relay information format................................................................................

235

27.6

ip dhcp l2relay information circuit-id............................................................................

236

27.7

ip dhcp l2relay information remote-id..........................................................................

237

27.8

show ip dhcp l2relay........................................................................................................

237

27.9

show ip dhcp l2relay interface.......................................................................................

238

Chapter 28 QoS Commands..........................................................................................

239

28.1

qos trust mode .................................................................................................................

239

28.2

qos port-priority...............................................................................................................

240

28.3

qos cos-map.....................................................................................................................

240

28.4

qos dot1p-remap.............................................................................................................

241

28.5

qos dscp-map...................................................................................................................

242

28.6

qos dscp-remap...............................................................................................................

243

28.7

qos queue mode ..............................................................................................................

243

28.8

show qos cos-map ..........................................................................................................

244

28.9

show qos dot1p-remap ..................................................................................................

245

28.10

show qos dscp-map........................................................................................................

245

28.11

show qos dscp-remap ....................................................................................................

246

28.12

show qos port-priority interface ...................................................................................

246

28.13

show qos trust interface.................................................................................................

247

28.14

show qos queue interface ..............................................................................................

247

Chapter 29 Bandwidth Control Commands ..............................................................

249

29.1

storm-control rate-mode ...............................................................................................

249

29.2

storm-control....................................................................................................................

250

29.3

storm-control exceed .....................................................................................................

251

29.4

storm-control recover ....................................................................................................

251

29.5

bandwidth..........................................................................................................................

252

29.6

show storm-control.........................................................................................................

253

29.7

show bandwidth ...............................................................................................................

253

Chapter 30 Voice VLAN Commands ...........................................................................

255

30.1

voice vlan...........................................................................................................................

255

 

XI

 

30.2

voice vlan (interface) .......................................................................................................

255

30.3

voice vlan priority.............................................................................................................

256

30.4

voice vlan oui ....................................................................................................................

257

30.5

show voice vlan ................................................................................................................

257

30.6

show voice vlan oui-table ...............................................................................................

258

30.7

show voice vlan interface...............................................................................................

258

Chapter 31 Auto VoIP Commands...............................................................................

260

31.1

auto-voip ...........................................................................................................................

260

31.2

auto-voip (interface) ........................................................................................................

260

31.3

auto-voip dot1p................................................................................................................

261

31.4

auto-voip untagged .........................................................................................................

262

31.5

auto-voip none .................................................................................................................

262

31.6

no auto-voip (interface)...................................................................................................

263

31.7

auto-voip dscp .................................................................................................................

263

31.8

auto-voip data priority.....................................................................................................

264

31.9

show auto-voip.................................................................................................................

265

Chapter 32 Access Control Commands ....................................................................

266

32.1

user access-control ip-based enable ..........................................................................

266

32.2

user access-control ip-based .......................................................................................

266

32.3

user access-control mac-based enable......................................................................

267

32.4

user access-control mac-based...................................................................................

268

32.5

user access-control port-based enable......................................................................

269

32.6

user access-control port-based ...................................................................................

269

Chapter 33 HTTP and HTTPS Commands .................................................................

271

33.1

ip http server.....................................................................................................................

271

33.2

ip http port.........................................................................................................................

272

33.3

ip http max-users .............................................................................................................

272

33.4

ip http session timeout ...................................................................................................

273

33.5

ip http secure-server.......................................................................................................

274

33.6

ip http secure-port...........................................................................................................

274

33.7

ip http secure-protocol...................................................................................................

275

33.8

ip http secure-ciphersuite..............................................................................................

276

33.9

ip http secure-max-users ...............................................................................................

277

33.10

ip http secure-session timeout .....................................................................................

278

33.11

ip http secure-server download certificate.................................................................

278

33.12

ip http secure-server download key.............................................................................

279

 

XII

 

33.13

show ip http configuration..............................................................................................

280

33.14

show ip http secure-server ............................................................................................

281

Chapter 34 SSH Commands..........................................................................................

282

34.1

ip ssh server......................................................................................................................

282

34.2

ip ssh port..........................................................................................................................

282

34.3

ip ssh version....................................................................................................................

283

34.4

ip ssh algorithm ................................................................................................................

284

34.5

ip ssh timeout ...................................................................................................................

284

34.6

ip ssh max-client ..............................................................................................................

285

34.7

ip ssh download................................................................................................................

286

34.8

remove public-key ...........................................................................................................

286

34.9

show ip ssh........................................................................................................................

287

Chapter 35 Telnet Commands......................................................................................

288

35.1

telnet enable .....................................................................................................................

288

35.2

telnet port..........................................................................................................................

288

35.3

show telnet-status...........................................................................................................

289

Chapter 36 Serial Port Commands..............................................................................

290

36.1

serial_port baud-rate.......................................................................................................

290

Chapter 37 AAA Commands .........................................................................................

291

37.1

tacacas-server host ........................................................................................................

291

37.2

show tacacs-server.........................................................................................................

292

37.3

radius-server host ...........................................................................................................

293

37.4

show radius-server..........................................................................................................

294

37.5

aaa group...........................................................................................................................

295

37.6

server .................................................................................................................................

296

37.7

show aaa group ................................................................................................................

296

37.8

aaa authentication login..................................................................................................

297

37.9

aaa authentication enable ..............................................................................................

298

37.10

aaa authentication dot1x default...................................................................................

299

37.11

aaa accounting dot1x default ........................................................................................

300

37.12

show aaa authentication.................................................................................................

300

37.13

show aaa accounting.......................................................................................................

301

37.14

line telnet ...........................................................................................................................

301

37.15

login authentication (telnet)............................................................................................

302

37.16

line ssh ...............................................................................................................................

303

 

 

XIII

37.17

login authentication (ssh)................................................................................................

303

37.18

enable authentication (telnet) ........................................................................................

304

37.19

enable authentication (ssh) ............................................................................................

305

37.20

ip http login authentication.............................................................................................

305

37.21

ip http enable authentication .........................................................................................

306

37.22

show aaa global................................................................................................................

307

37.23

enable-admin....................................................................................................................

307

Chapter 38 IEEE 802.1x Commands............................................................................

309

38.1

dot1x system-auth-control............................................................................................

309

38.2

dot1x handshake..............................................................................................................

310

38.3

dot1x auth-protocol ........................................................................................................

310

38.4

dot1x vlan-assignment ...................................................................................................

311

38.5

dot1x accounting.............................................................................................................

312

38.6

dot1x mab .........................................................................................................................

313

38.7

dot1x guest-vlan ..............................................................................................................

313

38.8

dot1x timeout quiet-period ............................................................................................

314

38.9

dot1x timeout supp-timeout..........................................................................................

315

38.10

dot1x maxreq .................................................................................................................

316

38.11

dot1x ..................................................................................................................................

317

38.12

dot1x port-control ...........................................................................................................

317

38.13

dot1x port-method ..........................................................................................................

318

38.14

dot1x auth-init ..................................................................................................................

319

38.15

dot1x auth-reauth ............................................................................................................

320

38.16

show dot1x global............................................................................................................

320

38.17

show dot1x interface.......................................................................................................

321

38.18

show dot1x auth-state ....................................................................................................

322

Chapter 39 Port Security Commands.........................................................................

323

39.1

mac address-table max-mac count..............................................................................

323

39.2

show mac address-table max-mac-count ..................................................................

323

Chapter 40 Port Mirroring Commands.......................................................................

325

40.1

monitor session destination interface .........................................................................

325

40.2

monitor session source ..................................................................................................

326

40.3

show monitor session .....................................................................................................

327

Chapter 41 ACL Commands..........................................................................................

329

41.1

access-list create ............................................................................................................

329

 

XIV

 

41.2

access-list resequence ..................................................................................................

329

41.3

access-list mac ................................................................................................................

330

41.4

access-list ip.....................................................................................................................

332

41.5

access-list combined......................................................................................................

333

41.6

access-list ipv6 ................................................................................................................

335

41.7

access-list action.............................................................................................................

337

41.8

redirect interface .............................................................................................................

338

41.9

s-condition ........................................................................................................................

339

41.10

s-mirror ..............................................................................................................................

339

41.11

qos-remark........................................................................................................................

340

41.12

access bind.......................................................................................................................

341

41.13

show access-list ..............................................................................................................

342

41.14

show access-list bind......................................................................................................

342

41.15

show access-list status ..................................................................................................

343

41.16

show access-list counter ...............................................................................................

343

41.17

clear access-list ...............................................................................................................

344

Chapter 42 IPv4 IMPB Commands...............................................................................

345

42.1

ip source binding..............................................................................................................

345

42.2

ip dhcp snooping .............................................................................................................

346

42.3

ip dhcp snooping vlan .....................................................................................................

347

42.4

ip dhcp snooping max-entries.......................................................................................

347

42.5

show ip source binding ...................................................................................................

348

42.6

show ip dhcp snooping...................................................................................................

349

42.7

show ip dhcp snooping interface..................................................................................

349

Chapter 43 IPv6 IMPB Commands...............................................................................

351

43.1

Ipv6 source binding .........................................................................................................

351

43.2

ipv6 dhcp snooping .........................................................................................................

352

43.3

ipv6 dhcp snooping vlan.................................................................................................

353

43.4

ipv6 dhcp snooping max-entries ..................................................................................

353

43.5

ipv6 nd snooping..............................................................................................................

354

43.6

ipv6 nd snooping vlan .....................................................................................................

355

43.7

ipv6 nd snooping max-entries.......................................................................................

355

43.8

show ipv6 source binding...............................................................................................

356

43.9

show ipv6 dhcp snooping...............................................................................................

357

43.10

show ipv6 dhcp snooping interface

............................................................................. 357

43.11

show ipv6 nd snooping ...................................................................................................

358

 

 

XV

Chapter 44 IP Verify Source Commands...................................................................

359

44.1

ip verify source.................................................................................................................

359

44.2

ip verify source logging...................................................................................................

360

44.3

show ip verify source ......................................................................................................

360

44.4

show ip verify source interface .....................................................................................

361

Chapter 45 IPv6 Verify Source Commands ..............................................................

362

45.1

ipv6 verify source.............................................................................................................

362

45.2

show ipv6 verify source ..................................................................................................

363

45.3

show ipv6 verify source interface.................................................................................

363

Chapter 46 DHCPv4 Filter Commands .......................................................................

365

46.1

ip dhcp filter ......................................................................................................................

365

46.2

ip dhcp filter (interface) ...................................................................................................

365

46.3

ip dhcp filter mac-verify..................................................................................................

366

46.4

ip dhcp filter limit rate......................................................................................................

367

46.5

ip dhcp filter decline rate ................................................................................................

368

46.6

ip dhcp filter server permit-entry ..................................................................................

368

46.7

show ip dhcp filter............................................................................................................

369

46.8

show ip dhcp filter interface...........................................................................................

370

46.9

show ip dhcp filter server permit-entry........................................................................

370

Chapter 47 DHCPv6 Filter Commands .......................................................................

372

47.1

ipv6 dhcp filter..................................................................................................................

372

47.2

ipv6 dhcp filter (interface)...............................................................................................

372

47.3

ipv6 dhcp filter limit rate .................................................................................................

373

47.4

ipv6 dhcp filter decline rate............................................................................................

374

47.5

ipv6 dhcp filter server permit-entry..............................................................................

375

47.6

show ipv6 dhcp filter .......................................................................................................

376

47.7

show ipv6 dhcp filter interface ......................................................................................

376

47.8

show ip dhcp filter server permit-entry........................................................................

377

Chapter 48 DoS Defend Commands...........................................................................

378

48.1

ip dos-prevent ..................................................................................................................

378

48.2

ip dos-prevent type .........................................................................................................

378

48.3

show ip dos-prevent........................................................................................................

380

Chapter 49 DLDP Commands.......................................................................................

382

49.1

dldp (global).......................................................................................................................

382

 

XVI

 

49.2

dldp interval.......................................................................................................................

382

49.3

dldp shut-mode................................................................................................................

383

49.4

dldp(interface) ..................................................................................................................

384

49.5

show dldp ..........................................................................................................................

384

49.6

show dldp interface .........................................................................................................

385

Chapter 50 SNMP Commands ......................................................................................

386

50.1

snmp-server......................................................................................................................

386

50.2

snmp-server view ............................................................................................................

386

50.3

snmp-server group..........................................................................................................

387

50.4

snmp-server user.............................................................................................................

389

50.5

snmp-server community ................................................................................................

390

50.6

snmp-server host.............................................................................................................

391

50.7

snmp-server engineID ....................................................................................................

393

50.8

snmp-server traps snmp ................................................................................................

393

50.9

snmp-server traps ...........................................................................................................

394

50.10

snmp-server traps ddm ..................................................................................................

396

50.11

snmp-server traps vlan...................................................................................................

397

50.12

snmp-server traps security............................................................................................

398

50.13

snmp-server traps acl .....................................................................................................

399

50.14

snmp-server traps ip .......................................................................................................

399

50.15

snmp-server traps link-status .......................................................................................

400

50.16

rmon history......................................................................................................................

400

50.17

rmon event ........................................................................................................................

401

50.18

rmon alarm ........................................................................................................................

402

50.19

rmon statistics..................................................................................................................

404

50.20

show snmp-server...........................................................................................................

405

50.21

show snmp-server view..................................................................................................

405

50.22

show snmp-server group ...............................................................................................

406

50.23

show snmp-server user ..................................................................................................

406

50.24

show snmp-server community......................................................................................

407

50.25

show snmp-server host..................................................................................................

407

50.26

show snmp-server engineID..........................................................................................

407

50.27

show rmon history ...........................................................................................................

408

50.28

show rmon event..............................................................................................................

408

50.29

show rmon alarm..............................................................................................................

409

50.30

show rmon statistics .......................................................................................................

410

XVII

Chapter 51 ARP Inspection Commands

..................................................................... 411

51.1

ip arp inspection...............................................................................................................

411

51.2

ip arp inspection validate................................................................................................

411

51.3

ip arp inspection vlan ......................................................................................................

412

51.4

ip arp inspection vlan logging ........................................................................................

413

51.5

ip arp inspection trust .....................................................................................................

414

51.6

ip arp inspection limit-rate..............................................................................................

414

51.7

ip arp inspection burst-interval .....................................................................................

415

51.8

ip arp inspection recover................................................................................................

416

51.9

show ip arp inspection ....................................................................................................

416

51.10

show ip arp inspection interface ...................................................................................

417

51.11

show ip arp inspection vlan............................................................................................

418

51.12

show ip arp inspection statistics...................................................................................

418

51.13

clear ip arp inspection statistics ...................................................................................

419

Chapter 52 ND Detection Commands ........................................................................

420

52.1

ipv6 nd detection .............................................................................................................

420

52.2

ipv6 nd detection vlan.....................................................................................................

420

52.3

ipv6 nd detection vlan logging.......................................................................................

421

52.4

ipv6 nd detection trust....................................................................................................

421

52.5

show ipv6 nd detection...................................................................................................

422

52.6

show ipv6 nd detection interface..................................................................................

422

52.7

show ipv6 nd detection vlan ..........................................................................................

423

Chapter 53 System Log Commands ...........................................................................

424

53.1

logging buffer ...................................................................................................................

424

53.2

logging buffer level ..........................................................................................................

424

53.3

logging file flash ...............................................................................................................

425

53.4

logging file flash frequency............................................................................................

426

53.5

logging file flash level ......................................................................................................

427

53.6

logging host index............................................................................................................

427

53.7

logging console................................................................................................................

428

53.8

logging console level.......................................................................................................

429

53.9

logging monitor ................................................................................................................

430

53.10

logging monitor level.......................................................................................................

430

53.11

clear logging .....................................................................................................................

431

53.12

show logging local-config ..............................................................................................

432

53.13

show logging loghost ......................................................................................................

432

 

 

XVIII

53.14

show logging buffer.........................................................................................................

433

53.15

show logging flash ...........................................................................................................

433

XIX

Preface

This Guide is intended for network administrator to provide referenced information about CLI (Command Line Interface). The device mentioned in this Guide stands for T2500G-10TS JetStream 8-Port Gigabit L2 Managed Switch with 2 SFP Slots without any explanation.

Overview of this Guide

Chapter 1: Using the CLI

Provide information about how to use the CLI, CLI Command Modes, Security Levels and some Conventions.

Chapter 2: User Interface

Provide information about the commands used to switch between five CLI Command Modes.

Chapter 3: User Management Commands

Provide information about the commands used for user management.

Chapter 4: System Configuration Commands

Provide information about the commands used for configuring the System information and System IP, reboot and reset the switch, upgrade the switch system and commands used for cable test.

Chapter 5: EEE Configuration Commands

Provide information about the commands used for configuring EEE.

Chapter 6: SDM Template Commands

Provide information about the commands used for configuring the SDM templates.

Chapter 7: Time Range Commands

Provide information about the commands used for configuring the time range.

Chapter 8: Port Configuration Commands

Provide information about the commands used for configuring the Speed, Negotiation Mode, and Flow Control for Ethernet ports.

Chapter 9: Port Isolation Commands

Provide information about the commands used for configuring Port Isolation function.

Chapter 10: Loopback Detection Commands

Provide information about the commands used for configuring the Loopback Detection function.

Chapter 11: DDM Commands

Provide information about the commands used for DDM (Digital Diagnostic Monitoring) function.

1

Chapter 12: Etherchannel Commands

Provide information about the commands used for configuring LAG (Link Aggregation Group) and LACP (Link Aggregation Control Protocol).

Chapter 13: MAC Address Commands

Provide information about the commands used for Address configuration.

Chapter 14 IEEE 802.1Q VLAN Commands

Provide information about the commands used for configuring IEEE 802.1Q VLAN.

Chapter 15: MAC-based VLAN Commands

Provide information about the commands used for configuring MAC-based VLAN.

Chapter 16: Protocol-based VLAN Commands

Provide information about the commands used for configuring Protocol VLAN.

Chapter 17: VLAN-VPN Commands

Provide information about the commands used for configuring VLAN-VPN (Virtual Private Network) function.

Chapter 18: GVRP Commands

Provide information about the commands used for configuring GVRP (GARP VLAN registration protocol).

Chapter 19: IGMP Snooping Commands

Provide information about the commands used for configuring the IGMP Snooping (Internet Group Management Protocol Snooping).

Chapter 20: MLD Snooping Commands

Provide information about the commands used for configuring the MLD Snooping (Multicast Listener Discovery Snooping).

Chapter 21: MVR Commands

Provide information about the commands used for configuring the MVR.

Chapter 22: MSTP Commands

Provide information about the commands used for configuring the MSTP (Multiple Spanning Tree Protocol).

Chapter 23: LLDP Commands

Provide information about the commands used for configuring LLDP function.

Chapter 24: L2PT Commands

Provide information about the commands used for configuring L2PT (Layer 2 Protocol Tunneling).

Chapter 25: PPPoE ID-Insertion Commands

Provide information about the commands used for configuring PPPoE ID-Insertion.

2

Chapter 26: DHCP Relay Commands

Provide information about the commands used for configuring the DHCP Relay function.

Chapter 27: DHCP L2 Relay Commands

Provide information about the commands used for configuring the DHCP L2 Relay function.

Chapter 28: QoS Commands

Provide information about the commands used for configuring the QoS function.

Chapter 29: Bandwidth Commands

Provide information about the commands used for configuring the Bandwidth Control.

Chapter 30: Voice VLAN Commands

Provide information about the commands used for configuring Voice VLAN.

Chapter 31: Auto VoIP Commands

Provide information about the commands used for configuring Auto VoIP.

Chapter 32: Access Control Commands

Provide information about the commands used for configuring Access Control.

Chapter 33: HTTP and HTTPS Commands

Provide information about the commands used for configuring the HTTP and HTTPS logon.

Chapter 34: SSH Commands

Provide information about the commands used for configuring and managing SSH (Security Shell).

Chapter 35: Telnet Commands

Provide information about the commands used for configuring and managing SSH (Security Shell).

Chapter 36: Serial Port Commands

Provide information about the commands used for configuring and managing SSH (Security Shell).

Chapter 37: AAA Commands

Provide information about the commands used for configuring AAA (authentication, authorization and accounting).

Chapter 38: IEEE 802.1X Commands

Provide information about the commands used for configuring IEEE 802.1X function.

Chapter 39: Port Security Commands

Provide information about the commands used for configuring Port Security.

3

Chapter 40: Port Mirroring Commands

Provide information about the commands used for configuring the Port Mirror function.

Chapter 41: ACL Commands

Provide information about the commands used for configuring the ACL (Access Control List).

Chapter 42: IPv4 IMPB Commands

Provide information about the commands used for binding the IP address, MAC address, VLAN and the connected Port number of the Host together.

Chapter 43: IPv6 IMPB Commands

Provide information about the commands used for binding the IPv6 address, MAC address, VLAN and the connected Port number of the Host together.

Chapter 44: IP Verify Source Commands

Provide information about the commands used for guarding the IP Source by filtering the IP packets based on the IP-MAC Binding entries.

Chapter 45: IPv6 Verify Source Commands

Provide information about the commands used for guarding the IPv6 Source by filtering the IP packets based on the IP-MAC Binding entries.

Chapter 46: DHCPv4 Filter Commands

Provide information about the commands used for configuring the DHCPv4 Filter.

Chapter 47: DHCPv6 Filter Commands

Provide information about the commands used for configuring the DHCPv6 Filter.

Chapter 48: DoS Defend Command

Provide information about the commands used for DoS defend and detecting the DoS attack.

Chapter 49: DLDP Commands

Provide information about the commands used for configuring the DLDP (Device Link Detection Protocol).

Chapter 50: SNMP Commands

Provide information about the commands used for configuring the SNMP (Simple Network Management Protocol) functions.

Chapter 51: ARP Inspection Commands

Provide information about the commands used for protecting the switch from the ARP cheating or ARP Attack.

Chapter 52: ND Detection Commands

Provide information about the commands used for configuring ND detection.

Chapter 53: System Log Commands

Provide information about the commands used for configuring system log.

4

Chapter 1 Using the CLI

1.1 Accessing the CLI

You can log on to the switch and access the CLI by logging on to the switch remotely by a Telnet or SSH connection through an Ethernet port.

1.1.1 Logon by Telnet

To log on to the switch by a Telnet connection, please take the following steps:

1.Click Start and type in cmd in the Search programs and files window and press the Enter button.

Figure 1-1 Run Window

2.Telnet the switch’s IP address (factory setting is 192.168.0.1) in the prompt cmd window and press Enter.

Figure 1-2 Type in the telnet command

5

3.Type in the User name and Password (the factory default value for both of them are admin) and press the Enter button to enter User EXEC Mode , which is shown as Figure 1-3.

Figure 1-3 Log in the Switch

4.Type in enable command to enter Privileged EXEC Mode.

Figure 1-4 Enter into Priviledged EXEC Mode

1.1.2 Logon by SSH

To log on by SSH, a Putty client software is recommended. There are two authentication modes to set up an SSH connection:

Password Authentication Mode: It requires username and password, which are both admin by default.

Key Authentication Mode: It requires a public key for the switch and a private key for the SSH client software. You can generate the public key and the private key through Putty Key Generator.

Note:

Before SSH login, please follow the steps shown in Figure 1-5 to enable the SSH function through Telnet connection.

6

Figure 1-5 Enable SSH function

Password Authentication Mode

1.Open the software to log on to the interface of PuTTY. Enter the IP address of the switch into Host Name field; keep the default value 22 in the Port field; select SSH as the Connection type.

Figure 1-6 SSH Connection Config

7

2. Click the Open button in the above figure to log on to the switch. Enter the login user name and password to log on the switch, and then enter enable to enter Privileged EXEC Mode, so you can continue to configure the switch.

Figure 1-7 Log on the Switch

Key Authentication Mode

1.Select the key type and key length, and generate SSH key.

Figure 1-8 Generate SSH Key

Note:

1.The key length is in the range of 512 to 3072 bits.

8

TP-Link T2500G-10TS REV2.0.0 CLI Reference Guide

2.During the key generation, randomly moving the mouse quickly can accelerate the key generation.

2.After the key is successfully generated, please save the public key and private key to a TFTP server.

Figure 1-9 Save the Generated Key

9

3.Log on to the switch by Telnet and download the public key file from the TFTP server to the switch, as the following figure shows:

Figure 1-10 Download the Public Key

Note:

1.The key type should accord with the type of the key file.

2.The SSH key downloading can not be interrupted.

10

Loading...
+ 424 hidden pages