TP-Link T2500G-10TS REV2.1.0 CLI Reference Guide

CLI Reference Guide
T2500G-10TS (TL-SG3210)
1910012660 REV2.1.0
December 2019
COPYRIGHT & TRADEMARKS
Specifications are subject to change without notice. is a registered trademark of
TP-Link Technologies Co., Ltd. Other brands and product names are trademarks or registered
trademarks of their respective holders.
No part of the specifications may be reproduced in any form or by any means or used to make
any derivative such as translation, transformation, or adaptation without permission from
TP-Link Technologies Co., Ltd. Copyright © 2020 TP-Link Technologies Co., Ltd. All rights
reserved.
https://www.tp-link.com
CONTENTS
Preface ....................................................................................................................................... 1
Chapter 1 Using the CLI ..................................................................................................... 5
1.1 Accessing the CLI ......................................................................................................................................... 5
1.1.1 Logon by a console port ......................................................................................................... 5
1.1.2 Logon by Telnet ......................................................................................................................... 8
1.1.3 Logon by SSH ............................................................................................................................. 9
1.2 CLI Command Modes ............................................................................................................................... 15
1.3 Privilege Restrictions ................................................................................................................................ 18
1.4 Conventions ................................................................................................................................................. 18
1.4.1 Format Conventions .............................................................................................................. 18
1.4.2 Special Characters ................................................................................................................ 19
1.4.3 Parameter Format .................................................................................................................. 19
Chapter 2 Line Commands ............................................................................................. 20
2.1 line ......................................................................................................................................................... 20
2.2 media-type rj45 ................................................................................................................................ 21
Chapter 3 User Interface ................................................................................................ 22
3.1 enable................................................................................................................................................... 22
3.2 service password-encryption .................................................................................................... 22
3.3 enable password ............................................................................................................................. 23
3.4 enable secret .................................................................................................................................... 24
3.5 configure ............................................................................................................................................. 25
3.6 exit ......................................................................................................................................................... 25
3.7 end ........................................................................................................................................................ 26
3.8 clipaging .............................................................................................................................................. 26
3.9 history .................................................................................................................................................. 27
3.10 history clear ....................................................................................................................................... 27
Chapter 4 User Management Commands .................................................................. 29
4.1 user name (password) ................................................................................................................... 29
4.2 user name (secret) .......................................................................................................................... 30
4.3 service password-recovery ........................................................................................................ 31
4.4 show user account-list .................................................................................................................. 32
4.5 show user configuration ............................................................................................................... 33
II
Chapter 5 System Configuration Commands ........................................................... 34
5.1 system-time manual ....................................................................................................................... 34
5.2 system-time ntp ............................................................................................................................... 34
5.3 system-time dst predefined ........................................................................................................ 36
5.4 system-time dst date ..................................................................................................................... 37
5.5 system-time dst recurring ........................................................................................................... 38
5.6 hostname ............................................................................................................................................ 39
5.7 location ................................................................................................................................................ 40
5.8 contact-info ....................................................................................................................................... 40
5.9 ip address ........................................................................................................................................... 41
5.10 ip address-alloc ................................................................................................................................ 42
5.11 reset ...................................................................................................................................................... 43
5.12 service reset-disable ..................................................................................................................... 43
5.13 reboot .................................................................................................................................................. 44
5.14 reboot-schedule .............................................................................................................................. 44
5.15 copy running-config startup-config ........................................................................................ 45
5.16 copy startup-config tftp ............................................................................................................... 46
5.17 copy tftp startup-config ............................................................................................................... 46
5.18 copy backup-config tftp ............................................................................................................... 47
5.19 copy backup-config startup-config ......................................................................................... 48
5.20 copy running-config backup-config ........................................................................................ 48
5.21 copy tftp backup-config ............................................................................................................... 49
5.22 boot application ............................................................................................................................... 50
5.23 boot config ......................................................................................................................................... 50
5.24 remove backup-image .................................................................................................................. 51
5.25 firmware upgrade ............................................................................................................................ 52
5.26 boot autoinstall start ...................................................................................................................... 53
5.27 boot autoinstall persistent-mode ............................................................................................. 53
5.28 boot autoinstall auto-save ........................................................................................................... 54
5.29 boot autoinstall auto-reboot ....................................................................................................... 54
5.30 boot autoinstall retry-count ........................................................................................................ 55
5.31 show boot autoinstall ..................................................................................................................... 55
5.32 show boot autoinstall downloaded-config ............................................................................ 56
5.33 ping ....................................................................................................................................................... 56
5.34 tracert .................................................................................................................................................. 57
5.35 show system-info ............................................................................................................................ 58
5.36 show image-info .............................................................................................................................. 59
III
5.37 show boot ........................................................................................................................................... 59
5.38 show running-config ...................................................................................................................... 60
5.39 show startup-config ....................................................................................................................... 60
5.40 show system-time ........................................................................................................................... 61
5.41 show system-time dst ................................................................................................................... 61
5.42 show system-time ntp ................................................................................................................... 62
5.43 show cable-diagnostics interface ............................................................................................ 62
5.44 show cpu-utilization........................................................................................................................ 63
5.45 show memory-utilization .............................................................................................................. 63
Chapter 6 EEE Configuration Commands .................................................................. 64
6.1 eee ......................................................................................................................................................... 64
6.2 show interface eee ......................................................................................................................... 64
Chapter 7 SDM Template Commands ......................................................................... 66
7.1 sdm prefer .......................................................................................................................................... 66
7.2 show sdm prefer .............................................................................................................................. 67
Chapter 8 Time Range Commands ............................................................................... 68
8.1 time-range .......................................................................................................................................... 68
8.2 absolute............................................................................................................................................... 68
8.3 periodic................................................................................................................................................ 69
8.4 holiday (time-range mode) ........................................................................................................... 70
8.5 holiday .................................................................................................................................................. 71
8.6 show holiday ...................................................................................................................................... 71
8.7 show time-range .............................................................................................................................. 72
Chapter 9 Port Configuration Commands ................................................................. 73
9.1 interface gigabitEthernet ............................................................................................................. 73
9.2 interface range gigabitEthernet ................................................................................................ 73
9.3 description ......................................................................................................................................... 74
9.4 shutdown ............................................................................................................................................ 75
9.5 flow-control ....................................................................................................................................... 76
9.6 duplex ................................................................................................................................................... 76
9.7 jumbo-size .......................................................................................................................................... 77
9.8 speed ................................................................................................................................................... 78
9.9 serdes-mode .....................................................................................................................................
9.10 clear counters ................................................................................................................................... 79
9.11 show fiber-ports .............................................................................................................................. 80
IV
78
9.12 show interface status .................................................................................................................... 80
9.13 show interface counters ............................................................................................................... 81
9.14 show interface configuration ...................................................................................................... 81
Chapter 10 Port Isolation Commands ........................................................................... 83
10.1 port isolation ..................................................................................................................................... 83
10.2 show port isolation interface ...................................................................................................... 84
Chapter 11 Loopback Detection Commands .............................................................. 85
11.1 loopback-detection (global) ........................................................................................................ 85
11.2 loopback-detection interval ........................................................................................................ 85
11.3 loopback-detection recovery-time .......................................................................................... 86
11.4 loopback-detection (interface) .................................................................................................. 87
11.5 loopback-detection config process-mode ........................................................................... 87
11.6 loopback-detection recover ....................................................................................................... 88
11.7 show loopback-detection global .............................................................................................. 89
11.8 show loopback-detection interface ......................................................................................... 89
Chapter 12 DDM Commands ............................................................................................ 91
12.1 ddm state enable ............................................................................................................................. 91
12.2 ddm shutdown .................................................................................................................................. 91
12.3 ddm temperature_threshold ....................................................................................................... 92
12.4 ddm voltage_threshold ................................................................................................................. 93
12.5 ddm bias_current_threshold ....................................................................................................... 94
12.6 ddm tx_power_threshold ............................................................................................................. 95
12.7 ddm rx_power_threshold ............................................................................................................. 96
12.8 show ddm configuration ............................................................................................................... 97
12.9 show ddm status ............................................................................................................................. 98
Chapter 13 Etherchannel Commands ........................................................................... 99
13.1 channel-group .................................................................................................................................. 99
13.2 port-channel load-balance ....................................................................................................... 100
13.3 lacp system-priority .................................................................................................................... 101
13.4 lacp port-priority ........................................................................................................................... 102
13.5 show etherchannel ...................................................................................................................... 102
13.6 show etherchannel load-balance ........................................................................................... 103
13.7 show lacp ......................................................................................................................................... 104
13.8 show lacp sys-
id ........................................................................................................................... 104
V
Chapter 14 MAC Address Commands ........................................................................ 106
14.1 mac address-table static .......................................................................................................... 106
14.2 no mac address-table dynamic .............................................................................................. 107
14.3 mac address-table aging-time ................................................................................................ 107
14.4 mac address-table filtering ...................................................................................................... 108
14.5 mac address-table notification ............................................................................................... 109
14.6 mac address-table max-mac-count ..................................................................................... 109
14.7 mac address-table notification (interface) ......................................................................... 111
14.8 mac address-table security ..................................................................................................... 112
14.9 mac address-table vlan-security ........................................................................................... 113
14.10 show mac address-table ........................................................................................................... 114
14.11 clear mac address-table ............................................................................................................ 114
14.12 show mac address-table aging-time .................................................................................... 115
14.13 show mac address-table max-mac-count ......................................................................... 115
14.14 show mac address-table interface ........................................................................................ 116
14.15 show mac address-table count .............................................................................................. 117
14.16 show mac address-table address ......................................................................................... 117
14.17 show mac address-table vlan .................................................................................................. 118
14.18 show mac address-table notification ................................................................................... 118
14.19 show mac address-table vlan-security ............................................................................... 119
Chapter 15 IEEE 802.1Q VLAN Commands ............................................................... 120
15.1 vlan ..................................................................................................................................................... 120
15.2 name .................................................................................................................................................. 121
15.3 vlan_trunk (globally) ..................................................................................................................... 121
15.4 vlan_trunk (interface) .................................................................................................................. 122
15.5 switchport general allowed vlan ............................................................................................. 122
15.6 switchport pvid .............................................................................................................................. 123
15.7 switchport check ingress .......................................................................................................... 124
15.8 switchport acceptable frame ................................................................................................... 125
15.9 show vlan summary ..................................................................................................................... 125
15.10 show vlan brief ............................................................................................................................... 126
15.11 show vlan ......................................................................................................................................... 126
15.12 show interface switchport ........................................................................................................ 127
Chapter 16 MAC-based VLAN Commands ................................................................ 128
16.1 mac-vlan mac-address .............................................................................................................. 128
16.2 mac-vlan .......................................................................................................................................... 129
VI
16.3 show mac-vlan ............................................................................................................................... 129
16.4 show mac-vlan interface ........................................................................................................... 130
Chapter 17 Protocol-based VLAN Commands ........................................................ 131
17.1 protocol-vlan template ............................................................................................................... 131
17.2 protocol-vlan vlan ........................................................................................................................ 132
17.3 protocol-vlan group..................................................................................................................... 133
17.4 show protocol-vlan template ................................................................................................... 134
17.5 show protocol-vlan vlan............................................................................................................. 134
Chapter 18 VLAN-VPN Commands ............................................................................. 135
18.1 dot1q-tunnel................................................................................................................................... 135
18.2 switchport dot1q-tunnel tpid ................................................................................................... 135
18.3 dot1q-tunnel mapping ................................................................................................................ 136
18.4 switchport dot1q-tunnel mode ............................................................................................... 137
18.5 switchport dot1q-tunnel missdrop ....................................................................................... 138
18.6 switchport dot1q-tunnel mapping ......................................................................................... 138
18.7 show dot1q-tunnel ....................................................................................................................... 139
18.8 show dot1q-tunnel mapping .................................................................................................... 140
18.9 show dot1q-tunnel interface ................................................................................................... 140
Chapter 19 GVRP Commands ....................................................................................... 142
19.1 gvrp .................................................................................................................................................... 142
19.2 gvrp (interface) .............................................................................................................................. 142
19.3 gvrp registration ........................................................................................................................... 143
19.4 gvrp timer ........................................................................................................................................ 144
19.5 show gvrp interface ..................................................................................................................... 145
19.6 show gvrp global ........................................................................................................................... 146
Chapter 20 IGMP Snooping Commands..................................................................... 147
20.1 ip igmp snooping (global) .......................................................................................................... 147
20.2 ip igmp snooping version .......................................................................................................... 147
20.3 ip igmp snooping drop-unknown ........................................................................................... 148
20.4 ip igmp snooping header-validation ..................................................................................... 149
20.5 ip igmp snooping vlan-config .................................................................................................. 149
20.6 ip igmp snooping vlan-config (immediate-leave) ............................................................. 151
20.7 ip igmp snooping vlan-config (report-suppression) .......................................................
20.8 ip igmp snooping vlan-config (router-ports-forbidden) ................................................ 152
20.9 ip igmp snooping vlan-config (rport interface) ................................................................. 153
VII
151
20.10 ip igmp snooping vlan-config (static) ................................................................................... 154
20.11 ip igmp snooping vlan-config (querier) ................................................................................ 155
20.12 ip igmp snooping (interface) .................................................................................................... 156
20.13 ip igmp snooping max-groups ................................................................................................ 157
20.14 ip igmp snooping immediate-leave ....................................................................................... 158
20.15 ip igmp snooping authentication ............................................................................................ 159
20.16 ip igmp snooping accounting .................................................................................................. 159
20.17 ip igmp profile ................................................................................................................................ 160
20.18 deny ................................................................................................................................................... 161
20.19 permit ................................................................................................................................................ 161
20.20 range ................................................................................................................................................. 162
20.21 ip igmp filter .................................................................................................................................... 162
20.22 clear ip igmp snooping statistics ........................................................................................... 163
20.23 show ip igmp snooping .............................................................................................................. 163
20.24 show ip igmp snooping interface ........................................................................................... 164
20.25 show ip igmp snooping vlan ..................................................................................................... 165
20.26 show ip igmp snooping groups ............................................................................................... 165
20.27 show ip igmp profile .................................................................................................................... 166
Chapter 21 MLD Snooping Commands ...................................................................... 168
21.1 ipv6 mld snooping (global) ........................................................................................................ 168
21.2 ipv6 mld snooping drop-unknown ......................................................................................... 168
21.3 ipv6 mld snooping vlan-config ................................................................................................ 169
21.4 ipv6 mld snooping vlan-config (immediate-leave) .......................................................... 170
21.5 ipv6 mld snooping vlan-config (report-suppression) ..................................................... 171
21.6 ipv6 mld snooping vlan-config (router-ports-forbidden) ............................................. 172
21.7 ipv6 mld snooping vlan-config (rport interface) ............................................................... 173
21.8 ipv6 mld snooping vlan-config (static) ................................................................................. 173
21.9 ipv6 mld snooping vlan-config (querier) .............................................................................. 174
21.10 ipv6 mld snooping (interface) .................................................................................................. 176
21.11 ipv6 mld snooping max-groups .............................................................................................. 176
21.12 ipv6 mld snooping immediate-leave ..................................................................................... 178
21.13 ipv6 mld profile .............................................................................................................................. 178
21.14 deny ................................................................................................................................................... 179
21.15 permit ................................................................................................................................................ 179
21.16
range ................................................................................................................................................. 180
21.17 ipv6 mld filter .................................................................................................................................. 181
21.18 clear ipv6 mld snooping statistics ......................................................................................... 181
VIII
21.19 show ipv6 mld snooping ............................................................................................................ 182
21.20 show ipv6 mld snooping interface ......................................................................................... 182
21.21 show ipv6 mld snooping vlan ................................................................................................... 183
21.22 show ipv6 mld snooping groups ............................................................................................ 184
21.23 show ipv6 mld profile .................................................................................................................. 184
Chapter 22 MVR Commands ......................................................................................... 186
22.1 mvr (global) ...................................................................................................................................... 186
22.2 mvr group ........................................................................................................................................ 186
22.3 mvr mode ......................................................................................................................................... 187
22.4 mvr querytime ................................................................................................................................ 188
22.5 mvr vlan ............................................................................................................................................ 189
22.6 mvr (interface) ................................................................................................................................ 189
22.7 mvr type ........................................................................................................................................... 190
22.8 mvr immediate ............................................................................................................................... 191
22.9 mvr vlan (group) ............................................................................................................................. 191
22.10 show mvr .......................................................................................................................................... 192
22.11 show mvr interface ...................................................................................................................... 193
22.12 show mvr members ..................................................................................................................... 193
Chapter 23 MSTP Commands ....................................................................................... 195
23.1 debug spanning-tree .................................................................................................................. 195
23.2 spanning-tree (global) ................................................................................................................. 196
23.3 spanning-tree (interface) ........................................................................................................... 196
23.4 spanning-tree common-config ............................................................................................... 197
23.5 spanning-tree mode .................................................................................................................... 198
23.6 spanning-tree mst configuration ........................................................................................... 199
23.7 instance ............................................................................................................................................ 200
23.8 name .................................................................................................................................................. 200
23.9 revision ............................................................................................................................................. 201
23.10 spanning-tree mst instance ..................................................................................................... 202
23.11 spanning-tree mst ........................................................................................................................ 202
23.12 spanning-tree priority ................................................................................................................. 203
23.13 spanning-tree timer ..................................................................................................................... 204
23.14 spanning-tree hold-count ......................................................................................................... 205
23.15 spanning-tree max-hops ........................................................................................................... 205
23.16 spanning-tree bpdufilter ............................................................................................................ 206
23.17 spanning-tree bpduflood .......................................................................................................... 207
IX
23.18 spanning-tree bpduguard ......................................................................................................... 207
23.19 spanning-tree guard loop ......................................................................................................... 208
23.20 spanning-tree guard root .......................................................................................................... 209
23.21 spanning-tree guard tc .............................................................................................................. 209
23.22 spanning-tree mcheck ............................................................................................................... 210
23.23 show spanning-tree active ....................................................................................................... 211
23.24 show spanning-tree bridge ...................................................................................................... 211
23.25 show spanning-tree interface ................................................................................................. 212
23.26 show spanning-tree interface-security ............................................................................... 213
23.27 show spanning-tree mst ............................................................................................................ 213
Chapter 24 LLDP Commands ........................................................................................ 215
24.1 lldp ...................................................................................................................................................... 215
24.2 lldp forward_message ................................................................................................................ 215
24.3 lldp hold-multiplier ....................................................................................................................... 216
24.4 lldp timer .......................................................................................................................................... 217
24.5 lldp receive ...................................................................................................................................... 218
24.6 lldp transmit .................................................................................................................................... 218
24.7 lldp snmp-trap ............................................................................................................................... 219
24.8 lldp tlv-select .................................................................................................................................. 220
24.9 lldp management-address ....................................................................................................... 220
24.10 lldp med-fast-count ..................................................................................................................... 221
24.11 lldp med-status ............................................................................................................................. 222
24.12 lldp med-tlv-select ....................................................................................................................... 222
24.13 lldp med-location .......................................................................................................................... 223
24.14 show lldp .......................................................................................................................................... 224
24.15 show lldp interface ....................................................................................................................... 225
24.16 show lldp local-information interface ................................................................................... 225
24.17 show lldp neighbor-information interface .......................................................................... 226
24.18 show lldp traffic interface .......................................................................................................... 226
Chapter 25 L2PT Commands ........................................................................................ 228
25.1 l2protocol-tunnel .......................................................................................................................... 228
25.2 l2protocol-tunnel type ............................................................................................................... 228
25.3 show l2protocol-tunnel global ................................................................................................ 230
25.4 show l2protocol-tunnel interface .......................................................................................... 230
Chapter 26 PPPoE ID-Insertion Commands ............................................................. 232
26.1 pppoe id-insertion (global) ........................................................................................................ 232
X
26.2 pppoe circuit-id (interface) ....................................................................................................... 233
26.3 pppoe circuit-id type ................................................................................................................... 233
26.4 pppoe remote-id ........................................................................................................................... 234
26.5 show pppoe id-insertion global .............................................................................................. 235
26.6 show pppoe id-insertion interface ........................................................................................ 235
Chapter 27 Static Routes Commands ........................................................................ 237
27.1 ip routing .......................................................................................................................................... 237
27.2 interface vlan .................................................................................................................................. 237
27.3 interface loopback ....................................................................................................................... 238
27.4 switchport ....................................................................................................................................... 238
27.5 interface range port-channel ................................................................................................... 239
27.6 Description...................................................................................................................................... 240
27.7 shutdown ......................................................................................................................................... 240
27.8 interface port-channel................................................................................................................ 241
27.9 ip route .............................................................................................................................................. 242
27.10 ipv6 routing ..................................................................................................................................... 242
27.11 ipv6 route ......................................................................................................................................... 243
27.12 show interface vlan ...................................................................................................................... 244
27.13 show ip interface .......................................................................................................................... 244
27.14 show ip interface brief ................................................................................................................ 245
27.15 show ip route .................................................................................................................................. 245
27.16 show ip route specify .................................................................................................................. 246
27.17 show ip route summary .............................................................................................................. 247
27.18 show ipv6 interface ..................................................................................................................... 247
27.19 show ipv6 route ............................................................................................................................. 248
27.20 show ipv6 route summary ......................................................................................................... 248
Chapter 28 IPv6 Address Configuration Commands ............................................. 250
28.1 ipv6 enable ...................................................................................................................................... 250
28.2 ipv6 address autoconfig ............................................................................................................ 250
28.3 ipv6 address link-local ................................................................................................................ 251
28.4 ipv6 address dhcp ........................................................................................................................ 252
28.5 ipv6 address ra .............................................................................................................................. 252
28.6 ipv6 address eui-64 ..................................................................................................................... 253
28.7 ipv6 address ................................................................................................................................... 254
28.8 show ipv6 interface ..................................................................................................................... 255
XI
Chapter 29 ARP Commands .......................................................................................... 256
29.1 arp ....................................................................................................................................................... 256
29.2 clear arp-cache ............................................................................................................................. 257
29.3 arp dynamicrenew ........................................................................................................................ 257
29.4 arp timeout ...................................................................................................................................... 258
29.5 gratuitous-arp intf-status-up enable .................................................................................... 258
29.6 gratuitous-arp dup-ip-detected enable .............................................................................. 259
29.7 gratuitous-arp learning enable ................................................................................................ 259
29.8 gratuitous-arp send-interval .................................................................................................... 260
29.9 ip proxy-arp .................................................................................................................................... 261
29.10 ip local-proxy-arp ......................................................................................................................... 261
29.11 show arp ........................................................................................................................................... 262
29.12 show ip arp (interface) ................................................................................................................ 263
29.13 show ip arp summary .................................................................................................................. 263
29.14 show gratuitous-arp .................................................................................................................... 264
29.15 show ip proxy-arp ......................................................................................................................... 264
Chapter 30 DHCP Server Commands ......................................................................... 266
30.1 service dhcp server ..................................................................................................................... 266
30.2 ip dhcp server extend-option capwap-ac-ip ..................................................................... 266
30.3 ip dhcp server extend-option vendor-class-id ................................................................. 267
30.4 ip dhcp server exclude-address ............................................................................................. 268
30.5 ip dhcp server pool ...................................................................................................................... 269
30.6 ip dhcp server ping timeout ..................................................................................................... 269
30.7 ip dhcp server ping packets ..................................................................................................... 270
30.8 network ............................................................................................................................................. 271
30.9 lease .................................................................................................................................................. 271
30.10 address hardware-address ...................................................................................................... 272
30.11 address client-identifier ............................................................................................................. 273
30.12 default-gateway ............................................................................................................................ 273
30.13 dns-server ....................................................................................................................................... 274
30.14 netbios-name-server .................................................................................................................. 275
30.15
netbios-node-type ....................................................................................................................... 275
30.16 next-server...................................................................................................................................... 276
30.17 domain-name ................................................................................................................................. 277
30.18 bootfile .............................................................................................................................................. 277
30.19 show ip dhcp server status ...................................................................................................... 278
30.20 show ip dhcp server statistics ................................................................................................. 278
XII
30.21 show ip dhcp server extend-option ...................................................................................... 279
30.22 show ip dhcp server pool .......................................................................................................... 279
30.23 show ip dhcp server excluded-address .............................................................................. 280
30.24 show ip dhcp server manual-binding .................................................................................... 280
30.25 show ip dhcp server binding .................................................................................................... 281
30.26 clear ip dhcp server statistics ................................................................................................. 281
30.27 clear ip dhcp server binding ..................................................................................................... 282
Chapter 31 DHCP Relay Commands ........................................................................... 283
31.1 service dhcp relay ........................................................................................................................ 283
31.2 ip dhcp relay hops ........................................................................................................................ 283
31.3 ip dhcp relay time ......................................................................................................................... 284
31.4 ip helper-address ......................................................................................................................... 285
31.5 ip dhcp relay information ........................................................................................................... 285
31.6 ip dhcp relay information strategy ......................................................................................... 286
31.7 ip dhcp relay information format ............................................................................................ 287
31.8 ip dhcp relay information circuit-id........................................................................................ 288
31.9 ip dhcp relay information remote-id ..................................................................................... 288
31.10 ip dhcp relay default-interface ................................................................................................ 289
31.11 ip dhcp relay vlan .......................................................................................................................... 290
31.12 show ip dhcp relay ....................................................................................................................... 290
Chapter 32 DHCP L2 Relay Commands ..................................................................... 292
32.1 ip dhcp l2relay ................................................................................................................................ 292
32.2 ip dhcp l2relay vlan ...................................................................................................................... 292
32.3 ip dhcp l2relay information ....................................................................................................... 293
32.4 ip dhcp l2relay information strategy ..................................................................................... 293
32.5 ip dhcp l2relay information format ........................................................................................ 294
32.6 ip dhcp l2relay information circuit-id .................................................................................... 295
32.7 ip dhcp l2relay information remote-id .................................................................................. 296
32.8 show ip dhcp l2relay .................................................................................................................... 296
32.9 show ip dhcp l2relay interface ................................................................................................ 297
Chapter 33 QoS Commands .......................................................................................... 298
33.1 qos trust mode .............................................................................................................................. 298
33.2 qos port-priority ............................................................................................................................ 299
33.3 qos cos-map .................................................................................................................................. 299
33.4 qos dot1p-remap .........................................................................................................................
33.5 qos dscp-map ................................................................................................................................ 301
XIII
300
33.6 qos dscp-remap ........................................................................................................................... 302
33.7 qos queue mode ........................................................................................................................... 302
33.8 show qos cos-map ...................................................................................................................... 303
33.9 show qos dot1p-remap.............................................................................................................. 304
33.10 show qos dscp-map .................................................................................................................... 304
33.11 show qos dscp-remap ................................................................................................................ 305
33.12 show qos port-priority interface ............................................................................................ 305
33.13 show qos trust interface ............................................................................................................ 306
33.14 show qos queue interface ......................................................................................................... 306
Chapter 34 Bandwidth Control Commands .............................................................. 308
34.1 storm-control rate-mode .......................................................................................................... 308
34.2 storm-control ................................................................................................................................. 309
34.3 storm-control exceed ................................................................................................................. 310
34.4 storm-control recover ................................................................................................................ 310
34.5 bandwidth ........................................................................................................................................ 311
34.6 show storm-control ..................................................................................................................... 312
34.7 show bandwidth ............................................................................................................................ 312
Chapter 35 Voice VLAN Commands ........................................................................... 314
35.1 voice vlan ......................................................................................................................................... 314
35.2 voice vlan (interface) ................................................................................................................... 314
35.3 voice vlan priority ......................................................................................................................... 315
35.4 voice vlan oui .................................................................................................................................. 316
35.5 show voice vlan ............................................................................................................................. 316
35.6 show voice vlan oui-table .......................................................................................................... 317
35.7 show voice vlan interface .......................................................................................................... 317
Chapter 36 Auto VoIP Commands ............................................................................... 319
36.1 auto-voip .......................................................................................................................................... 319
36.2 auto-voip (interface) .................................................................................................................... 319
36.3 auto-voip dot1p ............................................................................................................................ 320
36.4 auto-voip untagged ..................................................................................................................... 321
36.5 auto-voip none .............................................................................................................................. 321
36.6 no auto-voip (interface) .............................................................................................................. 322
36.7
36.8 auto-voip data priority ................................................................................................................ 323
36.9 show auto-voip .............................................................................................................................. 324
auto-voip dscp .............................................................................................................................. 322
XIV
Chapter 37 Access Control Commands .................................................................... 325
37.1 user access-control ip-based enable .................................................................................. 325
37.2 user access-control ip-based ................................................................................................. 325
37.3 user access-control mac-based enable ............................................................................. 326
37.4 user access-control mac-based ............................................................................................ 327
37.5 user access-control port-based enable ............................................................................. 328
37.6 user access-control port-based ............................................................................................ 328
Chapter 38 HTTP and HTTPS Commands ................................................................. 330
38.1 ip http server .................................................................................................................................. 330
38.2 ip http port ....................................................................................................................................... 331
38.3 ip http max-users .......................................................................................................................... 331
38.4 ip http session timeout ............................................................................................................... 332
38.5 ip http secure-server .................................................................................................................. 333
38.6 ip http secure-port ....................................................................................................................... 333
38.7 ip http secure-protocol .............................................................................................................. 334
38.8 ip http secure-ciphersuite ........................................................................................................ 335
38.9 ip http secure-max-users .......................................................................................................... 336
38.10 ip http secure-session timeout ............................................................................................... 337
38.11 ip http secure-server download certificate ....................................................................... 337
38.12 ip http secure-server download key ..................................................................................... 338
38.13 show ip http configuration ........................................................................................................ 339
38.14 show ip http secure-server ...................................................................................................... 340
Chapter 39 SSH Commands .......................................................................................... 341
39.1 ip ssh server ................................................................................................................................... 341
39.2 ip ssh port ........................................................................................................................................ 341
39.3 ip ssh version ................................................................................................................................. 342
39.4 ip ssh algorithm ............................................................................................................................. 343
39.5 ip ssh timeout ................................................................................................................................. 343
39.6 ip ssh max-client ........................................................................................................................... 344
39.7 ip ssh download ............................................................................................................................ 345
39.8 remove public-key ....................................................................................................................... 345
39.9 show ip ssh ................................................................
..................................................................... 346
Chapter 40 Telnet Commands ...................................................................................... 347
40.1 telnet ................................................................................................................................................. 347
40.2 telnet enable ................................................................................................................................... 347
XV
40.3 telnet port ........................................................................................................................................ 348
40.4 show telnet-status ....................................................................................................................... 348
Chapter 41 Serial Port Commands .............................................................................. 350
41.1 serial_port baud-rate .................................................................................................................. 350
Chapter 42 AAA Commands .......................................................................................... 351
42.1 tacacas-server host .................................................................................................................... 351
42.2 show tacacs-server ..................................................................................................................... 352
42.3 radius-server host ........................................................................................................................ 353
42.4 show radius-server ...................................................................................................................... 354
42.5 aaa group ......................................................................................................................................... 355
42.6 server ................................................................................................................................................ 356
42.7 show aaa group ............................................................................................................................. 356
42.8 aaa authentication login ............................................................................................................. 357
42.9 aaa authentication enable ......................................................................................................... 358
42.10 aaa authentication dot1x default ........................................................................................... 359
42.11 aaa accounting dot1x default .................................................................................................. 360
42.12 show aaa authentication ............................................................................................................ 360
42.13 show aaa accounting .................................................................................................................. 361
42.14 line telnet ......................................................................................................................................... 361
42.15 login authentication (telnet) ...................................................................................................... 362
42.16 line ssh .............................................................................................................................................. 363
42.17 login authentication (ssh) .......................................................................................................... 363
42.18 line console ..................................................................................................................................... 364
42.19 login authentication (console) ................................................................................................. 364
42.20 enable authentication (telnet) .................................................................................................. 365
42.21 enable authentication (ssh) ...................................................................................................... 366
42.22 enable authentication (console) ............................................................................................. 367
42.23 ip http login authentication ....................................................................................................... 367
42.24 ip http enable authentication ................................................................................................... 368
42.25 show aaa global ............................................................................................................................. 369
42.26 enable admin password ............................................................................................................. 369
42.27 enable admin secret .................................................................................................................... 370
42.28 enable-admin ................................................................................................................................. 371
Chapter 43 IEEE 802.1x Commands ............................................................................ 373
43.1 dot1x system
43.2 dot1x handshake .......................................................................................................................... 374
-auth-control ...................................................................................................... 373
XVI
43.3 dot1x auth-protocol .................................................................................................................... 374
43.4 dot1x vlan-assignment .............................................................................................................. 375
43.5 dot1x accounting ......................................................................................................................... 376
43.6 dot1x mab ....................................................................................................................................... 377
43.7 dot1x guest-vlan ........................................................................................................................... 377
43.8 dot1x timeout quiet-period ...................................................................................................... 378
43.9 dot1x timeout supp-timeout .................................................................................................... 379
43.10 dot1x max- req .............................................................................................................................. 380
43.11 dot1x ................................................................................................................................................. 381
43.12 dot1x port-control ....................................................................................................................... 381
43.13 dot1x port-method ...................................................................................................................... 382
43.14 dot1x auth-init................................................................................................................................ 383
43.15 dot1x auth-reauth ........................................................................................................................ 384
43.16 show dot1x global ........................................................................................................................ 384
43.17 show dot1x interface .................................................................................................................. 385
43.18 show dot1x auth-state ............................................................................................................... 386
Chapter 44 Port Security Commands ......................................................................... 387
44.1 mac address-table max-mac count ...................................................................................... 387
44.2 show mac address-table max-mac-count ......................................................................... 387
Chapter 45 Port Mirroring Commands ....................................................................... 389
45.1 monitor session destination interface ................................................................................. 389
45.2 monitor session source ............................................................................................................. 390
45.3 show monitor session ................................................................................................................. 391
Chapter 46 ACL Commands .......................................................................................... 393
46.1 access-list create ......................................................................................................................... 393
46.2 access-list resequence ............................................................................................................. 393
46.3 access-list mac ............................................................................................................................. 394
46.4 access-list ip .................................................................................................................................. 396
46.5 access-list combined ................................................................................................................. 397
46.6 access-list ipv6 ............................................................................................................................. 399
46.7 access-list action ......................................................................................................................... 401
46.8 redirect ............................................................................................................................................. 402
46.9 s-condition ...................................................................................................................................... 403
46.10 s-mirror ............................................................................................................................................. 403
46.11 qos-remark ..................................................................................................................................... 404
46.12 access bind ..................................................................................................................................... 405
XVII
46.13 show access-list ........................................................................................................................... 406
46.14 show access-list bind ................................................................................................................. 406
46.15 show access-list status ............................................................................................................. 407
46.16 show access-list counter .......................................................................................................... 407
46.17 clear access-list ............................................................................................................................ 408
Chapter 47 IPv4 IMPB Commands ............................................................................... 409
47.1 ip source binding .......................................................................................................................... 409
47.2 ip dhcp snooping .......................................................................................................................... 410
47.3 ip dhcp snooping vlan ................................................................................................................. 411
47.4 ip dhcp snooping max-entries ................................................................................................ 411
47.5 show ip source binding .............................................................................................................. 412
47.6 show ip dhcp snooping .............................................................................................................. 413
47.7 show ip dhcp snooping interface ........................................................................................... 413
Chapter 48 IPv6 IMPB Commands ............................................................................... 415
48.1 Ipv6 source binding ..................................................................................................................... 415
48.2 ipv6 dhcp snooping ..................................................................................................................... 416
48.3 ipv6 dhcp snooping vlan ............................................................................................................ 417
48.4 ipv6 dhcp snooping max-entries ........................................................................................... 417
48.5 ipv6 nd snooping .......................................................................................................................... 418
48.6 ipv6 nd snooping vlan ................................................................................................................. 419
48.7 ipv6 nd snooping max-entries ................................................................................................. 419
48.8 show ipv6 source binding ......................................................................................................... 420
48.9 show ipv6 dhcp snooping ......................................................................................................... 421
48.10 show ipv6 dhcp snooping interface ...................................................................................... 421
48.11 show ipv6 nd snooping .............................................................................................................. 422
48.12 show ipv6 nd snooping interface ........................................................................................... 423
Chapter 49 IP Verify Source Commands ................................................................... 424
49.1 ip verify source .............................................................................................................................. 424
49.2 ip verify source logging .............................................................................................................. 425
49.3 show ip verify source .................................................................................................................. 425
49.4 show ip verify source interface ............................................................................................... 426
Chapter 50 IPv6 Verify Source Commands .............................................................. 427
50.1 ipv6 verify source ......................................................................................................................... 427
50.2 show ipv6 verify source ............................................................................................................. 428
50.3 show ipv6 verify source interface .......................................................................................... 428
XVIII
Chapter 51 DHCPv4 Filter Commands ....................................................................... 430
51.1 ip dhcp filter .................................................................................................................................... 430
51.2 ip dhcp filter (interface) .............................................................................................................. 430
51.3 ip dhcp filter mac-verify ............................................................................................................. 431
51.4 ip dhcp filter limit rate ................................................................................................................. 432
51.5 ip dhcp filter decline rate ........................................................................................................... 433
51.6 ip dhcp filter server permit-entry ........................................................................................... 433
51.7 show ip dhcp filter ........................................................................................................................ 434
51.8 show ip dhcp filter interface ..................................................................................................... 435
51.9 show ip dhcp filter server permit-entry ............................................................................... 435
Chapter 52 DHCPv6 Filter Commands ....................................................................... 437
52.1 ipv6 dhcp filter ............................................................................................................................... 437
52.2 ipv6 dhcp filter (interface) ......................................................................................................... 437
52.3 ipv6 dhcp filter limit rate ............................................................................................................ 438
52.4 ipv6 dhcp filter decline rate ...................................................................................................... 439
52.5 ipv6 dhcp filter server permit-entry ...................................................................................... 440
52.6 show ipv6 dhcp filter ................................................................................................................... 441
52.7 show ipv6 dhcp filter interface ................................................................................................ 441
52.8 show ip dhcp filter server permit-entry ............................................................................... 442
Chapter 53 DoS Defend Commands ........................................................................... 443
53.1 ip dos-prevent ............................................................................................................................... 443
53.2 ip dos-prevent type ..................................................................................................................... 443
53.3 show ip dos-prevent ................................................................................................................... 445
Chapter 54 Ethernet OAM Commands ....................................................................... 447
54.1 ethernet-oam ................................................................................................................................. 447
54.2 ethernet-oam mode .................................................................................................................... 447
54.3 ethernet-oam link-monitor symbol-period ........................................................................ 448
54.4 ethernet-oam link-monitor frame .......................................................................................... 449
54.5 ethernet-oam link-monitor frame-period ........................................................................... 450
54.6 ethernet-oam link-monitor frame-seconds ....................................................................... 451
54.7 ethernet-oam remote-failure ................................................................................................... 452
54.8 clear ethernet-oam statistics .................................................................................................. 453
54.9 clear ethernet
54.10 show ethernet-oam configuration ......................................................................................... 454
54.11 show ethernet-oam event-log ................................................................................................ 455
-oam event-log ................................................................................................. 454
XIX
54.12 show ethernet-oam statistics ................................................................................................. 456
54.13 show ethernet-oam status ....................................................................................................... 456
Chapter 55 DLDP Commands ....................................................................................... 458
55.1 dldp (global) .................................................................................................................................... 458
55.2 dldp interval .................................................................................................................................... 458
55.3 dldp shut-mode ............................................................................................................................. 459
55.4 dldp(interface) ................................................................................................................................ 460
55.5 show dldp ........................................................................................................................................ 460
55.6 show dldp interface ..................................................................................................................... 461
Chapter 56 SNMP Commands ....................................................................................... 462
56.1 snmp-server ................................................................................................................................... 462
56.2 snmp-server view ......................................................................................................................... 462
56.3 snmp-server group ...................................................................................................................... 463
56.4 snmp-server user ......................................................................................................................... 465
56.5 snmp-server community ........................................................................................................... 466
56.6 snmp-server host ......................................................................................................................... 467
56.7 snmp-server engineID ................................................................................................................ 469
56.8 snmp-server traps snmp ........................................................................................................... 470
56.9 snmp-server traps ....................................................................................................................... 471
56.10 snmp-server traps ddm ............................................................................................................. 472
56.11 snmp-server traps vlan .............................................................................................................. 473
56.12 snmp-server traps security ...................................................................................................... 474
56.13 snmp-server traps acl ................................................................................................................ 475
56.14 snmp-server traps ip ................................................................................................................... 475
56.15 snmp-server traps link-status ................................................................................................. 476
56.16 rmon history ................................................................................................................................... 477
56.17 rmon event ...................................................................................................................................... 478
56.18 rmon alarm ...................................................................................................................................... 479
56.19 rmon statistics ............................................................................................................................... 480
56.20 show snmp-server ....................................................................................................................... 481
56.21 show snmp-server view ............................................................................................................. 481
56.22 show snmp-server group
56.23 show snmp-server user ............................................................................................................. 482
56.24 show snmp-server community ............................................................................................... 483
56.25 show snmp-server host ............................................................................................................. 483
56.26 show snmp-server engineID .................................................................................................... 484
.......................................................................................................... 482
XX
56.27 show rmon history ....................................................................................................................... 484
56.28 show rmon event .......................................................................................................................... 485
56.29 show rmon alarm .......................................................................................................................... 485
56.30 show rmon statistics ................................................................................................................... 486
Chapter 57 ARP Inspection Commands ..................................................................... 487
57.1 ip arp inspection ........................................................................................................................... 487
57.2 ip arp inspection validate .......................................................................................................... 487
57.3 ip arp inspection vlan .................................................................................................................. 488
57.4 ip arp inspection vlan logging .................................................................................................. 489
57.5 ip arp inspection trust ................................................................................................................. 490
57.6 ip arp inspection limit-rate ........................................................................................................ 490
57.7 ip arp inspection burst-interval ............................................................................................... 491
57.8 ip arp inspection recover .......................................................................................................... 492
57.9 show ip arp inspection................................................................................................................ 492
57.10 show ip arp inspection interface ............................................................................................ 493
57.11 show ip arp inspection vlan ...................................................................................................... 494
57.12 show ip arp inspection statistics ............................................................................................ 494
57.13 clear ip arp inspection statistics ............................................................................................. 495
Chapter 58 ND Detection Commands ........................................................................ 496
58.1 ipv6 nd detection .......................................................................................................................... 496
58.2 ipv6 nd detection vlan ................................................................................................................ 496
58.3 ipv6 nd detection vlan logging ................................................................................................ 497
58.4 ipv6 nd detection trust ............................................................................................................... 497
58.5 show ipv6 nd detection .............................................................................................................. 498
58.6 show ipv6 nd detection interface........................................................................................... 498
58.7 show ipv6 nd detection statistics .......................................................................................... 499
58.8 show ipv6 nd detection vlan .................................................................................................... 500
Chapter 59 System Log Commands ........................................................................... 501
59.1 logging buffer ................................................................................................................................. 501
59.2 logging buffer level ...................................................................................................................... 501
59.3 logging file flash ............................................................................................................................ 502
59.4 logging file flash frequency ...................................................................................................... 503
59.5 logging file flash level .................................................................................................................. 504
59.6 logging host index ........................................................................................................................ 504
59.7 logging console ............................................................................................................................. 505
59.8 logging console level .................................................................................................................. 506
XXI
59.9 logging monitor ............................................................................................................................. 507
59.10 logging monitor level .................................................................................................................. 507
59.11 clear logging ................................................................................................................................... 508
59.12 show logging local-config ......................................................................................................... 509
59.13 show logging loghost .................................................................................................................. 509
59.14 show logging buffer ..................................................................................................................... 510
59.15 show logging flash ....................................................................................................................... 510
XXII

Preface

This Guide is intended for network administrator to provide referenced information about CLI (Command Line Interface). The device mentioned in this Guide stands for T2500G-10TS JetStream 8-Port Gigabit L2 Managed Switch with 2 SFP Slots without any explanation.
Overview of this Guide
Chapter 1: Using the CLI
Provide information about how to use the CLI, CLI Command Modes, Security Levels and some
Conventions.
Chapter 2: User Interface
Provide information about the commands used to switch between five CLI Command Modes.
Chapter 3: User Management Commands
Provide information about the commands used for user management.
Chapter 4: System Configuration Commands
Provide information about the commands used for configuring the System information and
System IP, reboot and reset the switch, upgrade the switch system and commands used for
cable test.
Chapter 5: EEE Configuration Commands
Provide information about the commands used for configuring EEE.
Chapter 6: SDM Template Commands
Provide information about the commands used for configuring the SDM templates.
Chapter 7: Time Range Commands
Provide information about the commands used for configuring the time range.
Chapter 8: Port Configuration Commands
Provide information about the commands used for configuring the Speed, Negotiation Mode,
and Flow Control for Ethernet ports.
Chapter 9: Port Isolation Commands
Provide information about the commands used for configuring Port Isolation function.
Chapter 10: Loopback Detection Commands
Provide information about the commands used for configuring the Loopback Detection
function.
Chapter 11: DDM Commands
Provide information about the commands used for DDM (Digital Diagnostic Monitoring)
function.
1
Chapter 12: Etherchannel Commands
Provide information about the commands used for configuring LAG (Link Aggregation Group)
and LACP (Link Aggregation Control Protocol).
Chapter 13: MAC Address Commands
Provide information about the commands used for Address configuration.
Chapter 14 IEEE 802.1Q VLAN Commands
Provide information about the commands used for configuring IEEE 802.1Q VLAN.
Chapter 15: MAC-based VLAN Commands
Provide information about the commands used for configuring MAC-based VLAN.
Chapter 16: Protocol-based VLAN Commands
Provide information about the commands used for configuring Protocol VLAN.
Chapter 17: VLAN-VPN Commands
Provide information about the commands used for configuring VLAN-VPN (Virtual Private
Network) function.
Chapter 18: GVRP Commands
Provide information about the commands used for configuring GVRP (GARP VLAN registration
protocol).
Chapter 19: IGMP Snooping Commands
Provide information about the commands used for configuring the IGMP Snooping (Internet
Group Management Protocol Snooping).
Chapter 20: MLD Snooping Commands
Provide information about the commands used for configuring the MLD Snooping (Multicast
Listener Discovery Snooping).
Chapter 21: MVR Commands
Provide information about the commands used for configuring the MVR.
Chapter 22: MSTP Commands
Provide information about the commands used for configuring the MSTP (Multiple Spanning
Tree Protocol).
Chapter 23: LLDP Commands
Provide information about the commands used for configuring LLDP function.
Chapter 24: L2PT Commands
Provide information about the commands used for configuring L2PT (Layer 2 Protocol
Tunneling).
Chapter 25: PPPoE ID-Insertion Commands
Provide information about the commands used for configuring PPPoE ID-Insertion.
2
Chapter 26: DHCP Relay Commands
Provide information about the commands used for configuring the DHCP Relay function.
Chapter 27: DHCP L2 Relay Commands
Provide information about the commands used for configuring the DHCP L2 Relay function.
Chapter 28: QoS Commands
Provide information about the commands used for configuring the QoS function.
Chapter 29: Bandwidth Commands
Provide information about the commands used for configuring the Bandwidth Control.
Chapter 30: Voice VLAN Commands
Provide information about the commands used for configuring Voice VLAN.
Chapter 31: Auto VoIP Commands
Provide information about the commands used for configuring Auto VoIP.
Chapter 32: Access Control Commands
Provide information about the commands used for configuring Access Control.
Chapter 33: HTTP and HTTPS Commands
Provide information about the commands used for configuring the HTTP and HTTPS logon.
Chapter 34: SSH Commands
Provide information about the commands used for configuring and managing SSH (Security
Shell).
Chapter 35: Telnet Commands
Provide information about the commands used for configuring and managing SSH (Security
Shell).
Chapter 36: Serial Port Commands
Provide information about the commands used for configuring and managing SSH (Security
Shell).
Chapter 37: AAA Commands
Provide information about the commands used for configuring AAA (authentication,
authorization and accounting).
Chapter 38: IEEE 802.1X Commands
Provide information about the commands used for configuring IEEE 802.1X function.
Chapter 39: Port Security Commands
Provide information about the commands used for configuring Port Security.
3
Chapter 40: Port Mirroring Commands
Provide information about the commands used for configuring the Port Mirror function.
Chapter 41: ACL Commands
Provide information about the commands used for configuring the ACL (Access Control List).
Chapter 42: IPv4 IMPB Commands
Provide information about the commands used for binding the IP address, MAC address, VLAN
and the connected Port number of the Host together.
Chapter 43: IPv6 IMPB Commands
Provide information about the commands used for binding the IPv6 address, MAC address,
VLAN and the connected Port number of the Host together.
Chapter 44: IP Verify Source Commands
Provide information about the commands used for guarding the IP Source by filtering the IP
packets based on the IP-MAC Binding entries.
Chapter 45: IPv6 Verify Source Commands
Provide information about the commands used for guarding the IPv6 Source by filtering the IP
packets based on the IP-MAC Binding entries.
Chapter 46: DHCPv4 Filter Commands
Provide information about the commands used for configuring the DHCPv4 Filter.
Chapter 47: DHCPv6 Filter Commands
Provide information about the commands used for configuring the DHCPv6 Filter.
Chapter 48: DoS Defend Command
Provide information about the commands used for DoS defend and detecting the DoS attack.
Chapter 49: DLDP Commands
Provide information about the commands used for configuring the DLDP (Device Link
Detection Protocol).
Chapter 50: SNMP Commands
Provide information about the commands used for configuring the SNMP (Simple Network
Management Protocol) functions.
Chapter 51: ARP Inspection Commands
Provide information about the commands used for protecting the switch from the ARP
cheating or ARP Attack.
Chapter 52: ND Detection Commands
Provide information about the commands used for configuring ND detection.
Chapter 53: System Log Commands
Provide information about the commands used for configuring system log.
4

Chapter 1 Using the CLI

1.1 Accessing the CLI

You can log on to the switch and access the CLI by logging on to the switch remotely by a
Telnet or SSH connection through an Ethernet port.

1.1.1 Logon by a console port

Console Port
The switch has two console ports: an RJ-45 console port and a Micro-USB console port.
Console output is active on devices connected to both console ports, but console input is only
active on one console port at a time.
The Micro-USB connector takes precedence over the RJ-45 connector. When the switch
detects a valid connection on the Micro-USB console port, input from the RJ-45 console port is
immediately disabled, and input from the Micro-USB console port is enabled. Removing the
Micro-USB connection immediately reenables input from the RJ-45 console connection.
USB Console Driver
If you are using the USB port on the MAC OS X or Linux OS for console connection, there is no
need to run a USB driver.
If you are using the switch’s Micro-USB console port with the USB port of a Windows PC, a
driver for the USB port is required. The USB driver is provided on the resource CD. Follow the
InstallSheild Wizard to accomplish the installation.
The TP-Link USB Console Driver supports the following Windows operating systems:
32-bit Windows XP SP3
64-bit Windows XP
32-bit Windows Vista
64-bit Windows Vista
32-bit Windows 7
64-bit Windows 7
32-bit Windows 8
64-bit Windows 8
32-bit Windows 8.1
5
64-bit Windows 8.1
After the TP-Link USB Console Driver is installed, the PC’s USB port will act as RS-232 serial
port when the PC’s USB port is connected to the switch’s Micro-USB console port. And the
PC’s USB port will act as standard USB port when the PC’s USB port is unplugged from the
switch.
Logon
Take the following steps to log on to the switch by the console port.
1. Connect the PCs or Terminals to the console port on the switch by the provided cable.
2. Start the terminal emulation program (such as the HyperTerminal) on the PC.
3. Specify the connection COM port in the terminal emulation program. If the Micro-USB
Console port is used, you can view which port is assigned to the USB serial port in the
following path: Control Panel -> Hardware and Sound -> Device Manager -> Ports ->USB
Serial Port.
Figure 1-1 USB Serial Port Number
4. Configure the terminal emulation program or the terminal to use the following settings:
Baud rate: 38400 bps
Data bits: 8
Parity: none
6
Stop bits: 1
Flow control: none
5. Type the Username and Password in the Hyper Terminal window. The default value for
both of them are admin. Press Enter in the main window and “T2500G-10TS>” will appear
indicating that you have successfully logged in to the switch and you can use the CLI now.
Figure 1-2 Log in to the Switch
Note:
The first time you log in, change the password to better protect your network and devices.
7

1.1.2 Logon by Telnet

To log on to the switch by a Telnet connection, please take the following steps:
1. Click Start and type in cmd in the Search programs and files window and press the Enter
button.
Figure 1-3 Run Window
2. Telnet the switch’s IP address (factory setting is 192.168.0.1) in the prompt cmd window
and press Enter.
Figure 1-4 Type in the telnet command
3. Type in the User name and Password (the factory default value for both of them are admin)
and press the Enter button to enter User EXEC Mode , which is shown as Figure 1-3.
Figure 1-5 Log in the Switch
Note:
The first time you log in, change the password to better protect your network and devices.
8
4. Type in enable command to enter Privileged EXEC Mode.
Figure 1-6 Enter into Priviledged EXEC Mode

1.1.3 Logon by SSH

To log on by SSH, a Putty client software is recommended. There are two authentication modes
to set up an SSH connection:
Password Authentication Mode: It requires username and password, which are both admin by default.
Key Authentication Mode: It requires a public key for the switch and a private key for the SSH client software. You can generate the public key and the private key through Putty Key Generator.
Note:
1. Before SSH login, please follow the steps shown in Figure 1-5 to enable the SSH function through Telnet connection.
2. The first time you log in, change the password to better protect your network and devices.
Figure 1-7 Enable SSH function
9
Password Authentication Mode
1. Open the software to log on to the interface of PuTTY. Enter the IP address of the switch
into Host Name field; keep the default value 22 in the Port field; select SSH as the
Connection type.
Figure 1-8 SSH Connection Config
2. Click the Open button in the above figure to log on to the switch. Enter the login user name
and password to log on the switch, and then enter enable to enter Privileged EXEC Mode,
so you can continue to configure the switch.
Figure 1-9 Log on the Switch
10
Key Authentication Mode
1. Select the key type and key length, and generate SSH key.
Figure 1-10 Generate SSH Key
Note:
1. The key length is in the range of 512 to 3072 bits.
2. During the key generation, randomly moving the mouse quickly can accelerate the key generation.
11
2. After the key is successfully generated, please save the public key and private key to a
TFTP server.
Figure 1-11 Save the Generated Key
12
3. Log on to the switch by Telnet and download the public key file from the TFTP server to the
switch, as the following figure shows:
Figure 1-12 Download the Public Key
Note:
1. The key type should accord with the type of the key file.
2. The SSH key downloading can not be interrupted.
13
4. After the public key is downloaded, please log on to the interface of PuTTY and enter the IP
address for login.
Figure 1-13 SSH Connection Config
14
5. Click Browse to download the private key file to SSH client software and click Open.
Figure 1-14 Download the Private Key
6. After successful authentication, please enter the login user name. If you log on to the
switch without entering password, it indicates that the key has been successfully
downloaded.
Figure 1-15 Log on the Switch

1.2 CLI Command Modes

The CLI is divided into different command modes: User EXEC Mode, Privileged EXEC Mode,
Global Configuration Mode, Interface Configuration Mode and VLAN Configuration Mode.
15
mode.
Configuration mode.
mode.
Interface Configuration Mode can also be divided into Interface Ethernet, Interface
link-aggregation and some other modes, which is shown as the following diagram.
The following table gives detailed information about the Accessing path, Prompt of each mode and how to exit the current mode and access the next mode.
Mode Accessing Path Prompt
User EXEC
Mode
Privileged
EXEC Mode
Global
Configuration
Primary mode once it
is connected with the
switch.
Use the enable
command to enter this
mode from User EXEC
mode.
Use the configure
command to enter this
mode from Privileged
T2500G-10TS>
T2500G-10TS#
T2500G-10TS(config)#
Mode
EXEC mode.
Logout or Access the
next mode
Use the exit command to
disconnect the switch.
Use the enable command
to access Privileged EXEC
Enter the exit command to
return to User EXEC mode.
Enter configure command
to access Global
Use the exit or the end
command or press Ctrl+Z
to return to Privileged EXEC
mode.
Use the interface
gigabitEthernet
interface range
fastEthernet
gigabitEthernet
command to access
interface Configuration
mode.
port
port-list
port-list
or
|
16
Use the vlan
access VLAN Configuration
vlan-list
to
mode.
mode.
Global configuration mode.
Mode Accessing Path Prompt
Layer 2 Interface:
Use the interface
port,
port,
lagid
port-list
command to
command to
id
command
or
T2500G-10TS(config-if)#
T2500G-10TS(config-if-range)#
|
T2500G-10TS(config-if)#
T2500G-10TS(config-if-range)#
Interface
Configuration
Mode
Interface
Configuration
Mode
fastEthernet
interface
gigabitEthernet
interface
port-channel
interface range
fastEthernet
gigabitEthernet
port-list
enter this mode from
Global Configuration
Use the interface vlan
vlan-id
enter VLAN Interface mode from Global Configuration mode.
Use the interface
loopback
to enter Loopback
Interface mode from
Global Configuration
or
or
Logout or Access the
next mode
Use the end command or press Ctrl+Z to return to Privileged EXEC mode.
Enter the exit or the # command to return to Global Configuration mode.
A port number must be
specified in the interface
command.
Use the switchport command to switch to the Layer 2 interface mode.
Use the end command or press Ctrl+Z to return to Privileged EXEC mode.
Enter the exit or the #
command to return to
Global Configuration mode.
Use the end command or
VLAN
Configuration
Mode
Use the vlan
command to enter this
mode from Global
Configuration mode.
vlan-list
T2500G-10TS(config-vlan)#
press Ctrl+Z to return to
Privileged EXEC mode.
Enter the exit command or
the # command to return to
Note:
1. The user is automatically in User EXEC Mode after the connection between the PC and the
switch is established by a Telnet/SSH connection.
2. Each command mode has its own set of specific commands. To configure some
commands, you should access the corresponding command mode firstly.
Global Configuration Mode: In this mode, global commands are provided, such as the
Spanning Tree, Schedule Mode and so on.
17
Interface Configuration Mode: In this mode, users can configure one or several ports,
different ports correspond to different commands
a). Interface gigabitEthernet: Configure parameters for an Ethernet port, such as
Duplex-mode, flow control status.
b). Interface range gigabitEthernet: Configure parameters for several Ethernet ports.
c). Interface link-aggregation: Configure parameters for a link-aggregation, such as
broadcast storm.
d). Interface range link-aggregation: Configure parameters for multi-trunks.
e). Interface vlan: Configure parameters for the vlan-port.
VLAN Configuration Mode: In this mode, users can create a VLAN and add a specified
port to the VLAN.
3. Some commands are global, that means they can be performed in all modes:
show: Display all information of switch, for example: statistic information, port information,
VLAN information.
history: Display the commands history.

1.3 Privilege Restrictions

This switch’s security is divided into four privilege levels: User level, Power User level, Operator
level and Admin level. You can define username and password pairs, and assign a specific
privilege level to each pair. Different privilege levels have access to specified commands,
which is illustrated in the Privilege Requirement in each command. For details about how to
configure usename and password pairs, please refer to user name (password) and user name
(secret).
Users can enter Privileged EXEC mode from User EXEC mode by using the enable command. In
default case, no password is needed. In Global Configuration Mode, you can configure
password for Admin level by enable password command. Once password is configured, you
are required to enter it to access Privileged EXEC mode.

1.4 Conventions

1.4.1 Format Conventions

The following conventions are used in this Guide:
Items in square brackets [ ] are optional
Items in braces { } are required
18
Alternative items are grouped in braces and separated by vertical bars. For example:
speed {10 | 100 | 1000 }
Bold indicates an unalterable keyword. For example: show logging
Normal Font indicates a constant (several options are enumerated and only one can be
selected). For example: mode {dynamic | static | permanent}
Italic Font indicates a variable (an actual value must be assigned). For example: bridge
aging-time
aging-time

1.4.2 Special Characters

You should pay attentions to the description below if the variable is a character string:
These six characters ” < > , \ & cannot be input.
If a blank is contained in a character string, single or double quotation marks should be
used, for example ’hello world’, ”hello world”, and the words in the quotation marks will be
identified as a string. Otherwise, the words will be identified as several strings.

1.4.3 Parameter Format

Some parameters must be entered in special formats which are shown as follows:
MAC address must be enter in the format of xx:xx:xx:xx:xx:xx.
One or several values can be typed for a port-list or a vlan-list using comma to separate.
Use a hyphen to designate a range of values, for instance, 1/0/1, 1/0/3-5, 1/0/7 indicates
choosing port 1/0/1, 1/0/3, 1/0/4, 1/0/5, 1/0/7.
19

Chapter 2 Line Commands

2.1 line

Description
The line command is used to enter the Line Configuration Mode and make
related configurations for the desired user(s).
Syntax
line { console
Parameter
linenum
value is 0 in general, for the reason that console input is only active on one
console port at a time.
startlinenum
configure the login mode and password, ranging from 0 to 15. 0 means the
first login user number, 1 means the second, and the rest can be done on the
same manner.
endlinenum
configure the login mode and password, ranging from 0 to 15. 0 means the
first login user number, 1 means the second, and the rest can be done on the
same manner.
—— The number of users allowed to login through console port. Its
Command Mode
linenum
——The start serial number of the login user selected to
—— The end serial number of the login user selected to
| vty
startlinenum endlinenum
}
Global Configuration Mode
Privilege Requirement
Only Admin level users have access to these commands.
Example
Enter the Console port configuration mode and configure the console port 0:
T2500G-10TS(config)#line console 0
Enter the Virtual Terminal configuration mode so as to prepare further
configurations such as password and login mode for virtual terminal 0 to 5:
T2500G-10TS(config)#line vty 0 5
20

2.2 media-type rj45

Description
The media-type rj45 command is used to configure the console media type
as RJ-45 for input. The switch has two console ports available —— an RJ-45
console port and a micro-USB console port. Console input is active on only
one console port at a time. By default, the micro-USB connector takes
precedence over the RJ-45 connector, which means that, when both the
RJ-45 console connection and micro-USB console connection are valid,
input from the RJ-45 console is disabled, and input from the micro-USB
console is enabled. To return to the default configuration, please use no
media-type rj45 command.
Syntax
media-type rj45
no media-type rj45
Command Mode
Line Configuration Mode
Privilege Requirement
Only Admin level users have access to these commands.
Example
Enable the RJ-45 console input:
T2500G-10TS(config)# line console 0
T2500G-10TS(config-line)# media-type rj45
Receive the micro-USB console input prior to the RJ-45 console input:
T2500G-10TS(config)# line console 0
T2500G-10TS(config-line)# no media-type rj45
21

Chapter 3 User Interface

3.1 enable

Description
The enable command is used to access Privileged EXEC Mode from User
EXEC Mode.
Syntax
enable
Command Mode
User EXEC Mode
Privilege Requirement
None.
Example
If you have set the password to access Privileged EXEC Mode from User
EXEC Mode:
T2500G-10TS>enable
Enter password:
T2500G-10TS#

3.2 service password-encryption

Description
The service password-encryption command is used to encrypt the
password when the password is defined or when the configuration is written,
using the symmetric encryption algorithm. Encryption prevents the password
from being readable in the configuration file. To disable the global encryption
Syntax
function, please use no service password-encryption command.
service password-encryption
no service password-encryption
22
Command Mode
Global Configuration Mode
Privilege Requirement
Only Admin level users have access to these commands.
Example
Enable the global encryption function:
T2500G-10TS(config)# service password-encryption

3.3 enable password

Description
The enable password command is used to set or change the password for
users to access Privileged EXEC Mode from User EXEC Mode. To remove the
password, please use no enable password command. This command uses
the symmetric encryption.
Syntax
enable password { [ 0 ]
no enable password
Parameter
0 —— Specify the encryption type. 0 indicates that an unencrypted password
will follow. By default, the encryption type is 0.
password
English letters (case-sensitive), digits and 17 kinds of special characters. The
special characters are !$%’()*,-./[]_{|}. By default, it is empty.
7 —— Indicates a symmetric encrypted password with fixed length will follow.
encrypted-password
which you can copy from another switch’s configuration file. After the
password
—— A string with 31 characters at most, which can contain only
—— A symmetric encrypted password with fixed length,
| 7
encrypted-password
}
encrypted password is configured, you should use the corresponding
unencrypted password if you re-enter this mode.
Command Mode
Global Configuration Mode
Privilege Requirement
Only Admin level users have access to these commands.
23
User Guidelines
If the password you configured here is unencrypted and the global
encryption function is enabled in service password-encryption, the
password in the configuration file will be displayed in the symmetric
encrypted form.
Example
Set the super password as “admin” and unencrypted to access Privileged
EXEC Mode from User EXEC Mode:
T2500G-10TS(config)#enable password 0 admin

3.4 enable secret

Description
The enable secret command is used to set a secret password, which is using
an MD5 encryption algorithm, for users to access Privileged EXEC Mode from
User EXEC Mode. To return to the default configuration, please use no enable
secret command. This command uses the MD5 encryption.
Syntax
enable secret { [ 0 ]
no enable secret
Parameter
0 —— Specify the encryption type. 0 indicates that an unencrypted password
will follow. By default, the encryption type is 0.
password
English letters (case-sensitive), digits and 17 kinds of special characters. The
special characters are !$%’()*,-./[]_{|}. By default, it is empty.
5 —— Indicates an MD5 encrypted password with fixed length will follow.
password
—— A string with 31 characters at most, which can contain only
| 5
encrypted-password
}
encrypted-password
which you can copy from another switch’s configuration file. After the
encrypted password is configured, you should use the corresponding
unencrypted password if you re-enter this mode.
Command Mode
Global Configuration Mode
—— An MD5 encrypted password with fixed length,
24
Privilege Requirement
Only Admin level users have access to these commands.
User Guidelines
If both the enable password and enable secret are defined, you must enter
the password set in enable secret.
Example
Set the secret password as “admin” and unencrypted to access Privileged
EXEC Mode from User EXEC Mode. The password will be displayed in the
encrypted form.
T2500G-10TS(config)#enable secret 0 admin

3.5 configure

Description
The configure command is used to access Global Configuration Mode from Privileged EXEC Mode.
Syntax
configure
Command Mode
Privileged EXEC Mode
Privilege Requirement
Only Admin, Operator and Power User level users have access to these commands.
Example
Access Global Configuration Mode from Privileged EXEC Mode:
T2500G-10TS# configure
T2500G-10TS(config)#

3.6 exit

Description
The exit command is used to return to the previous Mode from the current
Mode.
25
Syntax
exit
Command Mode
Privileged EXEC Mode and Any Configuration Mode
Privilege Requirement
None.
Example
Return to Global Configuration Mode from Interface Configuration Mode, and then return to Privileged EXEC Mode:
T2500G-10TS(config-if)# exit
T2500G-10TS(config)#exit
T2500G-10TS#

3.7 end

Description
The end command is used to return to Privileged EXEC Mode.
Syntax
end
Command Mode
Privileged EXEC Mode and Any Configuration Mode
Privilege Requirement
Only Admin level users have access to these commands.
Example
Return to Privileged EXEC Mode from Interface Configuration Mode:
T2500G-10TS(config-if)#end
T2500G-10TS#

3.8 clipaging

Description
The clipaging command is used to enable the pause function for the screen display. If you want to display all the related information of the switch at once when using the show command, please use no clipaging command.
26
Syntax
clipaging
no clipaging
Command Mode
Privileged EXEC Mode and Any Configuration Mode
Privilege Requirement
None.
Example
Disable the pause function for the screen display:
T2500G-10TS(config)#no clipaging

3.9 history

Description
The history command is used to show the latest 20 commands you entered
in the current mode since the switch is powered.
Syntax
history
Command Mode
Privileged EXEC Mode and any Configuration Mode
Privilege Requirement
None.
Example
Show the commands you have entered in the current mode:
T2500G-10TS (config)# history
1 history

3.10 history clear

Description
The history clear command is used to clear the commands you have entered
in the current mode; therefore, these commands will not be shown next time
27
you use the history command.
Syntax
history clear
Command Mode
Privileged EXEC Mode and any Configuration Mode
Privilege Requirement
Only Admin, Operator and Power User level users have access to these commands.
Example
Clear the commands you have entered in the current mode:
T2500G-10TS(config)#history clear
28

Chapter 4 User Management Commands

User Management commands are used to manage the user’s logging information by Web,
Telnet or SSH, so as to protect the settings of the switch from being randomly changed.

4.1 user name (password)

Description
The user name command is used to add a new user or modify the existed
users’ information. To delete the existed users, please use no user name
command. This command uses the symmetric encryption.
Syntax
user name
{ [ 0 ]
no user name
Parameter
name
composed of digits, English letters and symbols. No spaces, question marks
and double quotation marks are allowed.
admin | operator | power_user | user —— Access level. “admin” means that
you can edit, modify and view all the settings of different functions. “operator”
means that you can edit, modify and view most of the settings of different
functions. “power-user” means that you can edit, modify and view some of
the settings of different functions. “user” means that you can only view some
of the settings of different functions without the right to edit or modify. It is
“admin” by default. For more details about privilege restrictions, please refer
to the Privilege Requirement part in each command.
name
[ privilege admin | operator | power_user | user ] password
password
| 7
encrypted-password
}
name
——Type a name for users' login, which contains 16 characters at most,
0 —— Specify the encryption type. 0 indicates that an unencrypted password
will follow. By default, the encryption type is 0.
password
characters or symbols. The password is case sensitive, allows digits, English
letters (case sensitive), underlines and sixteen special characters
( !$%'()*,-./[]{|} ).
7 —— Indicates a symmetric encrypted password with fixed length will follow.
—— Users’ login password, a string from 1 to 31 alphanumeric
29
encrypted-password
which you can copy from another switch’s configuration file. After the
encrypted password is configured, you should use the corresponding
unencrypted password if you re-enter this mode.
Command Mode
Global Configuration Mode
Privilege Requirement
Only Admin level users have access to these commands.
User Guidelines
If the password you configured here is unencrypted and the global
encryption function is enabled in service password-encryption, the
password in the configuration file will be displayed in the symmetric
encrypted form.
Example
—— A symmetric encrypted password with fixed length,
Add and enable a new admin user named “tplink”, of which the password is
“admin” and unencrypted:
T2500G-10TS(config)#user name tplink privilege admin password 0 admin

4.2 user name (secret)

Description
The user name command is used to add a new user or modify the existed
users’ information. To delete the existed users, please use no user name
command. This command uses the MD5 encryption.
Syntax
user name
password
no user name
name
[ privilege admin | operator | power_user | user ] secret { [ 0 ]
| 5
encrypted-password
name
}
Parameter
name
composed of digits, English letters and symbols. No spaces, question marks
and double quotation marks are allowed.
——Type a name for users' login, which contains 16 characters at most,
30
admin | operator | power_user | user —— Access level. “admin” means that
you can edit, modify and view all the settings of different functions. “operator”
means that you can edit, modify and view most of the settings of different
functions. “power-user” means that you can edit, modify and view some of
the settings of different functions. “user” means that you can only view some
of the settings of different functions without the right to edit or modify. It is
“admin” by default.
0 —— Specify the encryption type. 0 indicates that an unencrypted password
will follow. By default, the encryption type is 0.
password
characters or symbols. The password is case sensitive, allows digits, English
letters (case sensitive), underlines and sixteen special characters
( !$%'()*,-./[]{|} ). The password will be saved to the configuration file using the
MD5 encrypted algorithm.
5 —— Indicates an MD5 encrypted password with fixed length will follow.
——Users’ login password, a string from 1 to 31 alphanumeric
encrypted-password
which you can copy from another switch’s configuration file.
Command Mode
Global Configuration Mode
Privilege Requirement
Only Admin level users have access to these commands.
User Guidelines
If both the user name (password) and user name (secret) are defined, only
—— An MD5 encrypted password with fixed length,
the latest configured password will take effect.
Example
Add and enable a new admin user named “tplink”, of which the password is
“admin”. The password will be displayed in the encrypted form.
T2500G-10TS(config)#user name tplink privilege admin secret 0 admin

4.3 service password-recovery

Description
The service password-recovery command is used to enable the
password-recovery feature. To disable the password-recovery feature,
please use no service password-recovery command.
31
With password-recovery enabled, you can connect to the switch’s console
port and delete all your previous set accounts. You can use the default
username and password (which are both admin) to login the switch after its
startup.
Syntax
service password-recovery
no service password-recovery
Command Mode
Global Configuration Mode
Privilege Requirement
Only Admin level users have access to these commands.
Example
Enable the switch’s password-recovery feature:
T2500G-10TS(config)# service password-recovery

4.4 show user account-list

Description
The show user account-list command is used to display the information of
the current users.
Syntax
show user account-list
Command Mode
Privileged EXEC Mode and Any Configuration Mode
Privilege Requirement
Only Admin level users have access to these commands.
Example
Display the information of the current users:
T2500G-10TS(config)# show user account-list
32

4.5 show user configuration

Description
The show user configuration command is used to display the security
configuration information of the users, including access-control, max-number
and the idle-timeout, etc.
Syntax
show user configuration
Command Mode
Privileged EXEC Mode and Any Configuration Mode
Privilege Requirement
None.
Example
Display the security configuration information of the users:
T2500G-10TS(config)# show user configuration
33

Chapter 5 System Configuration Commands

System Commands can be used to configure the System information and System IP, reboot
and reset the switch, upgrade the switch system and other operations.

5.1 system-time manual

Description
The system-time manual command is used to configure the system time
manually.
Syntax
system-time manual
time
Parameter
time
—— Set the date and time manually, MM/DD/YYYY-HH:MM:SS. The valid
value of the year ranges from 2000 to 2037.
Command Mode
Global Configuration Mode
Privilege Requirement
Only Admin and Operator level users have access to these commands.
Example
Configure the system mode as manual, and the time is 12/20/2010 17:30:35
T2500G-10TS(config)# system-time manual 12/20/2010-17:30:35

5.2 system-time ntp

Description
The system-time ntp command is used to configure the time zone and the IP
address for the NTP Server. The switch will get UTC automatically if it has connected to an NTP Server.
Syntax
system-time ntp {
{
fetching-rate
Parameter
timezone
UTC+13:00.
timezone
}
—— Your local time-zone, and it ranges from UTC-12:00 to
34
} {
ntp-server
} {
backup-ntp-server
}
The detailed information that each time-zone means are displayed as follow:
UTC-12:00 —— TimeZone for International Date Line West.
UTC-11:00 —— TimeZone for Coordinated Universal Time-11.
UTC-10:00 —— TimeZone for Hawaii.
UTC-09:00 —— TimeZone for Alaska.
UTC-08:00 —— TimeZone for Pacific Time(US Canada).
UTC-07:00 —— TimeZone for Mountain Time(US Canada).
UTC-06:00 —— TimeZone for Central Time(US Canada).
UTC-05:00 —— TimeZone for Eastern Time(US Canada).
UTC-04:30 —— TimeZone for Caracas.
UTC-04:00 —— TimeZone for Atlantic Time(Canada).
UTC-03:30 —— TimeZone for Newfoundland.
UTC-03:00 —— TimeZone for Buenos Aires, Salvador, Brasilia.
UTC-02:00 —— TimeZone for Mid-Atlantic.
UTC-01:00 —— TimeZone for Azores, Cape Verde Is.
UTC —— TimeZone for Dublin, Edinburgh, Lisbon, London.
UTC+01:00 —— TimeZone for Amsterdam, Berlin, Bern, Rome, Stockholm,
Vienna.
UTC+02:00 —— TimeZone for Cairo, Athens, Bucharest, Amman, Beirut,
Jerusalem.
UTC+03:00 —— TimeZone for Kuwait, Riyadh, Baghdad.
UTC+03:30 —— TimeZone for Tehran.
UTC+04:00 —— TimeZone for Moscow, St.Petersburg, Volgograd, Tbilisi,
Port Louis.
UTC+04:30 —— TimeZone for Kabul.
UTC+05:00 —— TimeZone for Islamabad, Karachi, Tashkent.
UTC+05:30 —— TimeZone for Chennai, Kolkata, Mumbai, New Delhi.
UTC+05:45 —— TimeZone for Kathmandu.
UTC+06:00 —— TimeZone for Dhaka,Astana, Ekaterinburg.
UTC+06:30 —— TimeZone for Yangon (Rangoon).
UTC+07:00 —— TimeZone for Novosibrisk, Bangkok, Hanoi, Jakarta.
UTC+08:00—— TimeZone for Beijing, Chongqing, Hong Kong, Urumqi,
Singapore.
UTC+09:00 —— TimeZone for Seoul, Irkutsk, Osaka, Sapporo, Tokyo.
UTC+09:30 —— TimeZone for Darwin, Adelaide.
UTC+10:00 —— TimeZone for Canberra, Melbourne, Sydney, Brisbane.
UTC+11:00 —— TimeZone for Solomon Is., New Caledonia, Vladivostok.
UTC+12:00 —— TimeZone for Fiji, Magadan, Auckland, Welington.
UTC+13:00 —— TimeZone for Nuku'alofa, Samoa.
ntp-server
—— The IP address for the Primary NTP Server.
35
backup-ntp-server
fetching-rate
—— Specify the rate fetching time from NTP server.
Command Mode
Global Configuration Mode
Privilege Requirement
Only Admin and Operator level users have access to these commands.
Example
Configure the system time mode as NTP, the time zone is UTC-12:00, the
primary NTP server is 133.100.9.2 and the secondary NTP server is
139.78.100.163, the fetching-rate is 11 hours:
T2500G-10TS(config)# system-time ntp UTC-12:00 133.100.9.2
139.79.100.163 11
—— The IP address for the Secondary NTP Server.

5.3 system-time dst predefined

Description
The system-time dst predefined command is used to select a daylight
saving time configuration from the predefined mode. The configuration can
be used recurrently. To disable DST function, please use no system-time dst
command.
Syntax
system-time dst predefined [ USA
no system-time dst
Parameter
USA
There are 4 options which are USA, Australia, Europe and New-Zealand
respectively. The default value is Europe.
Following are the time ranges of each option:
|
Australia | Europe | New-Zealand —— The mode of daylight saving time.
|
Australia | Europe | New-Zealand ]
USA —— Second Sunday in March, 02:00 – First Sunday in November, 02:00.
Australia —— First Sunday in October, 02:00 – First Sunday in April, 03:00.
Europe —— Last Sunday in March, 01:00 – Last Sunday in October, 01:00.
New Zealand —— Last Sunday in September, 02:00 – First Sunday in April,
03:00.
36
Command Mode
Global Configuration Mode
Privilege Requirement
Only Admin and Operator level users have access to these commands.
Example
Configure the daylight saving time as USA standard:
T2500G-10TS(config)#system-time dst predefined USA

5.4 system-time dst date

Description
The system-time dst date command is used to configure the one-off
daylight saving time. The start date is in the current year by default. The time
range of the daylight saving time must shorter than one year, but you can
configure it spanning years. To disable DST function, please use no
system-time dst command.
Syntax
system-time dst date {
etime
{
no system-time dst
Parameter
smonth
showing as follows: Jan, Feb, Mar, Apr, May, Jun, Jul, Aug, Sep, Oct, Nov, Dec.
sday
you should show special attention to February and the differences between a
solar month and a lunar month.
stime
syear
smonth
} {
eyear }[offset ]
——The start month of the daylight saving time. There are 12 values
—— The start day of the daylight saving time, ranging from 1 to 31. Here
—— The start moment of the daylight saving time, HH:MM.
—— The start year of the daylight saving time.
} {
sday
} {
stime
} {
syear
} {
emonth
} {
eday
}
emonth
showing as follows: Jan, Feb, Mar, Apr, May, Jun, Jul, Aug, Sep, Oct, Nov, Dec.
eday
you should show special attention to February and the differences between a
solar month and a lunar month.
etime
eyear
—— The end month of the daylight saving time. There are 12 values
—— The end day of the daylight saving time, ranging from q to 31. Here
—— The end moment of the daylight saving time, HH:MM.
—— The end year of the daylight saving time.
37
offset
—— The number of minutes to add during the daylight saving time. It is
60 minutes by default.
Command Mode
Global Configuration Mode
Privilege Requirement
Only Admin and Operator level users have access to these commands.
Example
Configure the daylight saving time from zero clock, Apr 1st to zero clock Oct
1st and the offset is 30 minutes in 2015:
T2500G-10TS(config)# system-time dst date Apr 1 00:00 2015 Oct 1 00:00
2015 30

5.5 system-time dst recurring

Description
The system-time dst recurring command is used to configure the recurring
daylight saving time. It can be configured spanning years. To disable DST
function, please use no system-time dst command.
Syntax
system-time dst recurring {
{
emonth
no system-time dst
Parameter
sweek
showing as follows: first, second, third, fourth, last.
sday
showing as follows: Sun, Mon, Tue, Wed, Thu, Fri, Sat.
smonth
showing as follows: Jan, Feb, Mar, Apr, May, Jun, Jul, Aug, Sep, Oct, Nov, Dec.
sweek
} {
etime
} [
offset
]
——The start week of the daylight saving time. There are 5 values
—— The start day of the daylight saving time. There are 7 values
—— The start month of the daylight saving time. There are 12 values
} {
sday
} {
smonth
} {
stime
} {
eweek
} {
eday}
stime
—— The start moment of the daylight saving time, HH:MM.
eweek
showing as follows: first, second, third, fourth, last.
eday
showing as follows: Sun, Mon, Tue, Wed, Thu, Fri, Sat.
——The end week of the daylight saving time. There are 5 values
—— The end day of the daylight saving time. There are 5 values
38
emonth
showing as following: Jan, Feb, Mar, Apr, May, Jun, Jul, Aug, Sep, Oct, Nov,
Dec.
etime
offset
60 minutes by default.
—— The end month of the daylight saving time. There are 12 values
—— The end moment of the daylight saving time, HH:MM.
—— The number of minutes to add during the daylight saving time. It is
Command Mode
Global Configuration Mode
Privilege Requirement
Only Admin and Operator level users have access to these commands.
Example
Configure the daylight saving time from 2:00am, the first Sunday of May to
2:00am, the last Sunday of Oct and the offset is 45 minutes:
T2500G-10TS(config)# system-time dst recurring first Sun May 02:00 last
Sun Oct 02:00 45

5.6 hostname

Description
The hostname command is used to configure the system name. To clear the
system name information, please use no hostname command.
Syntax
hostname [
no hostname
Parameter
hostname
characters. By default, it is the device name, for example “T2500G-10TS”.
Command Mode
—— System Name. The length of the name ranges from 1 to 32
hostname
]
Global Configuration Mode
Privilege Requirement
Only Admin and Operator level users have access to these commands.
39
Example
Configure the system name as TPLINK:
T2500G-10TS(config)# hostname TPLINK

5.7 location

Description
The location command is used to configure the system location. To clear the
system location information, please use no location command.
Syntax
location [
no location
location
Parameter
location
most. It is “SHENZHEN” by default.
—— Device Location. It consists of 32 characters at
Command Mode
Global Configuration Mode
Privilege Requirement
Only Admin and Operator level users have access to these commands.
Example
Configure the system location as SHENZHEN:
T2500G-10TS(config)# location SHENZHEN
]

5.8 contact-info

Description
The contact-info command is used to configure the system contact
information. To clear the system contact information, please use no
contact-info command.
Syntax
contact-info [
no contact-info
contact_info
]
40
Parameter
contact_info
is “www.tp-link.com” by default.
Command Mode
Global Configuration Mode
Privilege Requirement
Only Admin and Operator level users have access to these commands.
Example
Configure the system contact information as www.tp-link.com:
T2500G-10TS(config)# contact-info www.tp-link.com

5.9 ip address

Description
This ip address command is used to configure the IP address and IP subnet
—— Contact Information. It consists of 32 characters at most. It
mask for the specified interface manually. The interface type includes: routed
port, port-channel interface, loopback interface and VLAN interface.
Syntax
ip address {
no ip address [
Parameter
ip-addr
mask
secondary —— Specify the interface’s secondary IP address. If this
parameter is omitted here, the configured IP address is the interface’s
primary address.
—— The IP address of the Layer 3 interface.
—— The subnet mask of the Layer 3 interface.
Command Mode
Interface Configuration Mode
ip-addr
ip-addr
} {
mask
} [ secondary ]
] [
mask
]
Privilege Requirement
Only Admin, Operator and Power User level users have access to these commands.
41
Example
Create the VLAN interface 2 with the primary IP address as 192.168.1.1/24
and secondary IP address as 192.168.2.1/24:
T2500G-10TS(config)# interface vlan 2
T2500G-10TS(config-if)# ip address 192.168.1.1 255.255.255.0
T2500G-10TS(config-if)# ip address 192.168.2.1 255.255.255.0 secondary

5.10 ip address-alloc

Description
The IP address-alloc command is used to enable the DHCP Client function or
the BOOTP Protocol. When this function is enabled, the management
interface will obtain IP from DHCP Server or BOOTP server. To disable the IP
obtaining function on the interface, please use the no ip address command.
Syntax
ip address-alloc { dhcp | bootp }
no ip address
Parameter
dhcp —— Specify the management interface to obtain IP address from the
DHCP Server.
bootp
BOOTP Server.
—— Specify the management interface to obtain IP address from the
Command Mode
Interface Configuration Mode
Privilege Requirement
Only Admin, Operator and Power User level users have access to these commands.
Example
Enter the management VLAN 1 and enable the DHCP Client function on the
management interface:
T2500G-10TS(config)# interface vlan 1
T2500G-10TS(config-if)# ip address-alloc dhcp
Disable the IP address obtaining function on the VLAN interface 1:
42
T2500G-10TS(config)# interface vlan 1
T2500G-10TS(config-if)# no ip address

5.11 reset

Description
The reset command is used to reset the switch’s software. After resetting, all
configuration of the switch will restore to the factory defaults and your
current settings will be lost.
Syntax
reset [ except-ip ]
Parameter
except-ip ——Maintain the IP address when resetting the switch.
Command Mode
Privileged EXEC Mode
Privilege Requirement
Only Admin level users have access to these commands.
Example
Reset all settings of the switch except its IP address:
T2500G-10TS# reset except-ip

5.12 service reset-disable

Description
The service reset-disable command is used to disable the reset function of
the console port or reset button. To enable the reset function, use no service
reset-disable command. By default, the reset function is enabled.
Syntax
service reset-disable
no service reset-disable
Command Mode
Global Configuration Mode
43
Privilege Requirement
Only Admin, Operator and Power User level users have access to these commands.
Example
Disable the reset function of console port or reset button:
T2500G-10TS(config)# service reset-disable

5.13 reboot

Description
The reboot command is used to reboot the Switch. To avoid damage, please
don’t turn off the device while rebooting.
Syntax
reboot
Command Mode
Privileged EXEC Mode
Privilege Requirement
Only Admin level users have access to these commands.
Example
Reboot the switch:
T2500G-10TS# reboot

5.14 reboot-schedule

Description
This reboot-schedule command is used to configure the switch to reboot at
a certain time point. To delete the reboot schedule settings, please use the
reboot-schedule cancel command.
Syntax
reboot-schedule at
reboot-schedule in
reboot-schedule cancel
time [ date
interval
] [ save_before_reboot ]
[ save_before_reboot ]
44
Parameter
time
—— Specify the time point for the switch to reboot, in the format of
hh:mm.
date
—— Specify the date for the switch to reboot, in the format of
DD:MM:YYYY. The date should be within 30 days.
save_before_reboot
interval
from 1 to 43200 minutes.
cancel —— Delete the reboot schedule settings.
—— Specify a time period after which the switch reboots. It ranges
Command Mode
Global Configuration Mode
Privilege Requirement
Only Admin level users have access to these commands.
User Guidelines
In the command reboot-schedule at
no date is specified and the time you set here is later than the time that this
command is executed, the switch will reboot later that day; otherwise the
switch will reboot at the time point the next day.
—— Save the configuration file before the switch
reboots.
time [ date
] [ save_before_reboot ], if
Example
Specify the switch to save the configuration files and reboot in 200 minutes:
T2500G-10TS(config)# reboot-schedule in 200 save_before_reboot

5.15 copy running-config startup-config

Description
The copy running-config startup-config command is used to save the
current settings.
Syntax
copy running-config startup-config
Command Mode
Privileged EXEC Mode
Privilege Requirement
Only Admin and Operator level users have access to these commands.
45
Example
Save current settings:
T2500G-10TS# copy running-config startup-config

5.16 copy startup-config tftp

Description
The copy startup-config tftp command is used to back up the configuration
file to TFTP server.
Syntax
copy startup-config tftp ip-address
Parameter
ip-addr
supported, for example 192.168.0.1 or fe80::1234.
name
—— IP Address of the TFTP server. Both IPv4 and IPv6 addresses are
—— Specify the name for the configuration file which would be backup.
Command Mode
Privileged EXEC Mode
Privilege Requirement
Only Admin and Operator level users have access to these commands.
Example
Backup the configuration files to TFTP server with the IP 192.168.0.148 and
name this file config.cfg:
T2500G-10TS# copy startup-config tftp ip-address 192.168.0.148 filename
config
ip-addr
filename
name
Backup the configuration files to TFTP server with the IP fe80::1234 and name
this file config.cfg:
T2500G-10TS# copy startup-config tftp ip-address fe80::1234 filename
config

5.17 copy tftp startup-config

Description
The copy tftp startup-config command is used to download the
configuration file to the switch from TFTP server.
46
Syntax
copy tftp startup-config ip-address
Parameter
ip-addr
supported, for example 192.168.0.1 or fe80::1234.
name
downloaded.
—— IP Address of the TFTP server. Both IPv4 and IPv6 addresses are
—— Specify the name for the configuration file which would be
Command Mode
Privileged EXEC Mode
Privilege Requirement
Only Admin level users have access to these commands.
Example
Download the configuration file named as config.cfg to the switch from TFTP
server with the IP 192.168.0.148:
T2500G-10TS# copy tftp startup-config ip-address 192.168.0.148 filename
ip-addr
filename
name
config
Download the configuration file named as config.cfg to the switch from TFTP
server with the IP fe80::1234
T2500G-10TS# copy tftp startup-config ip-address fe80::1234 filename
config

5.18 copy backup-config tftp

Description
The copy backup-config tftp command is used to export the backup
configuration file of the switch to TFTP server.
Syntax
copy backup-config tftp ip-address
Parameter
ip-addr
filename
name
ip-addr
supported, for example 192.168.0.1 or fe80::1234.
name
—— IP Address of the TFTP server. Both IPv4 and IPv6 addresses are
—— Specify the name for the configuration file which would be exported.
47
Command Mode
Privileged EXEC Mode
Privilege Requirement
Only Admin level users have access to these commands.
Example
Export the backup configuration file of the switch to the TFTP server with the
IP 192.168.0.148 and name the file config.cfg:
T2500G-10TS# copy backup-config tftp ip-address 192.168.0.148 filename
config

5.19 copy backup-config startup-config

Description
The copy backup-config startup-config command is used to replace the
startup configuration file using the backup configuration file.
Syntax
copy backup-config startup-config
Command Mode
Privileged EXEC Mode
Privilege Requirement
Only Admin level users have access to these commands.
Example
Replace the startup configuration file using the backup configuration file.:
T2500G-10TS# copy backup-config startup-config

5.20 copy running-config backup-config

Description
The copy running-config backup-config tftp command is used to save the
current running configuration as the backup configuration file.
Syntax
copy running-config backup-config
48
Command Mode
Privileged EXEC Mode
Privilege Requirement
Only Admin level users have access to these commands.
Example
Save the current running configuration as the backup configuration file.
T2500G-10TS# copy running-config backup-config

5.21 copy tftp backup-config

Description
The copy tftp backup-config command is used to download the backup
configuration file from a TFTP server.
Syntax
Copy tftp backup-config ip-address
Parameter
ip-addr
supported, for example 192.168.0.1 or fe80::1234.
name
downloaded.
—— IP Address of the TFTP server. Both IPv4 and IPv6 addresses are
—— Specify the name for the configuration file which would be
Command Mode
Privileged EXEC Mode
Privilege Requirement
Only Admin level users have access to these commands.
Example
Download the configuration file named config.cfg from the TFTP server with
the IP 192.168.0.148:
ip-addr
filename
name
T2500G-10TS# copy tftp backup-config ip-address 192.168.0.148 filename
config
49

5.22 boot application

Description
The boot application command is used to configure the image file as startup
image or backup image.
Syntax
boot application filename { image1 | image 2 } { startup | backup }
no boot application
Parameter
image1 | image2 —— Specify the image file to be configured. By default, the
image1.bin is the startup image and the image2.bin is the backup image.
startup | backup —— Specify the property of the image, either startup image
or backup image.
Command Mode
Global Configuration Mode
Privilege Requirement
Only Admin level users have access to these commands.
Example
Configure the image2.bin as the startup image:
T2500G-10TS(config)# boot application filename image2 startup

5.23 boot config

Description
The boot config command is used to configure the configuration file as
startup configuration or backup configuration.
Syntax
boot config filename { config1 | config 2 } { startup | backup }
no boot application
50
Parameter
config1 | config2 —— Specify the configuration file to be configured. By
default, the config1.cfg is the startup image and the config2.cfg is the backup
image.
startup | backup—— Specify the property of the configuration.
Command Mode
Global Configuration Mode
Privilege Requirement
Only Admin level users have access to these commands.
Example
Configure the config2.cfg as the startup image:
T2500G-10TS(config)# boot config filename config2 startup

5.24 remove backup-image

Description
The remove backup-image command is used to delete the backup-image.
Syntax
remove backup-image
Command Mode
Privileged EXEC Mode
Privilege Requirement
Only Admin level users have access to these commands.
Example
Delete the backup image file:
T2500G-10TS# remove backup-image
51

5.25 firmware upgrade

Description
The firmware upgrade command is used to upgrade the switch’s backup
iamge file via the TFTP server. The uploaded firmware file will take place of
the Backup Image, and user can choose whether to reboot the switch will the
Backup Image.
Syntax
firmware upgrade ip-address
Parameter
ip-addr
supported, for example 192.168.0.1 or fe80::1234.
name
—— IP Address of the TFTP server. Both IPv4 and IPv6 addresses are
—— Specify the name for the firmware file.
Command Mode
Privileged EXEC Mode
Privilege Requirement
Only Admin level users have access to these commands.
Example
Upgrade the switch’s backup iamge file with the file firmware.bin in the TFTP
server with the IP address 192.168.0.148, and reboot the switch with this
firmware:
T2500G-10TS# firmware upgrade ip-address 192.168.0.148 filename
ip-addr
filename
name
firmware.bin
It will only upgrade the backup image. Continue? (Y/N):y
Operation OK!
Reboot with the backup image? (Y/N): y
Upgrade the switch’s backup iamge file with the file firmware.bin in the TFTP
server with the IP address fe80::1234, but do not reboot the switch:
T2500G-10TS# firmware upgrade ip-address fe80::1234 filename
firmware.bin
It will only upgrade the backup image. Continue? (Y/N):y
Operation OK!
Reboot with the backup image? (Y/N): n
52

5.26 boot autoinstall start

Description
The boot autoinstall start command is used to start Auto Install function. To
stop the Auto Install function, use no boot autoinstall start.
Syntax
boot autoinstall start
no boot autoinstall start
Command Mode
Global Configuration Mode
Privilege Requirement
Only Admin level users have access to these commands.
Example
Start Auto Install function:
T2500G-10TS(config)# boot autoinstall start

5.27 boot autoinstall persistent-mode

Description
The boot autoinstall persistent-mode command is used to start Auto Install
function to next reboot cycle. To disable persistent mode, use no boot
autoinstall persistent-mode.
Syntax
boot autoinstall persistent-mode
no boot autoinstall persistent-mode
Command Mode
Global Configuration Mode
Privilege Requirement
Only Admin level users have access to these commands.
Example
Start Auto Install function:
T2500G-10TS(config)# boot autoinstall persistent-mode
53

5.28 boot autoinstall auto-save

Description
The boot autoinstall auto-save command is used to automatically save the
new configuration file that was downloaded by Auto Install function to
start-up configuration file Auto Install. To disable auto-save configuration
feature use no boot autoinstall auto-save.
Syntax
boot autoinstall auto-save
no boot autoinstall auto-save
Command Mode
Global Configuration Mode
Privilege Requirement
Only Admin level users have access to these commands.
Example
Configure Auto Install function to auto-save new configuration file to start-up
configuration file:
T2500G-10TS(config)# boot autoinstall auto-save

5.29 boot autoinstall auto-reboot

Description
The boot autoinstall auto-reboot command is used to automatically reboot
the switch after Auto Install function is completed successfully. To disable
auto-reboot feature use no boot autoinstall auto-reboot.
Syntax
boot autoinstall auto-reboot
no boot autoinstall auto-reboot
Command Mode
Global Configuration Mode
Privilege Requirement
Only Admin level users have access to these commands.
Example
Configure the switch to auto reboot after Auto Install function completed
successfully:
54
T2500G-10TS(config)# boot autoinstall auto-reboot

5.30 boot autoinstall retry-count

Description
The boot autoinstall retry-count command is used to configure retry count
when Auto Install function uses TFTP to download configuration files in a
cycle of Auto Install process. To set retry count to default value use no boot
autoinstall retry-count.
Syntax
boot autoinstall retry-count
no boot autoinstall retry-count
count
Parameter
count
—— The count of retrying auto install. The value ranges from 1 to 3.
Command Mode
Global Configuration Mode
Privilege Requirement
Only Admin level users have access to these commands.
Example
Configure TFTP retry 2 times when download files failed:
T2500G-10TS(config)# boot autoinstall retry-count 2

5.31 show boot autoinstall

Description
The show boot autoinstall command is used to display the configuration of
Auto Install function.
Syntax
show boot autoinstall
Command Mode
Privileged EXEC Mode and Any Configuration Mode
Privilege Requirement
None.
55
Example
Display the configuration of Auto Install function:
T2500G-10TS# show boot autoinstall

5.32 show boot autoinstall downloaded-config

Description
The show boot autoinstall downloaded-config command is used to display
the configuration file which downloaded by Auto Install.
Syntax
show boot autoinstall downloaded-config
Command Mode
Privileged EXEC Mode and Any Configuration Mode
Privilege Requirement
None.
Example
Display the configuration file which downloaded by Auto Install:
T2500G-10TS# show boot autoinstall downloaded-config

5.33 ping

Description
The ping command is used to test the connectivity between the switch and
one node of the network.
Syntax
ping [ ip | ipv6 ] {
Parameter
ip_addr
} [ -n
count
] [ -l
size
] [ -i
interval
]
ip
—— The type of the IP address for ping test should be IPv4.
ipv6
—— The type of the IP address for ping test should be IPv6.
ip_addr
parameter ip/ipv6 is not selected, both IPv4 and IPv6 addresses are
supported, for example 192.168.0.100 or fe80::1234.
-n
ranges from 1 to 10. By default, this value is 4.
—— The IP address of the destination node for ping test. If the
count
—— The amount of times to send test data during Ping testing. It
56
size
—— The size of the sending data during ping testing. It ranges from 1 to
-l
1500 bytes. By default, this value is 64.
-i
interval
to 1000 milliseconds. By default, this value is 1000.
—— The interval to send ICMP request packets. It ranges from 100
Command Mode
Privileged EXEC Mode
Privilege Requirement
None.
Example
To test the connectivity between the switch and the network device with the
IP 192.168.0.131, please specify the
1000 milliseconds. If there is not any response after 8 times’ Ping test, the
connection between the switch and the network device is failed to establish:
T2500G-10TS# ping 192.168.0.131 –n 8 –l 512
To test the connectivity between the switch and the network device with the
IP fe80::1234, please specify the
milliseconds. If there is not any response after 8 times’ Ping test, the
connection between the switch and the network device is failed to establish:
T2500G-10TS# ping fe80::1234 –n 8 –l 512

5.34 tracert

Description
The tracert command is used to test the connectivity of the gateways during
its journey from the source to destination of the test data.
count
(-l) as 512 bytes and
count
(-l) as 512 bytes and
count
count
(-i) as
(-i) as 1000
Syntax
tracert [ ip | ipv6 ]
Parameter
ip —— The type of the IP address for tracert test should be IPv4.
ipv6 —— The type of the IP address for tracert test should be IPv6.
ip_addr
is not selected, both IPv4 and IPv6 addresses are supported, for example
192.168.0.100 or fe80::1234.
maxHops
though. It ranges from 1 to 30. By default, this value is 4.
—— The IP address of the destination device. If the parameter ip/ipv6
—— The maximum number of the route hops the test data can pass
ip_addr [ maxHops
57
]
Command Mode
Privileged EXEC Mode
Privilege Requirement
Only Admin, Operator and Power User level users have access to these commands.
Example
Test the connectivity between the switch and the network device with the IP
192.168.0.131. If the destination device has not been found after 20
maxHops,
failed to establish:
T2500G-10TS# tracert 192.168.0.131 20
Test the connectivity between the switch and the network device with the IP
fe80::1234. If the destination device has not been found after 20
the connection between the switch and the destination device is failed to
establish:
T2500G-10TS# tracert fe80::1234 20
the connection between the switch and the destination device is

5.35 show system-info

Description
The show system-info command is used to display System Description,
Device Name, Device Location, System Contact, Hardware Version, Firmware
Version, System Time, Run Time and so on.
maxHops,
Syntax
show system-info
Command Mode
Privileged EXEC Mode and Any Configuration Mode
Privilege Requirement
None.
Example
Display the system information:
T2500G-10TS# show system-info
58

5.36 show image-info

Description
The show image-info command is used to display the information of image
files in the system.
Syntax
show image-info
Command Mode
Privileged EXEC Mode and Any Configuration Mode
Privilege Requirement
Only Admin level users have access to these commands.
Example
Display the system image files’ information:
T2500G-10TS# show image-info

5.37 show boot

Description
The show boot command is used to display the boot configuration of the
system.
Syntax
show boot
Command Mode
Privileged EXEC Mode and Any Configuration Mode
Privilege Requirement
Only Admin level users have access to these commands.
Example
Display the system boot configuration information:
T2500G-10TS# show boot
59

5.38 show running-config

Description
The show running-config command is used to display the current operating
configuration of the system or of a specified port.
Syntax
show running-config
Command Mode
Privileged EXEC Mode and Any Configuration Mode
Privilege Requirement
Only Admin level users have access to these commands.
Example
Display the system current operating configuration:
T2500G-10TS# show running-config

5.39 show startup-config

Description
The show startup-config command is used to display the current
configuration saved in the switch. These configuration settings will not be lost
the next time you reboot the switch.
Syntax
show startup-config
Command Mode
Privileged EXEC Mode and Any Configuration Mode
Privilege Requirement
Only Admin level users have access to these commands.
Example
Display the saved configuration:
T2500G-10TS# show startup-config
60

5.40 show system-time

Description
The show system-time command is used to display the time information of
the switch.
Syntax
show system-time
Command Mode
Privileged EXEC Mode and Any Configuration Mode
Privilege Requirement
None.
Example
Display the time information of the switch
T2500G-10TS# show system-time

5.41 show system-time dst

Description
The show system-time dst command is used to display the DST information
of the switch.
Syntax
show system-time dst
Command Mode
Privileged EXEC Mode and Any Configuration Mode
Privilege Requirement
None.
Example
Display the DST information of the switch
T2500G-10TS# show system-time dst
61

5.42 show system-time ntp

Description
The show system-time ntp command is used to display the NTP mode
configuration information.
Syntax
show system-time ntp
Command Mode
Privileged EXEC Mode and Any Configuration Mode
Privilege Requirement
None.
Example
Display the NTP mode configuration information of the switch:
T2500G-10TS# show system-time ntp

5.43 show cable-diagnostics interface

Description
The show cable-diagnostics interface command is used to display the cable
diagnostics of the connected Ethernet Port., which facilitates you to check
the connection status of the cable connected to the switch, locate and
diagnose the trouble spot of the network.
Syntax
show cable-diagnostics interface { fastEthernet
| ten-gigabitEthernet
Parameter
port
—— The number of the port which is selected for Cable test.
Command Mode
port
}
port
| gigabitEthernet
port
Privileged EXEC Mode and Any Configuration Mode
Privilege Requirement
None.
Example
Show the cable-diagnostics of port 3:
62
T2500G-10TS# show cable-diagnostics interface gigabitEthernet 1/0/3

5.44 show cpu-utilization

Description
The show cpu-utilization command is used to display the system’s CPU
utilization in the last 5 seconds/1minute/5minutes.
Syntax
show cpu-utilization
Command Mode
Privileged EXEC Mode and Any Configuration Mode
Privilege Requirement
None.
Example
Display the CPU utilization information of the switch:
T2500G-10TS# show cpu-utilization

5.45 show memory-utilization

Description
The show memory-utilization command is used to display the current
system’s memory utilization in the last 5 seconds/1minute/5minutes.
Syntax
show memory-utilization
Command Mode
Privileged EXEC Mode and Any Configuration Mode
Privilege Requirement
None.
Example
Display the memory utilization information of the switch:
T2500G-10TS# show memory-utilization
63

Chapter 6 EEE Configuration Commands

EEE (Energy Efficient Ethernet) is used to save power consumption of the switch during periods
of low data activity. You can simply enable this feature on ports to allow power reduction.

6.1 eee

Description
The eee command is used to enable EEE on the port. To disable EEE on the
port, please use no eee command.
Syntax
eee
no eee
Command Mode
Interface Configuration Mode
Privilege Requirement
Only Admin, Operator and Power User level users have access to these commands.
Example
Enable EEE on port 1/0/1:
T2500G-10TS(config)#interface gigabitEthernet 1/0/1
T2500G-10TS(config-if)#eee

6.2 show interface eee

Description
The show interface eee command is used to display the EEE configuration
on each port.
Syntax
show interface eee [ fastEthernet
Command Mode
Privileged EXEC Mode and Any Configuration Mode
64
port
| gigabitEthernet
port
]
Privilege Requirement
None.
Example
Display the EEE configuration of each port
T2500G-10TS# show interface eee
65

Chapter 7 SDM Template Commands

This chapter describes how to configure the Switch Database Management (SDM) templates to
allocate hardware resources on the switch for different uses.

7.1 sdm prefer

Description
The sdm prefer command is used to configure the SDM template. The SDM
template is used to allocate system resources to best support the features
being used in your application. To return to use the default template, please
use the sdm prefer default command. The template change will take effect
after a reboot.
Syntax
sdm prefer { default | enterpriseV4 | enterpriseV6 }
Parameter
default —— Specify the SDM template used in the switch as “default”.
enterpriseV4
“enterpriseV4”.
enterpriseV6
“enterpriseV6”.
—— Specify the SDM template used in the switch as
—— Specify the SDM template used in the switch as
Command Mode
Global Configuration Mode
Privilege Requirement
Only Admin level users have access to these commands.
Example
Specify the SDM template as enterpriseV4:
T2500G-10TS(config)# sdm prefer enterpriseV4
66

7.2 show sdm prefer

Description
The show sdm prefer command is used to display resource allocation of the
current SDM template in use, or the SDM templates that can be used.
Syntax
show sdm prefer { used | default | enterpriseV4 | enterpriseV6 }
Parameter
used —— Display the resource allocation of the template currently in use, and
the template that will become active after a reboot.
default
enterpriseV4
template. enterpriseV6
enterpriseV6 template.
—— Display the resource allocation of the default template.
—— Display the resource allocation of the enterpriseV4
Command Mode
Privileged EXEC Mode and Any Configuration Mode
Privilege Requirement
Only Admin level users have access to these commands.
Example
Display the resource allocation of the template currently in use, and the
—— Display the resource allocation of the
template that will become active after a reboot:
T2500G-10TS(config)#show sdm prefer used
67

Chapter 8 Time Range Commands

With this feature, you can configure a time range and bind it to an ACL rule.

8.1 time-range

Description
The time-range command is used to create time-range entry for the switch
and enter Time-range Create Configuration Mode. After a time-range entry is
created, you need to specify the date and time. A time-range can implement
multiple time-ranges simultaneously as long as they do not conflict with each
other. To delete the corresponding time-range configuration, please use no
time-range command.
Syntax
time-range
no time-range
Command Mode
Global Configuration Mode
Parameter
name
—— The time-range name, ranging from 1 to 16 characters.
Privilege Requirement
Only Admin, Operator and Power User level users have access to these commands.
Example
Create a time-range named “tRange1” for the switch:
T2500G-10TS(config)# time-range tRange1

8.2 absolute

name
name
Description
The absolute command is used to create an absolute time-range for the
time-range of the switch. To delete the corresponding absolute time-range
configuration, please use no absolute command.
68
Syntax
absolute from
no absolute [
start-date
index
Parameter
start-date
MM/DD/YYYY.
end-date
MM/DD/YYYY.
—— The start date in Absoluteness Mode, in the format of
—— The end date in Absoluteness Mode, in the format of
Command Mode
Time-range Create Configuration Mode
Privilege Requirement
Only Admin, Operator and Power User level users have access to these commands.
Example
Create an absolute time-range for the switch and specify the date extending
from May 5th, 2017 through Oct. 5th, 2017:
to
end-date
]
T2500G-10TS(config)#time-range tRange1
T2500G-10TS(config-time-range)#absolute from 05/05/2017 to
10/05/2017

8.3 periodic

Description
The periodic command is used to create a periodic mode time-range for the
time-range of the switch. To delete the corresponding periodic mode
time-range configuration, please use no periodic command.
Syntax
periodic start
no periodic [
Parameter
start-time
index
]
end
end-time
day-of-the-week
week-day
start-time
end-time
week-day
numbers 1-7 respectively represent Monday, Tuesday, Wednesday,
Thursday, Friday, Saturday and Sunday.
——Specify the start time in the format of HH:MM
——Specify the end time in the format of HH:MM
——Specify the days of a week in the format of 1-3, 7. The
69
Command Mode
Time-range Create Configuration Mode
Privilege Requirement
Only Admin, Operator and Power User level users have access to these commands.
Example
Configure the time-range named “tRange2” as a periodic time-range and
specify the date and time as 8:30 to 12:00 on weekends:
T2500G-10TS(config)#time-range tRange2
T2500G-10TS(config -time-range)#periodic start 08:30 end 12:00
day-of-the-week 6-7

8.4 holiday (time-range mode)

Description
The holiday command is used to create holiday mode time-range for the
time-range of the switch. When the holiday which is excluded from
time-range occurs, the switch will not supply power.
Syntax
holiday { exclude | include }
Parameter
exclude
include
——The time range will not take effect on holiday.
—— The time range will take effect on holiday.
Command Mode
Time-range Create Configuration Mode
Privilege Requirement
Only Admin, Operator and Power User level users have access to these commands.
Example
Create a time-range entry named “tRange3” and configure time-range to
exclude the holiday:
T2500G-10TS(config)#time-range tRange3
T2500G-10TS(config-time-range)#holiday exclude
70

8.5 holiday

Description
The holiday command is used to create holiday for the switch. To delete the
corresponding holiday configuration, please use no holiday command.
Syntax
holiday
no holiday
name
name
start-date
Parameter
name
—— The holiday name, ranging from 1 to 16 characters.
start-date
instance, 05/01.
end-date
instance, 05/01.
—— The start date of the holiday, in the format of MM/DD, for
——The end date of the holiday, in the format of MM/DD, for
Command Mode
Global Configuration Mode
Privilege Requirement
Only Admin, Operator and Power User level users have access to these commands.
Example
start-date
end-date
end-date
Create a holiday named “holiday1” and configure the start date as October
1st and the end date as October 3rd:
T2500G-10TS(config)# holiday holiday1 start-date 10/01 end-date 10/03

8.6 show holiday

Description
The show holiday command is used to display the defined holiday.
Syntax
show holiday
Command Mode
Privileged EXEC Mode and Any Configuration Mode
Privilege Requirement
None.
71
Example
Display the defined holiday:
T2500G-10TS# show holiday

8.7 show time-range

Description
The show time-range command is used to display the defined time-range.
Syntax
show time-range [
Parameter
time-range-name
characters.
Command Mode
Privileged EXEC Mode and Any Configuration Mode
Privilege Requirement
None.
Example
Display the defined time-range:
T2500G-10TS# show time-range
time-range-name
—— The time-range name, ranging from 1 to 16
]
72

Chapter 9 Port Configuration Commands

Port Configuration Commands can be used to configure the Bandwidth Control, Negotiation
Mode and Storm Control for Ethernet ports.

9.1 interface gigabitEthernet

Description
The interface gigabitEthernet command is used to enter the Interface
gigabitEthernet Configuration Mode and configure the corresponding Gigabit
Ethernet port.
Syntax
interface gigabitEthernet
Parameter
port
—— The Ethernet port number.
Command Mode
Global Configuration Mode
Privilege Requirement
Only Admin, Operator and Power User level users have access to these commands.
Example
To enter the Interface gigabitEthernet Configuration Mode and configure port
2:
T2500G-10TS(config)# interface gigabitEthernet 1/0/2
port

9.2 interface range gigabitEthernet

Description
The interface range gigabitEthernet command is used to enter the interface
range gigabitEthernet Configuration Mode and configure multiple Gigabit
Ethernet ports at the same time.
73
Syntax
interface range gigabitEthernet
Parameter
port-list
—— The list of Ethernet ports.
Command Mode
Global Configuration Mode
Privilege Requirement
Only Admin, Operator and Power User level users have access to these commands.
User Guidelines
Command in the Interface Range gigabitEthernet Mode is executed
independently on all ports in the range. It does not affect the execution on the
other ports at all if the command results in an error on one port.
Example
port-list
To enter the Interface range gigabitEthernet Configuration Mode, and
configure ports 1, 2, 3, 6, 7 and 9 at the same time by adding them to one
port-list:
T2500G-10TS(config)# interface range gigabitEthernet
1/0/1-3,1/0/6-7,1/0/9

9.3 description

Description
The description command is used to add a description to the Ethernet port.
To clear the description of the corresponding port, please use no
description command.
Syntax
description
string
no description
Parameter
string
—— Content of a port description, ranging from 1 to 16 characters.
74
Command Mode
Interface Configuration Mode (interface fastEthernet / interface range
fastEthernet / interface fastEthernet / interface range fastEthernet /interface
gigabitEthernet / interface range gigabitEthernet / interface port-channel /
interface range port-channel)
Privilege Requirement
Only Admin, Operator and Power User level users have access to these commands.
Example
Add a description Port_5 to port 1/0/5:
T2500G-10TS(config)# interface gigabitEthernet 1/0/5
T2500G-10TS(config-if)# description Port_5

9.4 shutdown

Description
The shutdown command is used to disable an Ethernet port. To enable this
port again, please use no shutdown command.
Syntax
shutdown
no shutdown
Command Mode
Interface Configuration Mode (interface fastEthernet / interface range
fastEthernet / interface fastEthernet / interface range fastEthernet /interface
gigabitEthernet / interface range gigabitEthernet / interface port-channel /
interface range port-channel)
Privilege Requirement
Only Admin, Operator and Power User level users have access to these commands.
Example
Disable port 1/0/3:
T2500G-10TS(config)# interface gigabitEthernet 1/0/3
T2500G-10TS(config-if)# shutdown
75

9.5 flow-control

Description
The flow-control command is used to enable the flow-control function for a
port. To disable the flow-control function for this corresponding port, please
use no flow-control command. With the flow-control function enabled, the
Ingress Rate and Egress Rate can be synchronized to avoid packet loss in the
network.
Syntax
flow-control
no flow-control
Command Mode
Interface Configuration Mode (interface fastEthernet / interface range
fastEthernet / interface fastEthernet / interface range fastEthernet /interface
gigabitEthernet / interface range gigabitEthernet / interface port-channel /
interface range port-channel)
Privilege Requirement
Only Admin and Operator level users have access to these commands.
Example
Enable the flow-control function for port 1/0/3:
T2500G-10TS(config)# interface gigabitEthernet 1/0/3
T2500G-10TS(config-if)# flow-control

9.6 duplex

Description
The duplex command is used to configure the Duplex Mode for an Ethernet
port. To return to the default configuration, please use no duplex command.
Syntax
duplex { auto | full | half }
no duplex
76
Parameter
auto | full | half —— The duplex mode of the Ethernet port. There are three
options: auto-negotiation mode, full-duplex mode and half-duplex mode. By
default, the Gigabit Ethernet port is auto-negotiation mode.
Command Mode
Interface Configuration Mode (interface fastEthernet / interface range
fastEthernet / interface fastEthernet / interface range fastEthernet /interface
gigabitEthernet / interface range gigabitEthernet / interface port-channel /
interface range port-channel)
Privilege Requirement
Only Admin and Operator level users have access to these commands.
Example
Configure the Duplex Mode as full-duplex for port 1/0/3:
T2500G-10TS(config)# interface gigabitEthernet 1/0/3
T2500G-10TS(config-if)# duplex full

9.7 jumbo-size

Description
The jumbo-size command is used to specify the size of jumbo frames.
Syntax
jumbo-size
Parameter
size
—— The value of jumbo frames. It ranges from 1518 to 9216 bytes, and
the default is 1518 bytes.
Command Mode
Global Configuration Mode
size
Privilege Requirement
Only Admin, Operator and Power User level users have access to these commands.
Example
Globally configure the size of jumbo frames as 9216:
T2500G-10TS(config)# jumbo-size 9216
77
Loading...