1.4.1 Format Conventions .............................................................................................................. 18
1.4.2 Special Characters ................................................................................................................ 19
1.4.3 Parameter Format .................................................................................................................. 19
Chapter 2 Line Commands ............................................................................................. 20
2.1 line ......................................................................................................................................................... 20
3.7 end ........................................................................................................................................................ 26
3.9 history .................................................................................................................................................. 27
3.10 history clear ....................................................................................................................................... 27
Chapter 4 User Management Commands .................................................................. 29
4.1 user name (password) ................................................................................................................... 29
4.2 user name (secret) .......................................................................................................................... 30
4.3 service password-recovery ........................................................................................................ 31
4.4 show user account-list .................................................................................................................. 32
4.5 show user configuration ............................................................................................................... 33
II
Chapter 5 System Configuration Commands ........................................................... 34
5.9 ip address ........................................................................................................................................... 41
5.10 ip address-alloc ................................................................................................................................ 42
5.35 show system-info ............................................................................................................................ 58
5.36 show image-info .............................................................................................................................. 59
III
5.37 show boot ........................................................................................................................................... 59
5.38 show running-config ...................................................................................................................... 60
5.39 show startup-config ....................................................................................................................... 60
5.40 show system-time ........................................................................................................................... 61
5.41 show system-time dst ................................................................................................................... 61
5.42 show system-time ntp ................................................................................................................... 62
5.43 show cable-diagnostics interface ............................................................................................ 62
5.44 show cpu-utilization........................................................................................................................ 63
5.45 show memory-utilization .............................................................................................................. 63
8.6 show holiday ...................................................................................................................................... 71
8.7 show time-range .............................................................................................................................. 72
Chapter 9 Port Configuration Commands ................................................................. 73
9.11 show fiber-ports .............................................................................................................................. 80
IV
78
9.12 show interface status .................................................................................................................... 80
9.13 show interface counters ............................................................................................................... 81
9.14 show interface configuration ...................................................................................................... 81
Chapter 10 Port Isolation Commands ........................................................................... 83
10.1 port isolation ..................................................................................................................................... 83
10.2 show port isolation interface ...................................................................................................... 84
13.5 show etherchannel ...................................................................................................................... 102
13.6 show etherchannel load-balance ........................................................................................... 103
13.7 show lacp ......................................................................................................................................... 104
13.8 show lacp sys-
id ........................................................................................................................... 104
V
Chapter 14 MAC Address Commands ........................................................................ 106
14.1 mac address-table static .......................................................................................................... 106
14.2 no mac address-table dynamic .............................................................................................. 107
14.3 mac address-table aging-time ................................................................................................ 107
14.4 mac address-table filtering ...................................................................................................... 108
14.5 mac address-table notification ............................................................................................... 109
14.6 mac address-table max-mac-count ..................................................................................... 109
14.7 mac address-table notification (interface) ......................................................................... 111
14.8 mac address-table security ..................................................................................................... 112
14.9 mac address-table vlan-security ........................................................................................... 113
14.10 show mac address-table ........................................................................................................... 114
14.11 clear mac address-table ............................................................................................................ 114
14.12 show mac address-table aging-time .................................................................................... 115
14.13 show mac address-table max-mac-count ......................................................................... 115
14.14 show mac address-table interface ........................................................................................ 116
14.15 show mac address-table count .............................................................................................. 117
14.16 show mac address-table address ......................................................................................... 117
14.17 show mac address-table vlan .................................................................................................. 118
14.18 show mac address-table notification ................................................................................... 118
14.19 show mac address-table vlan-security ............................................................................... 119
15.2 name .................................................................................................................................................. 121
15.9 show vlan summary ..................................................................................................................... 125
15.10 show vlan brief ............................................................................................................................... 126
15.11 show vlan ......................................................................................................................................... 126
15.12 show interface switchport ........................................................................................................ 127
20.20 range ................................................................................................................................................. 162
20.21 ip igmp filter .................................................................................................................................... 162
20.22 clear ip igmp snooping statistics ........................................................................................... 163
20.23 show ip igmp snooping .............................................................................................................. 163
20.24 show ip igmp snooping interface ........................................................................................... 164
20.25 show ip igmp snooping vlan ..................................................................................................... 165
20.26 show ip igmp snooping groups ............................................................................................... 165
20.27 show ip igmp profile .................................................................................................................... 166
range ................................................................................................................................................. 180
22.2 mvr group ........................................................................................................................................ 186
22.7 mvr type ........................................................................................................................................... 190
22.10 show mvr .......................................................................................................................................... 192
22.11 show mvr interface ...................................................................................................................... 193
22.12 show mvr members ..................................................................................................................... 193
23.8 name .................................................................................................................................................. 200
24.14 show lldp .......................................................................................................................................... 224
24.15 show lldp interface ....................................................................................................................... 225
24.16 show lldp local-information interface ................................................................................... 225
24.17 show lldp neighbor-information interface .......................................................................... 226
24.18 show lldp traffic interface .......................................................................................................... 226
27.1 ip routing .......................................................................................................................................... 237
27.9 ip route .............................................................................................................................................. 242
27.12 show interface vlan ...................................................................................................................... 244
27.13 show ip interface .......................................................................................................................... 244
27.14 show ip interface brief ................................................................................................................ 245
27.15 show ip route .................................................................................................................................. 245
27.16 show ip route specify .................................................................................................................. 246
27.17 show ip route summary .............................................................................................................. 247
27.18 show ipv6 interface ..................................................................................................................... 247
27.19 show ipv6 route ............................................................................................................................. 248
27.20 show ipv6 route summary ......................................................................................................... 248
29.9 ip proxy-arp .................................................................................................................................... 261
29.10 ip local-proxy-arp ......................................................................................................................... 261
29.11 show arp ........................................................................................................................................... 262
29.12 show ip arp (interface) ................................................................................................................ 263
29.13 show ip arp summary .................................................................................................................. 263
29.14 show gratuitous-arp .................................................................................................................... 264
29.15 show ip proxy-arp ......................................................................................................................... 264
Chapter 30 DHCP Server Commands ......................................................................... 266
30.1 service dhcp server ..................................................................................................................... 266
30.2 ip dhcp server extend-option capwap-ac-ip ..................................................................... 266
30.3 ip dhcp server extend-option vendor-class-id ................................................................. 267
30.4 ip dhcp server exclude-address ............................................................................................. 268
30.5 ip dhcp server pool ...................................................................................................................... 269
30.6 ip dhcp server ping timeout ..................................................................................................... 269
30.7 ip dhcp server ping packets ..................................................................................................... 270
Chapter 37 Access Control Commands .................................................................... 325
37.1 user access-control ip-based enable .................................................................................. 325
37.2 user access-control ip-based ................................................................................................. 325
37.3 user access-control mac-based enable ............................................................................. 326
37.4 user access-control mac-based ............................................................................................ 327
37.5 user access-control port-based enable ............................................................................. 328
37.6 user access-control port-based ............................................................................................ 328
Chapter 38 HTTP and HTTPS Commands ................................................................. 330
38.1 ip http server .................................................................................................................................. 330
38.2 ip http port ....................................................................................................................................... 331
38.3 ip http max-users .......................................................................................................................... 331
38.4 ip http session timeout ............................................................................................................... 332
38.5 ip http secure-server .................................................................................................................. 333
38.6 ip http secure-port ....................................................................................................................... 333
38.7 ip http secure-protocol .............................................................................................................. 334
38.8 ip http secure-ciphersuite ........................................................................................................ 335
38.9 ip http secure-max-users .......................................................................................................... 336
38.10 ip http secure-session timeout ............................................................................................... 337
38.11 ip http secure-server download certificate ....................................................................... 337
38.12 ip http secure-server download key ..................................................................................... 338
38.13 show ip http configuration ........................................................................................................ 339
38.14 show ip http secure-server ...................................................................................................... 340
39.1 ip ssh server ................................................................................................................................... 341
39.2 ip ssh port ........................................................................................................................................ 341
39.3 ip ssh version ................................................................................................................................. 342
39.4 ip ssh algorithm ............................................................................................................................. 343
39.5 ip ssh timeout ................................................................................................................................. 343
39.6 ip ssh max-client ........................................................................................................................... 344
39.7 ip ssh download ............................................................................................................................ 345
40.3 telnet port ........................................................................................................................................ 348
40.4 show telnet-status ....................................................................................................................... 348
Chapter 41 Serial Port Commands .............................................................................. 350
42.4 show radius-server ...................................................................................................................... 354
42.5 aaa group ......................................................................................................................................... 355
42.6 server ................................................................................................................................................ 356
42.7 show aaa group ............................................................................................................................. 356
42.12 show aaa authentication ............................................................................................................ 360
42.13 show aaa accounting .................................................................................................................. 361
42.14 line telnet ......................................................................................................................................... 361
42.16 line ssh .............................................................................................................................................. 363
42.18 line console ..................................................................................................................................... 364
42.23 ip http login authentication ....................................................................................................... 367
42.24 ip http enable authentication ................................................................................................... 368
42.25 show aaa global ............................................................................................................................. 369
43.6 dot1x mab ....................................................................................................................................... 377
46.3 access-list mac ............................................................................................................................. 394
46.4 access-list ip .................................................................................................................................. 396
52.5 ipv6 dhcp filter server permit-entry ...................................................................................... 440
52.6 show ipv6 dhcp filter ................................................................................................................... 441
52.7 show ipv6 dhcp filter interface ................................................................................................ 441
52.8 show ip dhcp filter server permit-entry ............................................................................... 442
Chapter 53 DoS Defend Commands ........................................................................... 443
53.1 ip dos-prevent ............................................................................................................................... 443
53.2 ip dos-prevent type ..................................................................................................................... 443
53.3 show ip dos-prevent ................................................................................................................... 445
55.5 show dldp ........................................................................................................................................ 460
55.6 show dldp interface ..................................................................................................................... 461
56.16 rmon history ................................................................................................................................... 477
59.12 show logging local-config ......................................................................................................... 509
59.13 show logging loghost .................................................................................................................. 509
59.14 show logging buffer ..................................................................................................................... 510
59.15 show logging flash ....................................................................................................................... 510
XXII
Preface
This Guide is intended for network administrator to provide referenced information about CLI
(Command Line Interface). The device mentioned in this Guide stands for T2500G-10TS
JetStream 8-Port Gigabit L2 Managed Switch with 2 SFP Slots without any explanation.
Overview of this Guide
Chapter 1: Using the CLI
Provide information about how to use the CLI, CLI Command Modes, Security Levels and some
Conventions.
Chapter 2: User Interface
Provide information about the commands used to switch between five CLI Command Modes.
Chapter 3: User Management Commands
Provide information about the commands used for user management.
Chapter 4: System Configuration Commands
Provide information about the commands used for configuring the System information and
System IP, reboot and reset the switch, upgrade the switch system and commands used for
cable test.
Chapter 5:EEE Configuration Commands
Provide information about the commands used for configuring EEE.
Chapter 6: SDM Template Commands
Provide information about the commands used for configuring the SDM templates.
Chapter 7: Time Range Commands
Provide information about the commands used for configuring the time range.
Chapter 8: Port Configuration Commands
Provide information about the commands used for configuring the Speed, Negotiation Mode,
and Flow Control for Ethernet ports.
Chapter 9: Port Isolation Commands
Provide information about the commands used for configuring Port Isolation function.
Chapter 10: Loopback Detection Commands
Provide information about the commands used for configuring the Loopback Detection
function.
Chapter 11: DDM Commands
Provide information about the commands used for DDM (Digital Diagnostic Monitoring)
function.
1
Chapter 12: Etherchannel Commands
Provide information about the commands used for configuring LAG (Link Aggregation Group)
and LACP (Link Aggregation Control Protocol).
Chapter 13: MAC Address Commands
Provide information about the commands used for Address configuration.
Chapter 14IEEE 802.1Q VLAN Commands
Provide information about the commands used for configuring IEEE 802.1Q VLAN.
Chapter 15: MAC-based VLAN Commands
Provide information about the commands used for configuring MAC-based VLAN.
Chapter 16: Protocol-based VLAN Commands
Provide information about the commands used for configuring Protocol VLAN.
Chapter 17: VLAN-VPN Commands
Provide information about the commands used for configuring VLAN-VPN (Virtual Private
Network) function.
Chapter 18: GVRP Commands
Provide information about the commands used for configuring GVRP (GARP VLAN registration
protocol).
Chapter 19: IGMP Snooping Commands
Provide information about the commands used for configuring the IGMP Snooping (Internet
Group Management Protocol Snooping).
Chapter 20: MLD Snooping Commands
Provide information about the commands used for configuring the MLD Snooping (Multicast
Listener Discovery Snooping).
Chapter 21: MVR Commands
Provide information about the commands used for configuring the MVR.
Chapter 22: MSTP Commands
Provide information about the commands used for configuring the MSTP (Multiple Spanning
Tree Protocol).
Chapter 23: LLDP Commands
Provide information about the commands used for configuring LLDP function.
Chapter 24: L2PT Commands
Provide information about the commands used for configuring L2PT (Layer 2 Protocol
Tunneling).
Chapter 25: PPPoE ID-Insertion Commands
Provide information about the commands used for configuring PPPoE ID-Insertion.
2
Chapter 26: DHCP Relay Commands
Provide information about the commands used for configuring the DHCP Relay function.
Chapter 27: DHCP L2 Relay Commands
Provide information about the commands used for configuring the DHCP L2 Relay function.
Chapter 28: QoS Commands
Provide information about the commands used for configuring the QoS function.
Chapter 29: Bandwidth Commands
Provide information about the commands used for configuring the Bandwidth Control.
Chapter 30: Voice VLAN Commands
Provide information about the commands used for configuring Voice VLAN.
Chapter 31: Auto VoIP Commands
Provide information about the commands used for configuring Auto VoIP.
Chapter 32: Access Control Commands
Provide information about the commands used for configuring Access Control.
Chapter 33: HTTP and HTTPS Commands
Provide information about the commands used for configuring the HTTP and HTTPS logon.
Chapter 34: SSH Commands
Provide information about the commands used for configuring and managing SSH (Security
Shell).
Chapter 35: Telnet Commands
Provide information about the commands used for configuring and managing SSH (Security
Shell).
Chapter 36: Serial Port Commands
Provide information about the commands used for configuring and managing SSH (Security
Shell).
Chapter 37: AAA Commands
Provide information about the commands used for configuring AAA (authentication,
authorization and accounting).
Chapter 38: IEEE 802.1X Commands
Provide information about the commands used for configuring IEEE 802.1X function.
Chapter 39: Port Security Commands
Provide information about the commands used for configuring Port Security.
3
Chapter 40: Port Mirroring Commands
Provide information about the commands used for configuring the Port Mirror function.
Chapter 41: ACL Commands
Provide information about the commands used for configuring the ACL (Access Control List).
Chapter 42: IPv4 IMPB Commands
Provide information about the commands used for binding the IP address, MAC address, VLAN
and the connected Port number of the Host together.
Chapter 43: IPv6 IMPB Commands
Provide information about the commands used for binding the IPv6 address, MAC address,
VLAN and the connected Port number of the Host together.
Chapter 44: IP Verify Source Commands
Provide information about the commands used for guarding the IP Source by filtering the IP
packets based on the IP-MAC Binding entries.
Chapter 45: IPv6 Verify Source Commands
Provide information about the commands used for guarding the IPv6 Source by filtering the IP
packets based on the IP-MAC Binding entries.
Chapter 46: DHCPv4 Filter Commands
Provide information about the commands used for configuring the DHCPv4 Filter.
Chapter 47: DHCPv6 Filter Commands
Provide information about the commands used for configuring the DHCPv6 Filter.
Chapter 48: DoS Defend Command
Provide information about the commands used for DoS defend and detecting the DoS attack.
Chapter 49: DLDP Commands
Provide information about the commands used for configuring the DLDP (Device Link
Detection Protocol).
Chapter 50: SNMP Commands
Provide information about the commands used for configuring the SNMP (Simple Network
Management Protocol) functions.
Chapter 51: ARP Inspection Commands
Provide information about the commands used for protecting the switch from the ARP
cheating or ARP Attack.
Chapter 52: ND Detection Commands
Provide information about the commands used for configuring ND detection.
Chapter 53: System Log Commands
Provide information about the commands used for configuring system log.
4
Chapter 1 Using the CLI
1.1 Accessing the CLI
You can log on to the switch and access the CLI by logging on to the switch remotely by a
Telnet or SSH connection through an Ethernet port.
1.1.1 Logon by a console port
■Console Port
The switch has two console ports: an RJ-45 console port and a Micro-USB console port.
Console output is active on devices connected to both console ports, but console input is only
active on one console port at a time.
The Micro-USB connector takes precedence over the RJ-45 connector. When the switch
detects a valid connection on the Micro-USB console port, input from the RJ-45 console port is
immediately disabled, and input from the Micro-USB console port is enabled. Removing the
Micro-USB connection immediately reenables input from the RJ-45 console connection.
■USB Console Driver
If you are using the USB port on the MAC OS X or Linux OS for console connection, there is no
need to run a USB driver.
If you are using the switch’s Micro-USB console port with the USB port of a Windows PC, a
driver for the USB port is required. The USB driver is provided on the resource CD. Follow the
InstallSheild Wizard to accomplish the installation.
The TP-Link USB Console Driver supports the following Windows operating systems:
▪ 32-bit Windows XP SP3
▪ 64-bit Windows XP
▪ 32-bit Windows Vista
▪ 64-bit Windows Vista
▪ 32-bit Windows 7
▪ 64-bit Windows 7
▪ 32-bit Windows 8
▪ 64-bit Windows 8
▪ 32-bit Windows 8.1
5
▪64-bit Windows 8.1
After the TP-Link USB Console Driver is installed, the PC’s USB port will act as RS-232 serial
port when the PC’s USB port is connected to the switch’s Micro-USB console port. And the
PC’s USB port will act as standard USB port when the PC’s USB port is unplugged from the
switch.
■Logon
Take the following steps to log on to the switch by the console port.
1. Connect the PCs or Terminals to the console port on the switch by the provided cable.
2. Start the terminal emulation program (such as the HyperTerminal) on the PC.
3. Specify the connection COM port in the terminal emulation program. If the Micro-USB
Console port is used, you can view which port is assigned to the USB serial port in the
following path: Control Panel -> Hardware and Sound -> Device Manager -> Ports ->USB
Serial Port.
Figure 1-1 USB Serial Port Number
4. Configure the terminal emulation program or the terminal to use the following settings:
▪ Baud rate: 38400 bps
▪ Data bits: 8
▪ Parity: none
6
▪ Stop bits: 1
▪ Flow control: none
5. Type the Username and Password in the Hyper Terminal window. The default value for
both of them are admin. Press Enter in the main window and “T2500G-10TS>” will appear
indicating that you have successfully logged in to the switch and you can use the CLI now.
Figure 1-2 Log in to the Switch
Note:
The first time you log in, change the password to better protect your network and devices.
7
1.1.2 Logon by Telnet
To log on to the switch by a Telnet connection, please take the following steps:
1. Click Start and type in cmd in the Search programs and files window and press the Enter
button.
Figure 1-3 Run Window
2. Telnet the switch’s IP address (factory setting is 192.168.0.1) in the prompt cmd window
and press Enter.
Figure 1-4 Type in the telnet command
3. Type in the User name and Password (the factory default value for both of them are admin)
and press the Enter button to enter User EXEC Mode , which is shown as Figure 1-3.
Figure 1-5 Log in the Switch
Note:
The first time you log in, change the password to better protect your network and devices.
8
4. Type in enable command to enter Privileged EXEC Mode.
Figure 1-6 Enter into Priviledged EXEC Mode
1.1.3 Logon by SSH
To log on by SSH, a Putty client software is recommended. There are two authentication modes
to set up an SSH connection:
Password Authentication Mode: It requires username and password, which are both admin by
default.
Key Authentication Mode: It requires a public key for the switch and a private key for the SSH
client software. You can generate the public key and the private key through Putty Key
Generator.
Note:
1. Before SSH login, please follow the steps shown in Figure 1-5 to enable the SSH function
through Telnet connection.
2. The first time you log in, change the password to better protect your network and devices.
Figure 1-7 Enable SSH function
9
■ Password Authentication Mode
1. Open the software to log on to the interface of PuTTY. Enter the IP address of the switch
into Host Name field; keep the default value 22 in the Port field; select SSH as the
Connection type.
Figure 1-8 SSH Connection Config
2. Click the Open button in the above figure to log on to the switch. Enter the login user name
and password to log on the switch, and then enter enable to enter Privileged EXEC Mode,
so you can continue to configure the switch.
Figure 1-9 Log on the Switch
10
■ Key Authentication Mode
1. Select the key type and key length, and generate SSH key.
Figure 1-10 Generate SSH Key
Note:
1. The key length is in the range of 512 to 3072 bits.
2. During the key generation, randomly moving the mouse quickly can accelerate the key
generation.
11
2. After the key is successfully generated, please save the public key and private key to a
TFTP server.
Figure 1-11 Save the Generated Key
12
3. Log on to the switch by Telnet and download the public key file from the TFTP server to the
switch, as the following figure shows:
Figure 1-12 Download the Public Key
Note:
1. The key type should accord with the type of the key file.
2. The SSH key downloading can not be interrupted.
13
4. After the public key is downloaded, please log on to the interface of PuTTY and enter the IP
address for login.
Figure 1-13 SSH Connection Config
14
5. Click Browse to download the private key file to SSH client software and click Open.
Figure 1-14 Download the Private Key
6. After successful authentication, please enter the login user name. If you log on to the
switch without entering password, it indicates that the key has been successfully
downloaded.
Figure 1-15 Log on the Switch
1.2 CLI Command Modes
The CLI is divided into different command modes: User EXEC Mode, Privileged EXEC Mode,
Global Configuration Mode, Interface Configuration Mode and VLAN Configuration Mode.
15
mode.
Configuration mode.
mode.
Interface Configuration Mode can also be divided into Interface Ethernet, Interface
link-aggregation and some other modes, which is shown as the following diagram.
The following table gives detailed information about the Accessing path, Prompt of each mode
and how to exit the current mode and access the next mode.
Mode Accessing Path Prompt
User EXEC
Mode
Privileged
EXEC Mode
Global
Configuration
Primary mode once it
is connected with the
switch.
Use the enable
command to enter this
mode from User EXEC
mode.
Use the configure
command to enter this
mode from Privileged
T2500G-10TS>
T2500G-10TS#
T2500G-10TS(config)#
Mode
EXEC mode.
Logout or Access the
next mode
Use the exit command to
disconnect the switch.
Use the enable command
to access Privileged EXEC
Enter the exit command to
return to User EXEC mode.
Enter configure command
to access Global
Use the exit or the end
command or press Ctrl+Z
to return to Privileged EXEC
mode.
Use the interface
gigabitEthernet
interface range
fastEthernet
gigabitEthernet
command to access
interface Configuration
mode.
port
port-list
port-list
or
|
16
Use the vlan
access VLAN Configuration
vlan-list
to
mode.
mode.
Global configuration mode.
Mode Accessing Path Prompt
Layer 2 Interface:
Use the interface
port,
port,
lagid
port-list
command to
command to
id
command
or
T2500G-10TS(config-if)#
T2500G-10TS(config-if-range)#
|
T2500G-10TS(config-if)#
T2500G-10TS(config-if-range)#
Interface
Configuration
Mode
Interface
Configuration
Mode
fastEthernet
interface
gigabitEthernet
interface
port-channel
interface range
fastEthernet
gigabitEthernet
port-list
enter this mode from
Global Configuration
Use the interface vlan
vlan-id
enter VLAN Interface
mode from Global
Configuration mode.
Use the interface
loopback
to enter Loopback
Interface mode from
Global Configuration
or
or
Logout or Access the
next mode
Use the end command or
press Ctrl+Z to return to
Privileged EXEC mode.
Enter the exit or the #
command to return to
Global Configuration mode.
A port number must be
specified in the interface
command.
Use the switchport
command to switch to the
Layer 2 interface mode.
Use the end command or
press Ctrl+Z to return to
Privileged EXEC mode.
Enter the exit or the #
command to return to
Global Configuration mode.
Use the end command or
VLAN
Configuration
Mode
Use the vlan
command to enter this
mode from Global
Configuration mode.
vlan-list
T2500G-10TS(config-vlan)#
press Ctrl+Z to return to
Privileged EXEC mode.
Enter the exit command or
the # command to return to
Note:
1. The user is automatically in User EXEC Mode after the connection between the PC and the
switch is established by a Telnet/SSH connection.
2. Each command mode has its own set of specific commands. To configure some
commands, you should access the corresponding command mode firstly.
▪Global Configuration Mode: In this mode, global commands are provided, such as the
Spanning Tree, Schedule Mode and so on.
17
▪Interface Configuration Mode: In this mode, users can configure one or several ports,
different ports correspond to different commands
a). Interface gigabitEthernet: Configure parameters for an Ethernet port, such as
Duplex-mode, flow control status.
b). Interface range gigabitEthernet: Configure parameters for several Ethernet ports.
c). Interface link-aggregation: Configure parameters for a link-aggregation, such as
broadcast storm.
d). Interface range link-aggregation: Configure parameters for multi-trunks.
e). Interface vlan: Configure parameters for the vlan-port.
▪VLAN Configuration Mode: In this mode, users can create a VLAN and add a specified
port to the VLAN.
3. Some commands are global, that means they can be performed in all modes:
▪show: Display all information of switch, for example: statistic information, port information,
VLAN information.
▪history: Display the commands history.
1.3 Privilege Restrictions
This switch’s security is divided into four privilege levels: User level, Power User level, Operator
level and Admin level. You can define username and password pairs, and assign a specific
privilege level to each pair. Different privilege levels have access to specified commands,
which is illustrated in the Privilege Requirement in each command. For details about how to
configure usename and password pairs, please refer to user name (password) and user name
(secret).
Users can enter Privileged EXEC mode from User EXEC mode by using the enable command. In
default case, no password is needed. In Global Configuration Mode, you can configure
password for Admin level by enable password command. Once password is configured, you
are required to enter it to access Privileged EXEC mode.
1.4 Conventions
1.4.1 Format Conventions
The following conventions are used in this Guide:
▪ Items in square brackets [ ] are optional
▪ Items in braces { } are required
18
▪Alternative items are grouped in braces and separated by vertical bars. For example:
speed {10 | 100 | 1000 }
▪ Bold indicates an unalterable keyword. For example: show logging
▪ Normal Font indicates a constant (several options are enumerated and only one can be
selected). For example: mode {dynamic | static | permanent}
▪Italic Font indicates a variable (an actual value must be assigned). For example: bridge
aging-time
aging-time
1.4.2 Special Characters
You should pay attentions to the description below if the variable is a character string:
▪ These six characters ” < > , \ & cannot be input.
▪ If a blank is contained in a character string, single or double quotation marks should be
used, for example ’hello world’, ”hello world”, and the words in the quotation marks will be
identified as a string. Otherwise, the words will be identified as several strings.
1.4.3 Parameter Format
Some parameters must be entered in special formats which are shown as follows:
▪ MAC address must be enter in the format of xx:xx:xx:xx:xx:xx.
▪ One or several values can be typed for a port-list or a vlan-list using comma to separate.
Use a hyphen to designate a range of values, for instance, 1/0/1, 1/0/3-5, 1/0/7 indicates
choosing port 1/0/1, 1/0/3, 1/0/4, 1/0/5, 1/0/7.
19
Chapter 2 Line Commands
2.1 line
Description
The line command is used to enter the Line Configuration Mode and make
related configurations for the desired user(s).
Syntax
line { console
Parameter
linenum
value is 0 in general, for the reason that console input is only active on one
console port at a time.
startlinenum
configure the login mode and password, ranging from 0 to 15. 0 means the
first login user number, 1 means the second, and the rest can be done on the
same manner.
endlinenum
configure the login mode and password, ranging from 0 to 15. 0 means the
first login user number, 1 means the second, and the rest can be done on the
same manner.
—— The number of users allowed to login through console port. Its
Command Mode
linenum
——The start serial number of the login user selected to
—— The end serial number of the login user selected to
| vty
startlinenum endlinenum
}
Global Configuration Mode
Privilege Requirement
Only Admin level users have access to these commands.
Example
Enter the Console port configuration mode and configure the console port 0:
T2500G-10TS(config)#line console 0
Enter the Virtual Terminal configuration mode so as to prepare further
configurations such as password and login mode for virtual terminal 0 to 5:
T2500G-10TS(config)#line vty 0 5
20
2.2 media-type rj45
Description
The media-type rj45 command is used to configure the console media type
as RJ-45 for input. The switch has two console ports available —— an RJ-45
console port and a micro-USB console port. Console input is active on only
one console port at a time. By default, the micro-USB connector takes
precedence over the RJ-45 connector, which means that, when both the
RJ-45 console connection and micro-USB console connection are valid,
input from the RJ-45 console is disabled, and input from the micro-USB
console is enabled. To return to the default configuration, please use no
media-type rj45 command.
Syntax
media-type rj45
no media-type rj45
Command Mode
Line Configuration Mode
Privilege Requirement
Only Admin level users have access to these commands.
Example
Enable the RJ-45 console input:
T2500G-10TS(config)# line console 0
T2500G-10TS(config-line)# media-type rj45
Receive the micro-USB console input prior to the RJ-45 console input:
T2500G-10TS(config)# line console 0
T2500G-10TS(config-line)# no media-type rj45
21
Chapter 3 User Interface
3.1 enable
Description
The enable command is used to access Privileged EXEC Mode from User
EXEC Mode.
Syntax
enable
Command Mode
User EXEC Mode
Privilege Requirement
None.
Example
If you have set the password to access Privileged EXEC Mode from User
EXEC Mode:
T2500G-10TS>enable
Enter password:
T2500G-10TS#
3.2 service password-encryption
Description
The service password-encryption command is used to encrypt the
password when the password is defined or when the configuration is written,
using the symmetric encryption algorithm. Encryption prevents the password
from being readable in the configuration file. To disable the global encryption
Syntax
function, please use no service password-encryption command.
service password-encryption
no service password-encryption
22
Command Mode
Global Configuration Mode
Privilege Requirement
Only Admin level users have access to these commands.
Example
Enable the global encryption function:
T2500G-10TS(config)# service password-encryption
3.3 enable password
Description
The enable password command is used to set or change the password for
users to access Privileged EXEC Mode from User EXEC Mode. To remove the
password, please use no enable password command. This command uses
the symmetric encryption.
Syntax
enable password { [ 0 ]
no enable password
Parameter
0 —— Specify the encryption type. 0 indicates that an unencrypted password
will follow. By default, the encryption type is 0.
password
English letters (case-sensitive), digits and 17 kinds of special characters. The
special characters are !$%’()*,-./[]_{|}. By default, it is empty.
7 —— Indicates a symmetric encrypted password with fixed length will follow.
encrypted-password
which you can copy from another switch’s configuration file. After the
password
—— A string with 31 characters at most, which can contain only
—— A symmetric encrypted password with fixed length,
| 7
encrypted-password
}
encrypted password is configured, you should use the corresponding
unencrypted password if you re-enter this mode.
Command Mode
Global Configuration Mode
Privilege Requirement
Only Admin level users have access to these commands.
23
User Guidelines
If the password you configured here is unencrypted and the global
encryption function is enabled in service password-encryption,the
password in the configuration file will be displayed in the symmetric
encrypted form.
Example
Set the super password as “admin” and unencrypted to access Privileged
EXEC Mode from User EXEC Mode:
T2500G-10TS(config)#enable password 0 admin
3.4 enable secret
Description
The enable secret command is used to set a secret password, which is using
an MD5 encryption algorithm, for users to access Privileged EXEC Mode from
User EXEC Mode. To return to the default configuration, please use no enable
secret command. This command uses the MD5 encryption.
Syntax
enable secret { [ 0 ]
no enable secret
Parameter
0 —— Specify the encryption type. 0 indicates that an unencrypted password
will follow. By default, the encryption type is 0.
password
English letters (case-sensitive), digits and 17 kinds of special characters. The
special characters are !$%’()*,-./[]_{|}. By default, it is empty.
5 —— Indicates an MD5 encrypted password with fixed length will follow.
password
—— A string with 31 characters at most, which can contain only
| 5
encrypted-password
}
encrypted-password
which you can copy from another switch’s configuration file. After the
encrypted password is configured, you should use the corresponding
unencrypted password if you re-enter this mode.
Command Mode
Global Configuration Mode
—— An MD5 encrypted password with fixed length,
24
Privilege Requirement
Only Admin level users have access to these commands.
User Guidelines
If both the enable password and enable secret are defined, you must enter
the password set in enable secret.
Example
Set the secret password as “admin” and unencrypted to access Privileged
EXEC Mode from User EXEC Mode. The password will be displayed in the
encrypted form.
T2500G-10TS(config)#enable secret 0admin
3.5 configure
Description
The configure command is used to access Global Configuration Mode from
Privileged EXEC Mode.
Syntax
configure
Command Mode
Privileged EXEC Mode
Privilege Requirement
Only Admin, Operator and Power User level users have access to these
commands.
Example
Access Global Configuration Mode from Privileged EXEC Mode:
T2500G-10TS# configure
T2500G-10TS(config)#
3.6 exit
Description
The exit command is used to return to the previous Mode from the current
Mode.
25
Syntax
exit
Command Mode
Privileged EXEC Mode and Any Configuration Mode
Privilege Requirement
None.
Example
Return to Global Configuration Mode from Interface Configuration Mode, and
then return to Privileged EXEC Mode:
T2500G-10TS(config-if)# exit
T2500G-10TS(config)#exit
T2500G-10TS#
3.7 end
Description
The end command is used to return to Privileged EXEC Mode.
Syntax
end
Command Mode
Privileged EXEC Mode and Any Configuration Mode
Privilege Requirement
Only Admin level users have access to these commands.
Example
Return to Privileged EXEC Mode from Interface Configuration Mode:
T2500G-10TS(config-if)#end
T2500G-10TS#
3.8 clipaging
Description
The clipaging command is used to enable the pause function for the screen
display. If you want to display all the related information of the switch at once
when using the show command, please use no clipaging command.
26
Syntax
clipaging
no clipaging
Command Mode
Privileged EXEC Mode and Any Configuration Mode
Privilege Requirement
None.
Example
Disable the pause function for the screen display:
T2500G-10TS(config)#no clipaging
3.9 history
Description
The history command is used to show the latest 20 commands you entered
in the current mode since the switch is powered.
Syntax
history
Command Mode
Privileged EXEC Mode and any Configuration Mode
Privilege Requirement
None.
Example
Show the commands you have entered in the current mode:
T2500G-10TS (config)# history
1 history
3.10 history clear
Description
The history clear command is used to clear the commands you have entered
in the current mode; therefore, these commands will not be shown next time
27
you use the history command.
Syntax
history clear
Command Mode
Privileged EXEC Mode and any Configuration Mode
Privilege Requirement
Only Admin, Operator and Power User level users have access to these
commands.
Example
Clear the commands you have entered in the current mode:
T2500G-10TS(config)#history clear
28
Chapter 4 User Management Commands
User Management commands are used to manage the user’s logging information by Web,
Telnet or SSH, so as to protect the settings of the switch from being randomly changed.
4.1 user name (password)
Description
The user name command is used to add a new user or modify the existed
users’ information. To delete the existed users, please use no user name
command. This command uses the symmetric encryption.
Syntax
user name
{ [ 0 ]
no user name
Parameter
name
composed of digits, English letters and symbols. No spaces, question marks
and double quotation marks are allowed.
admin | operator | power_user | user —— Access level. “admin” means that
you can edit, modify and view all the settings of different functions. “operator”
means that you can edit, modify and view most of the settings of different
functions. “power-user” means that you can edit, modify and view some of
the settings of different functions. “user” means that you can only view some
of the settings of different functions without the right to edit or modify. It is
“admin” by default. For more details about privilege restrictions, please refer
to the Privilege Requirement part in each command.