2.7 end ..................................................................................................................................................... 25
2.9 history ............................................................................................................................................... 26
2.10 history clear .................................................................................................................................... 27
3.3 name .................................................................................................................................................. 29
3.10 show vlan summary...................................................................................................................... 34
3.11 show vlan brief ............................................................................................................................... 35
3.12 show vlan ......................................................................................................................................... 35
3.13 show interface switchport ......................................................................................................... 36
p system-priority ..................................................................................................................... 75
11.5 show etherchannel ....................................................................................................................... 76
11.6 show etherchannel load-balance ............................................................................................ 77
11.7 show lacp ......................................................................................................................................... 78
11.8 show lacp sys-id ............................................................................................................................ 78
Chapter 12 User Management Commands ................................................................ 80
12.1 user name (password) ................................................................................................................. 80
IV
12.2 user name (secret) ........................................................................................................................ 81
12.3 service password-recovery ...................................................................................................... 82
12.4 user access-control ip-based .................................................................................................. 83
12.5 user access-control mac-based ............................................................................................. 84
12.6 user access-control port-based ............................................................................................. 85
12.7 line ...................................................................................................................................................... 85
12.10 login local ......................................................................................................................................... 88
12.14 show password-recovery .......................................................................................................... 91
12.15 show user account-list................................................................................................................ 91
12.16 show user configuration ............................................................................................................. 92
12.17 show telnet-status........................................................................................................................ 92
Chapter 13 HTTP and HTTPS Commands .................................................................. 94
13.1 ip http server .................................................................................................................................. 94
13.2 ip http max-users (For T2600G-18TS only) ......................................................................... 95
13.3 ip http max-users (For other switches) ................................................................................. 96
13.4 ip http session timeout ............................................................................................................... 96
13.5 ip http secure-server ................................................................................................................... 97
13.6 ip http secure-protocol............................................................................................................... 98
13.7 ip http secure-ciphersuite ......................................................................................................... 98
13.8 ip http secure-max-users .......................................................................................................... 99
13.9 ip
13.10 ip http secure-server download certificate ...................................................................... 101
13.11 ip http secure-server download key ................................................................................... 102
13.12 show ip http configuration ...................................................................................................... 103
14.4 show arp ........................................................................................................................................ 106
14.5 show ip arp (interface) .............................................................................................................. 106
V
14.6 show ip arp summary................................................................................................................ 107
22.12 dot1x mab .................................................................................................................................... 157
25.1 ip ssh server ................................................................................................................................ 177
25.2 ip ssh version .............................................................................................................................. 177
25.3 ip ssh algorithm .......................................................................................................................... 178
25.4 ip ssh timeout .............................................................................................................................. 179
25.5 ip ssh max-client ........................................................................................................................ 179
25.6 ip ssh download .......................................................................................................................... 180
25.8 show ip ssh................................................................................................................................... 181
Chapter 26 MAC Address Commands ....................................................................... 183
26.1 mac address-table static ........................................................................................................ 183
26.2 mac address-table aging-time .............................................................................................. 184
26.3 mac address-table filtering .................................................................................................... 184
26.4 mac address-table notification ............................................................................................. 185
26.5 mac address-table max-mac-count ................................................................................... 186
26.6 mac address-table notification (interface) ........................................................................ 187
26.7 mac address-table security ................................................................................................... 188
26.8 show mac address-table ......................................................................................................... 189
26.9 clear mac address-table ......................................................................................................... 190
26.10 show mac address-table aging-time .................................................................................. 190
26.11 show mac address-table max-mac-count ........................................................................ 191
26.12 show mac address-table interface ...................................................................................... 191
26.13 show mac address-table count ............................................................................................ 192
26.14 show mac address-table address ....................................................................................... 193
26.15 show mac address-table vlan ................................................................................................ 193
26.16 show mac address-table notification ................................................................................. 194
26.17 show mac address-table security ........................................................................................ 194
Chapter 27 System Configuration Commands ....................................................... 196
em-time dst date ............................................................................................................... 199
27.9 ip address ..................................................................................................................................... 203
27.10 ip address-alloc .......................................................................................................................... 204
27.29 show system-info ...................................................................................................................... 217
27.30 show system-info interface ................................................................................................... 217
27.31 show image-info ......................................................................................................................... 218
27.32 show boot ..................................................................................................................................... 218
27.33 show running-config ................................................................................................................. 219
27.34 show running-config | ............................................................................................................... 219
27.35 show startup-config ................................................................................................................. 220
27.36 show system-time ..................................................................................................................... 220
27.37 show system-time dst .............................................................................................................. 221
27.38 show system-time ntp ............................................................................................................. 221
27.39 show cable-diagnostics interface gigabitEthernet ........................................................ 222
27.40 show cable-diagnostics careful interface ......................................................................... 222
27.41 sho
w cpu-utilization .................................................................................................................. 223
27.42 show memory-utilization ......................................................................................................... 223
30.2 qos (For other switches) .......................................................................................................... 245
30.3 qos cos .......................................................................................................................................... 245
31.3 show monitor session .............................................................................................................. 257
Chapter 32 Port Isolation Commands ....................................................................... 258
32.1 port isolation................................................................................................................................ 258
32.2 show port isolation interface ................................................................................................. 259
36.8 name ............................................................................................................................................... 302
38.7 show dldp ..................................................................................................................................... 331
38.8 show dldp interface................................................................................................................... 332
39.23 range .............................................................................................................................................. 349
39.24 ip igmp filter ................................................................................................................................. 350
39.25 clear ip igmp snooping statistics ......................................................................................... 350
39.26 show ip igmp snooping ............................................................................................................ 351
39.27 show
ip igmp snooping interface ......................................................................................... 351
39.28 show ip igmp snooping vlan ................................................................................................... 352
39.29 show ip igmp snooping multi-vlan ....................................................................................... 353
39.30 show ip igmp snooping groups ............................................................................................. 353
39.31 show ip igmp snooping querier ............................................................................................. 354
39.32 show ip igmp profile .................................................................................................................. 355
40.21 range .............................................................................................................................................. 370
41.14 rmon history ................................................................................................................................ 390
42.14 show lldp ....................................................................................................................................... 409
42.15 show lldp interface .................................................................................................................... 410
42.16 show lldp local-information interface ................................................................................. 410
42.17 show lldp neighbor-information interface ......................................................................... 411
42.18 show lldp traffic interface ....................................................................................................... 411
44.8 ip route .......................................................................................................................................... 422
44.11 show interface vlan ................................................................................................................... 424
44.12 show ip interface ........................................................................................................................ 425
44.13 show ip interface brief .............................................................................................................. 426
44.14 show ip route ............................................................................................................................... 426
44.15 show ip route specify ............................................................................................................... 427
44.16 show ip route summary ........................................................................................................... 428
44.17 show ipv6 interface ................................................................................................................... 428
44.18 show
44.19 show ipv6 route summary ...................................................................................................... 429
46.5 show radius-server ................................................................................................................... 437
46.6 aaa group ...................................................................................................................................... 437
46.7 server ............................................................................................................................................. 438
46.8 show aaa group .......................................................................................................................... 439
46.13 show aaa authentication ......................................................................................................... 443
46.14 show aaa accounting ................................................................................................................ 443
46.15 line console .................................................................................................................................. 444
46.18 line telnet ...................................................................................................................................... 446
46.20 line ssh ........................................................................................................................................... 447
49.9 power inline consumption (interface) ................................................................................. 483
XX
49.10 power inline priority ................................................................................................................... 484
49.11 power inline supply .................................................................................................................... 484
49.12 power inline profile .................................................................................................................... 485
49.13 power inline time-range ........................................................................................................... 486
49.14 show power inline ...................................................................................................................... 486
49.15 show power inline configuration interface ........................................................................ 487
49.16 show power inline information interface ........................................................................... 487
49.17 show power profile .................................................................................................................... 488
49.18 show power holiday .................................................................................................................. 488
49.19 show power time-range ........................................................................................................... 489
XXI
Preface
This Guide is intended for network administrator to provide referenced information about CLI
(Command Line Interface). The device mentioned in this Guide stands for T2600G-18TS/
T2600G-28TS/ T2600G-52TS/ T2600G-28MPS JetStream Gigabit L2 Managed Switch without
any explanation. The commands in this guilde apply to these models if not specially noted, and
T2600G-28TS is taken as an example model in the example commands.
Some models featured in this guide may be unavailable in your country or region. For local
sales information, visit http://www.tp-link.com.
Overview of this Guide
Chapter 1: Using the CLI
Provide information about how to use the CLI, CLI Command Modes, Security Levels and some
Conventions.
Chapter 2: User Interface
Provide information about the commands used to switch between five CLI Command Modes.
Chapter 3:IEEE 802.1Q VLAN Commands
Provide information about the commands used for configuring IEEE 802.1Q VLAN.
Chapter 4: MAC-based VLAN Commands
Provide information about the commands used for configuring MAC-based VLAN.
Chapter 5: Protocol VLAN Commands
Provide information about the commands used for configuring Protocol VLAN.
Chapter 6: VLAN-VPN Commands
Provide information about the commands used for configuring VLAN-VPN (Virtual Private
Network) function.
Chapter 7: Private VLAN Commands
Provide information about the commands used for configuring Private VLAN.
Chapter 8: L2PT Commands
Provide information about the commands used for configuring L2PT (Layer 2 Portocol
Tunneling).
Chapter 9: GVRP Commands
Provide information about the commands used for configuring GVRP (GARP VLAN registration
protocol).
Chapter 10: Voice VLAN Commands
Provide information about the commands used for configuring Voice VLAN.
1
Chapter 11: Etherchannel Commands
Provide information about the commands used for configuring LAG (Link Aggregation Group)
and LACP (Link Aggregation Control Protocol).
Chapter 12: User Management Commands
Provide information about the commands used for user management.
Chapter 13: HTTP and HTTPS Commands
Provide information about the commands used for configuring the HTTP and HTTPS logon.
Chapter 14: ARP Commands
Provide information about the commands used for configuring the ARP (Address Resolution
Protocol) functions.
Chapter 15: Binding Table Commands
Provide information about the commands used for binding the IP address, MAC address, VLAN
and the connected Port number of the Host together.
Chapter 16: IPv6 Binding Table Commands
Provide information about the commands used for binding the IPv6 address, MAC address,
VLAN and the connected Port number of the Host together.
Chapter 17: IP Verify Source Commands
Provide information about the commands used for guarding the IP Source by filtering the IP
packets based on the IP-MAC Binding entries.
Chapter 18: IPv6 Verify Source Commands
Provide information about the commands used for guarding the IPv6 Source by filtering the IP
packets based on the IP-MAC Binding entries.
Chapter 19: ND Detection Commands
Provide information about the commands used for congifuring ND detection.
Chapter 20: ARP Inspection Commands
Provide information about the commands used for protecting the switch from the ARP
cheating or ARP Attack.
Chapter 21: DoS Defend Command
Provide information about the commands used for DoS defend and detecting the DoS attack.
Chapter 22: IEEE 802.1X Commands
Provide information about the commands used for configuring IEEE 802.1X function.
Chapter 23 PPPoE ID Insertion Commands
Provide information about the commands used for configuring PPPoE ID Insertion.
Chapter 24: System Log Commands
Provide information about the commands used for configuring system log.
2
Chapter 25: SSH Commands
Provide information about the commands used for configuring and managing SSH (Security
Shell).
Chapter 26: MAC Address Commands
Provide information about the commands used for Address configuration.
Chapter 27: System Configuration Commands
Provide information about the commands used for configuring the System information and
System IP, reboot and reset the switch, upgrade the switch system and commands used for
cable test.
Chapter 28: IPv6 Address Configuration Commands
Provide information about the commands used for configuring the System IPv6 addresses.
Chapter 29: Ethernet Configuration Commands
Provide information about the commands used for configuring the Bandwidth Control,
Negotiation Mode, and Storm Control for enthernet ports.
Chapter 30: QoS Commands
Provide information about the commands used for configuring the QoS function.
Chapter 31: Port Mirror Commands
Provide information about the commands used for configuring the Port Mirror function.
Chapter 32: Port Isolation Commands
Provide information about the commands used for configuring Port Isolation function.
Chapter 33: Loopback Detection Commands
Provide information about the commands used for configuring the Loopback Detection
function.
Chapter 34: DDM Commands
Provide information about the commands used for DDM (Digtal Diagnostic Monitoring)
function.
Chapter 35: ACL Commands
Provide information about the commands used for configuring the ACL (Access Control List).
Chapter 36: MSTP Commands
Provide information about the commands used for configuring the MSTP (Multiple Spanning
Tree Protocol).
Chapter 37 Ethernet OAM Commands
Provide information about the commands used for configuring the Ethernet OAM (Operation,
Administration, and Maintenance) function.
3
Chapter 38: DLDP Commands
Provide information about the commands used for configuring the DLDP (Device Link
Detection Protocol).
Chapter 39: IGMP Snooping Commands
Provide information about the commands used for configuring the IGMP Snooping (Internet
Group Management Protocol Snooping).
Chapter 40: MLD Snooping Commands
Provide information about the commands used for configuring the MLD Snooping (Multicast
Listener Discovery Snooping).
Chapter 41: SNMP Commands
Provide information about the commands used for configuring the SNMP (Simple Network
Management Protocol) functions.
Chapter 42: LLDP Commands
Provide information about the commands used for configuring LLDP function.
Chapter 43: sFlow Commands
Provide information about the commands used for configuring the Sampled Flow function.
Chapter 44: Static Routes Commands
Provide information about the commands used for configuring the Static Route function.
Chapter 45: SDM Template Commands
Provide information about the commands used for configuring the SDM templates.
Chapter 46: AAA Commands
Provide information about the commands used for configuring AAA (authentication,
authorization and accounting).
Chapter 47: DHCP Server Commands
Provide information about the commands used for configuring the DHCP Server function.
Chapter 48: DHCP Relay Commands
Provide information about the commands used for configuring the DHCP Relay function.
Chapter 49: PoE Commands(For T2600G-28MPS only)
Provide information about the commands used for configuring PoE function.
4
Chapter 1 Using the CLI
1.1 Accessing the CLI
You can log on to the switch and access the CLI by the following three methods:
1. Log on to the switch by the console port on the switch.
2. Log on to the switch remotely by a Telnet connection through an Ethernet port.
3. Log on to the switch remotely by an SSH connection through an Ethernet port.
1.1.1 Logon by a console port
Console Port
The switch has two console ports: an RJ-45 console port and a Micro-USB console port.
Console output is active on devices connected to both console ports, but console input is only
active on one console port at a time.
The Micro-USB connector takes precedence over the RJ-45 connector. When the switch
detects a valid connection on the Micro-USB console port, input from the RJ-45 console port is
immediately disabled, and input from the Micro-USB console port is enabled. Removing the
Micro-USB connection immediately reenables input from the RJ-45 console connection.
USB Console Driver
If you are using the USB port on the MAC OS X or Linux OS for console connection, there is no
need to run a USB driver.
If you are using the switch’s Micro-USB console port with the USB port of a Windows PC, a
driver for the USB port is required. The USB driver is provided on the resource CD. Follow the
InstallSheild Wizard to accomplish the installation.
The TP-Link USB Console Driver supports the following Windows operating systems:
32-bit Windows XP SP3
64-bit Windows XP
32-bit Windows Vista
64-bit Windows Vista
32-bit Windows 7
64-bit Windows 7
32-bit Windows 8
5
64-bit Windows 8
32-bit Windows 8.1
64-bit Windows 8.1
After the TP-Link USB Console Driver is installed, the PC’s USB port will act as RS-232 serial
port when the PC’s USB port is connected to the switch’s Micro-USB console port. And the
PC’s USB port will act as standard USB port when the PC’s USB port is unplugged from the
switch.
Logon
Take the following steps to log on to the switch by the console port.
1. Connect the PCs or Terminals to the console port on the switch by the provided cable.
2. Start the terminal emulation program (such as the HyperTerminal) on the PC.
3. Specify the connection COM port in the terminal emulation program. If the Micro-USB
Console port is used, you can view which port is assigned to the USB serial port in the
following path:
Control Panel -> Hardware and Sound -> Device Manager -> Ports ->USB Serial Port.
Figure 1-1 USB Serial Port Number
4. Configure the terminal emulation program or the terminal to use the following settings:
Baud rate: 38400 bps
Data bits: 8
Parity: none
Stop bits: 1
Flow control: none
6
5. The DOS prompt ”T2600G-28TS>” will appear after pressing the Enter button as shown in
Figure 1-2. It indicates that you can use the CLI now.
Figure 1-2 Log in the Switch
1.1.2 Logon by Telnet
For Telnet connection, you should also configure the Telnet login mode and login
authentication information through console connection.
Telnet login has the following two modes. You can choose one according to your needs:
Login local Mode: It requires username and password, which are both admin by default.
Login Mode: It doesn’t require username and password, but a connection password is
required.
Before Telnet login, you are required to configure Telnet login mode and login authentication
information through console connection.
7
Login Local Mode
Firstly, configure the Telnet login mode as “login local” in the prompted DOS screen shown in
Figure 1-3.
Figure 1-3 Configure login local mode
Now, you can logon by Telnet in login local mode.
1. Make sure the switch and the PC are in the same LAN. Click Start and type in cmd in the
Search programs and files window and press the Enter button.
Figure 1-4 Run Window
2. Type telnet 192.168.0.1 in the command prompt shown as Figure 1-5, and press the Enter
button.
Figure 1-5 Connecting to the Switch
8
Loading...
+ 481 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.