CLI Reference Guide
T2600G Series Switches
T2600G-18TS(TL-SG3216) / T2600G-28TS (TL-SG3424) T2600G-52TS (TL-SG3452) / T2600G-28MPS (TL-SG3424P) 1910012087 REV2.2.0
April 2017
COPYRIGHT & TRADEMARKS
Specifications are subject to change without notice. is a registered trademark of
TP-Link Technologies Co., Ltd. Other brands and product names are trademarks or registered trademarks of their respective holders.
No part of the specifications may be reproduced in any form or by any means or used to make any derivative such as translation, transformation, or adaptation without permission from TP-Link Technologies Co., Ltd. Copyright © 2017 TP-Link Technologies Co., Ltd. All rights reserved.
http://www.tp-link.com
I
CONTENTS
Preface |
............................................................................................................................ |
|
1 |
Chapter 1 Using the CLI ................................................................................................... |
5 |
||
1.1 Accessing the CLI..................................................................................................................................... |
5 |
||
1.1.1 Logon by a console port...................................................................................................... |
5 |
||
1.1.2 |
Logon by Telnet...................................................................................................................... |
7 |
|
1.1.3 |
Logon by SSH........................................................................................................................ |
11 |
|
1.2 CLI Command Modes............................................................................................................................ |
16 |
||
1.3 Privilege Restrictions............................................................................................................................. |
19 |
||
1.4 Conventions.............................................................................................................................................. |
19 |
||
1.4.1 |
Format Conventions ........................................................................................................... |
19 |
|
1.4.2 |
Special Characters.............................................................................................................. |
20 |
|
1.4.3 |
Parameter Format................................................................................................................ |
20 |
|
Chapter 2 |
User Interface.............................................................................................. |
21 |
|
2.1 |
enable ............................................................................................................................................... |
21 |
|
2.2 |
service password-encryption .................................................................................................. |
21 |
|
2.3 |
enable password........................................................................................................................... |
22 |
|
2.4 |
enable secret ................................................................................................................................. |
23 |
|
2.5 |
configure.......................................................................................................................................... |
24 |
|
2.6 |
exit...................................................................................................................................................... |
|
25 |
2.7 |
end ..................................................................................................................................................... |
|
25 |
2.8 |
clipaging........................................................................................................................................... |
26 |
|
2.9 |
history............................................................................................................................................... |
26 |
|
2.10 |
history clear.................................................................................................................................... |
27 |
|
Chapter 3 IEEE 802.1Q VLAN Commands ................................................................ |
28 |
||
3.1 |
vlan..................................................................................................................................................... |
|
28 |
3.2 |
interface vlan.................................................................................................................................. |
29 |
|
3.3 |
name.................................................................................................................................................. |
29 |
|
3.4 |
switchport mode........................................................................................................................... |
30 |
|
3.5 |
switchport access vlan............................................................................................................... |
31 |
|
3.6 |
switchport trunk allowed vlan................................................................................................... |
31 |
|
3.7 |
switchport trunk allowed vlan all ............................................................................................. |
32 |
|
3.8 |
switchport general allowed vlan .............................................................................................. |
33 |
|
3.9 |
switchport pvid.............................................................................................................................. |
34 |
II
3.10 |
show vlan summary...................................................................................................................... |
34 |
3.11 |
show vlan brief............................................................................................................................... |
35 |
3.12 |
show vlan......................................................................................................................................... |
35 |
3.13 |
show interface switchport......................................................................................................... |
36 |
Chapter 4 MAC-based VLAN Commands................................................................. |
37 |
|
4.1 |
mac-vlan mac-address............................................................................................................... |
37 |
4.2 |
mac-vlan .......................................................................................................................................... |
38 |
4.3 |
show mac-vlan............................................................................................................................... |
38 |
4.4 |
show mac-vlan interface............................................................................................................ |
39 |
Chapter 5 Protocol-based VLAN Commands ......................................................... |
40 |
|
5.1 |
protocol-vlan template (For T2600G-18TS only) .............................................................. |
40 |
5.2 |
protocol-vlan template (For other switches)....................................................................... |
41 |
5.3 |
protocol-vlan vlan......................................................................................................................... |
42 |
5.4 |
protocol-vlan group..................................................................................................................... |
43 |
5.5 |
show protocol-vlan template.................................................................................................... |
43 |
5.6 |
show protocol-vlan vlan ............................................................................................................. |
44 |
Chapter 6 VLAN-VPN Commands .............................................................................. |
45 |
|
6.1 |
dot1q-tunnel................................................................................................................................... |
45 |
6.2 |
dot1q-tunnel tpid.......................................................................................................................... |
45 |
6.3 |
dot1q-tunnel mapping ................................................................................................................ |
46 |
6.4 |
switchport dot1q-tunnel missdrop......................................................................................... |
47 |
6.5 |
switchport dot1q-tunnel mapping.......................................................................................... |
47 |
6.6 |
switchport dot1q-tunnel mode................................................................................................ |
48 |
6.7 |
show dot1q-tunnel....................................................................................................................... |
49 |
6.8 |
show dot1q-tunnel mapping..................................................................................................... |
50 |
6.9 |
show dot1q-tunnel interface .................................................................................................... |
50 |
Chapter 7 Private VLAN Commands ......................................................................... |
51 |
|
7.1 |
private-vlan primary..................................................................................................................... |
51 |
7.2 |
private-vlan community.............................................................................................................. |
51 |
7.3 |
private-vlan isolated .................................................................................................................... |
52 |
7.4 |
private-vlan association ............................................................................................................. |
53 |
7.5 |
switchport private-vlan............................................................................................................... |
53 |
7.6 |
switchport private-vlan host-association ............................................................................ |
54 |
7.7 |
switchport private-vlan mapping ............................................................................................ |
55 |
7.8 |
show vlan private-vlan ................................................................................................................ |
56 |
|
III |
|
7.9 |
show vlan private-vlan interface.............................................................................................. |
56 |
Chapter 8 |
L2PT Commands ......................................................................................... |
58 |
8.1 |
l2protocol-tunnel.......................................................................................................................... |
58 |
8.2 |
l2protocol-tunnel type................................................................................................................ |
58 |
8.3 |
show l2protocol-tunnel global ................................................................................................. |
60 |
8.4 |
show l2protocol-tunnel interface............................................................................................ |
60 |
Chapter 9 |
GVRP Commands........................................................................................ |
62 |
9.1 |
gvrp.................................................................................................................................................... |
62 |
9.2 |
gvrp (interface)............................................................................................................................... |
62 |
9.3 |
gvrp registration............................................................................................................................ |
63 |
9.4 |
gvrp timer ........................................................................................................................................ |
64 |
9.5 |
show gvrp interface ..................................................................................................................... |
65 |
9.6 |
show gvrp global........................................................................................................................... |
66 |
Chapter 10 Voice VLAN Commands ............................................................................ |
67 |
|
10.1 |
voice vlan......................................................................................................................................... |
67 |
10.2 |
voice vlan aging............................................................................................................................. |
67 |
10.3 |
voice vlan priority.......................................................................................................................... |
68 |
10.4 |
voice vlan mac-address ............................................................................................................. |
69 |
10.5 |
switchport voice vlan mode ...................................................................................................... |
70 |
10.6 |
switchport voice vlan security ................................................................................................. |
70 |
10.7 |
show voice vlan ............................................................................................................................. |
71 |
10.8 |
show voice vlan oui ...................................................................................................................... |
71 |
10.9 |
show voice vlan switchport....................................................................................................... |
72 |
Chapter 11 Etherchannel Commands ......................................................................... |
73 |
|
11.1 |
channel-group ............................................................................................................................... |
73 |
11.2 |
port-channel load-balance........................................................................................................ |
74 |
11.3 |
lacp system-priority..................................................................................................................... |
75 |
11.4 |
lacp port-priority........................................................................................................................... |
76 |
11.5 |
show etherchannel....................................................................................................................... |
76 |
11.6 |
show etherchannel load-balance............................................................................................ |
77 |
11.7 |
show lacp......................................................................................................................................... |
78 |
11.8 |
show lacp sys-id............................................................................................................................ |
78 |
Chapter 12 User Management Commands ................................................................ |
80 |
|
12.1 |
user name (password)................................................................................................................. |
80 |
|
IV |
|
12.2 |
user name (secret)........................................................................................................................ |
81 |
12.3 |
service password-recovery...................................................................................................... |
82 |
12.4 |
user access-control ip-based.................................................................................................. |
83 |
12.5 |
user access-control mac-based............................................................................................. |
84 |
12.6 |
user access-control port-based ............................................................................................. |
85 |
12.7 |
line...................................................................................................................................................... |
85 |
12.8 |
password ......................................................................................................................................... |
86 |
12.9 |
login................................................................................................................................................... |
88 |
12.10 |
login local......................................................................................................................................... |
88 |
12.11 |
media-type rj45 ............................................................................................................................. |
89 |
12.12 |
telnet ................................................................................................................................................. |
90 |
12.13 |
serial_port baud-rate................................................................................................................... |
90 |
12.14 |
show password-recovery.......................................................................................................... |
91 |
12.15 |
show user account-list................................................................................................................ |
91 |
12.16 |
show user configuration............................................................................................................. |
92 |
12.17 |
show telnet-status........................................................................................................................ |
92 |
Chapter 13 HTTP and HTTPS Commands .................................................................. |
94 |
|
13.1 |
ip http server .................................................................................................................................. |
94 |
13.2 |
ip http max-users (For T2600G-18TS only) ......................................................................... |
95 |
13.3 |
ip http max-users (For other switches) ................................................................................. |
96 |
13.4 |
ip http session timeout ............................................................................................................... |
96 |
13.5 |
ip http secure-server................................................................................................................... |
97 |
13.6 |
ip http secure-protocol............................................................................................................... |
98 |
13.7 |
ip http secure-ciphersuite ......................................................................................................... |
98 |
13.8 |
ip http secure-max-users .......................................................................................................... |
99 |
13.9 |
ip http secure-session timeout............................................................................................. |
100 |
13.10 |
ip http secure-server download certificate...................................................................... |
101 |
13.11 |
ip http secure-server download key ................................................................................... |
102 |
13.12 |
show ip http configuration...................................................................................................... |
103 |
13.13 |
show ip http secure-server .................................................................................................... |
103 |
Chapter 14 ARP Commands......................................................................................... |
104 |
|
14.1 |
arp ................................................................................................................................................... |
104 |
14.2 |
clear arp-cache .......................................................................................................................... |
105 |
14.3 |
arp timeout................................................................................................................................... |
105 |
14.4 |
show arp........................................................................................................................................ |
106 |
14.5 |
show ip arp (interface).............................................................................................................. |
106 |
|
V |
|
14.6 |
show ip arp summary................................................................................................................ |
107 |
Chapter 15 Binding Table Commands....................................................................... |
108 |
|
15.1 |
ip source binding ....................................................................................................................... |
108 |
15.2 |
ip dhcp snooping ....................................................................................................................... |
109 |
15.3 |
ip dhcp snooping vlan .............................................................................................................. |
110 |
15.4 |
ip dhcp snooping information option.................................................................................. |
111 |
15.5 |
ip dhcp snooping information strategy.............................................................................. |
111 |
15.6 |
ip dhcp snooping information format ................................................................................. |
112 |
15.7 |
ip dhcp snooping information remote-id........................................................................... |
113 |
15.8 |
ip dhcp snooping information circuit-id............................................................................. |
114 |
15.9 |
ip dhcp snooping trust............................................................................................................. |
115 |
15.10 |
ip dhcp snooping mac-verify................................................................................................. |
115 |
15.11 |
ip dhcp snooping limit rate ..................................................................................................... |
116 |
15.12 |
ip dhcp snooping decline rate............................................................................................... |
117 |
15.13 |
show ip source binding............................................................................................................ |
118 |
15.14 |
show ip dhcp snooping............................................................................................................ |
118 |
15.15 |
show ip dhcp snooping interface......................................................................................... |
119 |
15.16 |
show ip dhcp snooping information interface................................................................. |
119 |
Chapter 16 IPv6 Binding Table Commands.............................................................. |
121 |
|
16.1 |
ipv6 source binding................................................................................................................... |
121 |
16.2 |
ipv6 dhcp snooping .................................................................................................................. |
122 |
16.3 |
ipv6 dhcp snooping vlan ......................................................................................................... |
123 |
16.4 |
ipv6 dhcp snooping trust ........................................................................................................ |
123 |
16.5 |
ipv6 nd snooping ....................................................................................................................... |
124 |
16.6 |
ipv6 nd snooping vlan .............................................................................................................. |
125 |
16.7 |
ipv6 nd snooping max-entries............................................................................................... |
125 |
16.8 |
show ipv6 source binding....................................................................................................... |
126 |
16.9 |
show ipv6 dhcp snooping....................................................................................................... |
127 |
16.10 |
show ipv6 dhcp snooping interface.................................................................................... |
127 |
16.11 |
show ipv6 nd snooping............................................................................................................ |
128 |
16.12 |
show ipv6 nd snooping interface......................................................................................... |
128 |
Chapter 17 IP Verify Source Commands.................................................................. |
130 |
|
17.1 |
ip verify source ........................................................................................................................... |
130 |
17.2 |
show ip verify source................................................................................................................ |
131 |
17.3 |
show ip verify source interface............................................................................................. |
131 |
|
VI |
|
Chapter 18 IPv6 Verify Source Commands ............................................................. |
133 |
|
18.1 |
ipv6 verify source ...................................................................................................................... |
133 |
18.2 |
show ipv6 verify source........................................................................................................... |
134 |
18.3 |
show ipv6 verify source interface........................................................................................ |
134 |
Chapter 19 ND Detection Commands ....................................................................... |
136 |
|
19.1 |
ipv6 nd detection....................................................................................................................... |
136 |
19.2 |
ipv6 nd detection vlan.............................................................................................................. |
136 |
19.3 |
ipv6 nd detection trust............................................................................................................. |
137 |
19.4 |
show ipv6 nd detection ........................................................................................................... |
138 |
19.5 |
show ipv6 nd detection interface......................................................................................... |
138 |
Chapter 20 ARP Inspection Commands.................................................................... |
140 |
|
20.1 |
ip arp inspection(global) .......................................................................................................... |
140 |
20.2 |
ip arp inspection trust .............................................................................................................. |
140 |
20.3 |
ip arp inspection(interface)..................................................................................................... |
141 |
20.4 |
ip arp inspection limit-rate...................................................................................................... |
142 |
20.5 |
ip arp inspection recover ........................................................................................................ |
143 |
20.6 |
show ip arp inspection............................................................................................................. |
143 |
20.7 |
show ip arp inspection interface .......................................................................................... |
144 |
20.8 |
show ip arp inspection statistics.......................................................................................... |
144 |
20.9 |
clear ip arp inspection statistics........................................................................................... |
145 |
Chapter 21 DoS Defend Commands.......................................................................... |
146 |
|
21.1 |
ip dos-prevent ............................................................................................................................ |
146 |
21.2 |
ip dos-prevent type................................................................................................................... |
146 |
21.3 |
show ip dos-prevent................................................................................................................. |
148 |
Chapter 22 IEEE 802.1X Commands .......................................................................... |
149 |
|
22.1 |
dot1x system-auth-control.................................................................................................... |
149 |
22.2 |
dot1x handshake ....................................................................................................................... |
150 |
22.3 |
dot1x auth-method ................................................................................................................... |
150 |
22.4 |
dot1x accounting....................................................................................................................... |
151 |
22.5 |
dot1x vlan-assignment ............................................................................................................ |
152 |
22.6 |
dot1x guest-vlan(global).......................................................................................................... |
153 |
22.7 |
dot1x quiet-period..................................................................................................................... |
153 |
22.8 |
dot1x timeout supplicant-timeout ....................................................................................... |
154 |
22.9 |
dot1x max-reauth-req.............................................................................................................. |
155 |
22.10 |
dot1x .............................................................................................................................................. |
156 |
|
VII |
|
22.11 |
dot1x guest-vlan(interface).................................................................................................... |
156 |
22.12 |
dot1x mab .................................................................................................................................... |
157 |
22.13 |
dot1x port-control..................................................................................................................... |
158 |
22.14 |
dot1x port-method.................................................................................................................... |
159 |
22.15 |
show dot1x global ..................................................................................................................... |
159 |
22.16 |
show dot1x interface................................................................................................................ |
160 |
Chapter 23 PPPoE ID-Insertion Commands ............................................................ |
161 |
|
23.1 |
pppoe id-insertion(global)....................................................................................................... |
161 |
23.2 |
pppoe circuit-id(interface)...................................................................................................... |
162 |
23.3 |
pppoe circuit-id type ................................................................................................................ |
162 |
23.4 |
pppoe remote-id........................................................................................................................ |
163 |
23.5 |
show pppoe id-insertion global ............................................................................................ |
164 |
23.6 |
show pppoe id-insertion interface....................................................................................... |
164 |
Chapter 24 System Log Commands .......................................................................... |
166 |
|
24.1 |
logging buffer.............................................................................................................................. |
166 |
24.2 |
logging buffer level.................................................................................................................... |
166 |
24.3 |
logging file flash ......................................................................................................................... |
167 |
24.4 |
logging file flash frequency.................................................................................................... |
168 |
24.5 |
logging file flash level ............................................................................................................... |
169 |
24.6 |
logging host index ..................................................................................................................... |
169 |
24.7 |
logging console.......................................................................................................................... |
170 |
24.8 |
logging console level................................................................................................................ |
171 |
24.9 |
logging monitor .......................................................................................................................... |
172 |
24.10 |
logging monitor level................................................................................................................ |
172 |
24.11 |
clear logging................................................................................................................................ |
173 |
24.12 |
show logging local-config....................................................................................................... |
174 |
24.13 |
show logging loghost ............................................................................................................... |
174 |
24.14 |
show logging buffer .................................................................................................................. |
175 |
24.15 |
show logging flash..................................................................................................................... |
175 |
Chapter 25 SSH Commands......................................................................................... |
177 |
|
25.1 |
ip ssh server ................................................................................................................................ |
177 |
25.2 |
ip ssh version .............................................................................................................................. |
177 |
25.3 |
ip ssh algorithm .......................................................................................................................... |
178 |
25.4 |
ip ssh timeout.............................................................................................................................. |
179 |
25.5 |
ip ssh max-client ........................................................................................................................ |
179 |
25.6 |
ip ssh download.......................................................................................................................... |
180 |
|
VIII |
|
25.7 |
remove public-key..................................................................................................................... |
181 |
25.8 |
show ip ssh................................................................................................................................... |
181 |
Chapter 26 MAC Address Commands....................................................................... |
183 |
|
26.1 |
mac address-table static ........................................................................................................ |
183 |
26.2 |
mac address-table aging-time.............................................................................................. |
184 |
26.3 |
mac address-table filtering .................................................................................................... |
184 |
26.4 |
mac address-table notification............................................................................................. |
185 |
26.5 |
mac address-table max-mac-count ................................................................................... |
186 |
26.6 |
mac address-table notification (interface)........................................................................ |
187 |
26.7 |
mac address-table security ................................................................................................... |
188 |
26.8 |
show mac address-table......................................................................................................... |
189 |
26.9 |
clear mac address-table ......................................................................................................... |
190 |
26.10 |
show mac address-table aging-time .................................................................................. |
190 |
26.11 |
show mac address-table max-mac-count........................................................................ |
191 |
26.12 |
show mac address-table interface...................................................................................... |
191 |
26.13 |
show mac address-table count ............................................................................................ |
192 |
26.14 |
show mac address-table address ....................................................................................... |
193 |
26.15 |
show mac address-table vlan................................................................................................ |
193 |
26.16 |
show mac address-table notification ................................................................................. |
194 |
26.17 |
show mac address-table security........................................................................................ |
194 |
Chapter 27 System Configuration Commands ....................................................... |
196 |
|
27.1 |
system-time manual ................................................................................................................. |
196 |
27.2 |
system-time ntp......................................................................................................................... |
196 |
27.3 |
system-time dst predefined .................................................................................................. |
198 |
27.4 |
system-time dst date ............................................................................................................... |
199 |
27.5 |
system-time dst recurring...................................................................................................... |
200 |
27.6 |
hostname...................................................................................................................................... |
201 |
27.7 |
location.......................................................................................................................................... |
202 |
27.8 |
contact-info................................................................................................................................. |
202 |
27.9 |
ip address..................................................................................................................................... |
203 |
27.10 |
ip address-alloc.......................................................................................................................... |
204 |
27.11 |
reset ............................................................................................................................................... |
205 |
27.12 |
reboot ............................................................................................................................................ |
205 |
27.13 |
reboot-schedule ........................................................................................................................ |
206 |
27.14 |
copy running-config startup-config.................................................................................... |
207 |
27.15 |
copy startup-config tftp.......................................................................................................... |
207 |
|
IX |
|
27.16 |
copy tftp startup-config.......................................................................................................... |
208 |
27.17 |
boot application ......................................................................................................................... |
209 |
27.18 |
remove backup-image............................................................................................................. |
209 |
27.19 |
firmware upgrade....................................................................................................................... |
210 |
27.20 |
boot autoinstall start................................................................................................................. |
211 |
27.21 |
boot autoinstall persistent-mode ........................................................................................ |
211 |
27.22 |
boot autoinstall auto-save...................................................................................................... |
212 |
27.23 |
boot autoinstall auto-reboot.................................................................................................. |
212 |
27.24 |
boot autoinstall retry-count ................................................................................................... |
213 |
27.25 |
show boot autoinstall ............................................................................................................... |
214 |
27.26 |
show boot autoinstall downloaded-config ....................................................................... |
214 |
27.27 |
ping................................................................................................................................................. |
215 |
27.28 |
tracert ............................................................................................................................................ |
216 |
27.29 |
show system-info ...................................................................................................................... |
217 |
27.30 |
show system-info interface ................................................................................................... |
217 |
27.31 |
show image-info......................................................................................................................... |
218 |
27.32 |
show boot..................................................................................................................................... |
218 |
27.33 |
show running-config................................................................................................................. |
219 |
27.34 |
show running-config |............................................................................................................... |
219 |
27.35 |
show startup-config ................................................................................................................. |
220 |
27.36 |
show system-time..................................................................................................................... |
220 |
27.37 |
show system-time dst.............................................................................................................. |
221 |
27.38 |
show system-time ntp ............................................................................................................. |
221 |
27.39 |
show cable-diagnostics interface gigabitEthernet........................................................ |
222 |
27.40 |
show cable-diagnostics careful interface......................................................................... |
222 |
27.41 |
show cpu-utilization.................................................................................................................. |
223 |
27.42 |
show memory-utilization......................................................................................................... |
223 |
Chapter 28 IPv6 Address Configuration Commands ............................................ |
225 |
|
28.1 |
ipv6 enable................................................................................................................................... |
225 |
28.2 |
ipv6 address autoconfig.......................................................................................................... |
225 |
28.3 |
ipv6 address link-local ............................................................................................................. |
226 |
28.4 |
ipv6 address dhcp..................................................................................................................... |
227 |
28.5 |
ipv6 address ra ........................................................................................................................... |
227 |
28.6 |
ipv6 address eui-64 .................................................................................................................. |
228 |
28.7 |
ipv6 address................................................................................................................................ |
229 |
28.8 |
show ipv6 interface................................................................................................................... |
230 |
X
Chapter 29 Ethernet Configuration Commands..................................................... |
231 |
|
29.1 |
interface gigabitEthernet........................................................................................................ |
231 |
29.2 |
interface range gigabitEthernet............................................................................................ |
231 |
29.3 |
description................................................................................................................................... |
232 |
29.4 |
shutdown...................................................................................................................................... |
233 |
29.5 |
flow-control ................................................................................................................................. |
234 |
29.6 |
duplex ............................................................................................................................................ |
234 |
29.7 |
jumbo ............................................................................................................................................. |
235 |
29.8 |
jumbo-size.................................................................................................................................... |
235 |
29.9 |
speed ............................................................................................................................................. |
236 |
29.10 |
storm-control pps ..................................................................................................................... |
237 |
29.11 |
storm-control.............................................................................................................................. |
237 |
29.12 |
bandwidth..................................................................................................................................... |
238 |
29.13 |
clear counters............................................................................................................................. |
239 |
29.14 |
show interface status............................................................................................................... |
240 |
29.15 |
show interface counters ......................................................................................................... |
240 |
29.16 |
show interface configuration................................................................................................. |
241 |
29.17 |
show storm-control .................................................................................................................. |
242 |
29.18 |
show bandwidth ......................................................................................................................... |
242 |
Chapter 30 QoS Commands......................................................................................... |
244 |
|
30.1 |
qos (For T2600G-18TS only) ................................................................................................. |
244 |
30.2 |
qos (For other switches).......................................................................................................... |
245 |
30.3 |
qos cos.......................................................................................................................................... |
245 |
30.4 |
qos dscp ....................................................................................................................................... |
246 |
30.5 |
qos queue cos-map.................................................................................................................. |
247 |
30.6 |
qos queue dscp-map (For T2600G-18TS only)............................................................... |
248 |
30.7 |
qos queue dscp-map (For other switches)....................................................................... |
249 |
30.8 |
qos queue mode ........................................................................................................................ |
250 |
30.9 |
qos queue weight ...................................................................................................................... |
251 |
30.10 |
show qos interface.................................................................................................................... |
252 |
30.11 |
show qos cos-map.................................................................................................................... |
253 |
30.12 |
show qos dscp-map ................................................................................................................. |
253 |
30.13 |
show qos queue mode............................................................................................................. |
254 |
30.14 |
show qos status ......................................................................................................................... |
254 |
Chapter 31 Port Mirror Commands............................................................................ |
255 |
|
31.1 |
monitor session destination interface................................................................................ |
255 |
|
XI |
|
31.2 |
monitor session source interface........................................................................................ |
256 |
31.3 |
show monitor session.............................................................................................................. |
257 |
Chapter 32 Port Isolation Commands ....................................................................... |
258 |
|
32.1 |
port isolation................................................................................................................................ |
258 |
32.2 |
show port isolation interface ................................................................................................. |
259 |
Chapter 33 Loopback Detection Commands.......................................................... |
260 |
|
33.1 |
loopback-detection (global)................................................................................................... |
260 |
33.2 |
loopback-detection interval................................................................................................... |
260 |
33.3 |
loopback-detection recovery-time..................................................................................... |
261 |
33.4 |
loopback-detection (interface) ............................................................................................. |
262 |
33.5 |
loopback-detection config process-mode ...................................................................... |
262 |
33.6 |
loopback-detection config recovery-mode..................................................................... |
263 |
33.7 |
loopback-detection recover.................................................................................................. |
264 |
33.8 |
show loopback-detection global.......................................................................................... |
264 |
33.9 |
show loopback-detection interface.................................................................................... |
265 |
Chapter 34 DDM Commands ....................................................................................... |
266 |
|
34.1 |
ddm state enable ....................................................................................................................... |
266 |
34.2 |
ddm shutdown............................................................................................................................ |
266 |
34.3 |
ddm temperature_threshold.................................................................................................. |
267 |
34.4 |
ddm voltage_threshold............................................................................................................ |
268 |
34.5 |
ddm bias_current_threshold ................................................................................................. |
269 |
34.6 |
ddm tx_power_threshold........................................................................................................ |
270 |
34.7 |
ddm rx_power_threshold........................................................................................................ |
271 |
34.8 |
show ddm configuration.......................................................................................................... |
272 |
34.9 |
show ddm status........................................................................................................................ |
273 |
Chapter 35 ACL Commands......................................................................................... |
274 |
|
35.1 |
time-range.................................................................................................................................... |
274 |
35.2 |
absolute ........................................................................................................................................ |
274 |
35.3 |
periodic ......................................................................................................................................... |
275 |
35.4 |
holiday ........................................................................................................................................... |
276 |
35.5 |
holiday (global)............................................................................................................................ |
277 |
35.6 |
access-list create...................................................................................................................... |
277 |
35.7 |
mac access-list .......................................................................................................................... |
278 |
35.8 |
access-list standard ................................................................................................................. |
279 |
35.9 |
access-list extended................................................................................................................ |
280 |
|
XII |
|
35.10 |
access-list combined............................................................................................................... |
281 |
35.11 |
access-list ipv6 .......................................................................................................................... |
283 |
35.12 |
rule .................................................................................................................................................. |
284 |
35.13 |
access-list policy name........................................................................................................... |
286 |
35.14 |
access-list policy action.......................................................................................................... |
286 |
35.15 |
redirect interface ....................................................................................................................... |
287 |
35.16 |
s-condition................................................................................................................................... |
288 |
35.17 |
s-mirror.......................................................................................................................................... |
288 |
35.18 |
qos-remark .................................................................................................................................. |
289 |
35.19 |
access-list bind acl (interface) .............................................................................................. |
290 |
35.20 |
access-list bind acl (vlan) ........................................................................................................ |
290 |
35.21 |
access-list bind (interface) ..................................................................................................... |
291 |
35.22 |
access-list packet-content profile ...................................................................................... |
292 |
35.23 |
access-list packet-content config ...................................................................................... |
292 |
35.24 |
access-list bind (vlan)............................................................................................................... |
293 |
35.25 |
show access-list ........................................................................................................................ |
294 |
35.26 |
show access-list status........................................................................................................... |
295 |
35.27 |
show access-list policy ........................................................................................................... |
295 |
35.28 |
show access-list bind............................................................................................................... |
296 |
Chapter 36 MSTP Commands...................................................................................... |
297 |
|
36.1 |
debug spanning-tree................................................................................................................ |
297 |
36.2 |
spanning-tree (global) .............................................................................................................. |
298 |
36.3 |
spanning-tree (interface) ........................................................................................................ |
298 |
36.4 |
spanning-tree common-config............................................................................................. |
299 |
36.5 |
spanning-tree mode ................................................................................................................. |
300 |
36.6 |
spanning-tree mst configuration ......................................................................................... |
301 |
36.7 |
instance......................................................................................................................................... |
301 |
36.8 |
name............................................................................................................................................... |
302 |
36.9 |
revision.......................................................................................................................................... |
303 |
36.10 |
spanning-tree mst instance................................................................................................... |
304 |
36.11 |
spanning-tree mst..................................................................................................................... |
304 |
36.12 |
spanning-tree priority .............................................................................................................. |
305 |
36.13 |
spanning-tree timer .................................................................................................................. |
306 |
36.14 |
spanning-tree hold-count....................................................................................................... |
307 |
36.15 |
spanning-tree max-hops......................................................................................................... |
307 |
36.16 |
spanning-tree bpdufilter ......................................................................................................... |
308 |
36.17 |
spanning-tree bpduguard....................................................................................................... |
309 |
|
|
XIII |
36.18 |
spanning-tree guard loop ....................................................................................................... |
309 |
36.19 |
spanning-tree guard root........................................................................................................ |
310 |
36.20 |
spanning-tree guard tc............................................................................................................ |
311 |
36.21 |
spanning-tree mcheck............................................................................................................. |
311 |
36.22 |
show spanning-tree active..................................................................................................... |
312 |
36.23 |
show spanning-tree bridge .................................................................................................... |
312 |
36.24 |
show spanning-tree interface ............................................................................................... |
313 |
36.25 |
show spanning-tree interface-security ............................................................................. |
314 |
36.26 |
show spanning-tree mst ......................................................................................................... |
314 |
Chapter 37 Ethernet OAM Commands...................................................................... |
316 |
|
37.1 |
ethernet-oam .............................................................................................................................. |
316 |
37.2 |
ethernet-oam mode.................................................................................................................. |
316 |
37.3 |
ethernet-oam link-monitor symbol-period....................................................................... |
317 |
37.4 |
ethernet-oam link-monitor frame ........................................................................................ |
318 |
37.5 |
ethernet-oam link-monitor frame-period.......................................................................... |
319 |
37.6 |
ethernet-oam link-monitor frame-seconds...................................................................... |
320 |
37.7 |
ethernet-oam remote-failure................................................................................................. |
321 |
37.8 |
ethernet-oam remote-loopback received-remote- loopback................................... |
322 |
37.9 |
ethernet-oam remote-loopback .......................................................................................... |
323 |
37.10 |
clear ethernet-oam statistics ................................................................................................ |
324 |
37.11 |
clear ethernet-oam event-log ............................................................................................... |
324 |
37.12 |
show ethernet-oam configuration....................................................................................... |
325 |
37.13 |
show ethernet-oam event-log .............................................................................................. |
326 |
37.14 |
show ethernet-oam statistics ............................................................................................... |
326 |
37.15 |
show ethernet-oam status ..................................................................................................... |
327 |
Chapter 38 DLDP Commands...................................................................................... |
328 |
|
38.1 |
dldp (global) ................................................................................................................................. |
328 |
38.2 |
dldp interval ................................................................................................................................. |
328 |
38.3 |
dldp shut-mode.......................................................................................................................... |
329 |
38.4 |
dldp reset (global) ...................................................................................................................... |
330 |
38.5 |
dldp(interface)............................................................................................................................. |
330 |
38.6 |
dldp reset (interface) ................................................................................................................ |
331 |
38.7 |
show dldp ..................................................................................................................................... |
331 |
38.8 |
show dldp interface................................................................................................................... |
332 |
Chapter 39 IGMP Snooping Commands.................................................................... |
333 |
|
39.1 |
ip igmp snooping (global)........................................................................................................ |
333 |
|
XIV |
|
39.2 |
ip igmp snooping (interface) .................................................................................................. |
333 |
39.3 |
ip igmp snooping rtime ............................................................................................................ |
334 |
39.4 |
ip igmp snooping mtime.......................................................................................................... |
335 |
39.5 |
ip igmp snooping report-suppression................................................................................ |
335 |
39.6 |
ip igmp snooping immediate-leave ..................................................................................... |
336 |
39.7 |
ip igmp snooping drop-unknown ......................................................................................... |
336 |
39.8 |
ip igmp snooping last-listener query-inteval.................................................................... |
337 |
39.9 |
ip igmp snooping last-listener query-count ..................................................................... |
338 |
39.10 |
ip igmp snooping vlan-config ................................................................................................ |
338 |
39.11 |
ip igmp snooping vlan-config (router-port-forbidden) ................................................. |
340 |
39.12 |
ip igmp snooping multi-vlan-config..................................................................................... |
341 |
39.13 |
ip igmp snooping multi-vlan-config (router-port-forbidden)...................................... |
342 |
39.14 |
ip igmp snooping multi-vlan-config (source-ip-replace) ............................................. |
343 |
39.15 |
ip igmp snooping querier vlan ............................................................................................... |
343 |
39.16 |
ip igmp snooping querier vlan (general query) ................................................................ |
344 |
39.17 |
ip igmp snooping max-groups .............................................................................................. |
345 |
39.18 |
ip igmp snooping authentication.......................................................................................... |
346 |
39.19 |
ip igmp snooping accounting................................................................................................ |
347 |
39.20 |
ip igmp profile ............................................................................................................................. |
347 |
39.21 |
deny................................................................................................................................................ |
348 |
39.22 |
permit............................................................................................................................................. |
349 |
39.23 |
range .............................................................................................................................................. |
349 |
39.24 |
ip igmp filter ................................................................................................................................. |
350 |
39.25 |
clear ip igmp snooping statistics ......................................................................................... |
350 |
39.26 |
show ip igmp snooping............................................................................................................ |
351 |
39.27 |
show ip igmp snooping interface......................................................................................... |
351 |
39.28 |
show ip igmp snooping vlan................................................................................................... |
352 |
39.29 |
show ip igmp snooping multi-vlan ....................................................................................... |
353 |
39.30 |
show ip igmp snooping groups............................................................................................. |
353 |
39.31 |
show ip igmp snooping querier............................................................................................. |
354 |
39.32 |
show ip igmp profile.................................................................................................................. |
355 |
Chapter 40 MLD Snooping Commands..................................................................... |
356 |
|
40.1 |
ipv6 mld snooping (global)...................................................................................................... |
356 |
40.2 |
ipv6 mld snooping (interface) ................................................................................................ |
356 |
40.3 |
ipv6 mld snooping rtime.......................................................................................................... |
357 |
40.4 |
ipv6 mld snooping mtime........................................................................................................ |
357 |
40.5 |
ipv6 mld snooping report-suppression ............................................................................. |
358 |
|
XV |
|
40.6 |
ipv6 mld snooping immediate-leave................................................................................... |
359 |
40.7 |
ipv6 mld snooping drop-unknown....................................................................................... |
359 |
40.8 |
ipv6 mld snooping last-listener query-inteval ................................................................. |
360 |
40.9 |
ipv6 mld snooping last-listener query-count................................................................... |
360 |
40.10 |
ipv6 mld snooping vlan-config.............................................................................................. |
361 |
40.11 |
ip mld snooping vlan-config (router-port-forbidden).................................................... |
362 |
40.12 |
ipv6 mld snooping multi-vlan-config .................................................................................. |
363 |
40.13 |
ipv6 mld snooping multi-vlan-config (router-port-forbidden).................................... |
364 |
40.14 |
ipv6 mld snooping multi-vlan-config (source-ip-replace) ........................................... |
365 |
40.15 |
ipv6 mld snooping querier vlan............................................................................................. |
366 |
40.16 |
ipv6 mld snooping querier vlan (general query) .............................................................. |
366 |
40.17 |
ipv6 mld snooping max-groups............................................................................................ |
367 |
40.18 |
ipv6 mld profile ........................................................................................................................... |
369 |
40.19 |
deny................................................................................................................................................ |
369 |
40.20 |
permit............................................................................................................................................. |
370 |
40.21 |
range .............................................................................................................................................. |
370 |
40.22 |
ipv6 mld filter............................................................................................................................... |
371 |
40.23 |
clear ipv6 mld snooping statistics ....................................................................................... |
371 |
40.24 |
show ipv6 mld snooping.......................................................................................................... |
372 |
40.25 |
show ipv6 mld snooping interface....................................................................................... |
372 |
40.26 |
show ipv6 mld snooping vlan................................................................................................. |
373 |
40.27 |
show ipv6 mld snooping multi-vlan ..................................................................................... |
374 |
40.28 |
show ipv6 mld snooping groups .......................................................................................... |
374 |
40.29 |
show ipv6 mld snooping querier .......................................................................................... |
375 |
40.30 |
show ipv6 mld profile................................................................................................................ |
375 |
Chapter 41 SNMP Commands ..................................................................................... |
377 |
|
41.1 |
snmp-server ................................................................................................................................ |
377 |
41.2 |
snmp-server view ...................................................................................................................... |
377 |
41.3 |
snmp-server group ................................................................................................................... |
378 |
41.4 |
snmp-server user ...................................................................................................................... |
380 |
41.5 |
snmp-server community......................................................................................................... |
381 |
41.6 |
snmp-server host ...................................................................................................................... |
382 |
41.7 |
snmp-server engineID ............................................................................................................. |
384 |
41.8 |
snmp-server traps snmp......................................................................................................... |
384 |
41.9 |
snmp-server traps link-status............................................................................................... |
385 |
41.10 |
snmp-server traps..................................................................................................................... |
386 |
41.11 |
snmp-server traps ddm........................................................................................................... |
387 |
|
XVI |
|
41.12 |
snmp-server traps vlan............................................................................................................ |
388 |
41.13 |
snmp-server traps security dhcp-snoop .......................................................................... |
389 |
41.14 |
rmon history ................................................................................................................................ |
390 |
41.15 |
rmon event................................................................................................................................... |
391 |
41.16 |
rmon alarm ................................................................................................................................... |
392 |
41.17 |
rmon statistics............................................................................................................................ |
393 |
41.18 |
show snmp-server..................................................................................................................... |
394 |
41.19 |
show snmp-server view........................................................................................................... |
395 |
41.20 |
show snmp-server group........................................................................................................ |
395 |
41.21 |
show snmp-server user........................................................................................................... |
395 |
41.22 |
show snmp-server community ............................................................................................. |
396 |
41.23 |
show snmp-server host........................................................................................................... |
396 |
41.24 |
show snmp-server engineID.................................................................................................. |
397 |
41.25 |
show rmon history..................................................................................................................... |
397 |
41.26 |
show rmon event ....................................................................................................................... |
398 |
41.27 |
show rmon alarm........................................................................................................................ |
398 |
41.28 |
show rmon statistics ................................................................................................................ |
399 |
Chapter 42 LLDP Commands....................................................................................... |
400 |
|
42.1 |
lldp................................................................................................................................................... |
400 |
42.2 |
lldp forward_message.............................................................................................................. |
400 |
42.3 |
lldp hold-multiplier..................................................................................................................... |
401 |
42.4 |
lldp timer ....................................................................................................................................... |
402 |
42.5 |
lldp receive................................................................................................................................... |
403 |
42.6 |
lldp transmit................................................................................................................................. |
403 |
42.7 |
lldp snmp-trap............................................................................................................................. |
404 |
42.8 |
lldp tlv-select............................................................................................................................... |
405 |
42.9 |
lldp management address...................................................................................................... |
405 |
42.10 |
lldp med-fast-count .................................................................................................................. |
406 |
42.11 |
lldp med-status........................................................................................................................... |
407 |
42.12 |
lldp med-tlv-select .................................................................................................................... |
407 |
42.13 |
lldp med-location....................................................................................................................... |
408 |
42.14 |
show lldp....................................................................................................................................... |
409 |
42.15 |
show lldp interface .................................................................................................................... |
410 |
42.16 |
show lldp local-information interface ................................................................................. |
410 |
42.17 |
show lldp neighbor-information interface......................................................................... |
411 |
42.18 |
show lldp traffic interface ....................................................................................................... |
411 |
XVII
Chapter 43 sFlow Commands...................................................................................... |
413 |
|
43.1 |
sflow address.............................................................................................................................. |
413 |
43.2 |
sflow enable................................................................................................................................. |
414 |
43.3 |
sflow collector collector-ID.................................................................................................... |
414 |
43.4 |
sflow sampler.............................................................................................................................. |
415 |
43.5 |
show sflow global ...................................................................................................................... |
416 |
43.6 |
show sflow collector................................................................................................................. |
417 |
43.7 |
show sflow sampler .................................................................................................................. |
417 |
Chapter 44 Static Routes Commands ....................................................................... |
418 |
|
44.1 |
interface vlan............................................................................................................................... |
418 |
44.2 |
interface loopback .................................................................................................................... |
418 |
44.3 |
switchport .................................................................................................................................... |
419 |
44.4 |
interface range port-channel................................................................................................. |
420 |
44.5 |
description................................................................................................................................... |
420 |
44.6 |
shutdown...................................................................................................................................... |
421 |
44.7 |
interface port-channel............................................................................................................. |
422 |
44.8 |
ip route .......................................................................................................................................... |
422 |
44.9 |
ipv6 routing.................................................................................................................................. |
423 |
44.10 |
ipv6 route...................................................................................................................................... |
424 |
44.11 |
show interface vlan ................................................................................................................... |
424 |
44.12 |
show ip interface........................................................................................................................ |
425 |
44.13 |
show ip interface brief.............................................................................................................. |
426 |
44.14 |
show ip route............................................................................................................................... |
426 |
44.15 |
show ip route specify ............................................................................................................... |
427 |
44.16 |
show ip route summary ........................................................................................................... |
428 |
44.17 |
show ipv6 interface................................................................................................................... |
428 |
44.18 |
show ipv6 route.......................................................................................................................... |
429 |
44.19 |
show ipv6 route summary ...................................................................................................... |
429 |
Chapter 45 SDM Template Commands..................................................................... |
431 |
|
45.1 |
sdm prefer.................................................................................................................................... |
431 |
45.2 |
show sdm prefer ........................................................................................................................ |
432 |
Chapter 46 AAA Commands ........................................................................................ |
433 |
|
46.1 |
aaa enable .................................................................................................................................... |
433 |
46.2 |
tacacas-server host.................................................................................................................. |
434 |
46.3 |
show tacacs-server .................................................................................................................. |
435 |
|
|
XVIII |
46.4 |
radius-server host ..................................................................................................................... |
435 |
46.5 |
show radius-server ................................................................................................................... |
437 |
46.6 |
aaa group...................................................................................................................................... |
437 |
46.7 |
server............................................................................................................................................. |
438 |
46.8 |
show aaa group .......................................................................................................................... |
439 |
46.9 |
aaa authentication login .......................................................................................................... |
439 |
46.10 |
aaa authentication enable....................................................................................................... |
440 |
46.11 |
aaa authentication dot1x default.......................................................................................... |
441 |
46.12 |
aaa accounting dot1x default................................................................................................ |
442 |
46.13 |
show aaa authentication ......................................................................................................... |
443 |
46.14 |
show aaa accounting................................................................................................................ |
443 |
46.15 |
line console.................................................................................................................................. |
444 |
46.16 |
login authentication (console)............................................................................................... |
444 |
46.17 |
enable authentication (console) ........................................................................................... |
445 |
46.18 |
line telnet ...................................................................................................................................... |
446 |
46.19 |
login authentication (telnet).................................................................................................... |
446 |
46.20 |
line ssh........................................................................................................................................... |
447 |
46.21 |
login authentication (ssh)........................................................................................................ |
447 |
46.22 |
enable authentication (telnet)................................................................................................ |
448 |
46.23 |
enable authentication (ssh) .................................................................................................... |
449 |
46.24 |
ip http login authentication..................................................................................................... |
450 |
46.25 |
ip http enable authentication................................................................................................. |
450 |
46.26 |
show aaa global.......................................................................................................................... |
451 |
Chapter 47 DHCP Server Commands........................................................................ |
452 |
|
47.1 |
service dhcp server .................................................................................................................. |
452 |
47.2 |
ip dhcp server extend-option capwap-ac-ip.................................................................... |
452 |
47.3 |
ip dhcp server extend-option vendor-class-id ............................................................... |
453 |
47.4 |
ip dhcp server exclude-address........................................................................................... |
454 |
47.5 |
ip dhcp server pool ................................................................................................................... |
454 |
47.6 |
ip dhcp server ping timeout ................................................................................................... |
455 |
47.7 |
ip dhcp server ping packets................................................................................................... |
456 |
47.8 |
network ......................................................................................................................................... |
456 |
47.9 |
lease ............................................................................................................................................... |
457 |
47.10 |
address hardware-address.................................................................................................... |
458 |
47.11 |
address client-identifier .......................................................................................................... |
458 |
47.12 |
default-gateway ......................................................................................................................... |
459 |
47.13 |
dns-server.................................................................................................................................... |
460 |
|
XIX |
|
47.14 |
netbios-name-server ............................................................................................................... |
461 |
47.15 |
netbios-node-type .................................................................................................................... |
461 |
47.16 |
next-server................................................................................................................................... |
462 |
47.17 |
domain-name.............................................................................................................................. |
463 |
47.18 |
bootfile .......................................................................................................................................... |
463 |
47.19 |
show ip dhcp server status .................................................................................................... |
464 |
47.20 |
show ip dhcp server statistics............................................................................................... |
464 |
47.21 |
show ip dhcp server extend-option .................................................................................... |
465 |
47.22 |
show ip dhcp server pool........................................................................................................ |
465 |
47.23 |
show ip dhcp server excluded-address ............................................................................ |
466 |
47.24 |
show ip dhcp server manual-binding.................................................................................. |
466 |
47.25 |
show ip dhcp server binding.................................................................................................. |
467 |
47.26 |
clear ip dhcp server statistics ............................................................................................... |
467 |
47.27 |
clear ip dhcp server binding................................................................................................... |
468 |
Chapter 48 DHCP Relay Commands .......................................................................... |
469 |
|
48.1 |
service dhcp relay ..................................................................................................................... |
469 |
48.2 |
ip helper-address....................................................................................................................... |
469 |
48.3 |
ip dhcp relay information ........................................................................................................ |
470 |
48.4 |
ip dhcp relay information policy ........................................................................................... |
471 |
48.5 |
ip dhcp relay information format .......................................................................................... |
471 |
48.6 |
ip dhcp relay information custom ........................................................................................ |
472 |
48.7 |
ip dhcp relay information circuit-id...................................................................................... |
473 |
48.8 |
ip dhcp relay information remote-id.................................................................................... |
473 |
48.9 |
ip dhcp relay default-interface.............................................................................................. |
474 |
48.10 |
ip dhcp relay vlan ....................................................................................................................... |
475 |
48.11 |
show ip dhcp relay..................................................................................................................... |
475 |
Chapter 49 PoE Commands ......................................................................................... |
477 |
|
49.1 |
power inline consumption (global)....................................................................................... |
477 |
49.2 |
power inline disconnect-method ......................................................................................... |
477 |
49.3 |
power profile ............................................................................................................................... |
478 |
49.4 |
power time-range ...................................................................................................................... |
479 |
49.5 |
power holiday.............................................................................................................................. |
480 |
49.6 |
absolute ........................................................................................................................................ |
481 |
49.7 |
periodic ......................................................................................................................................... |
481 |
49.8 |
holiday ........................................................................................................................................... |
482 |
49.9 |
power inline consumption (interface) ................................................................................. |
483 |
|
XX |
|
49.10 |
power inline priority................................................................................................................... |
484 |
49.11 |
power inline supply.................................................................................................................... |
484 |
49.12 |
power inline profile.................................................................................................................... |
485 |
49.13 |
power inline time-range........................................................................................................... |
486 |
49.14 |
show power inline ...................................................................................................................... |
486 |
49.15 |
show power inline configuration interface........................................................................ |
487 |
49.16 |
show power inline information interface ........................................................................... |
487 |
49.17 |
show power profile.................................................................................................................... |
488 |
49.18 |
show power holiday .................................................................................................................. |
488 |
49.19 |
show power time-range........................................................................................................... |
489 |
XXI
This Guide is intended for network administrator to provide referenced information about CLI (Command Line Interface). The device mentioned in this Guide stands for T2600G-18TS/ T2600G-28TS/ T2600G-52TS/ T2600G-28MPS JetStream Gigabit L2 Managed Switch without any explanation. The commands in this guilde apply to these models if not specially noted, and T2600G-28TS is taken as an example model in the example commands.
Some models featured in this guide may be unavailable in your country or region. For local sales information, visit http://www.tp-link.com.
Overview of this Guide
Chapter 1: Using the CLI
Provide information about how to use the CLI, CLI Command Modes, Security Levels and some Conventions.
Chapter 2: User Interface
Provide information about the commands used to switch between five CLI Command Modes.
Chapter 3: IEEE 802.1Q VLAN Commands
Provide information about the commands used for configuring IEEE 802.1Q VLAN.
Chapter 4: MAC-based VLAN Commands
Provide information about the commands used for configuring MAC-based VLAN.
Chapter 5: Protocol VLAN Commands
Provide information about the commands used for configuring Protocol VLAN.
Chapter 6: VLAN-VPN Commands
Provide information about the commands used for configuring VLAN-VPN (Virtual Private Network) function.
Chapter 7: Private VLAN Commands
Provide information about the commands used for configuring Private VLAN.
Chapter 8: L2PT Commands
Provide information about the commands used for configuring L2PT (Layer 2 Portocol Tunneling).
Chapter 9: GVRP Commands
Provide information about the commands used for configuring GVRP (GARP VLAN registration protocol).
Chapter 10: Voice VLAN Commands
Provide information about the commands used for configuring Voice VLAN.
1
Chapter 11: Etherchannel Commands
Provide information about the commands used for configuring LAG (Link Aggregation Group) and LACP (Link Aggregation Control Protocol).
Chapter 12: User Management Commands
Provide information about the commands used for user management.
Chapter 13: HTTP and HTTPS Commands
Provide information about the commands used for configuring the HTTP and HTTPS logon.
Chapter 14: ARP Commands
Provide information about the commands used for configuring the ARP (Address Resolution Protocol) functions.
Chapter 15: Binding Table Commands
Provide information about the commands used for binding the IP address, MAC address, VLAN and the connected Port number of the Host together.
Chapter 16: IPv6 Binding Table Commands
Provide information about the commands used for binding the IPv6 address, MAC address, VLAN and the connected Port number of the Host together.
Chapter 17: IP Verify Source Commands
Provide information about the commands used for guarding the IP Source by filtering the IP packets based on the IP-MAC Binding entries.
Chapter 18: IPv6 Verify Source Commands
Provide information about the commands used for guarding the IPv6 Source by filtering the IP packets based on the IP-MAC Binding entries.
Chapter 19: ND Detection Commands
Provide information about the commands used for congifuring ND detection.
Chapter 20: ARP Inspection Commands
Provide information about the commands used for protecting the switch from the ARP cheating or ARP Attack.
Chapter 21: DoS Defend Command
Provide information about the commands used for DoS defend and detecting the DoS attack.
Chapter 22: IEEE 802.1X Commands
Provide information about the commands used for configuring IEEE 802.1X function.
Chapter 23 PPPoE ID Insertion Commands
Provide information about the commands used for configuring PPPoE ID Insertion.
Chapter 24: System Log Commands
Provide information about the commands used for configuring system log.
2
Chapter 25: SSH Commands
Provide information about the commands used for configuring and managing SSH (Security Shell).
Chapter 26: MAC Address Commands
Provide information about the commands used for Address configuration.
Chapter 27: System Configuration Commands
Provide information about the commands used for configuring the System information and System IP, reboot and reset the switch, upgrade the switch system and commands used for cable test.
Chapter 28: IPv6 Address Configuration Commands
Provide information about the commands used for configuring the System IPv6 addresses.
Chapter 29: Ethernet Configuration Commands
Provide information about the commands used for configuring the Bandwidth Control, Negotiation Mode, and Storm Control for enthernet ports.
Chapter 30: QoS Commands
Provide information about the commands used for configuring the QoS function.
Chapter 31: Port Mirror Commands
Provide information about the commands used for configuring the Port Mirror function.
Chapter 32: Port Isolation Commands
Provide information about the commands used for configuring Port Isolation function.
Chapter 33: Loopback Detection Commands
Provide information about the commands used for configuring the Loopback Detection function.
Chapter 34: DDM Commands
Provide information about the commands used for DDM (Digtal Diagnostic Monitoring) function.
Chapter 35: ACL Commands
Provide information about the commands used for configuring the ACL (Access Control List).
Chapter 36: MSTP Commands
Provide information about the commands used for configuring the MSTP (Multiple Spanning Tree Protocol).
Chapter 37 Ethernet OAM Commands
Provide information about the commands used for configuring the Ethernet OAM (Operation, Administration, and Maintenance) function.
3
Chapter 38: DLDP Commands
Provide information about the commands used for configuring the DLDP (Device Link Detection Protocol).
Chapter 39: IGMP Snooping Commands
Provide information about the commands used for configuring the IGMP Snooping (Internet Group Management Protocol Snooping).
Chapter 40: MLD Snooping Commands
Provide information about the commands used for configuring the MLD Snooping (Multicast Listener Discovery Snooping).
Chapter 41: SNMP Commands
Provide information about the commands used for configuring the SNMP (Simple Network Management Protocol) functions.
Chapter 42: LLDP Commands
Provide information about the commands used for configuring LLDP function.
Chapter 43: sFlow Commands
Provide information about the commands used for configuring the Sampled Flow function.
Chapter 44: Static Routes Commands
Provide information about the commands used for configuring the Static Route function.
Chapter 45: SDM Template Commands
Provide information about the commands used for configuring the SDM templates.
Chapter 46: AAA Commands
Provide information about the commands used for configuring AAA (authentication, authorization and accounting).
Chapter 47: DHCP Server Commands
Provide information about the commands used for configuring the DHCP Server function.
Chapter 48: DHCP Relay Commands
Provide information about the commands used for configuring the DHCP Relay function.
Chapter 49: PoE Commands(For T2600G-28MPS only)
Provide information about the commands used for configuring PoE function.
4
You can log on to the switch and access the CLI by the following three methods:
1.Log on to the switch by the console port on the switch.
2.Log on to the switch remotely by a Telnet connection through an Ethernet port.
3.Log on to the switch remotely by an SSH connection through an Ethernet port.
Console Port
The switch has two console ports: an RJ-45 console port and a Micro-USB console port. Console output is active on devices connected to both console ports, but console input is only active on one console port at a time.
The Micro-USB connector takes precedence over the RJ-45 connector. When the switch detects a valid connection on the Micro-USB console port, input from the RJ-45 console port is immediately disabled, and input from the Micro-USB console port is enabled. Removing the Micro-USB connection immediately reenables input from the RJ-45 console connection.
USB Console Driver
If you are using the USB port on the MAC OS X or Linux OS for console connection, there is no need to run a USB driver.
If you are using the switch’s Micro-USB console port with the USB port of a Windows PC, a driver for the USB port is required. The USB driver is provided on the resource CD. Follow the InstallSheild Wizard to accomplish the installation.
The TP-Link USB Console Driver supports the following Windows operating systems:
32-bit Windows XP SP3
64-bit Windows XP
32-bit Windows Vista
64-bit Windows Vista
32-bit Windows 7
64-bit Windows 7
32-bit Windows 8
5
64-bit Windows 8
32-bit Windows 8.1
64-bit Windows 8.1
After the TP-Link USB Console Driver is installed, the PC’s USB port will act as RS-232 serial port when the PC’s USB port is connected to the switch’s Micro-USB console port. And the PC’s USB port will act as standard USB port when the PC’s USB port is unplugged from the switch.
Logon
Take the following steps to log on to the switch by the console port.
1.Connect the PCs or Terminals to the console port on the switch by the provided cable.
2.Start the terminal emulation program (such as the HyperTerminal) on the PC.
3.Specify the connection COM port in the terminal emulation program. If the Micro-USB Console port is used, you can view which port is assigned to the USB serial port in the following path:
Control Panel -> Hardware and Sound -> Device Manager -> Ports ->USB Serial Port.
Figure 1-1 USB Serial Port Number
4.Configure the terminal emulation program or the terminal to use the following settings:
Baud rate: 38400 bps
Data bits: 8
Parity: none
Stop bits: 1
Flow control: none
6
5.The DOS prompt ”T2600G-28TS>” will appear after pressing the Enter button as shown in Figure 1-2. It indicates that you can use the CLI now.
Figure 1-2 Log in the Switch
For Telnet connection, you should also configure the Telnet login mode and login authentication information through console connection.
Telnet login has the following two modes. You can choose one according to your needs:
Login local Mode: It requires username and password, which are both admin by default.
Login Mode: It doesn’t require username and password, but a connection password is required.
Before Telnet login, you are required to configure Telnet login mode and login authentication information through console connection.
7
Login Local Mode
Firstly, configure the Telnet login mode as “login local” in the prompted DOS screen shown in Figure 1-3.
Figure 1-3 Configure login local mode
Now, you can logon by Telnet in login local mode.
1.Make sure the switch and the PC are in the same LAN. Click Start and type in cmd in the Search programs and files window and press the Enter button.
Figure 1-4 Run Window
2.Type telnet 192.168.0.1 in the command prompt shown as Figure 1-5, and press the Enter button.
Figure 1-5 Connecting to the Switch
8