TL-SG2216/TL-SG2424/TL-SG2424P/TL-SG2452
Gigabit Smart Switch
1094
COPYRIGHT & TRADEMARKS
Specifications are subject to change without notice. is a registered trademark of
TP-LINK TECHNOLOGIES CO., LTD. Other brands and product names are trademarks or
registered trademarks of their respective holders.
No part of the specifications may be reproduced in any form or by any means or used to make any
derivative such as translation, transformation, or adaptation without permission from TP-LINK
TECHNOLOGIES CO., LTD. Copyright © 2014 TP-LINK TECHNOLOGIES CO., LTD. All rights
reserved.
http://www.tp-link.com
I
CONTENTS
Preface .............................................................................................................. 1
Chapter 1 Using the CLI ....................................................................................... 4
1.1 Accessing the CLI ............................................................................................................... 4
1.1.1. Logon by Telnet ................................................................................................... 4
1.1.2. Logon by SSH ..................................................................................................... 5
1.2 CLI Command Modes ........................................................................................................ 11
1.3 Security Levels .................................................................................................................. 13
1.4 Conventions ...................................................................................................................... 13
1.4.1 Format Conventions ............................................................................................... 13
1.4.2 Special Characters .................................................................................................. 14
1.4.3 Parameter Format ................................................................................................... 14
Chapter 2 User Interface .................................................................................... 15
enable ...................................................................................................................................... 15
service password-encryption .................................................................................................. 15
enable password ..................................................................................................................... 16
enable secret ........................................................................................................................... 17
disable ..................................................................................................................................... 18
configure .................................................................................................................................. 18
exit ........................................................................................................................................... 18
end........................................................................................................................................... 19
history ...................................................................................................................................... 19
history clear ............................................................................................................................. 20
Chapter 3 IEEE 802.1Q VLAN Commands ........................................................ 21
vlan .......................................................................................................................................... 21
interface vlan ........................................................................................................................... 21
name ....................................................................................................................................... 22
switchport general allowed vlan .............................................................................................. 22
switchport pvid ........................................................................................................................ 23
show vlan summary ................................................................................................................ 23
show vlan brief ........................................................................................................................ 24
show vlan ................................................................................................................................ 24
show interface switchport ........................................................................................................ 25
Chapter 4 Voice VLAN Commands .................................................................... 26
II
voice vlan ................................................................................................................................ 26
voice vlan aging time ............................................................................................................... 26
voice vlan priority .................................................................................................................... 27
voice vlan mac-address .......................................................................................................... 27
switchport voice vlan mode ..................................................................................................... 28
switchport voice vlan security ................................................................................................. 29
show voice vlan ....................................................................................................................... 29
show voice vlan oui ................................................................................................................. 30
show voice vlan switchport ..................................................................................................... 30
Chapter 5 Etherchannel Commands ................................................................. 32
channel-group ......................................................................................................................... 32
port-channel load-balance ...................................................................................................... 33
lacp system-priority ................................................................................................................. 33
lacp port-priority ...................................................................................................................... 34
show etherchannel .................................................................................................................. 34
show etherchannel load-balance ............................................................................................ 35
show lacp ................................................................................................................................ 35
show lacp sys-id ...................................................................................................................... 36
Chapter 6 User Management Commands ......................................................... 37
user name (password) ............................................................................................................ 37
user name (secret) .................................................................................................................. 38
user access-control ip-based .................................................................................................. 39
user access-control mac-based .............................................................................................. 40
user access-control port-based............................................................................................... 40
user max-number .................................................................................................................... 41
user idle-timeout ...................................................................................................................... 42
show user account-list............................................................................................................. 42
show user configuration .......................................................................................................... 43
Chapter 7 System Log Commands .................................................................... 44
logging buffer ........................................................................................................................... 44
logging file flash ...................................................................................................................... 45
logging file flash frequency ..................................................................................................... 45
logging file flash level .............................................................................................................. 46
clear logging ............................................................................................................................ 46
logging host index ................................................................................................................... 47
show logging local-config ........................................................................................................ 48
III
show logging loghost ............................................................................................................... 48
show logging buffer ................................................................................................................. 49
show logging flash ................................................................................................................... 49
Chapter 8 SSH Commands................................................................................. 51
ip ssh server ............................................................................................................................ 51
ip ssh version .......................................................................................................................... 51
ip ssh timeout .......................................................................................................................... 52
ip ssh max-client ..................................................................................................................... 52
ip ssh download ...................................................................................................................... 53
show ip ssh .............................................................................................................................. 53
Chapter 9 SSL Commands ................................................................................. 56
ip http secure-server ............................................................................................................... 56
ip http secure-server download certificate .............................................................................. 56
ip http secure-server download key ........................................................................................ 57
show ip http secure-server ...................................................................................................... 58
Chapter 10 MAC Address Commands ................................................................. 59
mac address-table static ......................................................................................................... 59
mac address-table aging-time ................................................................................................. 60
mac address-table filtering ...................................................................................................... 60
mac address-table max-mac-count......................................................................................... 61
show mac address-table ......................................................................................................... 62
show mac address-table aging-time ....................................................................................... 62
show mac address-table max-mac-count interface gigabitEthernet ...................................... 63
show mac address-table interface gigabitEthernet ................................................................. 63
show mac address-table count ............................................................................................... 64
show mac address-table address ........................................................................................... 64
show mac address-table vlan ................................................................................................. 65
Chapter 11 System Commands ........................................................................... 66
system-time manual ................................................................................................................ 66
system-time ntp ....................................................................................................................... 66
system-time dst predefined ..................................................................................................... 68
system-time dst date ............................................................................................................... 68
system-time dst recurring ........................................................................................................ 69
hostname ................................................................................................................................. 71
location .................................................................................................................................... 71
IV
contact-info .............................................................................................................................. 72
ip management-vlan ................................................................................................................ 72
ip address ................................................................................................................................ 73
ip address-alloc dhcp .............................................................................................................. 73
ip address-alloc bootp ............................................................................................................. 74
reset ........................................................................................................................................ 74
reboot ...................................................................................................................................... 75
copy running-config startup-config .......................................................................................... 75
copy startup-config tftp ............................................................................................................ 75
copy tftp startup-config ............................................................................................................ 76
firmware upgrade .................................................................................................................... 77
ping .......................................................................................................................................... 77
tracert ...................................................................................................................................... 78
show system-info .................................................................................................................... 79
show running-config ................................................................................................................ 80
show system-time ................................................................................................................... 80
show system-time dst .............................................................................................................. 80
show system-time ntp ............................................................................................................. 81
show cable-diagnostics interface gigabitEthernet .................................................................. 81
Chapter 12 IPv6 Address Configuration Commands ......................................... 83
ipv6 enable .............................................................................................................................. 83
ipv6 address autoconfig .......................................................................................................... 83
ipv6 address link-local ............................................................................................................. 84
ipv6 address dhcp ................................................................................................................... 84
ipv6 address ra ........................................................................................................................ 85
ipv6 address eui-64 ................................................................................................................. 86
ipv6 address ............................................................................................................................ 86
show ipv6 interface vlan .......................................................................................................... 87
Chapter 13 Ethernet Configuration Commands ................................................. 88
interface gigabitEthernet ......................................................................................................... 88
interface range gigabitEthernet ............................................................................................... 88
description ............................................................................................................................... 89
shutdown ................................................................................................................................. 89
flow-control .............................................................................................................................. 90
media-type ............................................................................................................................... 90
duplex ...................................................................................................................................... 91
V
speed ....................................................................................................................................... 91
storm-control broadcast .......................................................................................................... 92
storm-control multicast ............................................................................................................ 93
storm-control unicast ............................................................................................................... 95
storm-control rate .................................................................................................................... 96
bandwidth ................................................................................................................................ 97
clear counters .......................................................................................................................... 97
show interface status .............................................................................................................. 98
show interface counters .......................................................................................................... 98
show interface description ...................................................................................................... 99
show interface flowcontrol ....................................................................................................... 99
show interface configuration ................................................................................................. 100
show storm-control ................................................................................................................ 100
show bandwidth..................................................................................................................... 101
Chapter 14 QoS Commands ............................................................................... 102
qos ......................................................................................................................................... 102
qos cos .................................................................................................................................. 102
qos dscp ................................................................................................................................ 103
qos queue cos-map ............................................................................................................... 104
qos queue dscp-map ............................................................................................................. 104
qos queue mode ................................................................................................................... 106
show qos interface ................................................................................................................ 107
show qos cos-map ................................................................................................................ 108
show qos dscp-map .............................................................................................................. 108
show qos queue mode .......................................................................................................... 108
show qos status..................................................................................................................... 109
Chapter 15 Port Mirror Commands .................................................................... 110
monitor session destination interface .................................................................................... 110
monitor session source interface ........................................................................................... 111
show monitor session ............................................................................................................. 112
Chapter 16 Port Isolation Commands ................................................................ 113
port isolation ........................................................................................................................... 113
show port isolation interface .................................................................................................. 113
Chapter 17 Loopback Detection Commands ..................................................... 115
loopback-detection(global) ..................................................................................................... 115
VI
loopback-detection interval .................................................................................................... 115
loopback-detection recovery-time .......................................................................................... 116
loopback-detection(interface) ................................................................................................. 116
loopback-detection config ...................................................................................................... 117
loopback-detection recover .................................................................................................... 118
show loopback-detection global ............................................................................................. 118
show loopback-detection interface ........................................................................................ 119
Chapter 18 ACL Commands ............................................................................... 120
access-list create .................................................................................................................. 120
mac access-list ...................................................................................................................... 120
access-list standard .............................................................................................................. 121
access-list extended .............................................................................................................. 122
rule......................................................................................................................................... 123
access-list policy name ......................................................................................................... 123
access-list policy action......................................................................................................... 124
access-list bind(interface) ..................................................................................................... 125
access-list bind(vlan) ............................................................................................................. 125
show access-list .................................................................................................................... 126
show access-list policy .......................................................................................................... 126
show access-list bind ............................................................................................................ 127
Chapter 19 DHCP Filtering Commands ............................................................. 128
ip dhcp filtering ...................................................................................................................... 128
ip dhcp filtering trust .............................................................................................................. 128
show ip dhcp filtering ............................................................................................................. 129
show ip dhcp filtering interface .............................................................................................. 129
Chapter 20 PoE Commands ............................................................................... 130
power inline consumption (global) ........................................................................................ 130
power profile .......................................................................................................................... 130
power time-range .................................................................................................................. 131
power holiday ........................................................................................................................ 132
absolute ................................................................................................................................. 133
periodic .................................................................................................................................. 133
holiday ................................................................................................................................... 134
power inline consumption (interface) .................................................................................... 135
power inline priority ............................................................................................................... 135
power inline supply ................................................................................................................ 136
VII
power inline profile ................................................................................................................ 136
power inline time-range ......................................................................................................... 137
show power inline .................................................................................................................. 138
show power inline configuration interface ............................................................................. 138
show power inline information interface ................................................................................ 138
show power profile ................................................................................................................ 139
show power holiday ............................................................................................................... 139
show power time-range ......................................................................................................... 140
Chapter 21 MSTP Commands ............................................................................ 141
spanning-tree(global) ............................................................................................................ 141
spanning-tree(interface) ........................................................................................................ 141
spanning-tree common-config .............................................................................................. 142
spanning-tree mode .............................................................................................................. 143
spanning-tree mst configuration ............................................................................................ 144
instance ................................................................................................................................. 144
name ..................................................................................................................................... 145
revision .................................................................................................................................. 145
spanning-tree mst instance ................................................................................................... 146
spanning-tree mst ................................................................................................................. 146
spanning-tree priority ............................................................................................................ 147
spanning-tree tc-defend ........................................................................................................ 148
spanning-tree timer ............................................................................................................... 148
spanning-tree hold-count ...................................................................................................... 149
spanning-tree max-hops ....................................................................................................... 150
spanning-tree bpdufilter ........................................................................................................ 150
spanning-tree bpduguard ...................................................................................................... 151
spanning-tree guard loop ...................................................................................................... 151
spanning-tree guard root ....................................................................................................... 152
spanning-tree guard tc .......................................................................................................... 152
spanning-tree mcheck ........................................................................................................... 153
show spanning-tree active .................................................................................................... 153
show spanning-tree bridge .................................................................................................... 154
show spanning-tree interface ................................................................................................ 154
show spanning-tree interface-security .................................................................................. 155
show spanning-tree mst ........................................................................................................ 156
Chapter 22 IGMP Snooping Commands ........................................................... 157
VIII
ip igmp snooping(global) ....................................................................................................... 157
ip igmp snooping(interface) ................................................................................................... 157
ip igmp snooping immediate-leave ....................................................................................... 158
ip igmp snooping drop-unknown ........................................................................................... 158
ip igmp snooping vlan-config ................................................................................................ 159
ip igmp snooping multi-vlan-config ....................................................................................... 160
ip igmp snooping filter add-id ................................................................................................ 161
ip igmp snooping filter(global) ............................................................................................... 162
ip igmp snooping filter(interface) ........................................................................................... 162
ip igmp snooping filter maxgroup .......................................................................................... 163
ip igmp snooping filter mode ................................................................................................. 163
show ip igmp snooping.......................................................................................................... 164
show ip igmp snooping interface........................................................................................... 164
show ip igmp snooping vlan .................................................................................................. 165
show ip igmp snooping multi-vlan ......................................................................................... 166
show ip igmp snooping groups ............................................................................................. 166
show ip igmp snooping filter .................................................................................................. 167
Chapter 23 MLD Snooping Commands ............................................................. 169
ipv6 mld snooping ................................................................................................................. 169
ipv6 mld snooping router-aging-time .................................................................................... 169
ipv6 mld snooping member-aging-time ................................................................................. 170
ipv6 mld snooping report-suppression .................................................................................. 170
ipv6 mld snooping unknown-filter.......................................................................................... 171
ipv6 mld snooping last-listener query-inteval ........................................................................ 171
ipv6 mld snooping last-listener query-count ......................................................................... 172
ipv6 mld snooping multicast-vlan .......................................................................................... 172
ipv6 mld snooping multicast-vlan vlan-id .............................................................................. 173
ipv6 mld snooping vlan.......................................................................................................... 173
ipv6 mld snooping vlan router-aging-time ............................................................................. 174
ipv6 mld snooping vlan member-aging-time ......................................................................... 174
ipv6 mld snooping vlan immediate-leave .............................................................................. 175
ipv6 mld snooping vlan mrouter ............................................................................................ 175
ipv6 mld snooping vlan static ................................................................................................ 176
ipv6 mld snooping querier vlan ............................................................................................. 176
ipv6 mld snooping querier vlan max-response-time ............................................................. 177
ipv6 mld snooping querier vlan query-interval ...................................................................... 178
ipv6 mld snooping querier vlan query-source ....................................................................... 178
IX
ipv6 mld snooping filter(global) ............................................................................................. 179
ipv6 mld snooping filter(interface) ......................................................................................... 179
ipv6 mld snooping filter-mode ............................................................................................... 180
ipv6 mld snooping filter-id ..................................................................................................... 180
ipv6 mld snooping max-group ............................................................................................... 181
clear ipv6 mld snooping statistics ......................................................................................... 181
show ipv6 mld snooping ........................................................................................................ 182
show ipv6 mld snooping vlan ................................................................................................ 182
show ipv6 mld snooping static-mcast ................................................................................... 183
show ipv6 mld snooping group ............................................................................................. 183
show ipv6 mld snooping filter ................................................................................................ 183
show ipv6 mld snooping interface ......................................................................................... 184
show ipv6 mld snooping interface filter ................................................................................. 184
show ipv6 mld snooping querier ........................................................................................... 185
show ipv6 mld snooping statistics ......................................................................................... 185
Chapter 24 SNMP Commands ............................................................................ 186
snmp-server .......................................................................................................................... 186
snmp-server view .................................................................................................................. 186
snmp-server group ................................................................................................................ 187
snmp-server user .................................................................................................................. 188
snmp-server community ........................................................................................................ 190
snmp-server host .................................................................................................................. 190
snmp-server engineID ........................................................................................................... 192
snmp-server traps snmp ....................................................................................................... 193
snmp-server traps link-status ................................................................................................ 193
snmp-server traps ................................................................................................................. 194
snmp-server traps mac ......................................................................................................... 195
snmp-server traps vlan .......................................................................................................... 196
rmon history ........................................................................................................................... 196
rmon event ............................................................................................................................ 197
rmon alarm ............................................................................................................................ 198
show snmp-server ................................................................................................................. 200
show snmp-server view......................................................................................................... 200
show snmp-server group ...................................................................................................... 200
show snmp-server user ......................................................................................................... 201
show snmp-server community .............................................................................................. 201
show snmp-server host ......................................................................................................... 202
X
show snmp-server engineID ................................................................................................. 202
show rmon history ................................................................................................................. 202
show rmon event ................................................................................................................... 203
show rmon alarm ................................................................................................................... 203
Chapter 25 LLDP Commands ............................................................................. 205
lldp ......................................................................................................................................... 205
lldp hold-multiplier ................................................................................................................. 205
lldp timer ................................................................................................................................ 206
lldp med-fast-count ................................................................................................................ 207
lldp receive ............................................................................................................................ 207
lldp transmit ........................................................................................................................... 208
lldp snmp-trap ........................................................................................................................ 208
lldp tlv-select .......................................................................................................................... 209
lldp med-location ................................................................................................................... 210
lldp med-status ...................................................................................................................... 210
lldp med-tlv-select .................................................................................................................. 211
show lldp ............................................................................................................................... 212
show lldp interface ................................................................................................................ 212
show lldp local-information interface ..................................................................................... 213
show lldp neighbor-information interface .............................................................................. 213
show lldp traffic interface ....................................................................................................... 214
XI
Preface
This Guide is intended for network administrator to provide referenced information about CLI
(Command Line Interface). The device mentioned in this Guide stands for
TL-SG2216/TL-SG2424/TL-SG2424P/TL-SG2452 Gigabit Smart Switch.
The five devices of TL-SG2216/TL-SG2424/TL-SG2424P/TL-SG2452 are sharing this Guide. For
simplicity, we will take TL-SG2424 for example throughout this Guide.
Overview of this Guide
Chapter 1: Using the CLI
Provide information about how to use the CLI, CLI Command Modes, Security Levels and some
Conventions.
Chapter 2: User Interface
Provide information about the commands used to switch between five CLI Command Modes.
Chapter 3: IEEE 802.1Q VLAN Commands
Provide information about the commands used for configuring IEEE 802.1Q VLAN.
Chapter 4: Voice VLAN Commands
Provide information about the commands used for configuring Voice VLAN.
Chapter 5: Etherchannel Commands
Provide information about the commands used for configuring LAG (Link Aggregation Group) and
LACP (Link Aggregation Control Protocol).
Chapter 6: User Management Commands
Provide information about the commands used for user management.
Chapter 7: System Log Commands
Provide information about the commands used for configuring system log.
Chapter 8: SSH Commands
Provide information about the commands used for configuring and managing SSH (Security
Shell).
Chapter 9: SSL Commands
Provide information about the commands used for configuring and managing SSL (Secure
Sockets Layer).
Chapter 10: MAC Address Commands
Provide information about the commands used for Address configuration.
1
Chapter 11: System Configuration Commands
Provide information about the commands used for configuring the System information and System
IP, reboot and reset the switch, upgrade the switch system and commands used for cable test.
Chapter 12: IPv6 Address Configuration Commands
Provide information about the commands used for configuring the System IPv6 addresses.
Chapter 13: Ethernet Configuration Commands
Provide information about the commands used for configuring the Bandwidth Control, Negotiation
Mode, and Storm Control for enthernet ports.
Chapter 14: QoS Commands
Provide information about the commands used for configuring the QoS function.
Chapter 15: Port Mirror Commands
Provide information about the commands used for configuring the Port Mirror function.
Chapter 16: Port Isolation Commands
Provide information about the commands used for configuring Port Isolation function.
Chapter 17: Loopback Detection Commands
Provide information about the commands used for configuring the Loopback Detection function.
Chapter 18: ACL Commands
Provide information about the commands used for configuring the ACL (Access Control List).
Chapter 19: DHCP Filtering Commands
Provide information about the commands used for configuring the DHCP Filtering function.
Chapter 20: PoE Commands
Provide information about the commands used for configuring PoE function.
Chapter 21: MSTP Commands
Provide information about the commands used for configuring the MSTP (Multiple Spanning Tree
Protocol).
Chapter 22: IGMP Snooping Commands
Provide information about the commands used for configuring the IGMP Snooping (Internet Group
Management Protocol Snooping).
Chapter 23: MLD Snooping Commands
Provide information about the commands used for configuring the MLD Snooping (Multicast
Listener Discovery Snooping).
Chapter 24: SNMP Commands
Provide information about the commands used for configuring the SNMP (Simple Network
Management Protocol) functions.
2
Chapter 25: LLDP Commands
Provide information about the commands used for configuring LLDP function.
3
Chapter 1 Using the CLI
1.1 Accessing the CLI
You can log on to the switch and access the CLI by logging on to the switch remotely by a Telnet or
SSH connection through an Ethernet port.
1.1.1. Logon by Telnet
To log on to the switch by a Telnet connection, please take the following steps:
1. Click Start → Run to open the Run window, and type in telnet 192.168.0.1 in the prompt Run
window as Figure 1-1 and click OK .
Figure 1-1 Run Window
2. Type in the User name and Password (the factory default value for both of them are admin)
and press the Enter button to enter User EXEC Mode , which is shown as Figure 1-2.
Figure 1-2 Log in the Switch
3. Type in enable command to enter Privileged EXEC Mode.
Figure 1-3 Enter into Priviledged EXEC Mode
4
1.1.2. Logon by SSH
To log on by SSH, a Putty client software is recommended. There are two authentication modes to
set up an SSH connection:
Password Authentication Mode : It requires username and password, which are both admin by
default.
Key Authentication Mode : It requires a public key for the switch and a private key for the SSH
client software. You can generate the public key and the private key through Putty Key Generator.
Note:
Before SSH login, please follow the steps shown in Figure 1-4 to enable the SSH function through
Telnet connection.
Figure 1-4 Enable SSH function
Password Authentication Mode
1. Open the software to log on to the interface of PuTTY. Enter the IP address of the switch into
Host Name field; keep the default value 22 in the Port field; select SSH as the Connection
type.
5
Figure 1-5 SSH Connection Config
2. Click the Open button in the above figure to log on to the switch. Enter the login user name
and password to log on the switch, and then enter enable to enter Privileged EXEC Mode, so
you can continue to configure the switch.
Figure 1-6 Log on the Switch
6
Key Authentication Mode
1. Select the key type and key length, and generate SSH key.
Figure 1-7 Generate SSH Key
Note:
1. The key length is in the range of 256 to 3072 bits.
2. During the key generation, randomly moving the mouse quickly can accelerate the key
generation.
7
2. After the key is successfully generated, please save the public key and private key to a TFTP
server.
Figure 1-8 Save the Generated Key
3. Log on to the switch by Telnet and download the public key file from the TFTP server to the
switch, as the following figure shows:
8
Figure 1-9 Download the Public Key
Note:
1. The key type should accord with the type of the key file.
2. The SSH key downloading can not be interrupted.
4. After the public key is downloaded, please log on to the interface of PuTTY and enter the IP
address for login.
9
Figure 1-10 SSH Connection Config
5. Click Browse to download the private key file to SSH client software and click Open .
Figure 1-11 Download the Private Key
10
command to return to User EXEC
6. After successful authentication, please enter the login user name. If you log on to the switch
without entering password, it indicates that the key has been successfully downloaded.
Figure 1-12 Log on the Switch
1.2 CLI Command Modes
The CLI is divided into different command modes: User EXEC Mode, Privileged EXEC Mode,
Global Configuration Mode, Interface Configuration Mode and VLAN Configuration Mode.
Interface Configuration Mode can also be divided into Interface Ethernet, Interface
link-aggregation and some other modes, which is shown as the following diagram.
Interface Configuration Mode
Interface gigabitEthernet
Interface link-aggregation
Interface range gigabitEthernet
Interface range link-aggregation
Interface vlan
Privileged EXEC
Mode
Global Configuration
Mode
The following table gives detailed information about the Accessing path, Prompt of each mode and
how to exit the current mode and access the next mode.
Mode
User EXEC
Mode
Accessing
Path
connected with the
switch.
Prompt
TL-SG2424>
Logout or Access the next
mode
Use the exit command to
disconnect the switch.
Use the enable
access Privileged EXEC mode.
Privileged
EXEC Mode
Use the enable
command to enter
User EXEC mode.
TL- SG2424#
11
Enter the disable or the exit
mode.
Enter configure
access Global Configuration mode.
this mode from
Privileged EXEC
to access interface Configuration
Mode
Global
Configuration
Mode
Interface
Configuration
Mode
Accessing
Path
Use the configure
command to enter
mode.
Use the interface
command to enter
Global
Configuration
mode.
Prompt
TL- SG2424 (config)#
TL-SG2424 (config-if)#
or
TL-SG2424(config-if-range)#
Logout or Access the next
mode
Use the exit or the end command
or press Ctrl+Z
Privileged EXEC mode.
Use the interface gigabitEthernet
port or interface range
gigabitEthernet port -list command
mode.
Use the vlan vlan-list
VLAN Configuration mode.
Use the end
Ctrl+Z to return to Privileged EXEC
mode.
Enter exit command or the #
command to return to Global
Configuration mode.
A port number must be specified in
the interface command.
VLAN
Configuration
Mode
Note:
1. The user is automatically in User EXEC Mode after the connection between the PC and the
switch is established by a Telnet/SSH connection.
2. Each command mode has its own set of specific commands. To configure some commands,
you should access the corresponding command mode firstly.
Global Configuration Mode: In this mode, global commands are provided, such as the
Interface Configuration Mode : In this mode, users can configure one or several ports,
Use the vlan
vlan-list command
to enter this mode
Configuration
mode.
TL-SG2424 (config-vlan)#
Use the end
Ctrl+Z to return to Privileged EXEC
mode.
Enter the exit command
command to return to Global
configuration mode.
Spanning Tree, Schedule Mode and so on.
different ports corresponds to different commands
a). Interface gigabitEthernet: Configure parameters for an Ethernet port, such as
Duplex-mode, flow control status.
b). Interface range gigabitEthernet: Configure parameters for several Ethernet ports.
12
c). Interface link-aggregation: Configure parameters for a link-aggregation, such as
broadcast storm.
d). Interface range link-aggregation: Configure parameters for multi-trunks.
e). Interface vlan: Configure parameters for the vlan-port.
VLAN Configuration Mode: In this mode, users can create a VLAN and add a specified
port to the VLAN.
3. Some commands are global, that means they can be performed in all modes:
show: display all information of switch, for example: statistic information, port information,
VLAN information.
history: Display the commands history.
1.3 Security Levels
This switch’s security is divided into two levels: User level and Admin level.
User level only allows users to do some simple operations in User EXEC Mode; Admin level
allows you to monitor, configure and manage the switch in Privileged EXEC Mode, Global
Configuration Mode, Interface Configuration Mode and VLAN Configuration Mode.
Users get the privilege to the User level once logging in by Telnet/SSH. However, Guest users are
restricted to access the CLI.
Users can enter Privileged EXEC mode from User EXEC mode by using the enable command. In
default case, no password is needed. In Global Configuration Mode, you can configure password
for Admin level by enable password command. Once password is configured, you are required to
enter it to access Privileged EXEC mode.
1.4 Conventions
1.4.1 Format Conventions
The following conventions are used in this Guide:
Items in square brackets [ ] are optional
Items in braces { } are required
Alternative items are grouped in braces and separated by vertical bars. For example: speed
{10 | 100 | 1000 }
Bold indicates an unalterable keyword. For example: show logging
13
Normal Font indicates a constant (several options are enumerated and only one can be
selected). For example: mode {dynamic | static | permanent}
Italic Font indicates a variable (an actual value must be assigned). For example: bridge
aging-time aging -time
1.4.2 Special Characters
You should pay attentions to the description below if the variable is a character string:
These six characters ” < > , \ & can not be input.
If a blank is contained in a character string, single or double quotation marks should be used,
for example ’hello world’, ”hello world”, and the words in the quotation marks will be identified
as a string. Otherwise, the words will be identified as several strings.
1.4.3 Parameter Format
Some parameters must be entered in special formats which are shown as follows:
MAC address must be enter in the format of xx:xx:xx:xx:xx:xx
One or several values can be typed for a port-list or a vlan-list using comma to separate. Use
a hyphen to designate a range of values, for instance,1/0/1,1/0/3-5,1/0/7 indicates choosing
port 1/0/1,1/0/3,1/0/4,1/0/5,1/0/7.
14
Chapter 2 User Interface
enable
Description
The enable command is used to access Privileged EXEC Mode from User
EXEC Mode.
Syntax
enable
Command Mode
User EXEC Mode
Example
If you have set the password to access Privileged EXEC Mode from User EXEC
Mode:
TL-SG2424>enable
Enter password:
TL-SG2424#
service password-encryption
Description
The service password-encryption command is used to encrypt the password
when the password is defined or when the configuration is written, using the
symmetric encryption algorithm. Encryption prevents the password from being
readable in the configuration file. To disable the global encryption function,
please use no service password-encryption command.
Syntax
service password-encryption
no service password-encryption
Command Mode
Global Configuration Mode
Example
Enable the global encryption function:
TL-SG2424(config)# service password-encryption
15
enable password
Description
The enable password command is used to set or change the password for
users to access Privileged EXEC Mode from User EXEC Mode. To remove the
password, please use no enable password command. This command uses the
symmetric encryption.
Syntax
enable password { [ 0 ] password | 7 encrypted-password }
no enable password
Parameter
0 —— Specify the encryption type. 0 indicates that an unencrypted password
will follow. By default, the encryption type is 0.
password —— Super password, a string from 1 to 31 alphanumeric characters
or symbols. The password is case sensitive, allows digits, English letters (case
sensitive), underlines and sixteen special characters ( !$%'()*,-./[]{|} ). By default,
it is empty.
7 —— Indicates a symmetric encrypted password with fixed length will follow.
encrypted-password —— A symmetric encrypted password with fixed length,
which you can copy from another switch’s configuration file. After the encrypted
password is configured, you should use the corresponding unencrypted
password if you re-enter this mode.
Command Mode
Global Configuration Mode
User Guidelines
If the password you configured here is unencrypted and the global encryption
function is enabled in service password-encryption
configuration file will be displayed in the symmetric encrypted form.
, the password in the
Example
Set the super password as “admin” and unencrypted to access Privileged EXEC
Mode from User EXEC Mode:
TL-SG2424(config)#enable password 0 admin
16
enable secret
Description
The enable secret command is used to set a secret password, which is using
an MD5 encryption algorithm, for users to access Privileged EXEC Mode from
User EXEC Mode. To return to the default configuration, please use no enable
secret command. This command uses the MD5 encryption.
Syntax
enable secret { [ 0 ] password | 5 encrypted-password }
no enable secret
Parameter
0 —— Specify the encryption type. 0 indicates that an unencrypted password
will follow. By default, the encryption type is 0.
password —— Super password, a string from 1 to 31 alphanumeric characters
or symbols. The password is case sensitive, allows digits, English letters (case
sensitive), underlines and sixteen special characters ( !$%'()*,-./[]{|} ). By default,
it is empty. The password in the configuration file will be displayed in the MD5
encrypted form.
5 —— Indicates an MD5 encrypted password with fixed length will follow.
encrypted-password —— An MD5 encrypted password with fixed length, which
you can copy from another switch’s configuration file. After the encrypted
password is configured, you should use the corresponding unencrypted
password if you re-enter this mode.
Command Mode
Global Configuration Mode
User Guidelines
If both the enable password and enable secret are defined, you must enter the
password set in enable secret.
Example
Set the secret password as “admin” and unencrypted to access Privileged
EXEC Mode from User EXEC Mode. The password will be displayed in the
encrypted form.
TL-SG2424(config)#enable secret 0 admin
17
disable
Description
Syntax
Command Mode
Example
The disable command is used to return to User EXEC Mode from Privileged
EXEC Mode.
disable
Privileged EXEC Mode
Return to User EXEC Mode from Privileged EXEC Mode:
TL-SG2424# disable
TL-SG2424>
configure
Description
Syntax
Command Mode
Example
exit
The configure command is used to access Global Configuration Mode from
Privileged EXEC Mode.
configure
Privileged EXEC Mode
Access Global Configuration Mode from Privileged EXEC Mode:
TL-SG2424# configure
TL-SG2424(config)#
Description
The exit command is used to return to the previous Mode from the current
Mode.
Syntax
exit
18