TP-Link TL-SG2216, TL-SG2424 CLI Reference Guide

5 (3)

TL-SG2216/TL-SG2424/TL-SG2424P/TL-SG2452

Gigabit Smart Switch

REV1.4.0

1910011096

COPYRIGHT & TRADEMARKS

Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Other brands and product names are trademarks or registered trademarks of their respective holders.

No part of the specifications may be reproduced in any form or by any means or used to make any derivative such as translation, transformation, or adaptation without permission from TP-LINK TECHNOLOGIES CO., LTD. Copyright © 2014 TP-LINK TECHNOLOGIES CO., LTD. All rights reserved.

http://www.tp-link.com

I

 

CONTENTS

 

Preface

..............................................................................................................

1

Chapter 1 Using the CLI .......................................................................................

4

1.1 Accessing the CLI..............................................................................................................

4

1.1.1.

Logon by Telnet..................................................................................................

4

1.1.2.

Logon by SSH....................................................................................................

5

1.2 CLI Command Modes......................................................................................................

11

1.3 Security Levels ................................................................................................................

13

1.4 Conventions ....................................................................................................................

13

1.4.1 Format Conventions ..............................................................................................

13

1.4.2 Special Characters ................................................................................................

14

1.4.3 Parameter Format .................................................................................................

14

Chapter 2

User Interface ....................................................................................

15

enable....................................................................................................................................

 

15

service password-encryption .................................................................................................

15

enable password ...................................................................................................................

16

enable secret.........................................................................................................................

17

disable ...................................................................................................................................

 

18

configure................................................................................................................................

 

18

exit.........................................................................................................................................

 

19

end ........................................................................................................................................

 

19

history....................................................................................................................................

 

19

history clear ...........................................................................................................................

20

Chapter 3 IEEE 802.1Q VLAN Commands ........................................................

21

vlan........................................................................................................................................

 

21

interface vlan .........................................................................................................................

21

name .....................................................................................................................................

 

22

switchport general allowed vlan.............................................................................................

22

switchport pvid.......................................................................................................................

23

show vlan summary...............................................................................................................

23

show vlan brief ......................................................................................................................

24

show vlan ..............................................................................................................................

 

24

show interface switchport ......................................................................................................

25

Chapter 4 Voice VLAN Commands....................................................................

26

 

II

 

voice vlan ..............................................................................................................................

26

voice vlan aging time.............................................................................................................

26

voice vlan priority...................................................................................................................

27

voice vlan mac-address.........................................................................................................

27

switchport voice vlan mode ...................................................................................................

28

switchport voice vlan security ................................................................................................

29

show voice vlan .....................................................................................................................

29

show voice vlan oui ...............................................................................................................

30

show voice vlan switchport ....................................................................................................

30

Chapter 5 Etherchannel Commands .................................................................

32

channel-group .......................................................................................................................

32

port-channel load-balance .....................................................................................................

33

lacp system-priority ...............................................................................................................

33

lacp port-priority.....................................................................................................................

34

show etherchannel ................................................................................................................

35

show etherchannel load-balance...........................................................................................

35

show lacp ..............................................................................................................................

36

show lacp sys-id ....................................................................................................................

36

Chapter 6 User Management Commands .........................................................

37

user name (password)...........................................................................................................

37

user name (secret) ................................................................................................................

38

user access-control ip-based.................................................................................................

39

user access-control mac-based.............................................................................................

40

user access-control port-based .............................................................................................

40

user max-number ..................................................................................................................

41

user idle-timeout....................................................................................................................

42

show user account-list...........................................................................................................

42

show user configuration.........................................................................................................

43

Chapter 7 System Log Commands....................................................................

44

logging buffer.........................................................................................................................

44

logging file flash.....................................................................................................................

45

logging file flash frequency ....................................................................................................

45

logging file flash level ............................................................................................................

46

clear logging ..........................................................................................................................

46

logging host index .................................................................................................................

47

show logging local-config ......................................................................................................

48

III

 

show logging loghost.............................................................................................................

48

show logging buffer ...............................................................................................................

49

show logging flash.................................................................................................................

49

Chapter 8

SSH Commands .................................................................................

51

ip ssh server ..........................................................................................................................

51

ip ssh version ........................................................................................................................

51

ip ssh timeout ........................................................................................................................

52

ip ssh max-client....................................................................................................................

52

ip ssh download.....................................................................................................................

53

show ip ssh............................................................................................................................

54

Chapter 9

SSL Commands .................................................................................

55

ip http secure-server..............................................................................................................

55

ip http secure-server download certificate .............................................................................

55

ip http secure-server download key.......................................................................................

56

show ip http secure-server ....................................................................................................

57

Chapter 10 MAC Address Commands.................................................................

58

mac address-table static........................................................................................................

58

mac address-table aging-time ...............................................................................................

59

mac address-table filtering ....................................................................................................

59

mac address-table max-mac-count .......................................................................................

60

show mac address-table........................................................................................................

61

show mac address-table aging-time ......................................................................................

62

show mac address-table max-mac-count interface gigabitEthernet ......................................

62

show mac address-table interface gigabitEthernet................................................................

63

show mac address-table count..............................................................................................

63

show mac address-table address..........................................................................................

64

show mac address-table vlan ................................................................................................

64

Chapter 11

System Commands ...........................................................................

65

system-time manual ..............................................................................................................

65

system-time ntp .....................................................................................................................

65

system-time dst predefined ...................................................................................................

67

system-time dst date .............................................................................................................

68

system-time dst recurring ......................................................................................................

69

hostname

...............................................................................................................................

70

location ..................................................................................................................................

 

70

 

IV

 

contact-info............................................................................................................................

71

ip management-vlan..............................................................................................................

71

ip address..............................................................................................................................

72

ip address-alloc dhcp ............................................................................................................

73

ip address-alloc bootp ...........................................................................................................

73

reset ......................................................................................................................................

74

reboot ....................................................................................................................................

74

copy running-config startup-config ........................................................................................

74

copy startup-config tftp ..........................................................................................................

75

copy tftp startup-config ..........................................................................................................

76

firmware upgrade ..................................................................................................................

76

ping .......................................................................................................................................

77

tracert ....................................................................................................................................

78

show system-info...................................................................................................................

79

show running-config ..............................................................................................................

79

show system-time..................................................................................................................

80

show system-time dst............................................................................................................

80

show system-time ntp............................................................................................................

81

show cable-diagnostics interface gigabitEthernet..................................................................

81

Chapter 12 IPv6 Address Configuration Commands .........................................

82

ipv6 enable ............................................................................................................................

82

ipv6 address autoconfig.........................................................................................................

82

ipv6 address link-local ...........................................................................................................

83

ipv6 address dhcp .................................................................................................................

84

ipv6 address ra......................................................................................................................

84

ipv6 address eui-64 ...............................................................................................................

85

ipv6 address ..........................................................................................................................

85

show ipv6 interface vlan ........................................................................................................

86

Chapter 13 Ethernet Configuration Commands .................................................

87

interface gigabitEthernet........................................................................................................

87

interface range gigabitEthernet .............................................................................................

87

description .............................................................................................................................

88

shutdown ...............................................................................................................................

89

flow-control ............................................................................................................................

89

media-type.............................................................................................................................

90

duplex....................................................................................................................................

90

V

 

speed.....................................................................................................................................

91

storm-control broadcast.........................................................................................................

92

storm-control multicast ..........................................................................................................

93

storm-control unicast .............................................................................................................

94

storm-control rate ..................................................................................................................

96

bandwidth ..............................................................................................................................

97

clear counters........................................................................................................................

97

show interface status.............................................................................................................

98

show interface counters.........................................................................................................

98

show interface description .....................................................................................................

99

show interface flowcontrol .....................................................................................................

99

show interface configuration................................................................................................

100

show storm-control ..............................................................................................................

101

show bandwidth...................................................................................................................

101

Chapter 14 QoS Commands................................................................................

103

qos ......................................................................................................................................

103

qos cos................................................................................................................................

104

qos dscp ..............................................................................................................................

104

qos queue cos-map.............................................................................................................

105

qos queue dscp-map...........................................................................................................

106

qos queue mode..................................................................................................................

108

show qos interface ..............................................................................................................

109

show qos cos-map ..............................................................................................................

109

show qos dscp-map ............................................................................................................

110

show qos queue mode ........................................................................................................

110

show qos status...................................................................................................................

111

Chapter 15 Port Mirror Commands ....................................................................

112

monitor session destination interface ..................................................................................

112

monitor session source interface.........................................................................................

113

show monitor session..........................................................................................................

114

Chapter 16 Port Isolation Commands ................................................................

115

port isolation ........................................................................................................................

115

show port isolation interface ................................................................................................

116

Chapter 17 Loopback Detection Commands.....................................................

117

loopback-detection(global) ..................................................................................................

117

VI

 

loopback-detection interval..................................................................................................

117

loopback-detection recovery-time........................................................................................

118

loopback-detection(interface) ..............................................................................................

118

loopback-detection config....................................................................................................

119

loopback-detection recover .................................................................................................

120

show loopback-detection global ..........................................................................................

120

show loopback-detection interface ......................................................................................

121

Chapter 18 ACL Commands................................................................................

122

access-list create.................................................................................................................

122

mac access-list....................................................................................................................

122

access-list standard.............................................................................................................

123

access-list extended............................................................................................................

124

rule ......................................................................................................................................

125

access-list policy name........................................................................................................

126

access-list policy action.......................................................................................................

126

access-list bind(interface)....................................................................................................

127

access-list bind(vlan)...........................................................................................................

128

show access-list ..................................................................................................................

128

show access-list policy ........................................................................................................

129

show access-list bind ..........................................................................................................

129

Chapter 19 DHCP Filtering Commands..............................................................

130

ip dhcp filtering ....................................................................................................................

130

ip dhcp filtering trust ............................................................................................................

130

show ip dhcp filtering...........................................................................................................

131

show ip dhcp filtering interface ............................................................................................

131

Chapter 20 PoE Commands................................................................................

133

power inline consumption (global) .......................................................................................

133

power profile........................................................................................................................

133

power time-range ................................................................................................................

134

power holiday ......................................................................................................................

135

absolute...............................................................................................................................

136

periodic................................................................................................................................

137

holiday.................................................................................................................................

137

power inline consumption (interface)...................................................................................

138

power inline priority .............................................................................................................

139

power inline supply..............................................................................................................

139

 

VII

power inline profile ..............................................................................................................

140

power inline time-range .......................................................................................................

141

show power inline................................................................................................................

141

show power inline configuration interface............................................................................

142

show power inline information interface...............................................................................

142

show power profile ..............................................................................................................

143

show power holiday.............................................................................................................

143

show power time-range .......................................................................................................

143

Chapter 21 MSTP Commands .............................................................................

145

spanning-tree(global)...........................................................................................................

145

spanning-tree(interface) ......................................................................................................

145

spanning-tree common-config .............................................................................................

146

spanning-tree mode.............................................................................................................

147

spanning-tree mst configuration ..........................................................................................

148

instance ...............................................................................................................................

148

name ...................................................................................................................................

149

revision ................................................................................................................................

149

spanning-tree mst instance .................................................................................................

150

spanning-tree mst................................................................................................................

151

spanning-tree priority...........................................................................................................

151

spanning-tree tc-defend.......................................................................................................

152

spanning-tree timer..............................................................................................................

153

spanning-tree hold-count.....................................................................................................

154

spanning-tree max-hops......................................................................................................

154

spanning-tree bpdufilter.......................................................................................................

155

spanning-tree bpduguard ....................................................................................................

155

spanning-tree guard loop.....................................................................................................

156

spanning-tree guard root .....................................................................................................

157

spanning-tree guard tc.........................................................................................................

157

spanning-tree mcheck .........................................................................................................

158

show spanning-tree active...................................................................................................

158

show spanning-tree bridge ..................................................................................................

159

show spanning-tree interface ..............................................................................................

159

show spanning-tree interface-security .................................................................................

160

show spanning-tree mst ......................................................................................................

161

Chapter 22 IGMP Snooping Commands

............................................................162

 

VIII

ip igmp snooping(global) .....................................................................................................

162

ip igmp snooping(interface) .................................................................................................

162

ip igmp snooping immediate-leave ......................................................................................

163

ip igmp snooping drop-unknown..........................................................................................

163

ip igmp snooping vlan-config ...............................................................................................

164

ip igmp snooping multi-vlan-config ......................................................................................

165

ip igmp snooping filter add-id...............................................................................................

166

ip igmp snooping filter(global)..............................................................................................

167

ip igmp snooping filter(interface) .........................................................................................

168

ip igmp snooping filter maxgroup.........................................................................................

168

ip igmp snooping filter mode................................................................................................

169

show ip igmp snooping ........................................................................................................

169

show ip igmp snooping interface .........................................................................................

170

show ip igmp snooping vlan ................................................................................................

171

show ip igmp snooping multi-vlan........................................................................................

171

show ip igmp snooping groups ............................................................................................

172

show ip igmp snooping filter ................................................................................................

173

Chapter 23 MLD Snooping Commands..............................................................

174

ipv6 mld snooping ...............................................................................................................

174

ipv6 mld snooping router-aging-time ...................................................................................

174

ipv6 mld snooping member-aging-time................................................................................

175

ipv6 mld snooping report-suppression.................................................................................

175

ipv6 mld snooping unknown-filter ........................................................................................

176

ipv6 mld snooping last-listener query-inteval.......................................................................

176

ipv6 mld snooping last-listener query-count ........................................................................

177

ipv6 mld snooping multicast-vlan.........................................................................................

177

ipv6 mld snooping multicast-vlan vlan-id .............................................................................

178

ipv6 mld snooping vlan........................................................................................................

178

ipv6 mld snooping vlan router-aging-time............................................................................

179

ipv6 mld snooping vlan member-aging-time ........................................................................

179

ipv6 mld snooping vlan immediate-leave.............................................................................

180

ipv6 mld snooping vlan mrouter...........................................................................................

180

ipv6 mld snooping vlan static...............................................................................................

181

ipv6 mld snooping querier vlan............................................................................................

181

ipv6 mld snooping querier vlan max-response-time ............................................................

182

ipv6 mld snooping querier vlan query-interval .....................................................................

183

ipv6 mld snooping querier vlan query-source ......................................................................

183

IX

 

ipv6 mld snooping filter(global)............................................................................................

184

ipv6 mld snooping filter(interface)........................................................................................

184

ipv6 mld snooping filter-mode..............................................................................................

185

ipv6 mld snooping filter-id....................................................................................................

185

ipv6 mld snooping max-group .............................................................................................

186

clear ipv6 mld snooping statistics ........................................................................................

186

show ipv6 mld snooping ......................................................................................................

187

show ipv6 mld snooping vlan...............................................................................................

187

show ipv6 mld snooping static-mcast ..................................................................................

188

show ipv6 mld snooping group ............................................................................................

188

show ipv6 mld snooping filter ..............................................................................................

188

show ipv6 mld snooping interface .......................................................................................

189

show ipv6 mld snooping interface filter................................................................................

189

show ipv6 mld snooping querier ..........................................................................................

190

show ipv6 mld snooping statistics........................................................................................

190

Chapter 24 SNMP Commands.............................................................................

191

snmp-server ........................................................................................................................

191

snmp-server view ................................................................................................................

191

snmp-server group ..............................................................................................................

192

snmp-server user ................................................................................................................

193

snmp-server community ......................................................................................................

195

snmp-server host.................................................................................................................

196

snmp-server engineID .........................................................................................................

197

snmp-server traps snmp......................................................................................................

198

snmp-server traps link-status...............................................................................................

199

snmp-server traps................................................................................................................

199

snmp-server traps mac........................................................................................................

201

snmp-server traps vlan ........................................................................................................

202

rmon history.........................................................................................................................

202

rmon event ..........................................................................................................................

203

rmon alarm ..........................................................................................................................

204

show snmp-server ...............................................................................................................

206

show snmp-server view .......................................................................................................

206

show snmp-server group .....................................................................................................

207

show snmp-server user .......................................................................................................

207

show snmp-server community.............................................................................................

207

show snmp-server host .......................................................................................................

208

 

X

show snmp-server engineID................................................................................................

208

show rmon history ...............................................................................................................

209

show rmon event .................................................................................................................

209

show rmon alarm.................................................................................................................

210

Chapter 25 LLDP Commands..............................................................................

211

lldp.......................................................................................................................................

211

lldp hold-multiplier................................................................................................................

211

lldp timer..............................................................................................................................

212

lldp med-fast-count ..............................................................................................................

213

lldp receive ..........................................................................................................................

214

lldp transmit .........................................................................................................................

214

lldp snmp-trap......................................................................................................................

215

lldp tlv-select........................................................................................................................

215

lldp med-location .................................................................................................................

216

lldp med-status ....................................................................................................................

217

lldp med-tlv-select................................................................................................................

217

show lldp .............................................................................................................................

218

show lldp interface...............................................................................................................

218

show lldp local-information interface....................................................................................

219

show lldp neighbor-information interface .............................................................................

219

show lldp traffic interface .....................................................................................................

220

XI

Preface

This Guide is intended for network administrator to provide referenced information about CLI (Command Line Interface). The device mentioned in this Guide stands for TL-SG2216/TL-SG2424/TL-SG2424P/TL-SG2452 Gigabit Smart Switch.

The five devices of TL-SG2216/TL-SG2424/TL-SG2424P/TL-SG2452 are sharing this Guide. For simplicity, we will take TL-SG2424 for example throughout this Guide.

Overview of this Guide

Chapter 1: Using the CLI

Provide information about how to use the CLI, CLI Command Modes, Security Levels and some Conventions.

Chapter 2: User Interface

Provide information about the commands used to switch between five CLI Command Modes.

Chapter 3: IEEE 802.1Q VLAN Commands

Provide information about the commands used for configuring IEEE 802.1Q VLAN.

Chapter 4: Voice VLAN Commands

Provide information about the commands used for configuring Voice VLAN.

Chapter 5: Etherchannel Commands

Provide information about the commands used for configuring LAG (Link Aggregation Group) and LACP (Link Aggregation Control Protocol).

Chapter 6: User Management Commands

Provide information about the commands used for user management.

Chapter 7: System Log Commands

Provide information about the commands used for configuring system log.

Chapter 8: SSH Commands

Provide information about the commands used for configuring and managing SSH (Security Shell).

Chapter 9: SSL Commands

Provide information about the commands used for configuring and managing SSL (Secure Sockets Layer).

Chapter 10: MAC Address Commands

Provide information about the commands used for Address configuration.

1

Chapter 11: System Configuration Commands

Provide information about the commands used for configuring the System information and System IP, reboot and reset the switch, upgrade the switch system and commands used for cable test.

Chapter 12: IPv6 Address Configuration Commands

Provide information about the commands used for configuring the System IPv6 addresses.

Chapter 13: Ethernet Configuration Commands

Provide information about the commands used for configuring the Bandwidth Control, Negotiation Mode, and Storm Control for enthernet ports.

Chapter 14: QoS Commands

Provide information about the commands used for configuring the QoS function.

Chapter 15: Port Mirror Commands

Provide information about the commands used for configuring the Port Mirror function.

Chapter 16: Port Isolation Commands

Provide information about the commands used for configuring Port Isolation function.

Chapter 17: Loopback Detection Commands

Provide information about the commands used for configuring the Loopback Detection function.

Chapter 18: ACL Commands

Provide information about the commands used for configuring the ACL (Access Control List).

Chapter 19: DHCP Filtering Commands

Provide information about the commands used for configuring the DHCP Filtering function.

Chapter 20: PoE Commands

Provide information about the commands used for configuring PoE function.

Chapter 21: MSTP Commands

Provide information about the commands used for configuring the MSTP (Multiple Spanning Tree Protocol).

Chapter 22: IGMP Snooping Commands

Provide information about the commands used for configuring the IGMP Snooping (Internet Group Management Protocol Snooping).

Chapter 23: MLD Snooping Commands

Provide information about the commands used for configuring the MLD Snooping (Multicast Listener Discovery Snooping).

Chapter 24: SNMP Commands

Provide information about the commands used for configuring the SNMP (Simple Network Management Protocol) functions.

2

Chapter 25: LLDP Commands

Provide information about the commands used for configuring LLDP function.

3

Chapter 1 Using the CLI

1.1 Accessing the CLI

You can log on to the switch and access the CLI by logging on to the switch remotely by a Telnet or SSH connection through an Ethernet port.

1.1.1.Logon by Telnet

To log on to the switch by a Telnet connection, please take the following steps:

1.Click Start Run to open the Run window, and type in telnet 192.168.0.1 in the prompt Run window as Figure 1-1 and click OK.

Figure 1-1 Run Window

2.Type in the User name and Password (the factory default value for both of them are admin) and press the Enter button to enter User EXEC Mode , which is shown as Figure 1-2.

Figure 1-2 Log in the Switch

3.Type in enable command to enter Privileged EXEC Mode.

Figure 1-3 Enter into Priviledged EXEC Mode

4

1.1.2. Logon by SSH

To log on by SSH, a Putty client software is recommended. There are two authentication modes to set up an SSH connection:

Password Authentication Mode: It requires username and password, which are both admin by default.

Key Authentication Mode: It requires a public key for the switch and a private key for the SSH client software. You can generate the public key and the private key through Putty Key Generator.

Note:

Before SSH login, please follow the steps shown in Figure 1-4 to enable the SSH function through Telnet connection.

Figure 1-4 Enable SSH function

5

Password Authentication Mode

1.Open the software to log on to the interface of PuTTY. Enter the IP address of the switch into Host Name field; keep the default value 22 in the Port field; select SSH as the Connection type.

Figure 1-5 SSH Connection Config

2.Click the Open button in the above figure to log on to the switch. Enter the login user name and password to log on the switch, and then enter enable to enter Privileged EXEC Mode, so you can continue to configure the switch.

Figure 1-6 Log on the Switch

6

Key Authentication Mode

1.Select the key type and key length, and generate SSH key.

Figure 1-7 Generate SSH Key

Note:

1.The key length is in the range of 256 to 3072 bits.

2.During the key generation, randomly moving the mouse quickly can accelerate the key generation.

7

2.After the key is successfully generated, please save the public key and private key to a TFTP server.

Figure 1-8 Save the Generated Key

8

3.Log on to the switch by Telnet and download the public key file from the TFTP server to the switch, as the following figure shows:

Figure 1-9 Download the Public Key

Note:

1.The key type should accord with the type of the key file.

2.The SSH key downloading can not be interrupted.

9

TP-Link TL-SG2216, TL-SG2424 CLI Reference Guide

4.After the public key is downloaded, please log on to the interface of PuTTY and enter the IP address for login.

Figure 1-10 SSH Connection Config

5.Click Browse to download the private key file to SSH client software and click Open.

Figure 1-11 Download the Private Key

10

6.After successful authentication, please enter the login user name. If you log on to the switch without entering password, it indicates that the key has been successfully downloaded.

Figure 1-12 Log on the Switch

1.2 CLI Command Modes

The CLI is divided into different command modes: User EXEC Mode, Privileged EXEC Mode, Global Configuration Mode, Interface Configuration Mode and VLAN Configuration Mode. Interface Configuration Mode can also be divided into Interface Ethernet, Interface link-aggregation and some other modes, which is shown as the following diagram.

User EXEC Mode

Privileged EXEC

 

Global Configuration

Mode

 

Mode

 

 

 

Interface Configuration Mode Interface gigabitEthernet Interface link-aggregation Interface range gigabitEthernet Interface range link-aggregation Interface vlan

……

VLAN Configuration Mode

The following table gives detailed information about the Accessing path, Prompt of each mode and how to exit the current mode and access the next mode.

 

Mode

 

 

Accessing

 

 

Prompt

 

 

Logout or Access the next

 

 

 

 

Path

 

 

 

 

 

mode

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

User EXEC

 

Primary

mode

 

 

 

 

Use

the exit

command

to

 

 

once

it

is

 

TL-SG2424>

 

disconnect the switch.

 

 

 

 

 

 

 

 

 

Mode

 

connected with the

 

 

Use the enable command to

 

 

 

 

 

 

 

 

switch.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

access Privileged EXEC mode.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Use

the

enable

 

 

 

 

Enter the disable or the exit

 

Privileged

 

command to enter

 

TLSG2424#

 

command to return to User EXEC

 

EXEC Mode

 

this

mode

from

 

 

mode.

 

 

 

 

 

User EXEC mode.

 

 

 

 

Enter

configure

command

to

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

access Global Configuration mode.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

11

 

 

 

 

 

 

 

Mode

 

 

Accessing

 

Prompt

 

 

Logout or Access the next

 

 

 

 

Path

 

 

 

 

 

 

mode

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Use the configure

 

 

 

 

Use the exit or the end command

 

 

 

 

command to enter

 

 

 

 

or press Ctrl+Z to return to

 

 

 

 

this

mode

from

 

 

 

 

Privileged EXEC mode.

 

 

Global

 

Privileged

EXEC

 

 

 

 

Use the interface gigabitEthernet

 

Configuration

 

mode.

 

 

TLSG2424 (config)#

 

port

or

 

interface

range

 

 

 

 

 

 

 

gigabitEthernet port-list command

 

Mode

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

to access

interface Configuration

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

mode.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Use the vlan vlan-list to access

 

 

 

 

 

 

 

 

 

 

 

VLAN Configuration mode.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Use the interface

 

 

 

 

Use the end command or press

 

 

 

 

type

number

 

TL-SG2424 (config-if)#

 

Ctrl+Z to return to Privileged EXEC

 

Interface

 

command to enter

 

 

mode.

 

 

 

 

 

 

this

mode

from

 

 

 

 

 

 

 

 

 

 

Configuration

 

 

or

 

Enter exit command or the #

 

 

Global

 

 

 

command

to

return to

Global

 

Mode

 

Configuration

 

TL-SG2424(config-if-range)#

 

Configuration mode.

 

 

 

 

 

 

 

 

 

 

 

 

mode.

 

 

 

 

 

A port number must be specified in

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

the interface command.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Use

the

vlan

 

 

 

 

Use the end command or press

 

VLAN

 

vlan-list command

 

 

 

 

Ctrl+Z to return to Privileged EXEC

 

Configuration

 

to enter this mode

 

TL-SG2424 (config-vlan)#

 

mode.

 

 

 

 

 

Mode

 

from

 

Global

 

 

 

 

Enter the exit

command or the #

 

 

Configuration

 

 

 

 

command to return to Global

 

 

 

 

 

 

 

 

 

 

 

 

mode.

 

 

 

 

 

configuration mode.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Note:

1.The user is automatically in User EXEC Mode after the connection between the PC and the switch is established by a Telnet/SSH connection.

2.Each command mode has its own set of specific commands. To configure some commands, you should access the corresponding command mode firstly.

Global Configuration Mode: In this mode, global commands are provided, such as the Spanning Tree, Schedule Mode and so on.

Interface Configuration Mode: In this mode, users can configure one or several ports, different ports corresponds to different commands

a). Interface gigabitEthernet: Configure parameters for an Ethernet port, such as Duplex-mode, flow control status.

b). Interface range gigabitEthernet: Configure parameters for several Ethernet ports.

12

c). Interface link-aggregation: Configure parameters for a link-aggregation, such as broadcast storm.

d). Interface range link-aggregation: Configure parameters for multi-trunks. e). Interface vlan: Configure parameters for the vlan-port.

VLAN Configuration Mode: In this mode, users can create a VLAN and add a specified port to the VLAN.

3.Some commands are global, that means they can be performed in all modes:

show: display all information of switch, for example: statistic information, port information, VLAN information.

history: Display the commands history.

1.3 Security Levels

This switch’s security is divided into two levels: User level and Admin level.

User level only allows users to do some simple operations in User EXEC Mode; Admin level allows you to monitor, configure and manage the switch in Privileged EXEC Mode, Global Configuration Mode, Interface Configuration Mode and VLAN Configuration Mode.

Users get the privilege to the User level once logging in by Telnet/SSH. However, Guest users are restricted to access the CLI.

Users can enter Privileged EXEC mode from User EXEC mode by using the enable command. In default case, no password is needed. In Global Configuration Mode, you can configure password for Admin level by enable password command. Once password is configured, you are required to enter it to access Privileged EXEC mode.

1.4 Conventions

1.4.1 Format Conventions

The following conventions are used in this Guide:

Items in square brackets [ ] are optional

Items in braces { } are required

Alternative items are grouped in braces and separated by vertical bars. For example: speed {10 | 100 | 1000 }

Bold indicates an unalterable keyword. For example: show logging

13

Normal Font indicates a constant (several options are enumerated and only one can be selected). For example: mode {dynamic | static | permanent}

Italic Font indicates a variable (an actual value must be assigned). For example: bridge aging-time aging-time

1.4.2 Special Characters

You should pay attentions to the description below if the variable is a character string:

These six characters ” < > , \ & can not be input.

If a blank is contained in a character string, single or double quotation marks should be used, for example ’hello world’, ”hello world”, and the words in the quotation marks will be identified as a string. Otherwise, the words will be identified as several strings.

1.4.3 Parameter Format

Some parameters must be entered in special formats which are shown as follows:

MAC address must be enter in the format of xx:xx:xx:xx:xx:xx.

One or several values can be typed for a port-list or a vlan-list using comma to separate. Use a hyphen to designate a range of values, for instance,1/0/1,1/0/3-5,1/0/7 indicates choosing port 1/0/1,1/0/3,1/0/4,1/0/5,1/0/7.

14

Chapter 2 User Interface

enable

Description

The enable command is used to access Privileged EXEC Mode from User EXEC Mode.

Syntax

enable

Command Mode

User EXEC Mode

Example

If you have set the password to access Privileged EXEC Mode from User EXEC Mode:

TL-SG2424>enable

Enter password

TL-SG2424#

service password-encryption

Description

The service password-encryption command is used to encrypt the password when the password is defined or when the configuration is written, using the symmetric encryption algorithm. Encryption prevents the password from being readable in the configuration file. To disable the global encryption function, please use no service password-encryption command.

Syntax

service password-encryption no service password-encryption

Command Mode

Global Configuration Mode

15

Example

Enable the global encryption function:

TL-SG2424(config)# service password-encryption

enable password

Description

The enable password command is used to set or change the password for users to access Privileged EXEC Mode from User EXEC Mode. To remove the password, please use no enable password command. This command uses the symmetric encryption.

Syntax

enable password { [ 0 ] password | 7 encrypted-password } no enable password

Parameter

0 —— Specify the encryption type. 0 indicates that an unencrypted password will follow. By default, the encryption type is 0.

password —— Super password, a string from 1 to 31 alphanumeric characters or symbols. The password is case sensitive, allows digits, English letters (case sensitive), underlines and sixteen special characters ( !$%'()*,-./[]{|} ). By default, it is empty.

7 —— Indicates a symmetric encrypted password with fixed length will follow.

encrypted-password —— A symmetric encrypted password with fixed length, which you can copy from another switch’s configuration file. After the encrypted password is configured, you should use the corresponding unencrypted password if you re-enter this mode.

Command Mode

Global Configuration Mode

User Guidelines

If the password you configured here is unencrypted and the global encryption function is enabled in service password-encryption, the password in the configuration file will be displayed in the symmetric encrypted form.

16

Example

Set the super password as “admin” and unencrypted to access Privileged EXEC Mode from User EXEC Mode:

TL-SG2424(config)#enable password 0 admin

enable secret

Description

The enable secret command is used to set a secret password, which is using an MD5 encryption algorithm, for users to access Privileged EXEC Mode from User EXEC Mode. To return to the default configuration, please use no enable secret command. This command uses the MD5 encryption.

Syntax

enable secret { [ 0 ] password | 5 encrypted-password } no enable secret

Parameter

0 —— Specify the encryption type. 0 indicates that an unencrypted password will follow. By default, the encryption type is 0.

password —— Super password, a string from 1 to 31 alphanumeric characters or symbols. The password is case sensitive, allows digits, English letters (case sensitive), underlines and sixteen special characters ( !$%'()*,-./[]{|} ). By default, it is empty. The password in the configuration file will be displayed in the MD5 encrypted form.

5 —— Indicates an MD5 encrypted password with fixed length will follow.

encrypted-password —— An MD5 encrypted password with fixed length, which you can copy from another switch’s configuration file. After the encrypted password is configured, you should use the corresponding unencrypted password if you re-enter this mode.

Command Mode

Global Configuration Mode

User Guidelines

If both the enable password and enable secret are defined, you must enter the password set in enable secret.

17

Example

Set the secret password as “admin” and unencrypted to access Privileged EXEC Mode from User EXEC Mode. The password will be displayed in the encrypted form.

TL-SG2424(config)#enable secret 0 admin

disable

Description

The disable command is used to return to User EXEC Mode from Privileged EXEC Mode.

Syntax

disable

Command Mode

Privileged EXEC Mode

Example

Return to User EXEC Mode from Privileged EXEC Mode:

TL-SG2424# disable

TL-SG2424>

configure

Description

The configure command is used to access Global Configuration Mode from

Privileged EXEC Mode.

Syntax

configure

Command Mode

Privileged EXEC Mode

Example

Access Global Configuration Mode from Privileged EXEC Mode:

TL-SG2424# configure

TL-SG2424(config)#

18

Loading...
+ 202 hidden pages