TP-Link TL-SL5428E CLI Reference Guide

TL-SL5428E
24-Port 10/100Mbps + 4-Port Gigabit JetStream L2 Managed Switch
REV2.0.0
1910011020
COPYRIGHT & TRADEMARKS
Specifications are subject to change without notice. is a registered trademark of
TP-LINK TECHNOLOGIES CO., LTD. Other brands and product names are trademarks or
registered trademarks of their respective holders.
No part of the specifications may be reproduced in any form or by any means or used to make any
derivative such as translation, transformation, or adaptation without permission from TP-LINK
TECHNOLOGIES CO., LTD. Copyright © 2014 TP-LINK TECHNOLOGIES CO., LTD. All rights
reserved.
http://www.tp-link.com
CONTENTS
Preface ………………………………………………………………………………….1
Chapter 1 Using the CLI ....................................................................................... 5
1.1 Accessing the CLI...........................................................................................................5
1.1.1 Logon by a console port .......................................................................................5
1.1.2 Configuring the Privileged EXEC Mode Password.............................................7
1.1.3 Logon by Telnet..................................................................................................7
1.1.4 Logon by SSH..................................................................................................13
1.2 CLI Command Modes ................................................................................................... 18
1.3 Security Levels .............................................................................................................20
1.4 Conventions..................................................................................................................20
1.4.1 Format Conventions ...........................................................................................20
1.4.2 Special Characters..............................................................................................21
1.4.3 Parameter Format...............................................................................................21
Chapter 2 User Interface .................................................................................... 22
enable....................................................................................................................................22
enable password ...................................................................................................................22
disable...................................................................................................................................23
configure................................................................................................................................23
exit.........................................................................................................................................24
end ........................................................................................................................................24
show history ..........................................................................................................................25
clear history ...........................................................................................................................25
Chapter 3 IEEE 802.1Q VLAN Commands ........................................................ 26
vlan........................................................................................................................................26
interface vlan .........................................................................................................................27
name .....................................................................................................................................27
switchport mode ....................................................................................................................28
switchport access vlan...........................................................................................................28
switchport trunk allowed vlan.................................................................................................29
switchport general allowed vlan.............................................................................................30
switchport pvid.......................................................................................................................30
show vlan summary...............................................................................................................31
show vlan brief ......................................................................................................................31
II
show vlan ..............................................................................................................................32
Chapter 4 MAC-based VLAN Commands ......................................................... 33
mac-vlan mac-address ..........................................................................................................33
mac-vlan................................................................................................................................34
show mac-vlan ......................................................................................................................34
show mac-vlan interface........................................................................................................35
Chapter 5 Protocol-based VLAN Commands ................................................... 36
protocol-vlan template ...........................................................................................................36
protocol-vlan vlan ..................................................................................................................37
protocol-vlan..........................................................................................................................37
show protocol-vlan template..................................................................................................38
show protocol-vlan vlan .........................................................................................................38
show protocol-vlan interface..................................................................................................39
Chapter 6 VLAN-VPN Commands...................................................................... 40
dot1q-tunnel ..........................................................................................................................40
dot1q-tunnel tpid....................................................................................................................40
dot1q-tunnel mapping............................................................................................................41
switchport dot1q-tunnel mapping...........................................................................................42
switchport dot1q-tunnel mode uplink .....................................................................................42
show dot1q-tunnel .................................................................................................................43
show dot1q-tunnel mapping ..................................................................................................43
show dot1q-tunnel mapping interface.................................................................................... 44
show dot1q-tunnel uplink.......................................................................................................44
Chapter 7 Voice VLAN Commands.................................................................... 45
voice vlan ..............................................................................................................................45
voice vlan aging time.............................................................................................................45
voice vlan priority...................................................................................................................46
voice vlan mac-address.........................................................................................................47
switchport voice vlan mode ...................................................................................................47
switchport voice vlan security ................................................................................................ 48
show voice vlan .....................................................................................................................49
show voice vlan oui ...............................................................................................................49
show voice vlan switchport .................................................................................................... 50
Chapter 8 Private VLAN Commands ................................................................. 51
III
private-vlan primary...............................................................................................................51
private-vlan community..........................................................................................................51
private-vlan association.........................................................................................................52
switchport private-vlan...........................................................................................................52
switchport private-vlan host-association ................................................................................ 53
switchport private-vlan mapping ............................................................................................54
show vlan private-vlan...........................................................................................................55
Chapter 9 GVRP Commands.............................................................................. 56
gvrp .......................................................................................................................................56
gvrp (interface) ......................................................................................................................56
gvrp registration.....................................................................................................................57
gvrp timer ..............................................................................................................................58
show gvrp global ...................................................................................................................59
show gvrp interface ...............................................................................................................59
Chapter 10 Etherchannel Commands ................................................................. 60
channel-group .......................................................................................................................60
port-channel load-balance ..................................................................................................... 61
lacp system-priority ...............................................................................................................61
lacp port-priority.....................................................................................................................62
show etherchannel ................................................................................................................62
show etherchannel load-balance...........................................................................................63
show lacp ..............................................................................................................................63
show lacp sys-id ....................................................................................................................64
Chapter 11 User Manage Commands.................................................................. 65
user name .............................................................................................................................65
user access-control ip-based.................................................................................................66
user access-control mac-based.............................................................................................66
user access-control port-based .............................................................................................67
user max-number ..................................................................................................................68
user idle-timeout....................................................................................................................68
line.........................................................................................................................................69
password ...............................................................................................................................70
login.......................................................................................................................................71
login local ..............................................................................................................................71
show user account-list...........................................................................................................72
show user configuration.........................................................................................................72
IV
Chapter 12 Binding Table Commands................................................................. 73
ip source binding ...................................................................................................................73
ip source binding index.......................................................................................................... 74
ip dhcp snooping ...................................................................................................................75
ip dhcp snooping global.........................................................................................................75
ip dhcp snooping information option......................................................................................76
ip dhcp snooping information strategy ................................................................................... 77
ip dhcp snooping information remote-id.................................................................................78
ip dhcp snooping information circuit-id ..................................................................................78
ip dhcp snooping trust ...........................................................................................................79
ip dhcp snooping mac-verify..................................................................................................80
ip dhcp snooping limit rate.....................................................................................................80
ip dhcp snooping decline .......................................................................................................81
show ip source binding..........................................................................................................81
show ip dhcp snooping ..........................................................................................................82
show ip dhcp snooping information .......................................................................................82
show ip dhcp snooping interface ........................................................................................... 83
Chapter 13 ARP Inspection Commands.............................................................. 84
ip arp inspection(global) ........................................................................................................84
ip arp inspection trust ............................................................................................................84
ip arp inspection(interface) ....................................................................................................85
ip arp inspection limit-rate......................................................................................................86
ip arp inspection recover .......................................................................................................86
show ip arp inspection...........................................................................................................87
show ip arp inspection interface ............................................................................................87
show ip arp inspection statistics ............................................................................................88
clear ip arp inspection statistics.............................................................................................88
Chapter 14 IP Verify Source Commands............................................................. 89
ip verify source ......................................................................................................................89
show ip verify source.............................................................................................................90
Chapter 15 DoS Defend Command...................................................................... 91
ip dos-prevent........................................................................................................................91
ip dos-prevent ping-rate.........................................................................................................91
ip dos-prevent syn-rate..........................................................................................................92
ip dos-prevent type................................................................................................................93
V
ip dos-prevent detect.............................................................................................................94
clear ip dos-prevent detect statistics......................................................................................94
show ip dos-prevent ..............................................................................................................95
Chapter 16 IEEE 802.1X Commands ................................................................... 96
dot1x system-auth-control .....................................................................................................96
dot1x auth-method ................................................................................................................96
dot1x guest-vlan(global) ........................................................................................................97
dot1x quiet-period..................................................................................................................98
dot1x timeout.........................................................................................................................98
dot1x max-reauth-req ............................................................................................................99
dot1x......................................................................................................................................99
dot1x guest-vlan(interface) .................................................................................................. 100
dot1x port-control ................................................................................................................101
dot1x port-method ...............................................................................................................101
radius...................................................................................................................................102
radius server-account..........................................................................................................103
show dot1x global................................................................................................................104
show dot1x interface ...........................................................................................................104
show radius accounting.......................................................................................................105
show radius authentication .................................................................................................. 105
Chapter 17 PPPoE Circuit-ID Insertion Commands ..........................................106
pppoe circuit-id(global) ........................................................................................................106
pppoe circuit-id(interface) ....................................................................................................106
pppoe circuit-id type ............................................................................................................ 107
show pppoe circuit-id global ................................................................................................108
show pppoe circuit-id interface ............................................................................................ 108
Chapter 18 System Log Commands...................................................................110
logging buffer....................................................................................................................... 110
logging file flash................................................................................................................... 111
logging file flash frequency .................................................................................................. 111
logging file flash level .......................................................................................................... 112
clear logging ........................................................................................................................113
logging host index ............................................................................................................... 113
show logging local-config ....................................................................................................114
show logging loghost........................................................................................................... 114
show logging buffer .............................................................................................................115
VI
show logging flash............................................................................................................... 115
Chapter 19 SSH Commands................................................................................117
ip ssh server ........................................................................................................................ 117
ip ssh version ...................................................................................................................... 117
ip ssh timeout ...................................................................................................................... 118
ip ssh max-client.................................................................................................................. 118
ip ssh download................................................................................................................... 119
show ip ssh..........................................................................................................................120
Chapter 20 SSL Commands................................................................................121
ip http secure-server............................................................................................................121
ip http secure-server download certificate ...........................................................................121
ip http secure-server download key.....................................................................................122
show ip http secure-server ..................................................................................................123
Chapter 21 MAC Address Commands................................................................124
mac address-table static......................................................................................................124
mac address-table aging-time ............................................................................................. 125
mac address-table filtering ..................................................................................................125
mac address-table max-mac-count .....................................................................................126
show mac address-table......................................................................................................127
show mac address-table aging-time....................................................................................128
show mac address-table max-mac-count interface ............................................................. 128
show mac address-table interface.......................................................................................129
show mac address-table count............................................................................................129
show mac address-table address........................................................................................129
show mac address-table vlan ..............................................................................................130
Chapter 22 System Configuration Commands..................................................131
system-time manual ............................................................................................................131
system-time ntp ...................................................................................................................131
system-time dst predefined .................................................................................................133
system-time dst date ...........................................................................................................134
system-time dst recurring ....................................................................................................135
hostname.............................................................................................................................136
location................................................................................................................................136
contact-info..........................................................................................................................137
ip management-vlan............................................................................................................ 137
VII
ip address............................................................................................................................138
ip address-alloc dhcp ..........................................................................................................138
ip address-alloc bootp .........................................................................................................139
reset .................................................................................................................................... 139
reboot ..................................................................................................................................140
copy running-config startup-config ......................................................................................140
copy startup-config tftp ........................................................................................................141
copy tftp startup-config ........................................................................................................141
firmware upgrade ................................................................................................................142
ping .....................................................................................................................................143
tracert ..................................................................................................................................144
loopback interface ...............................................................................................................145
show system-time................................................................................................................145
show system-time dst..........................................................................................................146
show system-time ntp.......................................................................................................... 146
show system-info.................................................................................................................146
show running-config ............................................................................................................147
show cable-diagnostics interface.........................................................................................147
Chapter 23 IPv6 Address Configuration Commands ........................................149
ipv6 enable ..........................................................................................................................149
ipv6 address autoconfig.......................................................................................................149
ipv6 address link-local .........................................................................................................150
ipv6 address dhcp ...............................................................................................................151
ipv6 address ra....................................................................................................................151
ipv6 address eui-64 .............................................................................................................152
ipv6 address ........................................................................................................................152
show ipv6 interface vlan ......................................................................................................153
Chapter 24 Ethernet Configuration Commands ................................................154
interface fastEthernet .......................................................................................................... 154
interface range fastEthernet ................................................................................................154
interface gigabitEthernet......................................................................................................155
interface range gigabitEthernet ...........................................................................................155
description ...........................................................................................................................156
shutdown .............................................................................................................................157
flow-control ..........................................................................................................................157
media-type...........................................................................................................................158
VIII
duplex..................................................................................................................................158
speed...................................................................................................................................159
storm-control broadcast.......................................................................................................159
storm-control multicast ........................................................................................................ 160
storm-control unicast ...........................................................................................................161
bandwidth ............................................................................................................................161
clear counters......................................................................................................................162
show interface status........................................................................................................... 162
show interface counters.......................................................................................................163
show interface description ................................................................................................... 164
show interface flowcontrol ...................................................................................................164
show interface configuration................................................................................................165
show storm-control ..............................................................................................................165
show bandwidth...................................................................................................................166
Chapter 25 QoS Commands................................................................................167
qos ......................................................................................................................................167
qos cos................................................................................................................................167
qos dscp..............................................................................................................................168
qos queue cos-map.............................................................................................................169
qos queue dscp-map...........................................................................................................169
qos queue mode..................................................................................................................170
show qos interface ..............................................................................................................171
show qos cos-map ..............................................................................................................172
show qos dscp-map ............................................................................................................172
show qos queue mode ........................................................................................................173
show qos status...................................................................................................................173
Chapter 26 Port Mirror Commands ....................................................................174
monitor session destination interface .................................................................................. 174
monitor session source interface.........................................................................................175
show monitor session..........................................................................................................176
Chapter 27 Port isolation Commands ................................................................177
port isolation ........................................................................................................................ 177
show port isolation...............................................................................................................178
Chapter 28 Loopback Detection Commands.....................................................179
loopback-detection(global) ..................................................................................................179
IX
loopback-detection interval..................................................................................................179
loopback-detection recovery-time........................................................................................ 180
loopback-detection(interface) ..............................................................................................180
loopback-detection config....................................................................................................181
loopback-detection recover .................................................................................................182
show loopback-detection global ..........................................................................................182
show loopback-detection interface ...................................................................................... 183
Chapter 29 ACL Commands................................................................................184
time-range ...........................................................................................................................184
absolute...............................................................................................................................184
periodic................................................................................................................................185
holiday.................................................................................................................................186
holiday(global) .....................................................................................................................186
access-list create.................................................................................................................187
mac access-list....................................................................................................................187
access-list standard.............................................................................................................188
access-list extended............................................................................................................189
rule ...................................................................................................................................... 190
access-list policy name........................................................................................................192
access-list policy action.......................................................................................................192
redirect interface..................................................................................................................193
redirect vlan.........................................................................................................................193
s-condition ........................................................................................................................... 194
s-mirror ................................................................................................................................195
qos-remark ..........................................................................................................................195
access-list bind(interface)....................................................................................................196
access-list bind(vlan)...........................................................................................................196
show time-range..................................................................................................................197
show holiday........................................................................................................................197
show access-list ..................................................................................................................198
show access-list policy ........................................................................................................198
show access-list bind ..........................................................................................................198
Chapter 30 MSTP Commands .............................................................................200
spanning-tree(global)...........................................................................................................200
spanning-tree(interface) ......................................................................................................200
spanning-tree common-config ............................................................................................. 201
X
spanning-tree mode.............................................................................................................202
spanning-tree mst configuration .......................................................................................... 203
instance...............................................................................................................................203
name ................................................................................................................................... 204
revision................................................................................................................................204
spanning-tree mst instance .................................................................................................205
spanning-tree mst................................................................................................................206
spanning-tree priority........................................................................................................... 206
spanning-tree tc-defend.......................................................................................................207
spanning-tree timer..............................................................................................................208
spanning-tree hold-count..................................................................................................... 208
spanning-tree max-hops......................................................................................................209
spanning-tree bpdufilter....................................................................................................... 210
spanning-tree bpduguard ....................................................................................................210
spanning-tree guard loop..................................................................................................... 211
spanning-tree guard root ..................................................................................................... 211
spanning-tree guard tc.........................................................................................................212
spanning-tree mcheck .........................................................................................................212
show spanning-tree active................................................................................................... 213
show spanning-tree bridge ..................................................................................................213
show spanning-tree interface ..............................................................................................214
show spanning-tree interface-security.................................................................................214
show spanning-tree mst ......................................................................................................215
Chapter 31 Ethernet OAM Commands ...............................................................217
ethernet-oam .......................................................................................................................217
ethernet-oam mode .............................................................................................................217
ethernet-oam link-monitor symbol-period ............................................................................218
ethernet-oam link-monitor frame .........................................................................................219
ethernet-oam link-monitor frame-period ..............................................................................220
ethernet-oam link-monitor frame-seconds ........................................................................... 221
ethernet-oam remote-failure ................................................................................................ 222
ethernet-oam remote-loopback received-remote- loopback ................................................223
ethernet-oam remote-loopback ...........................................................................................224
clear ethernet-oam statistics................................................................................................224
clear ethernet-oam event-log...............................................................................................225
show ethernet-oam configuration ........................................................................................ 226
show ethernet-oam event-log .............................................................................................. 226
XI
show ethernet-oam statistics ............................................................................................... 227
show ethernet-oam status ...................................................................................................227
Chapter 32 DLDP Commands .............................................................................229
dldp(global)..........................................................................................................................229
dldp interval ......................................................................................................................... 229
dldp shut-mode....................................................................................................................230
dldp reset(global).................................................................................................................230
dldp(interface) .....................................................................................................................231
dldp reset(interface).............................................................................................................231
show dldp ............................................................................................................................232
show dldp interface..............................................................................................................232
Chapter 33 IGMP Snooping Commands ............................................................234
ip igmp snooping(global) .....................................................................................................234
ip igmp snooping(interface) .................................................................................................234
ip igmp snooping immediate-leave ......................................................................................235
ip igmp snooping drop-unknown..........................................................................................235
ip igmp snooping vlan-config ............................................................................................... 236
ip igmp snooping multi-vlan-config ...................................................................................... 237
ip igmp snooping filter add-id...............................................................................................238
ip igmp snooping filter(global)..............................................................................................239
ip igmp snooping filter(interface) .........................................................................................239
ip igmp snooping filter maxgroup.........................................................................................240
ip igmp snooping filter mode................................................................................................240
ip igmp snooping querier vlan..............................................................................................241
ip igmp snooping querier vlan (general query) ....................................................................242
ip igmp snooping querier vlan (specific query) ....................................................................243
show ip igmp snooping........................................................................................................244
show ip igmp snooping interface ......................................................................................... 244
show ip igmp snooping vlan ................................................................................................245
show ip igmp snooping multi-vlan........................................................................................ 245
show ip igmp snooping groups ............................................................................................246
show ip igmp snooping filter ................................................................................................246
show ip igmp snooping querier vlan .................................................................................... 247
show ip igmp snooping querier............................................................................................247
Chapter 34 MLD Snooping Commands..............................................................249
ipv6 mld snooping ...............................................................................................................249
XII
ipv6 mld snooping router-aging-time ...................................................................................249
ipv6 mld snooping member-aging-time................................................................................250
ipv6 mld snooping report-suppression................................................................................. 250
ipv6 mld snooping unknown-filter ........................................................................................ 251
ipv6 mld snooping last-listener query-inteval.......................................................................251
ipv6 mld snooping last-listener query-count ........................................................................252
ipv6 mld snooping multicast-vlan.........................................................................................252
ipv6 mld snooping multicast-vlan vlan-id .............................................................................253
ipv6 mld snooping vlan ........................................................................................................ 253
ipv6 mld snooping vlan router-aging-time............................................................................254
ipv6 mld snooping vlan member-aging-time ........................................................................ 254
ipv6 mld snooping vlan immediate-leave.............................................................................255
ipv6 mld snooping vlan mrouter........................................................................................... 255
ipv6 mld snooping vlan static...............................................................................................256
ipv6 mld snooping querier vlan............................................................................................256
ipv6 mld snooping querier vlan max-response-time ............................................................ 257
ipv6 mld snooping querier vlan query-interval ..................................................................... 258
ipv6 mld snooping querier vlan query-source ......................................................................258
ipv6 mld snooping filter(global)............................................................................................259
ipv6 mld snooping filter(interface)........................................................................................259
ipv6 mld snooping filter-mode..............................................................................................260
ipv6 mld snooping filter-id....................................................................................................260
ipv6 mld snooping max-group .............................................................................................261
clear ipv6 mld snooping st
show ipv6 mld snooping ......................................................................................................262
show ipv6 mld snooping vlan...............................................................................................262
show ipv6 mld snooping static-mcast ..................................................................................263
show ipv6 mld snooping group ............................................................................................263
show ipv6 mld snooping filter ..............................................................................................264
show ipv6 mld snooping interface .......................................................................................264
show ipv6 mld snooping interface filter................................................................................ 264
atistics ........................................................................................261
show ipv6 mld snooping querier ..........................................................................................265
show ipv6 mld snooping statistics........................................................................................265
Chapter 35 SNMP Commands.............................................................................267
snmp-server ........................................................................................................................267
snmp-server view ................................................................................................................267
snmp-server group ..............................................................................................................268
XIII
snmp-server user ................................................................................................................269
snmp-server community ......................................................................................................271
snmp-server host.................................................................................................................272
snmp-server engineID .........................................................................................................273
snmp-server traps snmp...................................................................................................... 274
snmp-server traps security ..................................................................................................275
snmp-server traps link-status...............................................................................................276
snmp-server traps................................................................................................................276
snmp-server traps mac........................................................................................................ 277
snmp-server traps vlan........................................................................................................278
rmon history.........................................................................................................................279
rmon event ..........................................................................................................................280
rmon alarm ..........................................................................................................................281
show snmp-server ...............................................................................................................283
show snmp-server view ....................................................................................................... 283
show snmp-server group ..................................................................................................... 283
show snmp-server user .......................................................................................................284
show snmp-server community.............................................................................................284
show snmp-server host .......................................................................................................285
show snmp-server engineID................................................................................................285
show rmon history ...............................................................................................................285
show rmon event .................................................................................................................286
show rmon alarm.................................................................................................................286
Chapter 36 LLDP Commands..............................................................................288
lldp.......................................................................................................................................288
lldp hold-multiplier................................................................................................................288
lldp timer..............................................................................................................................289
lldp receive ..........................................................................................................................290
lldp transmit ......................................................................................................................... 290
lldp snmp-trap......................................................................................................................291
lldp tlv-select........................................................................................................................292
show lldp .............................................................................................................................292
show lldp interface...............................................................................................................293
show lldp local-information interface....................................................................................293
show lldp neighbor-information interface ............................................................................. 294
show lldp traffic interface.....................................................................................................294
Chapter 37 Cluster Commands...........................................................................296
XIV
cluster ndp...........................................................................................................................296
cluster ntdp.......................................................................................................................... 297
cluster explore .....................................................................................................................298
cluster..................................................................................................................................298
cluster ip pool ......................................................................................................................299
cluster commander ..............................................................................................................299
cluster manage....................................................................................................................300
cluster member....................................................................................................................300
cluster candidate .................................................................................................................301
cluster individual..................................................................................................................301
show cluster ndp..................................................................................................................302
show cluster ntdp.................................................................................................................302
show cluster ........................................................................................................................303
show cluster member ..........................................................................................................303
show cluster manage role....................................................................................................304
show cluster neighbor..........................................................................................................304
XV
TL-SL5428E JetStream L2 Managed Switch CLI Guide

Preface

This Guide is intended for network administrator to provide referenced information about CLI (Command Line Interface). The device mentioned in this Guide stands for TL-SL5428E 24-Port 10/100Mbps + 4-Port Gigabit JetStream L2 Managed Switch.
Overview of this Guide
Chapter 1: Using the CLI
Provide information about how to use the CLI, CLI Command Modes, Security Levels and some
Conventions.
Chapter 2: User Interface
Provide information about the commands used to switch between five CLI Command Modes.
Chapter 3: IEEE 802.1Q VLAN Commands
Provide information about the commands used for configuring IEEE 802.1Q VLAN.
Chapter 4: MAC-based VLAN Commands
Provide information about the commands used for configuring MAC-Based VLAN.
Chapter 5: Protocol-based VLAN Commands
Provide information about the commands used for configuring Protocol-based VLAN.
Chapter 6: VLAN-VPN Commands
Provide information about the commands used for configuring VLAN-VPN (Virtual Private Network)
function.
Chapter 7: Voice VLAN Commands
Provide information about the commands used for configuring Voice VLAN.
Chapter 8: Private VLAN Commands
Provide information about the commands used for configuring Private VLAN.
Chapter 9: GVRP Commands
Provide information about the commands used for configuring GVRP (GARP VLAN registration
protocol).
Chapter 10: EtherChannel Commands
Provide information about the commands used for configuring LAG (Link Aggregation Group) and
LACP (Link Aggregation Control Protocol).
Chapter 11: User Manage Commands
Provide information about the commands used for user management.
1
TL-SL5428E JetStream L2 Managed Switch CLI Guide
Chapter 12: Binding Table Commands
Provide information about the commands used for binding the IP address, MAC address, VLAN
and the connected Port number of the Host together. Besides it also provide information about the
commands used for monitoring the process of the Host obtaining the IP address from DHCP
server, and record the IP address, MAC address, VLAN and the connected Port number of the
Host for automatic binding.
Chapter 13: ARP Inspection Commands
Provide information about the commands used for protecting the switch from the ARP cheating or
ARP Attack.
Chapter 14: IP Verify Source Commands
Provide information about the commands used for guarding the IP Source by filtering the IP
packets based on the IP-MAC Binding entries.
Chapter 15: DoS Defend Command
Provide information about the commands used for DoS defend and detecting the DoS attack.
Chapter 16: IEEE 802.1X Commands
Provide information about the commands used for configuring IEEE 802.1X function.
Chapter 17: PPPoE Circuit-ID Insertion Commands
Provide information about the commands used for configuring PPPoE Circuit-ID function.
Chapter 18: System Log Commands
Provide information about the commands used for configuring system log.
Chapter 19: SSH Commands
Provide information about the commands used for configuring and managing SSH (Security
Shell).
Chapter 20: SSL Commands
Provide information about the commands used for configuring and managing SSL (Secure
Sockets Layer).
Chapter 21: MAC Address Commands
Provide information about the commands used for MAC address configuration.
Chapter 22: System Configuration Commands
Provide information about the commands used for configuring the System information and System
IP, reboot and reset the switch, upgrade the switch system and commands used for device
diagnose, including loopback test and cable test.
Chapter 23: IPv6 Address Configuration Commands
Provide information about the commands used for configuring the System IPv6 addresses.
2
TL-SL5428E JetStream L2 Managed Switch CLI Guide
Chapter 24: Ethernet Configuration Commands
Provide information about the commands used for configuring the Bandwidth Control, Negotiation
Mode, and Storm Control for ethernet ports.
Chapter 25: QoS Commands
Provide information about the commands used for configuring the QoS function.
Chapter 26: Port Mirror Commands
Provide information about the commands used for configuring the Port Mirror function.
Chapter 27: Port isolation Commands
Provide information about the commands used for configuring the Port isolation function.
Chapter 28: Loopback Detection Commands
Provide information about the commands used for loopback detection.
Chapter 29: ACL Commands
Provide information about the commands used for configuring the ACL (Access Control List).
Chapter 30: MSTP Commands
Provide information about the commands used for configuring the MSTP (Multiple Spanning Tree
Protocol).
Chapter 31: Ethernet OAM Commands
Provide information about the commands used for configuring the Ethernet OAM (Operation,
Administration, and Maintenance) function.
Chapter 32: DLDP Commands
Provide information about the commands used for configuring the DLDP (Device Link Detection
Protocol).
Chapter 33: IGMP Commands
Provide information about the commands used for configuring the IGMP Snooping (Internet Group
Management Protocol Snooping).
Chapter 34: MLD Snooping Commands
Provide information about the commands used for configuring the MLD Snooping (Multicast
Listener Discovery Snooping).
Chapter 35: SNMP Commands
Provide information about the commands used for configuring the SNMP (Simple Network
Management Protocol) functions.
Chapter 36: LLDP Commands
Provide information about the commands used for configuring the LLDP functions.
3
TL-SL5428E JetStream L2 Managed Switch CLI Guide
Chapter 37: Cluster Commands
Provide information about the commands used for configuring the Cluster Management function.
4
TL-SL5428E JetStream L2 Managed Switch CLI Guide

Chapter 1 Using the CLI

1.1 Accessing the CLI

You can log on to the switch and access the CLI by the following two methods:
1. Log on to the switch by the console port on the switch.
2. Log on to the switch remotely by a Telnet or SSH connection through an Ethernet port.

1.1.1 Logon by a console port

To log on to the switch by the console port on the switch, please take the following steps:
1. Connect the PCs or Terminals to the console port on the switch by a provided cable.
2. Click Start
the Hyper Terminal as the Figure 1-1 shown.
All Programs Accessories Communications Hyper Terminal to open
Figure 1-1 Open
3. The Connection Description Window will prompt as Figure 1-2. Enter a name into the Name
field and click OK.
Hyper Terminal
5
TL-SL5428E JetStream L2 Managed Switch CLI Guide
Figure 1-2 Connection Description
4. Select the port to connect in Figure 1-3, and click OK.
Figure 1-3 Select the port to connect
5. Configure the port selected in the step above as the following Figure 1-4 shown. Configure
Bit
s per second as 38400, Data bits as 8, Parity as None, Stop bits as 1, Flow control as
None, and then click OK.
Figure 1-4 Port Settings
6
TL-SL5428E JetStream L2 Managed Switch CLI Guide
6. The DOS prompt” TL-SL5428E>” will appear after pressing the Enter button as Figure 1-5
shown. It indicates
that you can use the CLI now.
Figure 1-5 Log in the Switch

1.1.2 Configuring the Privileged EXEC Mode Password

To configure the switch remotely by a Telnet or SSH connection, please set a password for
entering the Privileged EXEC Mode through the console connection first. Follow the steps in 1.1.1
Logon by a console port to log on to the switch, and then follow the steps shown in Figure 1-6 to
configure the Privileged EXEC Mode password.
Figure 1-6 Configure the Privileged EXEC Mode Password

1.1.3 Logon by Telnet

For Telnet connection, after configuring the Privileged EXEC Mode Password, you should also
configure the Telnet login mode and login authentication information through console connection.
Telnet login has the following two modes. You can choose one according to your needs:
Login local Mode: It requires username and password, which are both admin by default.
7
TL-SL5428E JetStream L2 Managed Switch CLI Guide
Login Mode: It doesn’t require username and password, but a connection password is required.
Note:
Before Telnet login, you are required to configure Telnet login mode and login authentication
information through console connection.
Login Local Mode
Firstly, configure the Telnet login mode as “login local” and set the password for entering into the
Privileged EXEC Mode as 123 in the prompted DOS screen shown in Figure 1-7.
Figure 1-7 Configure login local mode
Now, you can logon by Telnet in login local mode.
1. Telnet to different IPs according to your network.
a) In the IPv4 network, open Telnet and type telnet 192.168.0.1 in the command prompt
shown as Figure 1-8, and press the Enter button.
Figure 1-8 Connecting to the Switch
b) In the IPv6 network, you can telnet to the switch’s global address or link-local address to
login to the switch. Please guarantee the reachability between the host and the switch.
8
TL-SL5428E JetStream L2 Managed Switch CLI Guide
For example, the host’s global address is 3001::12/64and its corresponding interface is
4 as showed in Figure 1-9. The
switch’s global address is 3001::1/64, and its
auto-configured link-local address in EUI-64 format is FE80::20A:EBFF:FE00:1301. Ping
the switch’s IPv6 global address and link-local address from the host to confirm that they
are reachable.
Use the ipconfig/all command to obtain the host’s address information
Figure 1-9 The Host’s Address Information
Type either of the following two commands and press the Enter button:
telnet 3001::1
telnet FE80::20A:EBFF:FE00:1301%4 (In XP, and 4 is the corresponding interface ID)
telnet FE80::20A:EBFF:FE00:1301 in WIN7
9
TL-SL5428E JetStream L2 Managed Switch CLI Guide
2. Type the default user name and password admin/admin, then press the Enter button to enter
the User EXEC Mode.
Figure 1-10 Enter into the User EXEC Mode
Now you can manage your switch with CLI commands through Telnet connection.
3. Type enable command to enter Privileged EXEC Mode. A password that you have set
through Console port connection is required. Here the password has been set as 123.
10
TL-SL5428E JetStream L2 Managed Switch CLI Guide
Figure 1-11 Enter into the Privileged EXEC Mode
Login Mode
Firstly configure the Telnet login mode as “login”, and both the connection password and the
Privileged EXEC Mode password as 123 in the prompted DOS screen shown in Figure 1-12.
Figure 1-12 Configure login mode
Now, you can logon by Telnet in login mode:
1. Open Telnet, then type telnet 192.168.0.1 in the command prompt shown as Figure 1-13, and
press the En
ter button.
11
TL-SL5428E JetStream L2 Managed Switch CLI Guide
Figure 1-13 Connecting to the switch
2. You are prompted to enter the connection password 456 you have set through Console port
connection, and then you are in User EXEC Mode.
Figure 1-14 Enter into the User EXEC Mode
3. When entering enable command to access Privileged EXEC Mode, you are required to give
the password 123 you have set through Console port connection.
12
TL-SL5428E JetStream L2 Managed Switch CLI Guide
Figure 1-15 Enter into the Privileged EXEC Mode
Now you can manage your switch with CLI commands through Telnet connection.
Note:
You can refer to Chapter 11 User Manage Commands
Telnet connection configuration.
for detailed commands information of the

1.1.4 Logon by SSH

To log on by SSH, a Putty client software is recommended. There are two authentication modes to
set up an SSH connection:
Password Authentication Mode: It requires username and password, which are both admin by
default.
Key Authentication Mode: It requires a public key for the switch and a private key for the SSH
client software. You can generate the public key and the private key through Putty Key Generator.
Note:
Before SSH login, please follow the steps shown in Figure 1-16 to enable the SSH function
h console connection.
throug
13
TL-SL5428E JetStream L2 Managed Switch CLI Guide
Figure 1-16 Enable SSH function
Password Authentication Mode
1. Open the software to log on to the interface of PuTTY. Enter the IP address of the switch into
Host Name field; keep the default value 22 in the Port field; select SSH as the Connection
type.
Figure 1-17 SSH Connection Config
2. Click the Open button in the above figure to log on to the switch. Enter the login user name
and password to log on the switch, and the
n enter the Privileged EXEC Mode password, so
you can continue to configure the switch.
14
Loading...
+ 290 hidden pages