CLI Reference Guide
Jetstream Switches
1910012904 REV4.5.0
October 2020
COPYRIGHT & TRADEMARKS
Specifications are subject to change without notice. is a registered trademark of
TP-Link Corporation Limited. Other brands and product names are trademarks or registered trademarks of their respective holders.
No part of the specifications may be reproduced in any form or by any means or used to make any derivative such as translation, transformation, or adaptation without permission from TP-Link Corporation Limited. Copyright © 2020 TP-Link Corporation Limited. All rights reserved.
https://www.tp-link.com
I
CONTENTS
Preface |
............................................................................................................................ |
|
1 |
Chapter 1 Using the CLI ................................................................................................... |
6 |
||
1.1 |
Accessing the CLI........................................................................................................................... |
6 |
|
1.1.1 Logon by a console port...................................................................................................... |
6 |
||
1.1.2 |
Logon by Telnet...................................................................................................................... |
8 |
|
1.1.3 |
Logon by SSH........................................................................................................................ |
10 |
|
1.2 |
CLI Command Modes.................................................................................................................. |
15 |
|
1.3 |
Privilege Restrictions................................................................................................................... |
18 |
|
1.4 |
Conventions ................................................................................................................................... |
18 |
|
1.4.1 |
PoE Disclaimer...................................................................................................................... |
18 |
|
1.4.2 |
Format Conventions ........................................................................................................... |
19 |
|
1.4.3 |
Special Characters.............................................................................................................. |
19 |
|
1.4.4 |
Parameter Format................................................................................................................ |
19 |
|
Chapter 2 Line Commands (Only for Certain Devices)......................................... |
20 |
||
2.1 |
line...................................................................................................................................................... |
|
20 |
2.2 |
media-type rj45 ............................................................................................................................. |
21 |
|
Chapter 3 |
User Interface.............................................................................................. |
22 |
|
3.1 |
enable ............................................................................................................................................... |
22 |
|
3.2 |
service password-encryption .................................................................................................. |
22 |
|
3.3 |
enable password........................................................................................................................... |
23 |
|
3.4 |
enable secret ................................................................................................................................. |
24 |
|
3.5 |
configure.......................................................................................................................................... |
25 |
|
3.6 |
exit...................................................................................................................................................... |
|
26 |
3.7 |
end ..................................................................................................................................................... |
|
26 |
3.8 |
clipaging........................................................................................................................................... |
27 |
|
3.9 |
history............................................................................................................................................... |
27 |
|
3.10 |
history clear.................................................................................................................................... |
28 |
|
Chapter 4 User Management Commands ................................................................ |
29 |
||
4.1 |
user name (password)................................................................................................................. |
29 |
|
4.2 |
user name (secret)........................................................................................................................ |
30 |
|
4.3 |
service password-recovery...................................................................................................... |
31 |
|
4.4 |
show user account-list................................................................................................................ |
32 |
|
4.5 |
show user configuration............................................................................................................. |
33 |
II
Chapter 5 System Configuration Commands ......................................................... |
34 |
|
5.1 |
system-time manual .................................................................................................................... |
34 |
5.2 |
system-time ntp............................................................................................................................ |
34 |
5.3 |
system-time dst predefined ..................................................................................................... |
36 |
5.4 |
system-time dst date .................................................................................................................. |
37 |
5.5 |
system-time dst recurring......................................................................................................... |
38 |
5.6 |
hostname......................................................................................................................................... |
39 |
5.7 |
location............................................................................................................................................. |
40 |
5.8 |
contact-info.................................................................................................................................... |
40 |
5.9 |
led....................................................................................................................................................... |
41 |
5.10 |
ip address........................................................................................................................................ |
41 |
5.11 |
ip address-alloc............................................................................................................................. |
42 |
5.12 |
controller cloud-based (Only for Certain Devices)............................................................ |
43 |
5.13 |
controller inform-url (Only for Certain Devices)................................................................. |
44 |
5.14 |
reset .................................................................................................................................................. |
44 |
5.15 |
service reset-disable................................................................................................................... |
45 |
5.16 |
reboot ............................................................................................................................................... |
46 |
5.17 |
reboot-schedule ........................................................................................................................... |
46 |
5.18 |
copy running-config startup-config....................................................................................... |
47 |
5.19 |
copy startup-config tftp............................................................................................................. |
48 |
5.20 |
copy tftp startup-config............................................................................................................. |
48 |
5.21 |
copy backup-config tftp............................................................................................................. |
49 |
5.22 |
copy backup-config startup-config....................................................................................... |
50 |
5.23 |
copy running-config backup-config ...................................................................................... |
50 |
5.24 |
copy tftp backup-config............................................................................................................. |
51 |
5.25 |
boot application ............................................................................................................................ |
51 |
5.26 |
boot config...................................................................................................................................... |
52 |
5.27 |
remove backup-image................................................................................................................ |
53 |
5.28 |
firmware upgrade.......................................................................................................................... |
53 |
5.29 |
boot autoinstall start.................................................................................................................... |
54 |
5.30 |
boot autoinstall persistent-mode ........................................................................................... |
55 |
5.31 |
boot autoinstall auto-save......................................................................................................... |
55 |
5.32 |
boot autoinstall auto-reboot..................................................................................................... |
56 |
5.33 |
boot autoinstall retry-count ...................................................................................................... |
56 |
5.34 |
show boot autoinstall .................................................................................................................. |
57 |
5.35 |
show boot autoinstall downloaded-config .......................................................................... |
57 |
5.36 |
ping.................................................................................................................................................... |
58 |
|
III |
|
5.37 |
tracert ............................................................................................................................................... |
59 |
5.38 |
show system-info ......................................................................................................................... |
60 |
5.39 |
show image-info............................................................................................................................ |
60 |
5.40 |
show boot........................................................................................................................................ |
61 |
5.41 |
show running-config.................................................................................................................... |
61 |
5.42 |
show startup-config .................................................................................................................... |
62 |
5.43 |
show system-time........................................................................................................................ |
63 |
5.44 |
show system-time dst................................................................................................................. |
63 |
5.45 |
show system-time ntp ................................................................................................................ |
64 |
5.46 |
show cable-diagnostics interface........................................................................................... |
64 |
5.47 |
show cpu-utilization..................................................................................................................... |
65 |
5.48 |
show memory-utilization............................................................................................................ |
65 |
5.49 |
show controller.............................................................................................................................. |
66 |
5.50 |
show temperature ........................................................................................................................ |
66 |
5.51 |
show voltage .................................................................................................................................. |
67 |
Chapter 6 EEE Configuration Commands ................................................................ |
68 |
|
6.1 |
eee ..................................................................................................................................................... |
68 |
6.2 |
show interface eee....................................................................................................................... |
68 |
Chapter 7 SDM Template Commands....................................................................... |
70 |
|
7.1 |
sdm prefer....................................................................................................................................... |
70 |
7.2 |
show sdm prefer ........................................................................................................................... |
71 |
Chapter 8 Time Range Commands ............................................................................ |
72 |
|
8.1 |
time-range....................................................................................................................................... |
72 |
8.2 |
absolute ........................................................................................................................................... |
72 |
8.3 |
periodic ............................................................................................................................................ |
73 |
8.4 |
holiday (time-range mode)......................................................................................................... |
74 |
8.5 |
holiday .............................................................................................................................................. |
75 |
8.6 |
show holiday................................................................................................................................... |
75 |
8.7 |
show time-range ........................................................................................................................... |
76 |
Chapter 9 Port Configuration Commands ............................................................... |
77 |
|
9.1 |
interface gigabitEthernet........................................................................................................... |
77 |
9.2 |
interface range gigabitEthernet............................................................................................... |
77 |
9.3 |
description...................................................................................................................................... |
78 |
9.4 |
shutdown......................................................................................................................................... |
79 |
9.5 |
flow-control .................................................................................................................................... |
80 |
|
IV |
|
9.6 |
duplex ............................................................................................................................................... |
80 |
9.7 |
jumbo-size....................................................................................................................................... |
81 |
9.8 |
speed ................................................................................................................................................ |
81 |
9.9 |
serdes-mode.................................................................................................................................. |
82 |
9.10 |
clear counters................................................................................................................................ |
83 |
9.11 |
show fiber-ports............................................................................................................................ |
83 |
9.12 |
show interface status.................................................................................................................. |
84 |
9.13 |
show interface counters ............................................................................................................ |
84 |
9.14 |
show interface configuration.................................................................................................... |
85 |
Chapter 10 Port Isolation Commands ......................................................................... |
87 |
|
10.1 |
port isolation................................................................................................................................... |
87 |
10.2 |
show port isolation interface .................................................................................................... |
88 |
Chapter 11 Loopback Detection Commands............................................................ |
89 |
|
11.1 |
loopback-detection (global)...................................................................................................... |
89 |
11.2 |
loopback-detection interval...................................................................................................... |
89 |
11.3 |
loopback-detection recovery-time........................................................................................ |
90 |
11.4 |
loopback-detection (interface) ................................................................................................ |
91 |
11.5 |
loopback-detection config process-mode ......................................................................... |
91 |
11.6 |
loopback-detection recover..................................................................................................... |
92 |
11.7 |
show loopback-detection global............................................................................................. |
93 |
11.8 |
show loopback-detection interface....................................................................................... |
93 |
Chapter 12 DDM Commands (Only for Certain Devices)........................................ |
95 |
|
12.1 |
ddm state enable .......................................................................................................................... |
95 |
12.2 |
ddm shutdown............................................................................................................................... |
96 |
12.3 |
ddm temperature_threshold..................................................................................................... |
96 |
12.4 |
ddm voltage_threshold............................................................................................................... |
97 |
12.5 |
ddm bias_current_threshold .................................................................................................... |
98 |
12.6 |
ddm tx_power_threshold........................................................................................................... |
99 |
12.7 |
ddm rx_power_threshold........................................................................................................ |
100 |
12.8 |
show ddm configuration.......................................................................................................... |
101 |
12.9 |
show ddm status........................................................................................................................ |
102 |
Chapter 13 Etherchannel Commands ....................................................................... |
103 |
|
13.1 |
channel-group ............................................................................................................................ |
103 |
13.2 |
port-channel load-balance..................................................................................................... |
104 |
13.3 |
lacp system-priority.................................................................................................................. |
105 |
|
V |
|
13.4 |
lacp port-priority........................................................................................................................ |
106 |
13.5 |
show etherchannel.................................................................................................................... |
106 |
13.6 |
show etherchannel load-balance......................................................................................... |
107 |
13.7 |
show lacp...................................................................................................................................... |
108 |
13.8 |
show lacp sys-id......................................................................................................................... |
108 |
Chapter 14 MAC Address Commands....................................................................... |
110 |
|
14.1 |
mac address-table static ........................................................................................................ |
110 |
14.2 |
no mac address-table dynamic ............................................................................................ |
111 |
14.3 |
mac address-table aging-time.............................................................................................. |
111 |
14.4 |
mac address-table filtering .................................................................................................... |
112 |
14.5 |
mac address-table notification............................................................................................. |
113 |
14.6 |
mac address-table max-mac-count ................................................................................... |
113 |
14.7 |
mac address-table notification (interface)........................................................................ |
115 |
14.8 |
mac address-table security ................................................................................................... |
116 |
14.9 |
mac address-table vlan-security ......................................................................................... |
117 |
14.10 |
show mac address-table......................................................................................................... |
118 |
14.11 |
clear mac address-table ......................................................................................................... |
118 |
14.12 |
show mac address-table aging-time .................................................................................. |
119 |
14.13 |
show mac address-table max-mac-count........................................................................ |
119 |
14.14 |
show mac address-table interface...................................................................................... |
120 |
14.15 |
show mac address-table count ............................................................................................ |
121 |
14.16 |
show mac address-table address ....................................................................................... |
121 |
14.17 |
show mac address-table vlan................................................................................................ |
122 |
14.18 |
show mac address-table notification ................................................................................. |
122 |
14.19 |
show mac address-table security........................................................................................ |
123 |
Chapter 15 IEEE 802.1Q VLAN Commands .............................................................. |
124 |
|
15.1 |
vlan.................................................................................................................................................. |
124 |
15.2 |
name............................................................................................................................................... |
125 |
15.3 |
vlan_trunk (globally) .................................................................................................................. |
125 |
15.4 |
vlan_trunk (interface)................................................................................................................ |
126 |
15.5 |
switchport general allowed vlan ........................................................................................... |
126 |
15.6 |
switchport pvid........................................................................................................................... |
127 |
15.7 |
switchport check ingress........................................................................................................ |
128 |
15.8 |
switchport acceptable frame ................................................................................................ |
129 |
15.9 |
show vlan summary................................................................................................................... |
129 |
15.10 |
show vlan brief............................................................................................................................ |
130 |
|
VI |
|
15.11 |
show vlan...................................................................................................................................... |
130 |
15.12 |
show interface switchport...................................................................................................... |
131 |
Chapter 16 MAC-based VLAN Commands............................................................... |
132 |
|
16.1 |
mac-vlan mac-address............................................................................................................ |
132 |
16.2 |
mac-vlan ....................................................................................................................................... |
133 |
16.3 |
show mac-vlan............................................................................................................................ |
133 |
16.4 |
show mac-vlan interface......................................................................................................... |
134 |
Chapter 17 Protocol-based VLAN Commands ....................................................... |
135 |
|
17.1 |
protocol-vlan template ............................................................................................................ |
135 |
17.2 |
protocol-vlan vlan...................................................................................................................... |
136 |
17.3 |
protocol-vlan group.................................................................................................................. |
137 |
17.4 |
show protocol-vlan template................................................................................................. |
137 |
17.5 |
show protocol-vlan vlan .......................................................................................................... |
138 |
Chapter 18 Private VLAN Commands (Only for Certain Devices) ..................... |
139 |
|
18.1 |
private-vlan primary.................................................................................................................. |
139 |
18.2 |
private-vlan community........................................................................................................... |
139 |
18.3 |
private-vlan isolated ................................................................................................................. |
140 |
18.4 |
private-vlan association .......................................................................................................... |
141 |
18.5 |
switchport private-vlan............................................................................................................ |
141 |
18.6 |
switchport private-vlan host-association ......................................................................... |
142 |
18.7 |
switchport private-vlan mapping ......................................................................................... |
143 |
18.8 |
show vlan private-vlan ............................................................................................................. |
144 |
18.9 |
show vlan private-vlan interface........................................................................................... |
144 |
Chapter 19 VLAN-VPN Commands (Only for Certain Devices) .......................... |
146 |
|
19.1 |
dot1q-tunnel................................................................................................................................ |
146 |
19.2 |
switchport dot1q-tunnel tpid................................................................................................. |
146 |
19.3 |
dot1q-tunnel mapping ............................................................................................................. |
147 |
19.4 |
switchport dot1q-tunnel mode............................................................................................. |
148 |
19.5 |
switchport dot1q-tunnel missdrop...................................................................................... |
149 |
19.6 |
switchport dot1q-tunnel use_inner_priority .................................................................... |
149 |
19.7 |
switchport dot1q-tunnel mapping....................................................................................... |
150 |
19.8 |
switchport dot1q-tunnel replace ......................................................................................... |
151 |
19.9 |
show dot1q-tunnel.................................................................................................................... |
152 |
19.10 |
show dot1q-tunnel mapping.................................................................................................. |
152 |
19.11 |
show dot1q-tunnel interface ................................................................................................. |
153 |
|
VII |
|
Chapter 20 GVRP Commands...................................................................................... |
154 |
|
20.1 |
gvrp................................................................................................................................................. |
154 |
20.2 |
gvrp (interface)............................................................................................................................ |
154 |
20.3 |
gvrp registration......................................................................................................................... |
155 |
20.4 |
gvrp timer ..................................................................................................................................... |
156 |
20.5 |
show gvrp interface .................................................................................................................. |
157 |
20.6 |
show gvrp global........................................................................................................................ |
158 |
Chapter 21 IGMP Snooping Commands.................................................................... |
159 |
|
21.1 |
ip igmp snooping (global)........................................................................................................ |
159 |
21.2 |
ip igmp snooping version........................................................................................................ |
159 |
21.3 |
ip igmp snooping drop-unknown ......................................................................................... |
160 |
21.4 |
ip igmp snooping header-validation.................................................................................... |
161 |
21.5 |
ip igmp snooping vlan-config ................................................................................................ |
161 |
21.6 |
ip igmp snooping vlan-config (immediate-leave)............................................................ |
163 |
21.7 |
ip igmp snooping vlan-config (report-suppression)...................................................... |
163 |
21.8 |
ip igmp snooping vlan-config (router-ports-forbidden)............................................... |
164 |
21.9 |
ip igmp snooping vlan-config (rport interface)................................................................ |
165 |
21.10 |
ip igmp snooping vlan-config (static).................................................................................. |
166 |
21.11 |
ip igmp snooping vlan-config (querier)............................................................................... |
167 |
21.12 |
ip igmp snooping (interface) .................................................................................................. |
168 |
21.13 |
ip igmp snooping max-groups .............................................................................................. |
169 |
21.14 |
ip igmp snooping immediate-leave ..................................................................................... |
170 |
21.15 |
ip igmp snooping authentication.......................................................................................... |
170 |
21.16 |
ip igmp snooping accounting................................................................................................ |
171 |
21.17 |
ip igmp profile ............................................................................................................................. |
172 |
21.18 |
deny................................................................................................................................................ |
172 |
21.19 |
permit............................................................................................................................................. |
173 |
21.20 |
range .............................................................................................................................................. |
173 |
21.21 |
ip igmp filter ................................................................................................................................. |
174 |
21.22 |
clear ip igmp snooping statistics ......................................................................................... |
175 |
21.23 |
show ip igmp snooping............................................................................................................ |
175 |
21.24 |
show ip igmp snooping interface......................................................................................... |
176 |
21.25 |
show ip igmp snooping vlan................................................................................................... |
177 |
21.26 |
show ip igmp snooping groups............................................................................................. |
177 |
21.27 |
show ip igmp profile.................................................................................................................. |
178 |
VIII
Chapter 22 MLD Snooping Commands..................................................................... |
180 |
|
22.1 |
ipv6 mld snooping (global)...................................................................................................... |
180 |
22.2 |
ipv6 mld snooping drop-unknown....................................................................................... |
180 |
22.3 |
ipv6 mld snooping vlan-config.............................................................................................. |
181 |
22.4 |
ipv6 mld snooping vlan-config (immediate-leave) ......................................................... |
182 |
22.5 |
ipv6 mld snooping vlan-config (report-suppression).................................................... |
183 |
22.6 |
ipv6 mld snooping vlan-config (router-ports-forbidden)............................................. |
184 |
22.7 |
ipv6 mld snooping vlan-config (rport interface).............................................................. |
185 |
22.8 |
ipv6 mld snooping vlan-config (static) ............................................................................... |
185 |
22.9 |
ipv6 mld snooping vlan-config (querier) ............................................................................ |
186 |
22.10 |
ipv6 mld snooping (interface) ................................................................................................ |
188 |
22.11 |
ipv6 mld snooping max-groups............................................................................................ |
188 |
22.12 |
ipv6 mld snooping immediate-leave................................................................................... |
189 |
22.13 |
ipv6 mld profile ........................................................................................................................... |
190 |
22.14 |
deny................................................................................................................................................ |
191 |
22.15 |
permit............................................................................................................................................. |
191 |
22.16 |
range .............................................................................................................................................. |
192 |
22.17 |
ipv6 mld filter............................................................................................................................... |
192 |
22.18 |
clear ipv6 mld snooping statistics ....................................................................................... |
193 |
22.19 |
show ipv6 mld snooping.......................................................................................................... |
193 |
22.20 |
show ipv6 mld snooping interface....................................................................................... |
194 |
22.21 |
show ipv6 mld snooping vlan................................................................................................. |
195 |
22.22 |
show ipv6 mld snooping groups .......................................................................................... |
195 |
22.23 show ipv6 mld profile................................................................................................................ |
196 |
|
Chapter 23 MVR Commands........................................................................................ |
197 |
|
23.1 |
mvr (global)................................................................................................................................... |
197 |
23.2 |
mvr group ..................................................................................................................................... |
197 |
23.3 |
mvr mode...................................................................................................................................... |
198 |
23.4 |
mvr querytime............................................................................................................................. |
199 |
23.5 |
mvr vlan......................................................................................................................................... |
200 |
23.6 |
mvr (interface)............................................................................................................................. |
200 |
23.7 |
mvr type ........................................................................................................................................ |
201 |
23.8 |
mvr immediate ............................................................................................................................ |
202 |
23.9 |
mvr vlan (group).......................................................................................................................... |
202 |
23.10 |
show mvr ...................................................................................................................................... |
203 |
23.11 |
show mvr interface.................................................................................................................... |
204 |
23.12 |
show mvr members .................................................................................................................. |
204 |
|
IX |
|
Chapter 24 MSTP Commands...................................................................................... |
206 |
|
24.1 |
debug spanning-tree................................................................................................................ |
206 |
24.2 |
spanning-tree (global) .............................................................................................................. |
207 |
24.3 |
spanning-tree (interface) ........................................................................................................ |
207 |
24.4 |
spanning-tree common-config............................................................................................. |
208 |
24.5 |
spanning-tree mode ................................................................................................................. |
209 |
24.6 |
spanning-tree mst configuration ......................................................................................... |
210 |
24.7 |
instance......................................................................................................................................... |
210 |
24.8 |
name............................................................................................................................................... |
211 |
24.9 |
revision.......................................................................................................................................... |
212 |
24.10 |
spanning-tree mst instance................................................................................................... |
213 |
24.11 |
spanning-tree mst..................................................................................................................... |
213 |
24.12 |
spanning-tree priority .............................................................................................................. |
214 |
24.13 |
spanning-tree timer .................................................................................................................. |
215 |
24.14 |
spanning-tree hold-count....................................................................................................... |
216 |
24.15 |
spanning-tree max-hops......................................................................................................... |
216 |
24.16 |
spanning-tree bpdufilter ......................................................................................................... |
217 |
24.17 |
spanning-tree bpduflood........................................................................................................ |
218 |
24.18 |
spanning-tree bpduguard....................................................................................................... |
218 |
24.19 |
spanning-tree guard loop ....................................................................................................... |
219 |
24.20 |
spanning-tree guard root........................................................................................................ |
220 |
24.21 |
spanning-tree guard tc............................................................................................................ |
220 |
24.22 |
spanning-tree mcheck............................................................................................................. |
221 |
24.23 |
show spanning-tree active..................................................................................................... |
221 |
24.24 |
show spanning-tree bridge .................................................................................................... |
222 |
24.25 |
show spanning-tree interface ............................................................................................... |
222 |
24.26 |
show spanning-tree interface-security ............................................................................. |
223 |
24.27 |
show spanning-tree mst ......................................................................................................... |
224 |
Chapter 25 LLDP Commands....................................................................................... |
226 |
|
25.1 |
lldp................................................................................................................................................... |
226 |
25.2 |
lldp forward_message.............................................................................................................. |
226 |
25.3 |
lldp hold-multiplier..................................................................................................................... |
227 |
25.4 |
lldp timer ....................................................................................................................................... |
228 |
25.5 |
lldp receive................................................................................................................................... |
229 |
25.6 |
lldp transmit................................................................................................................................. |
229 |
25.7 |
lldp snmp-trap............................................................................................................................. |
230 |
25.8 |
lldp tlv-select............................................................................................................................... |
231 |
|
X |
|
25.9 |
lldp management-address ..................................................................................................... |
231 |
25.10 |
lldp med-fast-count .................................................................................................................. |
232 |
25.11 |
lldp med-status........................................................................................................................... |
233 |
25.12 |
lldp med-tlv-select .................................................................................................................... |
233 |
25.13 |
lldp med-location....................................................................................................................... |
234 |
25.14 |
show lldp....................................................................................................................................... |
235 |
25.15 |
show lldp interface .................................................................................................................... |
235 |
25.16 |
show lldp local-information interface ................................................................................. |
236 |
25.17 |
show lldp neighbor-information interface......................................................................... |
237 |
25.18 |
show lldp traffic interface ....................................................................................................... |
237 |
Chapter 26 L2PT Commands (Only for Certain Devices) ..................................... |
239 |
|
26.1 |
l2protocol-tunnel ..................................................................................................................... |
239 |
26.2 |
l2protocol-tunnel type........................................................................................................... |
240 |
26.3 |
show l2protocol-tunnel global ........................................................................................... |
241 |
26.4 |
show l2protocol-tunnel interface ..................................................................................... |
242 |
Chapter 27 PPPoE ID-Insertion Commands (Only for Certain Devices)........... |
243 |
|
27.1 |
pppoe id-insertion (global)................................................................................................... |
243 |
27.2 |
pppoe circuit-id (interface).................................................................................................. |
244 |
27.3 |
pppoe circuit-id type.............................................................................................................. |
244 |
27.4 |
pppoe remote-id....................................................................................................................... |
245 |
27.5 |
show pppoe id-insertion global ......................................................................................... |
246 |
27.6 |
show pppoe id-insertion interface................................................................................... |
246 |
Chapter 28 Static Routes Commands ....................................................................... |
248 |
|
28.1 |
ip routing....................................................................................................................................... |
248 |
28.2 |
interface vlan............................................................................................................................... |
248 |
28.3 |
interface loopback .................................................................................................................... |
249 |
28.4 |
switchport .................................................................................................................................... |
249 |
28.5 |
interface range port-channel................................................................................................. |
250 |
28.6 |
description................................................................................................................................... |
251 |
28.7 |
shutdown...................................................................................................................................... |
251 |
28.8 |
interface port-channel............................................................................................................. |
252 |
28.9 |
ip route .......................................................................................................................................... |
253 |
28.10 |
ipv6 routing.................................................................................................................................. |
253 |
28.11 |
ipv6 route...................................................................................................................................... |
254 |
28.12 |
show interface vlan ................................................................................................................... |
255 |
28.13 |
show ip interface........................................................................................................................ |
255 |
|
XI |
|
28.14 |
show ip interface brief.............................................................................................................. |
256 |
28.15 |
show ip route............................................................................................................................... |
256 |
28.16 |
show ip route specify ............................................................................................................... |
257 |
28.17 |
show ip route summary ........................................................................................................... |
258 |
28.18 |
show ipv6 interface................................................................................................................... |
258 |
28.19 |
show ipv6 route.......................................................................................................................... |
259 |
28.20 |
show ipv6 route summary ...................................................................................................... |
259 |
Chapter 29 IPv6 Address Configuration Commands ............................................ |
261 |
|
29.1 |
ipv6 enable................................................................................................................................... |
261 |
29.2 |
ipv6 address autoconfig.......................................................................................................... |
261 |
29.3 |
ipv6 address link-local ............................................................................................................. |
262 |
29.4 |
ipv6 address dhcp..................................................................................................................... |
263 |
29.5 |
ipv6 address ra ........................................................................................................................... |
263 |
29.6 |
ipv6 address eui-64 .................................................................................................................. |
264 |
29.7 |
ipv6 address................................................................................................................................ |
265 |
29.8 |
show ipv6 interface................................................................................................................... |
266 |
Chapter 30 ARP Commands......................................................................................... |
267 |
|
30.1 |
arp ................................................................................................................................................... |
267 |
30.2 |
clear arp-cache .......................................................................................................................... |
268 |
30.3 |
arp dynamicrenew..................................................................................................................... |
268 |
30.4 |
arp timeout................................................................................................................................... |
269 |
30.5 |
gratuitous-arp intf-status-up enable .................................................................................. |
269 |
30.6 |
gratuitous-arp dup-ip-detected enable............................................................................. |
270 |
30.7 |
gratuitous-arp learning enable.............................................................................................. |
270 |
30.8 |
gratuitous-arp send-interval.................................................................................................. |
271 |
30.9 |
ip proxy-arp.................................................................................................................................. |
272 |
30.10 |
ip local-proxy-arp ...................................................................................................................... |
272 |
30.11 |
show arp........................................................................................................................................ |
273 |
30.12 |
show ip arp (interface).............................................................................................................. |
274 |
30.13 |
show ip arp summary................................................................................................................ |
274 |
30.14 |
show gratuitous-arp ................................................................................................................. |
275 |
30.15 |
show ip proxy-arp...................................................................................................................... |
275 |
Chapter 31 DHCP Server Commands........................................................................ |
277 |
|
31.1 |
service dhcp server .................................................................................................................. |
277 |
31.2 |
ip dhcp server extend-option capwap-ac-ip.................................................................... |
277 |
31.3 |
ip dhcp server extend-option vendor-class-id ............................................................... |
278 |
|
XII |
|
31.4 |
ip dhcp server exclude-address........................................................................................... |
279 |
31.5 |
ip dhcp server pool ................................................................................................................... |
279 |
31.6 |
ip dhcp server ping timeout ................................................................................................... |
280 |
31.7 |
ip dhcp server ping packets................................................................................................... |
281 |
31.8 |
network ......................................................................................................................................... |
281 |
31.9 |
lease ............................................................................................................................................... |
282 |
31.10 |
address hardware-address.................................................................................................... |
283 |
31.11 |
address client-identifier .......................................................................................................... |
284 |
31.12 |
default-gateway ......................................................................................................................... |
284 |
31.13 |
dns-server.................................................................................................................................... |
285 |
31.14 |
netbios-name-server ............................................................................................................... |
286 |
31.15 |
netbios-node-type .................................................................................................................... |
286 |
31.16 |
next-server................................................................................................................................... |
287 |
31.17 |
domain-name.............................................................................................................................. |
288 |
31.18 |
bootfile .......................................................................................................................................... |
288 |
31.19 |
show ip dhcp server status .................................................................................................... |
289 |
31.20 |
show ip dhcp server statistics............................................................................................... |
289 |
31.21 |
show ip dhcp server extend-option .................................................................................... |
290 |
31.22 |
show ip dhcp server pool........................................................................................................ |
290 |
31.23 |
show ip dhcp server excluded-address ............................................................................ |
291 |
31.24 |
show ip dhcp server manual-binding.................................................................................. |
291 |
31.25 |
show ip dhcp server binding.................................................................................................. |
292 |
31.26 |
clear ip dhcp server statistics ............................................................................................... |
292 |
31.27 |
clear ip dhcp server binding................................................................................................... |
293 |
Chapter 32 DHCP Relay Commands .......................................................................... |
294 |
|
32.1 |
service dhcp relay ..................................................................................................................... |
294 |
32.2 |
ip dhcp relay hops ..................................................................................................................... |
294 |
32.3 |
ip dhcp relay time....................................................................................................................... |
295 |
32.4 |
ip helper-address....................................................................................................................... |
296 |
32.5 |
ip dhcp relay information ........................................................................................................ |
296 |
32.6 |
ip dhcp relay information strategy....................................................................................... |
297 |
32.7 |
ip dhcp relay information format .......................................................................................... |
298 |
32.8 |
ip dhcp relay information circuit-id...................................................................................... |
299 |
32.9 |
ip dhcp relay information remote-id.................................................................................... |
299 |
32.10 |
ip dhcp relay default-interface.............................................................................................. |
300 |
32.11 |
ip dhcp relay vlan ....................................................................................................................... |
301 |
32.12 |
show ip dhcp relay..................................................................................................................... |
301 |
|
XIII |
|
Chapter 33 DHCP L2 Relay Commands .................................................................... |
303 |
|
33.1 |
ip dhcp l2relay............................................................................................................................. |
303 |
33.2 |
ip dhcp l2relay vlan.................................................................................................................... |
303 |
33.3 |
ip dhcp l2relay information..................................................................................................... |
304 |
33.4 |
ip dhcp l2relay information strategy ................................................................................... |
304 |
33.5 |
ip dhcp l2relay information format....................................................................................... |
305 |
33.6 |
ip dhcp l2relay information circuit-id .................................................................................. |
306 |
33.7 |
ip dhcp l2relay information remote-id................................................................................ |
307 |
33.8 |
show ip dhcp l2relay ................................................................................................................. |
307 |
33.9 |
show ip dhcp l2relay interface .............................................................................................. |
308 |
Chapter 34 QoS Commands......................................................................................... |
309 |
|
34.1 |
qos trust mode ........................................................................................................................... |
309 |
34.2 |
qos port-priority......................................................................................................................... |
310 |
34.3 |
qos cos-map ............................................................................................................................... |
310 |
34.4 |
qos dot1p-remap....................................................................................................................... |
311 |
34.5 |
qos dscp-map............................................................................................................................. |
312 |
34.6 |
qos dscp-remap......................................................................................................................... |
313 |
34.7 |
qos queue bandwidth............................................................................................................... |
314 |
34.8 |
qos queue mode ........................................................................................................................ |
315 |
34.9 |
show qos cos-map.................................................................................................................... |
316 |
34.10 |
show qos dot1p-remap interface ........................................................................................ |
317 |
34.11 |
show qos dot1p-remap ........................................................................................................... |
317 |
34.12 |
show qos dscp-map interface .............................................................................................. |
318 |
34.13 |
show qos dscp-map ................................................................................................................. |
319 |
34.14 |
show qos dscp-remap interface .......................................................................................... |
319 |
34.15 |
show qos dscp-remap ............................................................................................................. |
320 |
34.16 |
show qos port-priority interface........................................................................................... |
320 |
34.17 |
show qos trust interface ......................................................................................................... |
321 |
34.18 |
show qos queue interface ...................................................................................................... |
321 |
Chapter 35 Bandwidth Control Commands ............................................................. |
323 |
|
35.1 |
storm-control rate-mode........................................................................................................ |
323 |
35.2 |
storm-control.............................................................................................................................. |
324 |
35.3 |
storm-control exceed .............................................................................................................. |
325 |
35.4 |
storm-control recover ............................................................................................................. |
326 |
35.5 |
bandwidth..................................................................................................................................... |
326 |
35.6 |
show storm-control .................................................................................................................. |
327 |
|
XIV |
|
35.7 |
show bandwidth ......................................................................................................................... |
328 |
Chapter 36 Voice VLAN Commands .......................................................................... |
329 |
|
36.1 |
voice vlan...................................................................................................................................... |
329 |
36.2 |
voice vlan (interface)................................................................................................................. |
329 |
36.3 |
voice vlan priority....................................................................................................................... |
330 |
36.4 |
voice vlan oui............................................................................................................................... |
331 |
36.5 |
show voice vlan .......................................................................................................................... |
331 |
36.6 |
show voice vlan oui-table........................................................................................................ |
332 |
36.7 |
show voice vlan interface ....................................................................................................... |
332 |
Chapter 37 Auto VoIP Commands.............................................................................. |
334 |
|
37.1 |
auto-voip....................................................................................................................................... |
334 |
37.2 |
auto-voip (interface) ................................................................................................................. |
334 |
37.3 |
auto-voip dot1p.......................................................................................................................... |
335 |
37.4 |
auto-voip untagged .................................................................................................................. |
336 |
37.5 |
auto-voip none ........................................................................................................................... |
336 |
37.6 |
no auto-voip (interface) ........................................................................................................... |
337 |
37.7 |
auto-voip dscp............................................................................................................................ |
337 |
37.8 |
auto-voip data priority.............................................................................................................. |
338 |
37.9 |
show auto-voip........................................................................................................................... |
338 |
Chapter 38 Access Control Commands ................................................................... |
340 |
|
38.1 |
user access-control ip-based enable................................................................................. |
340 |
38.2 |
user access-control ip-based............................................................................................... |
340 |
38.3 |
user access-control mac-based enable............................................................................ |
341 |
38.4 |
user access-control mac-based.......................................................................................... |
342 |
38.5 |
user access-control port-based enable............................................................................ |
343 |
38.6 |
user access-control port-based .......................................................................................... |
343 |
Chapter 39 HTTP and HTTPS Commands ................................................................ |
345 |
|
39.1 |
ip http server ............................................................................................................................... |
345 |
39.2 |
ip http port.................................................................................................................................... |
346 |
39.3 |
ip http max-users....................................................................................................................... |
346 |
39.4 |
ip http session timeout ............................................................................................................ |
347 |
39.5 |
ip http secure-server................................................................................................................ |
348 |
39.6 |
ip http secure-port .................................................................................................................... |
348 |
39.7 |
ip http secure-protocol............................................................................................................ |
349 |
39.8 |
ip http secure-ciphersuite ...................................................................................................... |
350 |
|
XV |
|
39.9 |
ip http secure-max-users ....................................................................................................... |
351 |
39.10 |
ip http secure-session timeout............................................................................................. |
352 |
39.11 |
ip http secure-server download certificate...................................................................... |
352 |
39.12 |
ip http secure-server download key ................................................................................... |
353 |
39.13 |
show ip http configuration...................................................................................................... |
354 |
39.14 |
show ip http secure-server .................................................................................................... |
355 |
Chapter 40 SSH Commands......................................................................................... |
356 |
|
40.1 |
ip ssh server ................................................................................................................................ |
356 |
40.2 |
ip ssh port..................................................................................................................................... |
356 |
40.3 |
ip ssh version .............................................................................................................................. |
357 |
40.4 |
ip ssh algorithm .......................................................................................................................... |
358 |
40.5 |
ip ssh timeout.............................................................................................................................. |
358 |
40.6 |
ip ssh max-client ........................................................................................................................ |
359 |
40.7 |
ip ssh download.......................................................................................................................... |
360 |
40.8 |
remove public-key..................................................................................................................... |
360 |
40.9 |
show ip ssh................................................................................................................................... |
361 |
Chapter 41 Telnet Commands..................................................................................... |
362 |
|
41.1 |
telnet .............................................................................................................................................. |
362 |
41.2 |
telnet enable................................................................................................................................ |
362 |
41.3 |
telnet port..................................................................................................................................... |
363 |
41.4 |
show telnet-status..................................................................................................................... |
363 |
Chapter 42 Serial Port Commands............................................................................. |
365 |
|
42.1 |
serial_port baud-rate................................................................................................................ |
365 |
Chapter 43 AAA Commands ........................................................................................ |
366 |
|
43.1 |
tacacs-server host.................................................................................................................... |
366 |
43.2 |
show tacacs-server .................................................................................................................. |
367 |
43.3 |
radius-server host ..................................................................................................................... |
368 |
43.4 |
show radius-server ................................................................................................................... |
369 |
43.5 |
aaa group...................................................................................................................................... |
370 |
43.6 |
server............................................................................................................................................. |
370 |
43.7 |
show aaa group .......................................................................................................................... |
371 |
43.8 |
aaa authentication login .......................................................................................................... |
372 |
43.9 |
aaa authentication enable....................................................................................................... |
373 |
43.10 |
aaa authentication dot1x default.......................................................................................... |
374 |
43.11 |
aaa accounting dot1x default................................................................................................ |
374 |
|
XVI |
|
43.12 |
show aaa authentication ......................................................................................................... |
375 |
43.13 |
show aaa accounting................................................................................................................ |
376 |
43.14 |
line telnet ...................................................................................................................................... |
376 |
43.15 |
login authentication (telnet).................................................................................................... |
377 |
43.16 |
line ssh........................................................................................................................................... |
377 |
43.17 |
login authentication (ssh)........................................................................................................ |
378 |
43.18 |
line console.................................................................................................................................. |
379 |
43.19 |
login authentication (console)............................................................................................... |
379 |
43.20 |
enable authentication (telnet)................................................................................................ |
380 |
43.21 |
enable authentication (ssh) .................................................................................................... |
381 |
43.22 |
enable authentication (console) ........................................................................................... |
381 |
43.23 |
ip http login authentication..................................................................................................... |
382 |
43.24 |
ip http enable authentication................................................................................................. |
383 |
43.25 |
show aaa global.......................................................................................................................... |
384 |
43.26 |
enable admin password........................................................................................................... |
384 |
43.27 |
enable admin secret ................................................................................................................. |
385 |
43.28 |
enable-admin .............................................................................................................................. |
386 |
Chapter 44 IEEE 802.1x Commands........................................................................... |
388 |
|
44.1 |
dot1x system-auth-control.................................................................................................... |
388 |
44.2 |
dot1x handshake ....................................................................................................................... |
389 |
44.3 |
dot1x auth-protocol.................................................................................................................. |
389 |
44.4 |
dot1x vlan-assignment ............................................................................................................ |
390 |
44.5 |
dot1x accounting....................................................................................................................... |
391 |
44.6 |
dot1x mab .................................................................................................................................... |
392 |
44.7 |
dot1x guest-vlan........................................................................................................................ |
392 |
44.8 |
dot1x timeout quiet-period .................................................................................................... |
393 |
44.9 |
dot1x timeout supp-timeout.................................................................................................. |
394 |
44.10 |
dot1x maxreq ........................................................................................................................... |
395 |
44.11 |
dot1x .............................................................................................................................................. |
395 |
44.12 |
dot1x port-control..................................................................................................................... |
396 |
44.13 |
dot1x port-method.................................................................................................................... |
397 |
44.14 |
dot1x auth-init............................................................................................................................. |
398 |
44.15 |
dot1x auth-reauth...................................................................................................................... |
398 |
44.16 |
show dot1x global ..................................................................................................................... |
399 |
44.17 |
show dot1x interface................................................................................................................ |
400 |
44.18 |
show dot1x auth-state interface .......................................................................................... |
400 |
XVII
Chapter 45 Port Security Commands........................................................................ |
402 |
|
45.1 |
mac address-table max-mac count .................................................................................... |
402 |
45.2 |
show mac address-table max-mac-count........................................................................ |
402 |
Chapter 46 Port Mirroring Commands...................................................................... |
404 |
|
46.1 |
monitor session destination interface................................................................................ |
404 |
46.2 |
monitor session source........................................................................................................... |
405 |
46.3 |
show monitor session.............................................................................................................. |
406 |
Chapter 47 ACL Commands......................................................................................... |
408 |
|
47.1 |
access-list create...................................................................................................................... |
408 |
47.2 |
access-list packet-content profile ...................................................................................... |
408 |
47.3 |
access-list resequence........................................................................................................... |
409 |
47.4 |
access-list mac .......................................................................................................................... |
410 |
47.5 |
access-list ip ............................................................................................................................... |
411 |
47.6 |
access-list combined............................................................................................................... |
413 |
47.7 |
access-list ipv6 .......................................................................................................................... |
415 |
47.8 |
access-list packet-content config ...................................................................................... |
417 |
47.9 |
access-list action....................................................................................................................... |
418 |
47.10 |
redirect.......................................................................................................................................... |
419 |
47.11 |
s-condition................................................................................................................................... |
420 |
47.12 |
s-mirror.......................................................................................................................................... |
421 |
47.13 |
qos-remark .................................................................................................................................. |
421 |
47.14 |
access bind.................................................................................................................................. |
422 |
47.15 |
show access-list ........................................................................................................................ |
423 |
47.16 |
show access-list bind............................................................................................................... |
423 |
47.17 |
show access-list status........................................................................................................... |
424 |
47.18 |
show access-list counter........................................................................................................ |
424 |
47.19 |
clear access-list ......................................................................................................................... |
425 |
Chapter 48 IPv4 IMPB Commands.............................................................................. |
426 |
|
48.1 |
ip source binding ....................................................................................................................... |
426 |
48.2 |
ip dhcp snooping ....................................................................................................................... |
427 |
48.3 |
ip dhcp snooping vlan .............................................................................................................. |
428 |
48.4 |
ip dhcp snooping max-entries .............................................................................................. |
428 |
48.5 |
show ip source binding............................................................................................................ |
429 |
48.6 |
show ip dhcp snooping............................................................................................................ |
430 |
48.7 |
show ip dhcp snooping interface......................................................................................... |
430 |
|
XVIII |
|
Chapter 49 IPv6 IMPB Commands.............................................................................. |
432 |
|
49.1 |
Ipv6 source binding................................................................................................................... |
432 |
49.2 |
ipv6 dhcp snooping .................................................................................................................. |
433 |
49.3 |
ipv6 dhcp snooping vlan ......................................................................................................... |
434 |
49.4 |
ipv6 dhcp snooping max-entries.......................................................................................... |
434 |
49.5 |
ipv6 nd snooping ....................................................................................................................... |
435 |
49.6 |
ipv6 nd snooping vlan .............................................................................................................. |
436 |
49.7 |
ipv6 nd snooping max-entries............................................................................................... |
436 |
49.8 |
show ipv6 source binding....................................................................................................... |
437 |
49.9 |
show ipv6 dhcp snooping....................................................................................................... |
438 |
49.10 |
show ipv6 dhcp snooping interface.................................................................................... |
438 |
49.11 |
show ipv6 nd snooping............................................................................................................ |
439 |
49.12 |
show ipv6 nd snooping interface......................................................................................... |
439 |
Chapter 50 IP Verify Source Commands.................................................................. |
441 |
|
50.1 |
ip verify source ........................................................................................................................... |
441 |
50.2 |
ip verify source logging ........................................................................................................... |
442 |
50.3 |
show ip verify source................................................................................................................ |
442 |
50.4 |
show ip verify source interface............................................................................................. |
443 |
Chapter 51 IPv6 Verify Source Commands ............................................................. |
444 |
|
51.1 |
ipv6 verify source ...................................................................................................................... |
444 |
51.2 |
show ipv6 verify source........................................................................................................... |
445 |
51.3 |
show ipv6 verify source interface........................................................................................ |
445 |
Chapter 52 DHCPv4 Filter Commands ...................................................................... |
447 |
|
52.1 |
ip dhcp filter................................................................................................................................. |
447 |
52.2 |
ip dhcp filter (interface)............................................................................................................ |
447 |
52.3 |
ip dhcp filter mac-verify........................................................................................................... |
448 |
52.4 |
ip dhcp filter limit rate............................................................................................................... |
449 |
52.5 |
ip dhcp filter decline rate......................................................................................................... |
450 |
52.6 |
ip dhcp filter server permit-entry ......................................................................................... |
450 |
52.7 |
show ip dhcp filter ..................................................................................................................... |
451 |
52.8 |
show ip dhcp filter interface................................................................................................... |
452 |
52.9 |
show ip dhcp filter server permit-entry.............................................................................. |
452 |
Chapter 53 DHCPv6 Filter Commands ...................................................................... |
454 |
|
53.1 |
ipv6 dhcp filter ............................................................................................................................ |
454 |
53.2 |
ipv6 dhcp filter (interface)....................................................................................................... |
454 |
|
XIX |
|
53.3 |
ipv6 dhcp filter limit rate.......................................................................................................... |
455 |
53.4 |
ipv6 dhcp filter decline rate.................................................................................................... |
456 |
53.5 |
ipv6 dhcp filter server permit-entry .................................................................................... |
457 |
53.6 |
show ipv6 dhcp filter................................................................................................................. |
458 |
53.7 |
show ipv6 dhcp filter interface.............................................................................................. |
458 |
53.8 |
show ip dhcp filter server permit-entry.............................................................................. |
459 |
Chapter 54 DoS Defend Commands.......................................................................... |
460 |
|
54.1 |
ip dos-prevent ............................................................................................................................ |
460 |
54.2 |
ip dos-prevent type................................................................................................................... |
460 |
54.3 |
show ip dos-prevent................................................................................................................. |
462 |
Chapter 55 sFlow Commands (Only for Certain Devices).................................... |
464 |
|
55.1 |
sflow address.............................................................................................................................. |
464 |
55.2 |
sflow enable................................................................................................................................. |
465 |
55.3 |
sflow collector collector-ID.................................................................................................... |
465 |
55.4 |
sflow sampler.............................................................................................................................. |
466 |
55.5 |
show sflow global ...................................................................................................................... |
467 |
55.6 |
show sflow collector................................................................................................................. |
468 |
55.7 |
show sflow sampler .................................................................................................................. |
468 |
Chapter 56 Ethernet OAM Commands (Only for Certain Devices).................... |
469 |
|
56.1 |
ethernet-oam .............................................................................................................................. |
469 |
56.2 |
ethernet-oam mode.................................................................................................................. |
470 |
56.3 |
ethernet-oam link-monitor symbol-period....................................................................... |
470 |
56.4 |
ethernet-oam link-monitor frame ........................................................................................ |
471 |
56.5 |
ethernet-oam link-monitor frame-period.......................................................................... |
472 |
56.6 |
ethernet-oam link-monitor frame-seconds...................................................................... |
473 |
56.7 |
ethernet-oam remote-failure................................................................................................. |
474 |
56.8 |
ethernet-oam remote-loopback received-remote- loopback................................... |
475 |
56.9 |
ethernet-oam remote-loopback .......................................................................................... |
476 |
56.10 |
clear ethernet-oam statistics ................................................................................................ |
477 |
56.11 |
clear ethernet-oam event-log ............................................................................................... |
478 |
56.12 |
show ethernet-oam configuration....................................................................................... |
478 |
56.13 |
show ethernet-oam event-log .............................................................................................. |
479 |
56.14 |
show ethernet-oam statistics ............................................................................................... |
480 |
56.15 |
show ethernet-oam status ..................................................................................................... |
480 |
XX
Chapter 57 DLDP Commands (Only for Certain Devices) .................................... |
482 |
|
57.1 |
dldp (global) ................................................................................................................................. |
482 |
57.2 |
dldp interval ................................................................................................................................. |
482 |
57.3 |
dldp shut-mode.......................................................................................................................... |
483 |
57.4 |
dldp reset (global) ...................................................................................................................... |
484 |
57.5 |
dldp(interface)............................................................................................................................. |
484 |
57.6 |
dldp reset (interface) ................................................................................................................ |
485 |
57.7 |
show dldp ..................................................................................................................................... |
485 |
57.8 |
show dldp interface................................................................................................................... |
486 |
Chapter 58 SNMP Commands ..................................................................................... |
487 |
|
58.1 |
snmp-server ................................................................................................................................ |
487 |
58.2 |
snmp-server view ...................................................................................................................... |
487 |
58.3 |
snmp-server group ................................................................................................................... |
488 |
58.4 |
snmp-server user ...................................................................................................................... |
490 |
58.5 |
snmp-server community......................................................................................................... |
491 |
58.6 |
snmp-server host ...................................................................................................................... |
492 |
58.7 |
snmp-server engineID ............................................................................................................. |
494 |
58.8 |
snmp-server traps snmp......................................................................................................... |
495 |
58.9 |
snmp-server traps..................................................................................................................... |
496 |
58.10 |
snmp-server traps ddm........................................................................................................... |
497 |
58.11 |
snmp-server traps vlan............................................................................................................ |
498 |
58.12 |
snmp-server traps security.................................................................................................... |
499 |
58.13 |
snmp-server traps acl.............................................................................................................. |
500 |
58.14 |
snmp-server traps ip ................................................................................................................ |
500 |
58.15 |
snmp-server traps power (Only for Certain Devices).................................................... |
501 |
58.16 |
snmp-server traps link-status............................................................................................... |
502 |
58.17 |
rmon history ................................................................................................................................ |
503 |
58.18 |
rmon event................................................................................................................................... |
504 |
58.19 |
rmon alarm ................................................................................................................................... |
505 |
58.20 |
rmon statistics............................................................................................................................ |
506 |
58.21 |
show snmp-server..................................................................................................................... |
507 |
58.22 |
show snmp-server view........................................................................................................... |
508 |
58.23 |
show snmp-server group........................................................................................................ |
508 |
58.24 |
show snmp-server user........................................................................................................... |
509 |
58.25 |
show snmp-server community ............................................................................................. |
509 |
58.26 |
show snmp-server host........................................................................................................... |
509 |
58.27 |
show snmp-server engineID.................................................................................................. |
510 |
|
XXI |
|
58.28 |
show rmon history..................................................................................................................... |
510 |
58.29 |
show rmon event ....................................................................................................................... |
511 |
58.30 |
show rmon alarm........................................................................................................................ |
512 |
58.31 |
show rmon statistics ................................................................................................................ |
512 |
Chapter 59 PoE Commands (Only for Certain Devices) ....................................... |
514 |
|
59.1 |
power inline consumption (global)....................................................................................... |
514 |
59.2 |
power profile ............................................................................................................................... |
514 |
59.3 |
power inline consumption (interface) ................................................................................. |
515 |
59.4 |
power inline priority................................................................................................................... |
516 |
59.5 |
power inline supply.................................................................................................................... |
517 |
59.6 |
power inline profile.................................................................................................................... |
517 |
59.7 |
power inline time-range........................................................................................................... |
518 |
59.8 |
show power inline ...................................................................................................................... |
519 |
59.9 |
show power inline configuration interface........................................................................ |
519 |
59.10 |
show power inline information interface ........................................................................... |
520 |
59.11 |
show power profile.................................................................................................................... |
520 |
Chapter 60 ARP Inspection Commands.................................................................... |
522 |
|
60.1 |
ip arp inspection......................................................................................................................... |
522 |
60.2 |
ip arp inspection validate ........................................................................................................ |
522 |
60.3 |
ip arp inspection vlan................................................................................................................ |
523 |
60.4 |
ip arp inspection vlan logging................................................................................................ |
524 |
60.5 |
ip arp inspection trust .............................................................................................................. |
525 |
60.6 |
ip arp inspection limit-rate...................................................................................................... |
525 |
60.7 |
ip arp inspection burst-interval............................................................................................. |
526 |
60.8 |
ip arp inspection recover ........................................................................................................ |
527 |
60.9 |
show ip arp inspection............................................................................................................. |
527 |
60.10 |
show ip arp inspection interface .......................................................................................... |
528 |
60.11 |
show ip arp inspection vlan.................................................................................................... |
529 |
60.12 |
show ip arp inspection statistics.......................................................................................... |
529 |
60.13 |
clear ip arp inspection statistics........................................................................................... |
530 |
Chapter 61 ND Detection Commands ....................................................................... |
531 |
|
61.1 |
ipv6 nd detection....................................................................................................................... |
531 |
61.2 |
ipv6 nd detection vlan.............................................................................................................. |
531 |
61.3 |
ipv6 nd detection vlan logging.............................................................................................. |
532 |
61.4 |
ipv6 nd detection trust............................................................................................................. |
532 |
61.5 |
show ipv6 nd detection ........................................................................................................... |
533 |
|
XXII |
|
61.6 |
show ipv6 nd detection interface......................................................................................... |
533 |
61.7 |
show ipv6 nd detection statistics ........................................................................................ |
534 |
61.8 |
show ipv6 nd detection vlan .................................................................................................. |
535 |
Chapter 62 System Log Commands .......................................................................... |
536 |
|
62.1 |
logging buffer.............................................................................................................................. |
536 |
62.2 |
logging buffer level.................................................................................................................... |
536 |
62.3 |
logging file flash ......................................................................................................................... |
537 |
62.4 |
logging file flash frequency.................................................................................................... |
538 |
62.5 |
logging file flash level ............................................................................................................... |
539 |
62.6 |
logging host index ..................................................................................................................... |
539 |
62.7 |
logging console.......................................................................................................................... |
540 |
62.8 |
logging console level................................................................................................................ |
541 |
62.9 |
logging monitor .......................................................................................................................... |
542 |
62.10 |
logging monitor level................................................................................................................ |
542 |
62.11 |
clear logging................................................................................................................................ |
543 |
62.12 |
show logging local-config....................................................................................................... |
544 |
62.13 |
show logging loghost ............................................................................................................... |
544 |
62.14 |
show logging buffer .................................................................................................................. |
545 |
62.15 |
show logging flash..................................................................................................................... |
545 |
XXIII
This Guide is intended for network administrator to provide referenced information about CLI (Command Line Interface). The device mentioned in this Guide stands for JetStream Switch without any explanation. Some models featured in this guide may be unavailable in your country or region. For local sales information, visit https://www.tp-link.com.
Overview of this Guide
Chapter 1: Using the CLI
Provide information about how to use the CLI, CLI Command Modes, Security Levels and some Conventions.
Chapter 2: Line Commands (Only for Certain Devices)
Provide information about the commands used to make related configurations for the desired users and set the priority of the console media type.
Chapter 3: User Interface
Provide information about the commands used to switch between five CLI Command Modes.
Chapter 4: User Management Commands
Provide information about the commands used for user management.
Chapter 5: System Configuration Commands
Provide information about the commands used for configuring the System information and System IP, reboot and reset the switch, upgrade the switch system and commands used for cable test.
Chapter 6: EEE Configuration Commands
Provide information about the commands used for configuring EEE.
Chapter 7: SDM Template Commands
Provide information about the commands used for configuring the SDM templates.
Chapter 8: Time Range Commands
Provide information about the commands used for configuring the time range.
Chapter 9: Port Configuration Commands
Provide information about the commands used for configuring the Speed, Negotiation Mode, and Flow Control for Ethernet ports.
Chapter 10: Port Isolation Commands
Provide information about the commands used for configuring Port Isolation function.
1
Chapter 11: Loopback Detection Commands
Provide information about the commands used for configuring the Loopback Detection function.
Chapter 12: DDM Commands (Only for Certain Devices)
Provide information about the commands used for DDM (Digital Diagnostic Monitoring) function.
Chapter 13: Etherchannel Commands
Provide information about the commands used for configuring LAG (Link Aggregation Group) and LACP (Link Aggregation Control Protocol).
Chapter 14: MAC Address Commands
Provide information about the commands used for Address configuration.
Chapter 15: IEEE 802.1Q VLAN Commands
Provide information about the commands used for configuring IEEE 802.1Q VLAN.
Chapter 16: MAC-based VLAN Commands
Provide information about the commands used for configuring MAC-based VLAN.
Chapter 17: Protocol-based VLAN Commands
Provide information about the commands used for configuring Protocol VLAN.
Chapter 18: Private VLAN Commands (Only for Certain Devices)
Provide information about the commands used for configuring Private VLAN.
Chapter 19: VLAN-VPN Commands (Only for Certain Devices)
Provide information about the commands used for configuring VLAN-VPN (Virtual Private Network) function.
Chapter 20: GVRP Commands
Provide information about the commands used for configuring GVRP (GARP VLAN registration protocol).
Chapter 21: IGMP Snooping Commands
Provide information about the commands used for configuring the IGMP Snooping (Internet Group Management Protocol Snooping).
Chapter 22: MLD Snooping Commands
Provide information about the commands used for configuring the MLD Snooping (Multicast Listener Discovery Snooping).
Chapter 23: MVR Commands
Provide information about the commands used for configuring the MVR.
2
Chapter 24: MSTP Commands
Provide information about the commands used for configuring the MSTP (Multiple Spanning Tree Protocol).
Chapter 25: LLDP Commands
Provide information about the commands used for configuring LLDP function.
Chapter 26: L2PT Commands (Only for Certain Devices)
Provide information about the commands used for configuring L2PT (Layer 2 Protocol Tunneling).
Chapter 27: PPPoE ID-Insertion Commands (Only for Certain Devices)
Provide information about the commands used for configuring PPPoE ID-Insertion.
Chapter 28: Static Routes Commands
Provide information about the commands used for configuring the Static Route function.
Chapter 29: IPv6 Address Configuration Commands
Provide information about the commands used for configuring the System IPv6 addresses.
Chapter 30: ARP Commands
Provide information about the commands used for configuring the ARP (Address Resolution Protocol) functions.
Chapter 31: DHCP Server Commands
Provide information about the commands used for configuring the DHCP Server function.
Chapter 32: DHCP Relay Commands
Provide information about the commands used for configuring the DHCP Relay function.
Chapter 33: DHCP L2 Relay Commands
Provide information about the commands used for configuring the DHCP L2 Relay function.
Chapter 34: QoS Commands
Provide information about the commands used for configuring the QoS function.
Chapter 35: Bandwidth Commands
Provide information about the commands used for configuring the Bandwidth Control.
Chapter 36: Voice VLAN Commands
Provide information about the commands used for configuring Voice VLAN.
Chapter 37 Auto VoIP Commands
Provide information about the commands used for configuring Auto VoIP.
Chapter 38: Access Control Commands
Provide information about the commands used for configuring Access Control.
3
Chapter 39: HTTP and HTTPS Commands
Provide information about the commands used for configuring the HTTP and HTTPS logon.
Chapter 40: SSH Commands
Provide information about the commands used for configuring and managing SSH (Security Shell).
Chapter 41: Telnet Commands
Provide information about the commands used for configuring and managing SSH (Security Shell).
Chapter 42: Serial Port Commands (Only for Certain Devices)
Provide information about the commands used for configuring and managing SSH (Security Shell).
Chapter 43: AAA Commands
Provide information about the commands used for configuring AAA (authentication, authorization and accounting).
Chapter 44: IEEE 802.1X Commands
Provide information about the commands used for configuring IEEE 802.1X function.
Chapter 45: Port Security Commands
Provide information about the commands used for configuring Port Security.
Chapter 46: Port Mirroring Commands
Provide information about the commands used for configuring the Port Mirror function.
Chapter 47: ACL Commands
Provide information about the commands used for configuring the ACL (Access Control List).
Chapter 48: IPv4 IMPB Commands
Provide information about the commands used for binding the IP address, MAC address, VLAN and the connected Port number of the Host together.
Chapter 49: IPv6 IMPB Commands
Provide information about the commands used for binding the IPv6 address, MAC address, VLAN and the connected Port number of the Host together.
Chapter 50: IP Verify Source Commands
Provide information about the commands used for guarding the IP Source by filtering the IP packets based on the IP-MAC Binding entries.
Chapter 51: IPv6 Verify Source Commands
Provide information about the commands used for guarding the IPv6 Source by filtering the IP packets based on the IP-MAC Binding entries.
4
Chapter 52: DHCPv4 Filter Commands
Provide information about the commands used for configuring the DHCPv4 Filter.
Chapter 53: DHCPv6 Filter Commands
Provide information about the commands used for configuring the DHCPv6 Filter.
Chapter 54: DoS Defend Command
Provide information about the commands used for DoS defend and detecting the DoS attack.
Chapter 55: sFlow Commands (Only for Certain Devices)
Provide information about the commands used for configuring the Sampled Flow function.
Chapter 56: Ethernet OAM Commands (Only for Certain Devices)
Provide information about the commands used for configuring the Ethernet OAM (Operation, Administration, and Maintenance) function.
Chapter 57: DLDP Commands
Provide information about the commands used for configuring the DLDP (Device Link Detection Protocol).
Chapter 58: SNMP Commands
Provide information about the commands used for configuring the SNMP (Simple Network Management Protocol) functions.
Chapter 59: PoE Commands (Only for Certain Devices)
Provide information about the commands used for configuring PoE function.
Chapter 60: ARP Inspection Commands
Provide information about the commands used for protecting the switch from the ARP cheating or ARP Attack.
Chapter 61: ND Detection Commands
Provide information about the commands used for configuring ND detection.
Chapter 62: System Log Commands
Provide information about the commands used for configuring system log.
5
You can log on to the switch and access the CLI by the following three methods:
1.Log on to the switch by the console port on the switch.
2.Log on to the switch remotely by a Telnet connection through an Ethernet port.
3.Log on to the switch remotely by an SSH connection through an Ethernet port.
Note: Console port is only available on certain devices.
■Console Port
The switch has two console ports: an RJ-45 console port and a Micro-USB console port. Console output is active on devices connected to both console ports, but console input is only active on one console port at a time.
The Micro-USB connector takes precedence over the RJ-45 connector. When the switch detects a valid connection on the Micro-USB console port, input from the RJ-45 console port is immediately disabled, and input from the Micro-USB console port is enabled. Removing the Micro-USB connection immediately reenables input from the RJ-45 console connection.
■USB Console Driver
If you are using the USB port on the MAC OS X or Linux OS for console connection, there is no need to run a USB driver.
If you are using the switch’s Micro-USB console port with the USB port of a Windows PC, a driver for the USB port is required. The USB driver is provided on the resource CD. Follow the InstallSheild Wizard to accomplish the installation.
The TP-Link USB Console Driver supports the following Windows operating systems:
■32-bit Windows XP SP3
■64-bit Windows XP
■32-bit Windows Vista
■64-bit Windows Vista
■32-bit Windows 7
6