Simplicity 3424 Spezifikationen Seite 1

Stöbern Sie online oder laden Sie Spezifikationen nach Software Simplicity 3424 herunter. Simplicity 3424 Specifications Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken

Inhaltsverzeichnis

Seite 1 - JetStream L2 Managed Switch

TL-SG3210/TL-SG3216/TL-SG3424 JetStream L2 Managed Switch REV1.1.0 1910010717

Seite 2 - COPYRIGHT & TRADEMARKS

IX access-list bind(interface)...149 access-list bin

Seite 3 - CONTENTS

88 Parameter ssl-cert —— The name of the SSL certificate which is selected to download to the switch. The length of the name ranges from 1 to 25 ch

Seite 4

89 show ip http secure-server Description The show ip http secure-server command is used to display the global configuration of SSL. Syntax show i

Seite 5

90 Chapter 17 MAC Address Commands MAC Address configuration can improve the network security by configuring the Port Security and maintaining the

Seite 6

91 mac address-table aging-time Description The mac address-table aging-time command is used to configure aging time for the dynamic address. To retu

Seite 7

92 Command Mode Global Configuration Mode Example Add a filtering address entry of which VLAN ID is 1 and MAC address is 00:1e:4b:04:01:5d: TL-SG3424

Seite 8

93 status —— Enable or disable the Port Security function for a specified port. By default, this function is disabled. Command Mode Interface Confi

Seite 9

94 Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the Aging Time of the MAC address: TL-SG3424(config)# show mac addres

Seite 10

95 Syntax show mac address-table interface gigabitEthernet port Parameter port —— The Ethernet port number. Command Mode Privileged EXEC Mode a

Seite 11

96 Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the information of the MAC address 00:00:00:00:23:00:00: TL-SG3424(co

Seite 12

97 Chapter 18 System Configuration Commands System Configuration Commands can be used to configure the system information and system IP of the switc

Seite 13 - Preface

X ip igmp snooping(interface) ...169 ip igmp snooping i

Seite 14

98 GMT-11 —— TimeZone for Midway Island,Samoa. GMT-10 —— TimeZone for Hawaii. GMT-09 —— TimeZone for Alaska. GMT-08 —— TimeZone for Pacific Ti

Seite 15

99 system-time dst predefined Description The system-time dst predefined command is used to select a predefined DST configuration and the configurati

Seite 16 - Chapter 1 Using the CLI

100 Parameter smonth —— Month to start, with the options: Jan, Feb, Mar, Apr, May, Jun, Jul, Aug, Sep, Oct, Nov, Dec sday —— Day to start, rangi

Seite 17

101 stime —— Time to start, in the format of: hh:mm. eweek —— Week to end, with options: first, second, third, fourth, last. eday —— Day to end, w

Seite 18 - 1.1.2 Logon by Telnet

102 location Description The location command is used to configure the system location. To clear the system location information, please use no locat

Seite 19

103 reset Description The reset command is used to reset the switch’s software. After resetting, all configuration of the switch will restore to the

Seite 20

104 Command Mode Privileged EXEC Mode Example Save current settings: TL-SG3424# copy running-config startup-config copy startup-config tftp Descripti

Seite 21

105 name —— Specify the name for the configuration file which would be downloaded. Command Mode Privileged EXEC Mode Example Download the configura

Seite 22

106 Syntax ping { ip_addr } [ -n count ] [ -l count ] [ -i count ] Parameter ip_addr —— The IP address of the destination node for ping test. -n c

Seite 23 - 1.2 CLI Command Modes

107 Example Test the connectivity between the switch and the network device with the IP 192.168.0.131. If the destination device has not been found a

Seite 24 - 1.3 Security Levels

XI Chapter 28 Cluster Commands...195 cluster ndp...

Seite 25 - 1.4 Conventions

108 Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the time information of the switch: TL-SG3424# show system-time show

Seite 26

109 show system-info Description The show system-info command is used to display system description, system name, device location, system contact, ha

Seite 27 - Chapter 2 User Interface

110 Chapter 19 Ethernet Configuration Commands Ethernet Configuration Commands can be used to configure the Bandwidth Control, Negotiation Mode and

Seite 28

111 User Guidelines Command in the Interface Range gigabitEthernet Mode is executed independently on all ports in the range. It does not effect the

Seite 29

112 Command Mode Interface Configuration Mode (interface gigabitEthernet / interface range gigabitEthernet) Example Disable port 3: TL-SG3424(config)

Seite 30

113 Parameter full | half —— The duplex mode of the Ethernet port. There are two options: full-duplex mode (default) and half-duplex mode. Command

Seite 31

114 storm-control broadcast Description The storm-control broadcast command is used to enable the broadcast control function. To disable the broadcas

Seite 32

115 Parameter rate —— Select the bandwidth for receiving multicast packets on the port. The packet traffic exceeding the bandwidth will be discarde

Seite 33

116 bandwidth Description The bandwidth command is used to configure the bandwidth limit for an Ethernet port. To disable the bandwidth limit, please

Seite 34

117 show interface status Description The show interface status command is used to display the connective-status of an Ethernet port. Syntax show int

Seite 35

1 Preface This Guide is intended for network administrator to provide referenced information about CLI (Command Line Interface). The switch or TL-SG3

Seite 36

118 show interface description Description The show interface description command is used to display the description of all ports or an Ethernet port

Seite 37

119 show interface configuration Description The show interface configuration command is used to display the configurations of all ports or an Ether

Seite 38

120 TL-SG3424(config)# show storm-control interface range gigabitEthernet 1/0/4-7 show bandwidth Description The show bandwidth command is used to

Seite 39

121 Chapter 20 QoS Commands QoS (Quality of Service) function is used to optimize the network performance. It provides you with network service expe

Seite 40

122 Syntax qos dscp no qos dscp Command Mode Global Configuration Mode User Guidelines DSCP (DiffServ Code Point) is a new definition to IP ToS field

Seite 41

123 User Guidelines 1. By default, the mapping relation between tag/cos and the egress queue is: 0-TC1, 1-TC0, 2-TC0, 3-TC1, 4-TC2, 5-TC2, 6-TC3, 7-

Seite 42

124 User Guidelines By default, the mapping relation between tag and the egress queue is: (0-7)-CoS 0, (8-15)-CoS 1, (16-23)-CoS 2, (24-31)-CoS 3, (3

Seite 43

125 equ —— Equal-Mode. In this mode, all the queues occupy the bandwidth equally. The weight value ratio of all the queues is 1:1:1:1. Command Mode

Seite 44

126 Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the configuration of IEEE 802.1P Priority and the mapping relation b

Seite 45

127 show qos status Description The show qos status command is used to display the status of IEEE 802.1P priority and DSCP priority. Syntax show qo

Seite 46 - Chapter 7 GVRP Commands

2 commands used for monitoring the process of the Host obtaining the IP address from DHCP server, and record the IP address, MAC address, VLAN and th

Seite 47

128 Chapter 21 Port Mirror Commands Port Mirror refers to the process of forwarding copies of packets from one port to a monitoring port. Usually, t

Seite 48

129 monitor session source interface Description The monitor session source interface command is used to configure the monitored port. To delete t

Seite 49

130 TL-SG3424(config)# monitor session 1 source interface gigabitEthernet 1/0/4-5,1/0/7 rx Delete port 4 in monitor session 1 and its configuration:

Seite 50

131 Chapter 22 Port isolation Commands Port Isolation provides a method of restricting traffic flow to improve the network security by forbidding th

Seite 51

132 Syntax show port isolation interface [ gigabitEthernet port ] Parameter port —— The number of Ethernet port you want to show its forward port

Seite 52

133 Chapter 23 Loopback Detection Commands With loopback detection feature enabled, the switch can detect loops using loopback detection packets. Wh

Seite 53

134 Example Specify the interval-time as 50 seconds: TL-SG3424(config)# loopback-detection interval 50 loopback-detection recovery-time Description T

Seite 54

135 TL-SG3424(config)# interface range gigabitEthernet 1/0/1-3 TL-SG3424(Config-if)# loopback-detection loopback-detection config Description The lo

Seite 55

136 Syntax loopback-detection recover Command Mode Interface Configuration Mode (interface gigabitEthernet / interface range gigabitEthernet) Example

Seite 56

137 Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the configuration of loopback detection function and the status of a

Seite 57

3 Provide information about the commands used for configuring the Loopback Detection function. Chapter 24: ACL Commands Provide information about the

Seite 58

138 Chapter 24 ACL Commands ACL (Access Control List) is used to filter data packets by configuring a series of match conditions, operations and tim

Seite 59

139 Parameter start-date —— The start date in Absoluteness Mode, in the format of MM/DD/ YYYY. By default, it is 01/01/2000. end-date —— The end d

Seite 60

140 TL-SG3424(config-time-range)# periodic week-date off-day time-slice1 08:30-12:00 holiday Description The holiday command is used to configure the

Seite 61

141 Example Define National Day, configuring the start date as October 1st, and the end date as October 3rd: TL-SG3424(config)# holiday nationalday s

Seite 62

142 Example Create a MAC ACL whose ID is 23: TL-SG3424(config)# mac access-list 23 access-list standard Description The access-list standard command

Seite 63

143 255.255.255.0, the time-range for the rule to take effect is tSeg1, and the packets match this rule will be forwarded by the switch: TL-SG3424(co

Seite 64

144 tos—— Enter the IP ToS contained in the rule. pri —— Enter the IP Precedence contained in the rule. Command Mode Global Configuration Mode Exa

Seite 65

145 ethernet-type —— EtherType contained in the rule, in the format of 4-hex number. user-pri —— The user priority contained in the rule, ranging f

Seite 66

146 TL-SG3424(config)# access-list policy name policy1 access-list policy action Description The access-list policy action command is used to add ACL

Seite 67

147 policy to port 2: TL-SG3424(config)# access-list policy action policy1 120 TL-SG3424(config-action)# redirect interface gigabitEthernet 1/0/2 red

Seite 68

4 Chapter 1 Using the CLI 1.1 Accessing the CLI You can log on to the switch and access the CLI by the following two methods: 1. Log on to the sw

Seite 69

148 Command Mode Action Configuration Mode Example Edit the actions for policy1. For the data packets matching ACL 120 in the policy, if the rate bey

Seite 70

149 Parameter dscp —— DSCP of QoS Remark. Specify the DSCP region for the data packets matching the corresponding ACL. DSCP ranges from 0 to 63. By

Seite 71

150 access-list bind(vlan) Description The access-list bind command is used to bind a policy to a VLAN. To cancel the bind relation, please use no ac

Seite 72 - Parameters

151 Syntax show holiday Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the defined holiday: TL-SG3424(config)# show hol

Seite 73

152 Example Display the information of a policy named policy1: TL-SG3424(config)# show access-list policy policy1 show access-list bind Description T

Seite 74

153 Chapter 25 MSTP Commands MSTP (Multiple Spanning Tree Protocol), compatible with both STP and RSTP and subject to IEEE 802.1s, can disbranch a r

Seite 75

154 TL-SG3424(config-if)# spanning-tree spanning-tree common-config Description The spanning-tree common-config command is used to configure the par

Seite 76

155 Command Mode Interface Configuration Mode (interface gigabitEthernet / interface range gigabitEthernet) Example Enable the STP function of port 1

Seite 77

156 default configuration of the corresponding Instance, please use no spanning-tree mst configuration command. Syntax spanning-tree mst configuratio

Seite 78

157 Remove VLANs 1-50 in maping VLANs 1-100 for Instance 1: TL-SG3424(config)# spanning-tree mst configuration TL-SG3424(config-mst)# no instance 1 v

Seite 79

5 Figure 1-2 Connection Description 4. Select the port to connect in Figure 1-3, and click OK. Figure 1-3 Select the port to connect 5. Configure

Seite 80

158 TL-SG3424(config-mst)# revison 100 spanning-tree mst instance Description The spanning-tree mst instance command is used to configure the priorit

Seite 81

159 Parameter instance-id —— Instance ID, ranging from 1 to 8. pri —— Port Priority, which must be multiple of 16 ranging from 0 to 240. By defau

Seite 82

160 spanning-tree tc-defend Description The spanning-tree tc-defend command is used to configure the TC Protect of Spanning Tree globally. To return

Seite 83

161 Parameter forward-time —— Forward Delay, which is the time for the port to transit its state after the network topology is changed. Forward Dela

Seite 84

162 TL-SG3424(config)# spanning-tree hold-count 8 spanning-tree max-hops Description The spanning-tree max-hops command is used to configure the max

Seite 85

163 Example Enable the BPDU filter function for port 2: TL-SG3424(config)# interface gigabitEthernet 1/0/2 TL-SG3424(config-if)# spanning-tree bpdufi

Seite 86

164 Command Mode Interface Configuration Mode (interface gigabitEthernet / interface range gigabitEthernet) Example Enable the Loop Protect function

Seite 87

165 removing MAC address entries, which may decrease the performance and stability of the network. With the Protect of Spanning Tree function enabled

Seite 88

166 Syntax show spanning-tree active Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the active information of spanning-

Seite 89

167 Example Display the spanning-tree information of all ports: TL-SG3424(config)# show spanning-tree interface Display the spanning-tree information

Seite 90 - There

6 Figure 1-4 Port Settings 6. The DOS prompt” TL-SG3424>” will appear after pressing the Enter button as Figure 1-5 shown. It indicates that you

Seite 91

168 show spanning-tree mst Description The show spanning-tree mst command is used to display the related information of MST Instance. Syntax show sp

Seite 92

169 Chapter 26 IGMP Commands IGMP Snooping (Internet Group Management Protocol Snooping) is a multicast control mechanism running on Layer 2 switch.

Seite 93

170 TL-SG3424(config)# interface gigabitEthernet 1/0/3 TL-SG3424(config-if)# ip igmp snooping ip igmp snooping immediate-leave Description The ip igm

Seite 94

171 ip igmp snooping vlan-config Description The ip igmp snooping vlan-config command is used to enable VLAN IGMP Snooping function or to modify IGMP

Seite 95 - Chapter 15 SSH Commands

172 Example Enable the IGMP Snooping function and modify Router Port Time as 300 seconds, Member Port Time as 200 seconds for VLAN1-3, and set the Le

Seite 96

173 leave-time —— Leave Time, which is the interval between the switch receiving a leave message from a host and the switch removing the host from th

Seite 97

174 Example Bind the filtering address ID 2-6 to port 3: TL-SG3424(config)# interface gigabitEthernet 1/0/3 TL-SG3424(config-if)# ip igmp snooping fi

Seite 98

175 Syntax ip igmp snooping filter no ip igmp snooping filter Command Mode Interface Configuration Mode (interface gigabitEthernet / interface range

Seite 99 - Chapter 16 SSL Commands

176 Syntax ip igmp snooping filter mode mode Parameter mode —— Action Mode, with refuse and accept options. Refuse indicates only the multicast pac

Seite 100

177 Syntax show ip igmp snooping interface gigabitEthernet [ port | port-list ] { basic-config | filter | packet-stat } Parameter port —— The Eth

Seite 101 - Example

7 Note: 1. Before Telnet login, you are required to configure Telnet login mode and login authentication information through Console connection. Th

Seite 102 - Parameter

178 TL-SG3424# show ip igmp snooping vlan 2 show ip igmp snooping multi-vlan Description The show ip igmp snooping multi-vlan command is used to dis

Seite 103

179 Display the count of multicast entries in VLAN 5: TL-SG3424(config)#show ip igmp snooping groups vlan 5 count Display the dynamic multicast group

Seite 104

180 Chapter 27 SNMP Commands SNMP (Simple Network Management Protocol) functions are used to manage the network devices for a smooth communication,

Seite 105

181 mib-oid —— MIB Object ID. It is the Object Identifier (OID) for the entry of View, ranging from 1 to 61 characters. include | exclude —— View T

Seite 106

182 By default, the Security Level is noAuthNoPriv. There is no need to configure this in SNMP v1 Mode and SNMP v2c Mode. read-view —— Select the

Seite 107

183 Parameter name —— User Name, ranging from 1 to 16 characters. local | remote —— User Type, with local and remote options. Local indicates tha

Seite 108

184 snmp-server community Description The snmp-server community command is used to add Community. To delete the corresponding Community, please use n

Seite 109

185 udp-port —— UDP port, which is used to send notifications. The UDP port functions with the IP address for the notification sending. It ranges fr

Seite 110

186 snmp-server engineID Description The snmp-server engineID command is used to configure the local and remote engineID of the switch. To restore to

Seite 111

187 periodically, based on which the management station can monitor network effectively. Syntax rmon history index interface gigabitEthernet port [

Seite 112

I COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Othe

Seite 113

8 2. Open Telnet, then type telnet 192.168.0.1 in the command prompt shown as Figure 1-8, and press the Enter button. Figure 1-8 Connecting to the

Seite 114

188 Parameter index —— The index number of the event entry, ranging from 1 to 12. You can only select one entry for each command. user-name —— The

Seite 115

189 f-hold ] [ falling-event-index f-event ] [ a-type { rise | fall | all }] [ owner owner-name ] [ interval interval ] no rmon alarm index Paramete

Seite 116 - ip-addr filename name

190 Example Configure the port of entries of 1,2 and 3 as port 2, the owners as owner1 and the alarm intervals as 100 seconds TL-SG3424(config)# rmon

Seite 117

191 Syntax show snmp-server group Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the Group table: TL-SG3424# show snmp-

Seite 118

192 show snmp-server host Description The show snmp-server host command is used to display the Host table. Syntax show snmp-server host Command Mode

Seite 119

193 for each command. By default, the configuration of all history sample entries is displayed. Command Mode Privileged EXEC Mode and Any Configurati

Seite 120

194 Parameter index —— The index number of the entry selected to display the configuration, ranging from 1 to 12, in the format of 1-3, 5. You can

Seite 121

195 Chapter 28 Cluster Commands Cluster Management function enables a network administrator to manage the scattered devices in the network via a man

Seite 122

196 Change Aging Time to 80 seconds: TL-SG3424(config)# cluster ndp timer aging 80 Change Hello Time to 80 seconds: TL-SG3424(config)# cluster ndp ti

Seite 123

197 hop-value —— NTDP Hops, which is the hop count the switch topology collects. NTDP Hops ranges from 1 to 16. By default, it is 3. Command Mode Gl

Seite 124

9 Figure 1-10 Enter into the Privileged EXEC Mode ¾ Login Mode Firstly configure the Telnet login mode as “login”, and both the connection password

Seite 125

198 ntdp —— Enable/ Disable NTDP function for the port. By default, it is enabled. Command Mode Interface Configuration Mode (interface gigabitEthe

Seite 126

199 show cluster ndp Description The show cluster ndp command is used to display NDP configuration of certain ports. Syntax show cluster ndp [interf

Seite 127

200 Display the NTDP configuration of port 2: TL-SG3424# show cluster ntdp interface gigabitEthernet 1/0/2 Display the information of device collecte

Seite 128

10 Figure 1-12 Connecting to the Switch 2. You are prompted to enter the connection password 123 you have set through Console port connection, and

Seite 129

11 Now you can manage your switch with CLI commands through Telnet connection. Note: You can refer to Chapter 9 User Manage Commands for detailed com

Seite 130

12 VLAN Configuration Mode Use the vlan vlan-list command to enter this mode from Global Configuration mode. TL-SG3424(config-vlan)# Use the end co

Seite 131

13 Users get the privilege to the User level once connecting console port with the switch or logging in by Telnet. However, Guest users are restricte

Seite 132

14 ¾ The port number should format as 1/0/3, meaning unit/slot/port. The unit number is always 1, and slot number is always 0 and the port number is

Seite 133 - Chapter 20 QoS Commands

15 Chapter 2 User Interface enable Description The enable command is used to access Privileged EXEC Mode from User EXEC Mode. Syntax enable Command

Seite 134

16 disable Description The disable command is used to return to User EXEC Mode from Privileged EXEC Mode. Syntax disable Command Mode Privileged EXE

Seite 135

17 Command Mode Any Configuration Mode Example Return to Global Configuration Mode from Interface Configuration Mode, and then return to Privileged E

Seite 136 - User Guidelines

II CONTENTS Preface ... 1 Chapter

Seite 137

18 Chapter 3 IEEE 802.1Q VLAN Commands VLAN (Virtual Local Area Network) technology is developed for the switch to divide the LAN into multiple logi

Seite 138

19 Parameter vlan-id —— Specify IEEE 802.1Q VLAN ID, ranging from 1 to 4094. Command Mode Global Configuration Mode Example Create VLAN Interface 2:

Seite 139

20 Command Mode Interface Configuration Mode (interface gigabitEthernet / interface range gigabitEthernet) Example Specify the Link Type of port 3 as

Seite 140

21 no switchport trunk allowed vlan vlan-list Parameter vlan-list —— Specify IEEE 802.1Q VLAN ID list, ranging from 2 to 4094, in the format of 2-3,

Seite 141

22 TL-SG3424(config-if)# switchport general allowed vlan 2 tagged switchport pvid Description The switchport pvid command is used to configure the P

Seite 142

23 show vlan brief Description The show vlan brief command is used to display the brief information of IEEE 802.1Q VLAN. Syntax show vlan brief Comma

Seite 143

24 Chapter 4 MAC-based VLAN Commands MAC-based VLAN (Virtual Local Area Network) is the way to classify the VLANs based on MAC Address. A MAC addres

Seite 144

25 Command Mode Privileged EXEC Mode and Any Configuration Mode Parameter mac-addr —— MAC address, in the format of XX:XX:XX:XX:XX:XX. vlan-id —— S

Seite 145

26 Chapter 5 Protocol-based VLAN Commands Protocol-based VLAN (Virtual Local Area Network) is the way to classify VLANs based on Protocols. A Protoc

Seite 146

27 protocol-vlan vlan Description The protocol-vlan vlan command is used to create a Protocol-based VLAN. To delete a Protocol-based VLAN, please use

Seite 147

III Chapter 5 Protocol-based VLAN Commands... 26 protocol-vlan template ...

Seite 148

28 Command Mode Interface Configuration Mode (interface gigabitEthernet / interface range gigabitEthernet) Example Create Protocol-based VLAN group 2

Seite 149

29 Chapter 6 Voice VLAN Commands Voice VLANs are configured specially for voice data stream. By configuring Voice VLANs and adding the ports with vo

Seite 150 - Chapter 24 ACL Commands

30 Parameter time ——Aging time (in minutes) to be set for the Voice VLAN. It ranges from 1 to 43200 and the default value is 1440. Command Mode Glo

Seite 151

31 Syntax voice vlan mac-address mac-addr mask mask [ description descript ] no voice vlan mac-address mac-addr Parameter mac-addr —— The OUI address

Seite 152

32 TL-SG3424(config)# interface gigabitEthernet 1/0/3 TL-SG3424(config-if)# switchport voice vlan mode auto switchport voice vlan security Descriptio

Seite 153

33 show voice vlan oui Description The show voice vlan oui command is used to display the configuration information of Voice VLAN OUI. Syntax show v

Seite 154

34 Chapter 7 GVRP Commands GVRP (GARP VLAN registration protocol) is an implementation of GARP (generic attribute registration protocol). GVRP allow

Seite 155

35 Example Enable the GVRP function for ports 2-6: TL-SG3424(config)# interface range gigabitEthernet 1/0/2-6 TL-SG3424(config-if-range)# gvrp gvrp

Seite 156

36 no gvrp timer [ leaveall | join | leave ] Parameter leaveall | join | leave —— They are the three timers: leave All、join and leave. Once the Leave

Seite 157

37 Example Display the global GVRP status: TL-SG3424(config)# show gvrp global show gvrp interface Description The show gvrp interface command is use

Seite 158

IV user access-control mac-based...44 user access-control p

Seite 159

38 Chapter 8 Etherchannel Commands Etherchannel Commands are used to configure LAG and LACP function. LAG (Link Aggregation Group) is to combine a

Seite 160

39 port-channel load-balance Description The port-channel load-balance command is used to configure the Aggregate Arithmetic for LAG. To return to th

Seite 161

40 Command Mode Global Configuration Mode Example Configure the LACP system priority as 1024 globally: TL-SG3424(config)# lacp system-priority 1024 l

Seite 162

41 Syntax show etherchannel [ channel-group-num ] { detail | summary } Parameter channel-group-num —— The EtherChannel Group number, ranging from 1

Seite 163

42 Parameter channel-group-num —— The EtherChannel Group number, ranging from 1 to 14. By default, it is empty, and will display the information of

Seite 164

43 Chapter 9 User Manage Commands User Manage Commands are used to manage the user’s logging information by Web, CLI or SSH, so as to protect the se

Seite 165 - Chapter 25 MSTP Commands

44 user access-control ip-based Description The user access-control ip-based command is used to limit the IP-range of the users for login. Only the u

Seite 166

45 Parameter mac-addr —— The source MAC address. Only the user with this MAC Address is allowed to login. Command Mode Global Configuration Mode Exam

Seite 167

46 user max-number Description The user max-number command is used to configure the maximum login user numbers at the same time. To cancel the limit

Seite 168

47 Parameter minutes ——The timeout time, ranging from 5 to 30 in minutes. The value is 10 by default. Command Mode Global Configuration Mode Exam

Seite 169

V Chapter 12 DoS Defend Command ... 66 ip dos-prevent...

Seite 170

48 TL-SG3424(config)# line vty 0 5 password Description The password command is used to configure the connection password. To clear the password, ple

Seite 171

49 Command Mode Line Configuration Mode Example Configure the login of Console port connection 0 as login mode: TL-SG3424(config)# line console 0 T

Seite 172

50 Syntax show user account-list Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the information of the current users: T

Seite 173

51 Chapter 10 Binding Table Commands You can bind the IP address, MAC address, VLAN and the connected Port number of the Host together, which can be

Seite 174

52 Command Mode Global Configuration Mode Example Bind an entry with the IP 192.168.0.1, MAC 00:00:00:00:00:01, VLAN ID 2 and Port number 5 manually.

Seite 175

53 To restore to the default value, please use no dhcp-snooping global command. Syntax ip dhcp snooping global [ global-rate global-rate ] [ dec-t

Seite 176

54 Syntax ip dhcp snooping information option no ip dhcp snooping information option Command Mode Global Configuration Mode Example Enable the Option

Seite 177

55 ip dhcp snooping information remote-id Description The ip dhcp snooping information remote-id command is used to enable and configure the customiz

Seite 178

56 Command Mode Global Configuration Mode Example Enable and configure the customized sub-option Circuit ID for the Option 82 as tplink: TL-SG3424(co

Seite 179

57 Syntax ip dhcp snooping mac-verify no ip dhcp snooping mac-verify Command Mode Interface Configuration Mode (interface gigabitEthernet / interfa

Seite 180

VI ip ssh download...85 show ip ssh

Seite 181 - Chapter 26 IGMP Commands

58 ip dhcp snooping decline Description The ip dhcp snooping decline command is used to enable the Decline Protect feature. To disable the Decline Pr

Seite 182

59 show ip dhcp snooping Description The show ip dhcp snooping command is used to display the running status of DHCP-Snooping. Syntax show ip dhcp

Seite 183

60 Syntax show ip dhcp snooping interface gigabitEthernet [ port ] Parameters port ——The Ethernet port number. Command Mode Privileged EXEC Mode and

Seite 184

61 Chapter 11 ARP Inspection Commands ARP (Address Resolution Protocol) Detect function is to protect the switch from the ARP cheating, such as the

Seite 185

62 Command Mode Interface Configuration Mode (interface gigabitEthernet / interface range gigabitEthernet) Example Configure the ports 2-5 as the Tru

Seite 186

63 ip arp inspection limit-rate Description The ip arp inspection limit-rate command is used to configure the ARP speed of a specified port. To resto

Seite 187

64 Example Restore port 5 to the ARP transmit status: TL-SG3424(config)# interface gigabitEthernet 1/0/5 TL-SG3424(config-if)# ip arp inspection reco

Seite 188

65 TL-SG3424(config)# show ip arp inspection interface Display the configuration of port 2: TL-SG3424(config)# show ip arp inspection interface gigab

Seite 189

66 Chapter 12 DoS Defend Command DoS (Denial of Service) Attack is to occupy the network bandwidth maliciously by the network attackers or the evil

Seite 190

67 Parameter land —— Land attack. scan-synfin —— Scan SYNFIN attack. xma-scan —— Xma Scan attack. null-scan —— NULL Scan attack. port-less-than-1024

Seite 191

VII loopback interface ...107 show system

Seite 192 - Chapter 27 SNMP Commands

68 Chapter 13 IEEE 802.1X Commands IEEE 802.1X function is to provide an access control for LAN ports via the authentication. Only the supplicant pa

Seite 193

69 pap: IEEE 802.1X authentication system uses extensible authentication protocol (EAP) to exchange information between the switch and the client. Th

Seite 194

70 dot1x quiet-period Description The dot1x quiet-period command is used to enable the quiet-period function. To disable the function, please use no

Seite 195

71 Example Configure the quiet period as 100 seconds: TL-SG3424(config)# dot1x timeout quiet-period 100 dot1x max-reauth-req Description The dot1x m

Seite 196

72 Command Mode Interface Configuration Mode (interface gigabitEthernet / interface range gigabitEthernet) Example Enable the IEEE 802.1X function fo

Seite 197

73 Syntax dot1x port-control { auto | authorized-force | unauthorized-force } no dot1x port-control Parameter auto | authorized-force | unauthorized-

Seite 198

74 port-based: All the clients connected to the port can access the network on the condition that any one of the clients has passed the 802.1X Authen

Seite 199

75 value ——The maximum time for the switch to wait for the response before resending a request to the supplicant., ranging from 1 to 9 in second. By

Seite 200

76 Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the configuration of 801.X globally: TL-SG3424(config)# show dot1x gl

Seite 201

77 Command Mode Privileged EXEC Mode and Any Configuration Modes Example Display the configuration of the accounting server: TL-SG3424(config)# show

Seite 202

VIII show qos status...127 Chapter 21

Seite 203

78 Chapter 14 System Log Commands The log information will record the settings and operation of the switch respectively for you to monitor operation

Seite 204

79 logging file flash Description The logging file flash command is used to configure the level and the status of the log file input. To restore to t

Seite 205

80 Command Mode Global Configuration Mode Example Clear the information in the log file: TL-SG3424(config)# clear logging buffer logging host index D

Seite 206

81 show logging local-config Description The show logging local-config command is used to display the configuration of the Local Log including the lo

Seite 207 - Chapter 28 Cluster Commands

82 The show logging buffer command is used to display the log information in the log buffer according to the severity level. Syntax show logging bu

Seite 208

83 Chapter 15 SSH Commands SSH (Security Shell) can provide the unsecured remote management with security and powerful authentication to ensure the

Seite 209

84 Example Enable SSH v2: TL-SG3424(config)# ip ssh version v2 ip ssh timeout Description The ip ssh timeout command is used to specify the idle-time

Seite 210

85 Command Mode Global Configuration Mode Example Specify the maximum number of the connections to the SSH server as 3: TL-SG3424(config)# ip ssh m

Seite 211

86 Example Display the global configuration of SSH: TL-SG3424(config)# show ip ssh

Seite 212

87 Chapter 16 SSL Commands SSL(Secure Sockets Layer), a security protocol, is to provide a secure connection for the application layer protocol(e.

Kommentare zu diesen Handbüchern

Keine Kommentare