JetStream L2 Managed Switch - TP-Link

CLI Reference Guide

TL-SG3210/TL-SG3216/TL-SG3424/TL-SG3424P

JetStream L2 Managed Switch

REV3.0.1 1910011346

COPYRIGHT & TRADEMARKS

Specifications are subject to change without notice.

is a registered trademark of

TP-LINK TECHNOLOGIES CO., LTD. Other brands and product names are trademarks or

registered trademarks of their respective holders.

No part of the specifications may be reproduced in any form or by any means or used to make any derivative such as translation, transformation, or adaptation without permission from TP-LINK TECHNOLOGIES CO., LTD. Copyright ? 2015 TP-LINK TECHNOLOGIES CO., LTD. All rights reserved.



I

CONTENTS

Preface

.............................................................................................................. 1

Chapter 1 Using the CLI......................................................................................... 4

1.1 Accessing the CLI ...........................................................................................................4 1.1.1 Logon by a console port .......................................................................................4 1.1.2 Configuring the Privileged EXEC Mode Password ...............................................5 1.1.3 Logon by Telnet ....................................................................................................5 1.1.4 Logon by SSH ......................................................................................................9

1.2 CLI Command Modes ...................................................................................................14 1.3 Security Levels .............................................................................................................16 1.4 Conventions ..................................................................................................................17

1.4.1 Format Conventions ...........................................................................................17 1.4.2 Special Characters .............................................................................................17 1.4.3 Parameter Format ..............................................................................................17

Chapter 2 User Interface ...................................................................................... 19

enable.................................................................................................................................... 19 service password-encryption .................................................................................................19 enable password ...................................................................................................................20 enable secret.........................................................................................................................21 disable ...................................................................................................................................22 configure................................................................................................................................ 22 exit ......................................................................................................................................... 22 end ........................................................................................................................................23 history .................................................................................................................................... 23 history clear ...........................................................................................................................24

Chapter 3 IEEE 802.1Q VLAN Commands .......................................................... 25

vlan ........................................................................................................................................ 25 interface vlan .........................................................................................................................25 name .....................................................................................................................................26 switchport mode ....................................................................................................................26 switchport access vlan...........................................................................................................27 switchport trunk allowed vlan.................................................................................................27 switchport general allowed vlan.............................................................................................28 switchport pvid.......................................................................................................................29

II

show vlan summary...............................................................................................................29 show vlan brief ......................................................................................................................30 show vlan ..............................................................................................................................30 show interface switchport ......................................................................................................31

Chapter 4 MAC-based VLAN Commands ............................................................ 32

mac-vlan mac-address ..........................................................................................................32 show mac-vlan ......................................................................................................................32

Chapter 5 Protocol-based VLAN Commands....................................................... 34

protocol-vlan template ...........................................................................................................34 protocol-vlan vlan ..................................................................................................................35 protocol-vlan group................................................................................................................35 show protocol-vlan template..................................................................................................36 show protocol-vlan vlan .........................................................................................................36

Chapter 6 Voice VLAN Commands ...................................................................... 37

voice vlan ..............................................................................................................................37 voice vlan aging time .............................................................................................................37 voice vlan priority...................................................................................................................38 voice vlan mac-address.........................................................................................................38 switchport voice vlan mode ...................................................................................................39 switchport voice vlan security ................................................................................................40 show voice vlan .....................................................................................................................40 show voice vlan oui ...............................................................................................................41 show voice vlan switchport ....................................................................................................41

Chapter 7 GVRP Commands ............................................................................... 42

gvrp(global) ...........................................................................................................................42 gvrp(interface) .......................................................................................................................42 gvrp registration.....................................................................................................................43 gvrp timer ..............................................................................................................................43 show gvrp global ...................................................................................................................44 show gvrp interface ...............................................................................................................45

Chapter 8 Etherchannel Commands .................................................................... 46

channel-group .......................................................................................................................46 port-channel load-balance .....................................................................................................47 lacp system-priority ...............................................................................................................47

III

lacp port-priority.....................................................................................................................48 show etherchannel ................................................................................................................48 show etherchannel load-balance...........................................................................................49 show lacp ..............................................................................................................................49 show lacp sys-id ....................................................................................................................50

Chapter 9 User Manage Commands.................................................................... 51

user name (password)...........................................................................................................51 user name (secret) ................................................................................................................52 user access-control ip-based.................................................................................................53 user access-control mac-based.............................................................................................54 user access-control port-based .............................................................................................55 line ......................................................................................................................................... 55 password ...............................................................................................................................56 login ....................................................................................................................................... 57 login local ..............................................................................................................................58 telnet...................................................................................................................................... 58 show user account-list ...........................................................................................................59 show user configuration.........................................................................................................59 show telnet-status..................................................................................................................60

Chapter 10 HTTP and HTTPS Commands ............................................................ 61

ip http server..........................................................................................................................61 ip http max-users...................................................................................................................61 ip http session .......................................................................................................................62 ip http secure-server..............................................................................................................63 ip http secure-protocol ...........................................................................................................63 ip http secure-ciphersuite ......................................................................................................64 ip http secure-max-users .......................................................................................................64 ip http secure-session............................................................................................................65 ip http secure-server download certificate .............................................................................66 ip http secure-server download key .......................................................................................67 show ip http configuration......................................................................................................67 show ip http secure-server ....................................................................................................68

Chapter 11 Binding Table Commands.................................................................... 69

ip source binding ...................................................................................................................69 ip source binding index..........................................................................................................70 ip dhcp snooping ...................................................................................................................71

IV

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download