TP-Link TL-SL2210 Reference Manual
TP-Link TL-SL2210 Reference Manual

TP-Link TL-SL2210 Reference Manual

Smart switch tl-sl2210/tl-sl2218/tl-sl2428/tl-sl2452
Hide thumbs Also See for TL-SL2210:
Table of Contents

Advertisement

TL-SL2210/TL-SL2218/TL-SL2428/TL-SL2452
Smart Switch
REV1.1.0
1910010971

Advertisement

Table of Contents
loading

Summary of Contents for TP-Link TL-SL2210

  • Page 1 TL-SL2210/TL-SL2218/TL-SL2428/TL-SL2452 Smart Switch REV1.1.0 1910010971...
  • Page 2 COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Other brands and product names are trademarks or registered trademarks of their respective holders. No part of the specifications may be reproduced in any form or by any means or used to make any derivative such as translation, transformation, or adaptation without permission from TP-LINK TECHNOLOGIES CO., LTD.
  • Page 3: Table Of Contents

    CONTENTS Preface ......................1 Chapter 1 Using the CLI ..................3 1.1 Accessing the CLI......................3 1.2 CLI Command Modes......................4 1.3 Security Levels ........................7 1.4 Conventions ........................7 1.4.1 Format Conventions ....................7 1.4.2 Special Characters ....................8 1.4.3 Parameter Format ....................8 Chapter 2 User Interface ..................
  • Page 4 show voice vlan ........................20 show voice vlan oui .......................21 show voice vlan switchport ....................21 Chapter 5 Etherchannel Commands ..............23 channel-group ........................23 port-channel load-balance .....................24 lacp system-priority .......................24 lacp port-priority........................25 show etherchannel ........................25 show etherchannel load-balance...................26 show lacp ..........................26 show lacp sys-id ........................27 Chapter 6 User Management Commands ............
  • Page 5 ip ssh version ........................41 ip ssh timeout ........................42 ip ssh max-client........................42 ip ssh download........................43 show ip ssh..........................43 Chapter 9 SSL Commands ................. 45 ip http secure-server......................45 ip http secure-server download certificate ................45 ip http secure-server download key ..................46 show ip http secure-server ....................47 Chapter 10 MAC Address Commands..............
  • Page 6 reboot ............................64 copy running-config startup-config ..................64 copy startup-config tftp ......................65 copy tftp startup-config ......................65 firmware upgrade ........................66 ping ............................66 tracert ............................67 loopback interface .........................68 show system-info........................68 show running-config ......................69 show system-time........................69 show system-time dst ......................69 show system-time ntp......................70 show cable-diagnostics interface...................70 Chapter 12 Ethernet Configuration Commands ..........
  • Page 7 Chapter 13 QoS Commands................. 85 qos ............................85 qos cos ..........................85 qos dscp ..........................86 qos queue cos-map .......................87 qos queue dscp-map ......................87 qos queue mode........................88 show qos interface ........................89 show qos cos-map ........................90 show qos dscp-map ......................90 show qos queue mode ......................91 show qos status........................91 Chapter 14 Port Mirror Commands ..............
  • Page 8 access-list policy action .......................106 access-list bind(interface)....................107 access-list bind(vlan) ......................107 show access-list ........................108 show access-list policy ......................108 show access-list bind ......................109 Chapter 18 DHCP Filtering Commands..............110 ip dhcp filtering ........................110 ip dhcp filtering trust ......................110 show ip dhcp filtering ......................111 show ip dhcp filtering interface ....................
  • Page 9 show spanning-tree interface-security .................126 show spanning-tree mst ......................127 Chapter 20 IGMP Commands................128 ip igmp snooping(global) .....................128 ip igmp snooping(interface) ....................128 ip igmp snooping immediate-leave ..................129 ip igmp snooping drop-unknown..................129 ip igmp snooping vlan-config ....................130 ip igmp snooping multi-vlan-config ..................131 ip igmp snooping filter add-id....................132 ip igmp snooping filter(global)....................133 ip igmp snooping filter(interface) ..................133 ip igmp snooping filter maxgroup..................134...
  • Page 10 show snmp-server .......................152 show snmp-server view .......................153 show snmp-server group .....................153 show snmp-server user .......................154 show snmp-server community.....................154 show snmp-server host .......................154 show snmp-server engineID....................155 show rmon history .......................155 show rmon event .........................155 show rmon alarm.........................156...
  • Page 11: Preface

    TL-SL2210/TL-SL2218/TL-SL2428/TL-SL2452 Smart Switch. The four devices of TL-SL2210, TL-SL2218, TL-SL2428 and TL-SL2452 are sharing this User Guide. For simplicity, we will take TL-SL2428 for example throughout the configuration chapters. TL-SL2210, TL-SL2218, TL-SL2428 and TL-SL2452 just differ in the number of LED indicators and ports and all figures in this guide are of TL-SL2428.
  • Page 12 Chapter 10: MAC Address Commands Provide information about the commands used for Address configuration. Chapter 11: System Commands Provide information about the commands used for configuring the System information and System IP, reboot and reset the switch, upgrade the switch system and other operations. Chapter 12: Ethernet Configuration Commands Provide information about the commands used for configuring the Bandwidth Control, Negotiation Mode, and Storm Control for Ethernet ports.
  • Page 13: Chapter 1 Using The Cli

    Chapter 1 Using the CLI 1.1 Accessing the CLI You can log on to the switch and access the CLI by logging on to the switch remotely by a Telnet through an Ethernet port. To log on to the switch by a Telnet connection, please take the following steps: Make sure the switch and the PC are in the same LAN.
  • Page 14: 1.2 Cli Command Modes

    Type telnet 192.168.0.1 in the command prompt shown as Figure 1-3, and press the Enter button. Figure 1-3 Connecting to the Switch Type the User name and Password (the factory default value for both of them is admin) and press the Enter button, then you can use the CLI now, which is shown as Figure1-4. Figure 1-4 Log in the Switch 1.2 CLI Command Modes The CLI is divided into different command modes: User EXEC Mode, Privileged EXEC Mode,...
  • Page 15 Interface Configuration Mode Interface fastEthernet Interface gigabitEthernet Interface link-aggregation Interface range fastEthernet User EXEC Mode Interface range gigabitEthernet Interface range link-aggregation password Interface vlan …… Privileged EXEC Global Configuration Mode Mode VLAN Configuration Mode The following table gives detailed information about the Accessing path, Prompt of each mode and how to exit the current mode and access the next mode.
  • Page 16 Logout or Access the Mode Accessing Path Prompt next mode interface Use the end command or fastEthernet/gigabitEthernet press Ctrl+Z to return to Privileged EXEC mode. port interface range TL-SL2428 (config-if)# Interface fastEthernet/ Enter the exit command or the Configuration gigabitEthernet port-list # command to return to Global command to enter this mode...
  • Page 17: 1.3 Security Levels

    Vlan Configuration Mode: In this mode, users can create a VLAN and add a specified  port to the VLAN. 3. Some commands are global, that means they can be performed in all modes: show: display all information of switch, for example: statistic information, port information, ...
  • Page 18: 1.4.2 Special Characters

    1.4.2 Special Characters You should pay attentions to the description below if the variable is a character string: These six characters ” < > , \ & can not be input.  If a blank is contained in a character string, single or double quotation marks should be used, ...
  • Page 19: Chapter 2 User Interface

    English letters and underdashes only. By default, it is empty. simple | cipher —— The way of displaying password in configuration file. By default, it is “simple”. This function is not supported by TL-SL2210. Command Mode Global Configuration Mode...
  • Page 20: Disable

    Example Set the super password as admin to access Privileged EXEC Mode from User EXEC Mode: TL-SL2428(config)# enable password admin disable Description The disable command is used to return to User EXEC Mode from Privileged EXEC Mode. Syntax disable Command Mode Privileged EXEC Mode Example Return to User EXEC Mode from Privileged EXEC Mode:...
  • Page 21: Exit

    exit Description The exit command is used to return to the previous Mode from the current Mode. Syntax exit Command Mode Privileged EXEC Mode and Any Configuration Mode Example Return to Global Configuration Mode from Interface Configuration Mode, and then return to Privileged EXEC Mode: TL-SL2428(config-if)# exit TL-SL2428(config)#exit TL-SL2428#...
  • Page 22: Chapter 3 Ieee 802.1Q Vlan Commands

    Chapter 3 IEEE 802.1Q VLAN Commands VLAN (Virtual Local Area Network) technology is developed for the switch to divide the LAN into multiple logical LANs flexibly. Hosts in the same VLAN can communicate with each other, regardless of their physical locations. VLAN can enhance performance by conserving bandwidth, and improve security by limiting traffic to specific domains.
  • Page 23: Name

    Parameter vlan-id —— Specify IEEE 802.1Q VLAN ID, ranging from 1 to 4094. Command Mode Global Configuration Mode Example Create VLAN Interface 2: TL-SL2428(config)# interface vlan 2 name Description The name command is used to assign a description to a VLAN. To clear the description, please use no name command.
  • Page 24: Switchport Pvid

    Parameter vlan-list —— Specify IEEE 802.1Q VLAN ID list, ranging from 2 to 4094, in the format of 2-3, 5. It is multi-optional. tagged | untagged —— Egress rule,untagged or tagged. Tagged: All packets forwarded by the port are tagged. The packets contain VLAN information. Untagged: Packets forwarded by the port are untagged.
  • Page 25: Show Vlan Brief

    Syntax show vlan summary Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the summarized information of IEEE 802.1Q VLAN: TL-SL2428(config)# show vlan summary show vlan brief Description The show vlan brief command is used to display the brief information of IEEE 802.1Q VLAN.
  • Page 26: Show Interface Switchport

    Example Display the information of vlan 5: TL-SL2428(config)# show vlan 5 show interface switchport Description The show interface switchport command is used to display the IEEE 802.1Q VLAN configuration information of the specified port or all ports. Syntax show interface switchport [port] Parameter port ——...
  • Page 27: Chapter 4 Voice Vlan Commands

    Chapter 4 Voice VLAN Commands Voice VLANs are configured specially for voice data stream. By configuring Voice VLANs and adding the ports with voice devices attached to voice VLANs, you can perform QoS-related configuration for voice data, ensuring the transmission priority of voice data stream and voice quality.
  • Page 28: Voice Vlan Priority

    Parameter time —— Aging time (in minutes) to be set for the Voice VLAN. It ranges from 1 to 43200 and the default value is 1440. Command Mode Global Configuration Mode Example Set the aging time for the Voice VLAN as 1 minute: TL-SL2428(config)#voice vlan aging time 1 voice vlan priority Description...
  • Page 29: Switchport Voice Vlan Mode

    Description The voice vlan mac-address command is used to create Voice VLAN OUI. To delete the specified Voice VLAN OUI, please use no voice vlan mac-address command. Syntax voice vlan mac-address mac-addr mask mask [description descript] no voice vlan mac-address mac-addr Parameter mac-addr ——...
  • Page 30: Switchport Voice Vlan Security

    Command Mode Interface Configuration Mode (interface fastEthernet / interface range fastEthernet / interface gigabitEthernet / interface range gigabitEthernet) Example Configure the Fast Ethernet port 3 to operate in the auto voice VLAN mode: TL-SL2428(config)#interface fastEthernet 1/0/3 TL-SL2428(config-if)#switchport voice vlan mode auto switchport voice vlan security Description The switchport voice vlan security command is used to enable the Voice...
  • Page 31: Show Voice Vlan Oui

    Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the configuration information of Voice VLAN globally: TL-SL2428(config)#show voice vlan show voice vlan oui Description The show voice vlan oui command is used to display the configuration information of Voice VLAN OUI. Syntax show voice vlan oui Command Mode...
  • Page 32 Example Display the configuration information of Fast Ethernet port 1 in the Voice VLAN: TL-SL2428(config)#show voice vlan switchport fastEthernet 1/0/1 Display the configuration information of all the ports in the Voice VLAN: TL-SL2428(config)#show voice vlan switchport...
  • Page 33: Chapter 5 Etherchannel Commands

    Chapter 5 Etherchannel Commands Etherchannel Commands are used to configure LAG and LACP function. LAG (Link Aggregation Group) is to combine a number of ports together to make a single high-bandwidth data path, which can highly extend the bandwidth. The bandwidth of the LAG is the sum of bandwidth of its member port.
  • Page 34: Port-Channel Load-Balance

    port-channel load-balance Description The port-channel load-balance command is used to configure the Aggregate Arithmetic for LAG. To return to the default configurations, please use no port-channel load-balance command. Syntax port-channel load-balance { src-dst-mac | src-dst-ip } no port-channel load-balance Parameter src-dst-mac ——...
  • Page 35: Lacp Port-Priority

    Command Mode Global Configuration Mode Example Configure the LACP system priority as 1024 globally: TL-SL2428(config)# lacp system-priority 1024 lacp port-priority Description The lacp port-priority command is used to configure the LACP port priority for specified ports. To return to the default configurations, please use no lacp port-priority command.
  • Page 36: Show Etherchannel Load-Balance

    Syntax show etherchannel [ channel-group-num ] { detail | summary } Parameter channel-group-num —— The EtherChannel Group number, ranging from 1 to 6. By default, it is empty, and will display the information of all EtherChannel Groups. detail —— The detailed information of EtherChannel. summary ——...
  • Page 37: Show Lacp Sys-Id

    Parameter channel-group-num —— The EtherChannel Group number, ranging from 1 to 6. By default, it is empty, and will display the information of all LACP groups. internal —— The internal LACP information. neighbor —— The neighbor LACP information. Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the internal LACP information of EtherChannel Group 1:...
  • Page 38: Chapter 6 User Management Commands

    | enable ——Enable/disable the user. The new added user is enabled by default. simple | cipher —— The way of displaying password in configuration file. By default, it is “simple”. This function is not supported by TL-SL2210. Command Mode Global Configuration Mode...
  • Page 39: User Access-Control Ip-Based

    TL-SL2428(config)# user name tplink password password type admin status enable user access-control ip-based Description The user access-control ip-based command is used to limit the IP-range of the users for login. Only the users within the IP-range you set here are allowed to login.
  • Page 40: User Access-Control Port-Based

    no user access-control Parameter mac-addr —— The source MAC address. Only the user with this MAC address is allowed to login. Command Mode Global Configuration Mode Example Configure that only the user whose MAC address is 00:00:13:0A:00:01 is allowed to login: TL-SL2428(config)# user access-control mac-based 00:00:13:0A:00:01 user access-control port-based Description...
  • Page 41: User Max-Number

    user max-number Description The user max-number command is used to configure the number of the users logging on at the same time. To cancel the limit to the numbers of the users logging in, please use no user max-number command. Syntax user max-number admin-num guest-num no user max-number...
  • Page 42: Show User Account-List

    Parameter minutes ——The timeout time, ranging from 5 to 30 in minutes. By default, the value is 10. Command Mode Global Configuration Mode Example Configure the timeout time of the switch as 15 minutes: TL-SL2428(config)# user idle-timeout 15 show user account-list Description The show user account-list command is used to display the information of the current users.
  • Page 43 Example Display the security configuration information of the users: TL-SL2428(config)# show user configuration...
  • Page 44: Chapter 7 System Log Commands

    Chapter 7 System Log Commands The log information will record the settings and operation of the switch respectively for you to monitor operation status and diagnose malfunction. logging buffer Description The logging buffer command is used to configure the severity level and the status of the configuration input to the log buffer.
  • Page 45: Logging File Flash (For Tl-Sl2452)

    file flash command. The log file indicates the flash sector for saving system log. The information in the log file will not be lost after the switch is restarted and can be got by the show logging flash command. This command does not apply to TL-SL2452.
  • Page 46: Logging File Flash Frequency

    Example Enable the log file flash function: TL-SL2452(config)#logging file flash logging file flash frequency Description The logging file flash frequency command is used to specify the frequency to synchronize the system log file in the log buffer to the flash. To resume the default synchronizing frequency, please use the no logging file flash frequency command.
  • Page 47: Clear Logging

    no logging file flash level command. This command only applies to TL-SL2452. Syntax logging file flash level level no logging file flash level Parameter level —— Severity level of the log message. There are 8 severity levels marked with values 0-7. The smaller value has the higher priority. Only the log with the same or smaller severity level value will be saved to the flash.
  • Page 48: Logging Host Index

    logging host index Description The logging host index command is used to configure the Log Host. To clear the configuration of the specified Log Host, please use no logging host index command. Log Host is to receive the system log from other devices. You can remotely monitor the settings and operation status of other devices through the log host.
  • Page 49: Show Logging Loghost

    Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the configuration of the Local Log: TL-SL2428(config)# show logging local-config show logging loghost Description The show logging loghost command is used to display the configuration of the log host. Syntax show logging loghost [ index ] Parameter...
  • Page 50: Show Logging Flash

    Parameter level —— Severity level. There are 8 severity levels marked with values 0-7. The information of levels with priority not lower than the select level will display. Display all the log information in the log buffer by default. Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the log information from level 0 to level 5 in the log buffer:...
  • Page 51: Chapter 8 Ssh Commands

    Chapter 8 SSH Commands SSH (Security Shell) can provide the unsecured remote management with security and powerful authentication to ensure the security of the management information. ip ssh server Description The ip ssh server command is used to enable SSH function. To disable the SSH function, please use no ip ssh server command.
  • Page 52: Ip Ssh Timeout

    By default, this value is 120. For TL-SL2210, it ranges from 1 to 999 in seconds; and for TL-SL2218/ TL-SL2428/ TL-SL2452, it ranges from 1 to 120 in seconds.
  • Page 53: Ip Ssh Download

    Command Mode Global Configuration Mode Example Specify the maximum number of the connections to the SSH server as 3: TL-SL2428(config)# ip ssh max-client 3 ip ssh download Description The ip ssh download command is used to download the SSH key file from TFTP server.
  • Page 54 Example Display the global configuration of SSH: TL-SL2428(config)# show ip ssh...
  • Page 55: Chapter 9 Ssl Commands

    Chapter 9 SSL Commands SSL (Secure Sockets Layer), a security protocol, is to provide a secure connection for the application layer protocol(e.g. HTTP) based on TCP. Adopting asymmetrical encryption technology, SSL uses key pair to encrypt/decrypt information. A key pair refers to a public key (contained in the certificate) and its corresponding private key.
  • Page 56: Ip Http Secure-Server Download Key

    Parameter ssl-cert —— The name of the SSL certificate which is selected to download to the switch. The length of the name ranges from 1 to 25 characters. The certificate must be BASE64 encoded. ip-addr —— The IP address of the TFTP server. Command Mode Global Configuration Mode Example...
  • Page 57: Show Ip Http Secure-Server

    show ip http secure-server Description The show ip http secure-server command is used to display the global configuration of SSL. Syntax show ip http secure-server Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the global configuration of SSL: TL-SL2428(config)# show ip http secure-server...
  • Page 58: Chapter 10 Mac Address Commands

    Chapter 10 MAC Address Commands MAC address configuration can improve the network security by configuring the Port Security and maintaining the address information by managing the Address Table. mac address-table static Description The mac address-table static command is used to add the static MAC address entry.
  • Page 59: Mac Address-Table Aging-Time

    mac address-table aging-time Description The mac address-table aging-time command is used to configure aging time for the dynamic address. To return to the default configuration, please use no mac address-table aging-time command. Syntax mac address-table aging-time aging-time no mac address-table aging-time Parameter aging-time ——...
  • Page 60: Mac Address-Table Max-Mac-Count

    Command Mode Global Configuration Mode Example Add a filtering address entry of which VLAN ID is 1 and MAC address is 00:1e:4b:04:01:5d: TL-SL2428(config)# mac address-table filtering mac 00:1e:4b:04:01:5d vid 1 mac address-table max-mac-count Description The mac address-table max-mac-count command is used to configure the Port Security.
  • Page 61: Show Mac Address-Table Address

    Command Mode Interface Configuration Mode (interface fastEthernet / interface range fastEthernet / interface gigabitEthernet / interface range gigabitEthernet) Example Enable Port Security function for port 1, select Static mode as the learn mode, and specify the maximum number of MAC addresses that can be learned on this port as 30: TL-SL2428(config)# interface fastEthernet 1/0/1 TL-SL2428(config-if)# mac address-table max-mac-count max-number 30...
  • Page 62: Show Mac Address-Table Max-Mac-Count Interface

    Example Display the Aging Time of the MAC address: TL-SL2428(config)# show mac address-table aging-time show mac address-table max-mac-count interface Description The show mac address-table max-mac-count interface command is used to display the security configuration of all Fast/Ethernet ports or the specified port. Syntax show mac address-table max-mac-count interface { fastEthernet [port] | gigabitEthernet [port] }...
  • Page 63: Show Mac Address-Table Mac-Num

    Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the address configuration of port 1: TL-SL2428(config)# show mac address-table interface fastEthernet 1/0/1 show mac address-table mac-num Description The show mac address-table mac-num command is used to display the total amount of MAC address table.
  • Page 64: Show Mac Address-Table Vlan

    show mac address-table vlan Description The show mac address-table vlan command is used to display the MAC address configuration of the specified vlan. Syntax show mac address-table vlan vid Parameter —— The specified VLAN id. Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the MAC address configuration of vlan 1: TL-SL2428(config)# show mac address-table vlan 1...
  • Page 65: Chapter 11 System Commands

    Chapter 11 System Commands System Commands can be used to configure the System information and System IP, reboot and reset the switch, upgrade the switch system and other operations. system-time manual Description The system-time manual command is used to configure the system time manually.
  • Page 66 UTC-09:00 —— TimeZone for Alaska. UTC-08:00 —— TimeZone for Pacific Time(US Canada). UTC-07:00 —— TimeZone for Mountain Time(US Canada). UTC-06:00 —— TimeZone for Central Time(US Canada). UTC-05:00 —— TimeZone for Eastern Time(US Canada). UTC-04:30 —— TimeZone for Caracas. UTC-04:00 —— TimeZone for Atlantic Time(Canada). UTC-03:30 ——...
  • Page 67: System-Time Dst Predefined

    Command Mode Global Configuration Mode Example Configure the system time mode as NTP, the time zone is UTC-12:00, the primary NTP server is 133.100.9.2 and the secondary NTP server is 139.78.100.163, the fetching-rate is 11 hours: TL-SL2428(config)# system-time ntp UTC-12:00 133.100.9.2 139.79.100.163 system-time dst predefined Description The system-time dst predefined command is used to select a daylight saving...
  • Page 68: System-Time Dst Date

    system-time dst date Description The system-time dst date command is used to configure the one-off daylight saving time. The start date is in the current year by default. The time range of the daylight saving time must shorter than one year, but you can configure it spanning years.
  • Page 69: System-Time Dst Recurring

    system-time dst recurring Description The system-time dst recurring command is used to configure the recurring daylight saving time. It can be configured spanning years. To disable DST function, please use no system-time dst command. Syntax system-time dst recurring {sweek} {sday} {smonth} {stime} {eweek} {eday} {emonth} {etime} [offset] no system-time dst Parameter...
  • Page 70: Hostname

    TL-SL2428(config)# system-time dst recurring first Sun May 02:00 last Sun Oct 02:00 45 hostname Description The hostname command is used to configure the system name. To clear the system name information, please use no hostname command. Syntax hostname hostname no hostname Parameter hostname ——...
  • Page 71: Contact-Info

    Example Configure the system location as SHENZHEN: TL-SL2428(config)# location SHENSHEN contact-info Description The contact-info command is used to configure the system contact information. To clear the system contact information, please use no contact-info command. Syntax contact-info contact_info no contact-info Parameter contact_info ——...
  • Page 72: Ip Address

    TL-SL2428(config)# ip management-vlan 6 ip address Description The ip address command is used to configure the system IP address, Subnet Mask and Default Gateway. To restore to the factory defaults, please use no ip address command. This command should be configured in the Interface Configuration Mode of the management VLAN.
  • Page 73: Ip Address-Alloc Bootp

    Command Mode Interface Configuration Mode (interface vlan) Example Enable the DHCP Client function when the management VLAN of the switch is VLAN1: TL-SL2428(config)# interface vlan 1 TL-SL2428(config-if)# ip address-alloc dhcp ip address-alloc bootp Description The ip address-alloc bootp command is used to enable the BOOTP Protocol. When the BOOTP Protocol is enabled, the switch will obtain IP address from BOOTP Server.
  • Page 74: Reboot

    Example Reset the software of the switch: TL-SL2428# reset reboot Description The reboot command is used to reboot the switch. To avoid damage, please don’t turn off the device while rebooting. Syntax reboot Command Mode Privileged EXEC Mode Example Reboot the switch: TL-SL2428# reboot copy running-config startup-config Description...
  • Page 75: Copy Startup-Config Tftp

    copy startup-config tftp Description The copy startup-config tftp command is used to backup the configuration file to TFTP server. Syntax copy startup-config tftp ip-address ip-addr filename name Parameter ip-addr —— IP address of the TFTP server. name —— Specify the name for the configuration file which would be backup. Command Mode Privileged EXEC Mode Example...
  • Page 76: Firmware Upgrade

    TL-SL2428# copy tftp startup-config ip-address 192.168.0.148 filename config firmware upgrade Description The firmware upgrade command is used to upgrade the switch system file via the TFTP server. Syntax firmware upgrade ip-address ip-addr filename name Parameter ip-addr —— IP address of the TFTP server. name ——...
  • Page 77: Tracert

    count (-i) —— The interval to send ICMP request packets. It ranges from 100 to 1000 milliseconds. By default, this value is 1000. Command Mode User EXEC Mode and Privileged EXEC Mode Example To test the connectivity between the switch and the network device with the IP 192.168.0.131, please specify the count (-l) as 512 bytes and count (-i) as 1000 milliseconds.
  • Page 78: Loopback Interface

    loopback interface Description The loopback interface command is used to test whether the port is available or not. Syntax loopback interface { fastEthernet port | gigabitEthernet port } { internal | external } Parameter port —— The Fast/Gigabit Ethernet port number. internal | external ——...
  • Page 79: Show Running-Config

    show running-config Description The show running-config command is used to display the current operating configuration of the system or a specified port. Syntax show running-config [ interface { fastEthernet port | gigabitEthernet port } ] Parameter port —— The Fast/Gigabit Ethernet port number. Command Mode Privileged EXEC Mode and Any Configuration Mode Example...
  • Page 80: Show System-Time Ntp

    Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the DST time information of the switch TL-SL2428# show system-time dst show system-time ntp Description The show system-time ntp command is used to display the NTP mode configuration information. Syntax show system-time ntp Command Mode...
  • Page 81 Example Show the cable-diagnostics of port 3: TL-SL2428# show cable-diagnostics interface fastEthernet 1/0/3...
  • Page 82: Chapter 12 Ethernet Configuration Commands

    Chapter 12 Ethernet Configuration Commands Ethernet Configuration Commands can be used to configure the Bandwidth Control, Negotiation Mode and Storm Control for Ethernet ports. interface fastEthernet Description The interface fastEthernet command is used to enter the interface fastEthernet Configuration Mode and configure the corresponding Fast Ethernet port.
  • Page 83: Interface Gigabitethernet

    User Guidelines Command in the Interface Range fastEthernet Mode is executed independently on all ports in the range. It does not effect the execution on the other ports at all if the command results in an error on one port. Example To enter the Interface Range fastEthernet Configuration Mode, and configure ports 1, 2, 3, 6, 7 and 9 at the same time by adding them to one port-list:...
  • Page 84: Description

    Parameter port-list —— The list of Gigabit Ethernet ports. Command Mode Global Configuration Mode User Guidelines Command in the Interface Range gigabitEthernet Mode is executed independently on all ports in the range. It does not effect the execution on the other ports at all if the command results in an error on one port.
  • Page 85: Flow-Control

    Description The shutdown command is used to disable an Ethernet port. To enable this port again, please use no shutdown command. Syntax shutdown no shutdown Command Mode Interface Configuration Mode (interface fastEthernet / interface range fastEthernet / interface gigabitEthernet / interface range gigabitEthernet) Example Disable port 3: TL-SL2428(config)# interface fastEthernet 1/0/3...
  • Page 86: Media-Type

    The media-type command is used to configure the media type of Combo port. For a Combo port, the media type should be configured before you set its speed and mode. This command does not apply to TL-SL2210/TL-SL2452 since TL-SL2210/TL-SL2452 has no Combo port.
  • Page 87: Speed

    TL-SL2428(config)# interface fastEthernet 1/0/3 TL-SL2428(config-if)# duplex full speed Description The speed command is used to configure the Speed Mode for an Ethernet port. To return to the default configuration, please use no speed command. Syntax speed { 10 | 100 | 1000 | auto } no speed Parameter 10 | 100 | 1000 | auto ——...
  • Page 88: Storm-Control Multicast

    Parameter rate —— Specify the bandwidth for receiving broadcast packets on the port. The packet traffic exceeding the bandwidth will be discarded. By default, the value is “128K”. Command Mode Interface Configuration Mode (interface fastEthernet / interface range fastEthernet / interface gigabitEthernet / interface range gigabitEthernet) Example Enable the broadcast control function for port 5: TL-SL2428(config)# interface fastEthernet 1/0/5...
  • Page 89: Storm-Control Unicast

    storm-control unicast Description The storm-control unicast command is used to enable the unicast control function. To disable the unicast control function, please use no storm-control unicast command. Unicast control function allows the switch to filter UL frame in the network. If the transmission rate of the UL frames exceeds the set bandwidth, the packets will be automatically discarded to avoid network broadcast storm.
  • Page 90: Clear Counters

    Parameter ingress-rate — — Specify the bandwidth for receiving packets. Range: 1-1024000 for the gigaport. egress-rate — — Specify the bandwidth for sending packets. Range: 1-1024000 for the gigaport. Command Mode Interface Configuration Mode (interface fastEthernet / interface range fastEthernet / interface gigabitEthernet / interface range gigabitEthernet) Example Configure the ingress-rate as 5120Kbps and egress-rate as 1024Kbps for port TL-SL2428(config)# interface fastEthernet 1/0/5...
  • Page 91: Show Interface Counters

    Parameter —— port The Ethernet port number. Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the connective-status of all ports: TL-SL2428(config)# show interface status Display the connective-status of port 1: TL-SL2428(config)# show interface fastEthernet 1/0/1 status show interface counters Description The show interface counters command is used to display the statistic information of all ports or an Ethernet port.
  • Page 92: Show Interface Flowcontrol

    Parameter —— port The Ethernet port number. Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the description of all Ethernet ports: TL-SL2428(config)# show interface description Display the description of port 2: TL-SL2428(config)# show interface fastEthernet 1/0/2 description show interface flowcontrol Description The show interface flowcontrol command is used to display the flow-control...
  • Page 93: Show Storm-Control

    Parameter —— port The Ethernet port number. Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the configurations of all Ethernet ports: TL-SL2428(config)# show interface configuration Display the configurations of port 2: TL-SL2428(config)# show interface fastEthernet 1/0/2 configuration show storm-control Description The show storm-control command is used to display the storm-control...
  • Page 94 Syntax show bandwidth [interface { fastEthernet port | gigabitEthernet port | range fastEthernet port-list | range gigabitEthernet port-list }] Parameter port —— The Ethernet port number. port-list —— The list of the Ethernet ports. Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the bandwidth-limit information of port 4: TL-SL2428(config)# show bandwidth interface fastEthernet 1/0/4...
  • Page 95: Chapter 13 Qos Commands

    Chapter 13 QoS Commands QoS (Quality of Service) function is used to optimize the network performance. It provides you with network service experience of a better quality. Description The qos command is used to configure the prority based on port. To return to the default configuration, please use no qos command.
  • Page 96: Qos Dscp

    Syntax qos cos no qos cos Command Mode Global Configuration Mode User Guidelines IEEE 802.1P gives the Pri field in IEEE 802.1Q tag a recommended definition. When the mapping relation between IEEE 802.1P Priority and TC egress queue is enabled, the data will be classified into the egress queue based on this mapping relation.
  • Page 97: Qos Queue Cos-Map

    qos queue cos-map Description The qos queue cos-map command is used to configure the mapping relation between IEEE 802.1P priority tag/IEEE 802.1Q tag and the TC egress queue. To return to the default configuration, please use no qos queue cos-map command.
  • Page 98: Qos Queue Mode

    datagram are mapped to different priority levels based on DSCP priority mode; non-IP datagram with IEEE 802.1Q tag are mapped to different priority levels based on IEEE 802.1P priority mode if IEEE 802.1P Priority is enabled; the untagged non-IP datagram are mapped based on port priority mode. Syntax qos queue dscp-map { dscp-list } { tc-id } no qos queue dscp-map...
  • Page 99: Show Qos Interface

    Parameter sp —— Strict-Priority Mode. In this mode, the queue with higher priority will occupy the whole bandwidth. Packets in the queue with lower priority are sent only when the queue with higher priority is empty. wrr —— Weight Round Robin Mode. In this mode, packets in all the queues are sent in order based on the weight value for each queue.
  • Page 100: Show Qos Cos-Map

    Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the configuration of QoS for port 5: TL-SL2428# show qos interface fastEthernet 1/0/5 Display the configuration of QoS for ports 1-4: TL-SL2428# show qos interface range fastEthernet 1/0/1-4 show qos cos-map Description The show qos cos-map command is used to display the configuration of IEEE 802.1P priority and the mapping relation between IEEE 802.1P priority and tc-id.
  • Page 101: Show Qos Queue Mode

    show qos queue mode Description The show qos queue mode command is used to display the schedule rule of the egress queues. Syntax show qos queue mode Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the schedule rule of the egress queues: TL-SL2428# show qos queue mode show qos status Description...
  • Page 102: Chapter 14 Port Mirror Commands

    Chapter 14 Port Mirror Commands Port Mirror refers to the process of forwarding copies of packets from one port to a monitoring port. Usually, the monitoring port is connected to data diagnose device, which is used to analyze the monitored packets for monitoring and troubleshooting the network. monitor session destination interface Description The monitor session destination interface command is used to configure the...
  • Page 103: Monitor Session Source Interface

    monitor session source interface Description The monitor session source interface command is used to configure the monitored port. To delete the corresponding monitored port, please use no monitor session source interface command. Syntax monitor session session_num source interface { fastEthernet port-list | gigabitEthernet port-list } mode no monitor session session_num source interface { fastEthernet port-list | gigabitEthernet port-list } mode...
  • Page 104: Show Monitor Session

    TL-SL2428(config)# monitor session 1 source interface fastEthernet 1/0/4-5,1/0/7 rx Delete port 4 in monitor session 1 and its configuration: TL-SL2428(config)# no monitor session 1 source interface fastEthernet 1/0/4 rx show monitor session Description The show monitor session command is used to display the configuration of port monitoring.
  • Page 105: Chapter 15 Port Isolation Commands

    Chapter 15 Port Isolation Commands Port Isolation provides a method of restricting traffic flow to improve the network security by forbidding the port to forward packets to the ports that are not on its forwarding port list. port isolation Description The port isolation command is used to configure the forward port list of a port, so that this port can only communicate with the ports on its port list.
  • Page 106: Command Mode

    Syntax show port isolation interface [ fastEthernet port | gigabitEthernet port ] Parameter port —— The number of Ethernet port you want to show its forward port list, in the format of 1/0/2. Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the forward-list of port 2: TL-SL2428# show port isolation interface fastEthernet 1/0/2...
  • Page 107: Chapter 16 Loopback Detection Commands

    Chapter 16 Loopback Detection Commands With loopback detection feature enabled, the switch can detect loops using loopback detection packets. When a loop is detected, the switch will display an alert or further block the corresponding port according to the configuration. loopback-detection(global) Description The loopback-detection command is used to enable the loopback detection...
  • Page 108: Loopback-Detection Recovery-Time

    Example Specify the interval-time as 50 seconds: TL-SL2428(config)# loopback-detection interval 50 loopback-detection recovery-time Description The loopback-detection recovery-time command is used to configure the time after which the blocked port would automatically recover to normal status. Syntax loopback-detection recovery-time recovery-time Parameter recovery-time ——...
  • Page 109: Loopback-Detection Config

    TL-SL2428(config)# interface range fastEthernet 1/0/1-3 TL-SL2428(Config-if-range)# loopback-detection loopback-detection config Description The loopback-detection config command is used to configure the process-mode and recovery-mode for the ports by which the switch copes with the detected loops. Syntax loopback-detection config [ process-mode { alert | port-based }] [ recovery-mode { auto | manual }] Parameter process-mode ——...
  • Page 110: Show Loopback-Detection Global

    Syntax loopback-detection recover Command Mode Interface Configuration Mode (interface fastEthernet / interface range fastEthernet / interface gigabitEthernet / interface range gigabitEthernet) Example Recover the blocked port 2 to normal status: TL-SL2428(config)# interface fastEthernet 1/0/2 TL-SL2428(config-if)# loopback-detection recover show loopback-detection global Description The show loopback-detection global command is used to display the global configuration of loopback detection function such as loopback detection global...
  • Page 111 Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the configuration of loopback detection function and the status of all ports: TL-SL2428# show loopback-detection interface Display the configuration of loopback detection function and the status of port 5: TL-SL2428# show loopback-detection interface fastEthernet 1/0/5...
  • Page 112: Chapter 17 Acl Commands

    Chapter 17 ACL Commands access-list create Description The access-list create command is used to create standard-IP ACL and extend-IP ACL. Syntax access-list create access-list-num Parameter access-list-num —— ACL ID, ranging from 100 to 299. The ID range of Standard-IP ACL ranges is 100-199 and the Extend-IP ACL is 200-299. Command Mode Global Configuration Mode Example...
  • Page 113: Access-List Standard

    TL-SL2428(config)# mac access-list 23 access-list standard Description The access-list standard command is used to add Standard-IP ACL rule. To delete the corresponding rule, please use no access-list standard command. Standard-IP ACLs analyze and process data packets based on a series of match conditions, which can be the source IP addresses and destination IP addresses carried in the packets.
  • Page 114: Access-List Extended

    access-list extended Description The access-list extended command is used to add Extended-IP ACL rule. To delete the corresponding rule, please use no access-list extended command. Syntax access-list extended acl-id rule rule-id { deny | permit } [[ sip source-ip ] smask source-ip-mask ] [[ dip destination-ip] dmask destination-ip-mask ] [ s-port s-port ] [ d-port d-port ] [ protocol protocol ] no access-list extended acl-id rule rule-id...
  • Page 115: Rule

    rule Description The rule command is used to configure MAC ACL rule. To delete the corresponding rule, please use no rule command. Syntax rule rule-id { deny | permit } [[ smac source-mac ] smask source-mac-mask ] [[ dmac destination-mac ] dmask destination-mac-mask ] no rule rule-id Parameter rule-id ——...
  • Page 116: Access-List Policy Action

    Policy is used to control the data packets those match the corresponding ACL rules by configuring ACLs and actions together for effect. The operations here include stream mirror, stream condition, QoS Remarking and redirect. Syntax access-list policy name name no access-list policy name name Parameter name ——...
  • Page 117: Access-List Bind(Interface)

    access-list bind(interface) Description The access-list bind command is used to bind a policy to a specified port. To cancel the bind relation, please use no access-list bind command. Syntax access-list bind policy-name no access-list bind policy-name Parameter policy-name —— The name of the policy desired to bind. Command Mode Interface Configuration Mode (interface fastEthernet / interface range fastEthernet / interface gigabitEthernet / interface range gigabitEthernet)
  • Page 118: Show Access-List

    TL-SL2428(config-if)# access-list bind policy1 show access-list Description The show access-list command is used to display configuration of ACL. Syntax show access-list acl-id Parameter acl-id —— The ID of the ACL selected to display the configuration. Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the configuration of the MAC ACL whose ID is 20: TL-SL2428(config)# show access-list 20...
  • Page 119: Show Access-List Bind

    show access-list bind Description The show access-list bind command is used to display the configuration of Policy bind. Syntax show access-list bind Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the configuration of Policy bind: TL-SL2428(config)# show access-list bind...
  • Page 120: Chapter 18 Dhcp Filtering Commands

    Chapter 18 DHCP Filtering Commands DHCP Filtering functions to monitor the process of hosts obtaining IP addresses from DHCP Servers by configuring the desired port(s) as Trusted Port(s). Only the hosts connected to the trusted port(s) can receive DHCP packets from DHCP servers. In this way, the switch can devoid of DHCP cheating attack which will cause network confusion and security problem.
  • Page 121: Show Ip Dhcp Filtering

    Example Configure port 1 to be a trusted port: TL-SL2428(config)#interface fastEthernet 1/0/1 TL-SL2428(config-if)#ip dhcp filtering trust show ip dhcp filtering Description The show ip dhcp filtering command is used to display the running status of DHCP Filtering. Syntax show ip dhcp filtering Command Mode Privileged EXEC Mode and Any Configuration Mode Example...
  • Page 122: Chapter 19 Mstp Commands

    Chapter 19 MSTP Commands MSTP (Multiple Spanning Tree Protocol), compatible with both STP and RSTP and subject to IEEE 802.1s, can disbranch a ring network. STP is to block redundant links and backup links as well as optimize paths. spanning-tree(global) Description The spanning-tree command is used to enable STP function globally.
  • Page 123: Spanning-Tree Common-Config

    TL-SL2428(config)# interface fastEthernet 1/0/2 TL-SL2428(config-if)# spanning-tree spanning-tree common-config Description The spanning-tree common-config command is used to configure the parameters of the ports for comparison in the CIST and the common parameters of all instances. To return to the default configuration, please use no spanning-tree common-config command.
  • Page 124: Spanning-Tree Mode

    designated port, they can transit their states to forwarding rapidly to reduce the unnecessary forward delay. Command Mode Interface Configuration Mode (interface fastEthernet / interface range fastEthernet / interface gigabitEthernet / interface range gigabitEthernet) Example Enable the STP function of port 1, and configure the Port Priority as 64, ExtPath Cost as 100, IntPath Cost as 100, and then enable Edge Port: TL-SL2428(config)# interface fastEthernet 1/0/1 TL-SL2428(config-if)# spanning-tree common-config port-priority 64...
  • Page 125: Spanning-Tree Mst Configuration

    spanning-tree mst configuration Description The spanning-tree mst configuration command is used to access MST Configuration Mode from Global Configuration Mode, as to configure the VLAN-Instance mapping, region name and revision level. To return to the default configuration of the corresponding Instance, please use no spanning-tree mst configuration command.
  • Page 126: Name

    Example Map the VLANs 1-100 to Instance 1: TL-SL2428(config)# spanning-tree mst configuration TL-SL2428(config-mst)# instance 1 vlan 1-100 Disable Instance 1, namely remove all the mapping VLANs 1-100: TL- SL2428(config)# spanning-tree mst configuration TL- SL2428(config-mst)# no instance 1 Remove VLANs 1-50 in mapping VLANs 1-100 for Instance 1: TL-SL2428(config)# spanning-tree mst configuration TL-SL2428(config-mst)# no instance 1 vlan 1-50 name...
  • Page 127: Spanning-Tree Mst Instance

    Parameters revision —— The revision level for MST region identification, ranging from 0 to 65535. Command Mode MST Configuration Mode Example Configure the revision level of MST as 100: TL-SL2428(config)# spanning-tree mst configuration TL-SL2428(config-mst)# revision 100 spanning-tree mst instance Description The spanning-tree mst instance command is used to configure the priority of MST instance.
  • Page 128: Spanning-Tree Priority

    use no spanning-tree mst command. A port can play different roles in different spanning tree instance. You can use this command to configure the parameters of the ports in different instance IDs as well as view status of the ports in the specified instance.
  • Page 129: Spanning-Tree Tc-Defend

    Command Mode Global Configuration Mode Example Configure the bridge priority as 4096: TL-SL2428(config)# spanning-tree priority 4096 spanning-tree tc-defend Description The spanning-tree tc-defend command is used to configure the TC Protect of Spanning Tree globally. To return to the default configuration, please use no spanning-tree tc-defend command.
  • Page 130: Spanning-Tree Hold-Count

    Syntax spanning-tree timer {[ forward-time forward-time ] [ hello-time hello-time ] [ max-age max-age ]} no spanning-tree timer Parameter forward-time —— Forward Delay, which is the time for the port to transit its state after the network topology is changed. Forward Delay ranges from 4 to 30 in seconds and it is 15 by default.
  • Page 131: Spanning-Tree Max-Hops

    Command Mode Global Configuration Mode Example Configure the hold-count of STP as 8pps: TL-SL2428(config)# spanning-tree hold-count 8 spanning-tree max-hops Description The spanning-tree max-hops command is used to configure the maximum number of hops that occur in a specific region before the BPDU is discarded. To return to the default configurations, please use no spanning-tree max-hops command.
  • Page 132: Spanning-Tree Bpduguard

    Command Mode Interface Configuration Mode (interface fastEthernet / interface range fastEthernet / interface gigabitEthernet / interface range gigabitEthernet) Example Enable the BPDU filter function for port 2: TL-SL2428(config)# interface fastEthernet 1/0/2 TL-SL2428(config-if)# spanning-tree bpdufilter spanning-tree bpduguard Description The spanning-tree bpduguard command is used to enable the BPDU protect function for a port.
  • Page 133: Spanning-Tree Guard Root

    Syntax spanning-tree guard loop no spanning-tree guard loop Command Mode Interface Configuration Mode (interface fastEthernet / interface range fastEthernet / interface gigabitEthernet / interface range gigabitEthernet) Example Enable the Loop Protect function for port 2: TL-SL2428(config)# interface fastEthernet 1/0/2 TL-SL2428(config-if)# spanning-tree guard loop spanning-tree guard root Description The spanning-tree guard root command is used to enable the Root Protect...
  • Page 134: Spanning-Tree Mcheck

    function, please use no spanning-tree guard tc command. A switch removes MAC address entries upon receiving TC-BPDUs. If a malicious user continuously sends TC-BPDUs to a switch, the switch will be busy with removing MAC address entries, which may decrease the performance and stability of the network.
  • Page 135: Show Spanning-Tree Active

    show spanning-tree active Description The show spanning-tree active command is used to display the active information of spanning-tree. Syntax show spanning-tree active Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the active information of spanning-tree: TL-SL2428(config)# show spanning-tree active show spanning-tree bridge Description The show spanning-tree bridge command is used to display the bridge...
  • Page 136: Show Spanning-Tree Interface-Security

    Syntax show spanning-tree interface [ fastEthernet port | gigabitEthernet port ] [ edge | ext-cost | int-cost | mode | p2p | priority | role | state | status ] Parameter port —— The Ethernet port number. Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the spanning-tree information of all ports: TL-SL2428(config)# show spanning-tree interface...
  • Page 137: Show Spanning-Tree Mst

    Display the interface security bpdufilter information: TL-SL2428(config)# show spanning-tree interface-security bpdufilter show spanning-tree mst Description The show spanning-tree mst command is used to display the related information of MST Instance. Syntax show spanning-tree mst { configuration [ digest ] | instance instance-id [ interface [ fastEthernet port | gigabitEthernet port ]} Parameter instance-id ——...
  • Page 138: Chapter 20 Igmp Commands

    Chapter 20 IGMP Commands IGMP Snooping (Internet Group Management Protocol Snooping) is a multicast control mechanism running on Layer 2 switch. It can effectively prevent multicast groups being broadcasted in the network. ip igmp snooping(global) Description The ip igmp snooping command is used to configure IGMP Snooping globally. To disable the IGMP Snooping function, please use no ip igmp snooping command.
  • Page 139: Ip Igmp Snooping Immediate-Leave

    TL-SL2428(config)# interface fastEthernet 1/0/3 TL-SL2428(config-if)# ip igmp snooping ip igmp snooping immediate-leave Description The ip igmp snooping immediate-leave command is used to configure the Fast Leave function for port. To disable the Fast Leave function, please use no ip igmp snooping immediate-leave command. Syntax ip igmp snooping immediate-leave no ip igmp snooping immediate-leave...
  • Page 140: Ip Igmp Snooping Vlan-Config

    ip igmp snooping vlan-config Description The ip igmp snooping vlan-config command is used to enable VLAN IGMP Snooping function or to modify IGMP Snooping parameters, and to create static multicast IP entry. To disable the VLAN IGMP Snooping function, please use no ip igmp snooping vlan-config command.
  • Page 141: Ip Igmp Snooping Multi-Vlan-Config

    Example Enable the IGMP Snooping function and modify Router Port Time as 300 seconds, Member Port Time as 200 seconds for VLAN 1-3, and set the Leave time as 15 seconds for VLAN 1-2: TL-SL2428(config)# ip igmp snooping vlan-config 1-3 rtime 300 TL-SL2428(config)# ip igmp snooping vlan-config 1-3 mtime 200 TL-SL2428(config)# ip igmp snooping vlan-config 1-2 ltime 15 Add static multicast IP address 225.0.0.1, which corresponds to VLAN 2, and...
  • Page 142: Ip Igmp Snooping Filter Add-Id

    leave-time —— Leave Time, which is the interval between the switch receiving a leave message from a host and the switch removing the host from the multicast groups. Leave Time ranges from 1 to 30 in seconds. By default, it is 1. port ——...
  • Page 143: Ip Igmp Snooping Filter(Global)

    Example Bind the filtering address ID 2-6 to port 3: TL-SL2428(config)# interface fastEthernet 1/0/3 TL-SL2428(config-if)# ip igmp snooping filter addr-id 2-6 ip igmp snooping filter(global) Description The ip igmp snooping filter command is used to add or modify the multicast filtering IP-range.
  • Page 144: Ip Igmp Snooping Filter Maxgroup

    Syntax ip igmp snooping filter no ip igmp snooping filter Command Mode Interface Configuration Mode (interface fastEthernet / interface range fastEthernet / interface gigabitEthernet / interface range gigabitEthernet) Example Enable IGMP Snooping filter function for port 3: TL-SL2428(config)# interface fastEthernet 1/0/3 TL-SL2428(config-if)# ip igmp snooping filter ip igmp snooping filter maxgroup Description...
  • Page 145: Show Ip Igmp Snooping

    Syntax ip igmp snooping filter mode mode Parameter mode —— Action Mode, with refuse and accept options. Refuse indicates only the multicast packets whose multicast IP is not in the IP-range will be processed, while accept indicates only the multicast packets whose multicast IP is in the IP-range will be processed.
  • Page 146: Show Ip Igmp Snooping Vlan

    Syntax show ip igmp snooping interface { fastEthernet port | gigabitEthernet port } { basic-config | filter | packet-stat } show ip igmp snooping interface { fastEthernet port-list | gigabitEthernet port-list } { basic-config | filter | packet-stat } Parameter port ——...
  • Page 147: Show Ip Igmp Snooping Multi-Vlan

    show ip igmp snooping multi-vlan Description The show ip igmp snooping multi-vlan command is used to display the Multicast VLAN configuration. Syntax show ip igmp snooping multi-vlan Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the Multicast VLAN configuration: TL-SL2428# show ip igmp snooping multi-vlan show ip igmp snooping groups Description...
  • Page 148: Show Ip Igmp Snooping Filter

    TL-SL2428#show ip igmp snooping groups Display all the multicast entries in VLAN 5: TL-SL2428(config)#show ip igmp snooping groups vlan 5 Display the count of multicast entries in VLAN 5: TL-SL2428(config)#show ip igmp snooping groups vlan 5 count Display the dynamic multicast groups of VLAN 5 TL-SL2428(config)#show ip igmp snooping groups vlan 5 dynamic Display the static multicast groups of VLAN 5 TL-SL2428(config)#show ip igmp snooping groups vlan 5 static...
  • Page 149: Chapter 21 Snmp Commands

    Chapter 21 SNMP Commands SNMP (Simple Network Management Protocol) functions are used to manage the network devices for a smooth communication, which can facilitate the network administrators to monitor the network nodes and implement the proper operation. snmp-server Description The snmp-server command is used to enable the SNMP function. By default, it is disabled.
  • Page 150: Snmp-Server Group

    mib-oid —— MIB Object ID. It is the Object Identifier (OID) for the entry of View, ranging from 1 to 61 characters. include | exclude —— View Type, with include and exclude options. They represent the view entry can/cannot be managed by the SNMP management station individually.
  • Page 151: Snmp-Server User

    By default, the Security Level is noAuthNoPriv. There is no need to configure this in SNMP v1 Mode and SNMP v2c Mode. read-view —— Select the View to be the Read View. The management access is restricted to read-only, and changes cannot be made to the assigned SNMP View.
  • Page 152 Parameter name —— User Name, ranging from 1 to 16 characters. local | remote —— User Type, with local and remote options. Local indicates that the user is connected to a local SNMP engine, while remote means that the user is connected to a remote SNMP engine. group-name ——...
  • Page 153: Snmp-Server Community

    snmp-server community Description The snmp-server community command is used to add Community. To delete the corresponding Community, please use no snmp-server community command. SNMP v1 and SNMP v2c adopt community name authentication. The community name can limit access to the SNMP agent from SNMP network management station, functioning as a password.
  • Page 154 udp-port —— UDP port, which is used to send notifications. The UDP port functions with the IP address for the notification sending. It ranges from 1 to 65535. user-name —— The User name of the management station. smode —— The Security Model of the management station, with v1, v2c and v3 options.
  • Page 155: Snmp-Server Engineid

    snmp-server engineID Description The snmp-server engineID command is used to configure the local and remote engineID of the switch. To restore to the default setting, please use no snmp-server engineID command. Syntax snmp-server engineID { [ local local-engineID ] [ remote remote-engineID ] } no snmp-server engineID Parameter local-engineID ——...
  • Page 156: Snmp-Server Traps Link-Status

    Syntax snmp-server traps snmp [ linkup | linkdown | warmstart | coldstart ] no snmp-server traps snmp [ linkup | linkdown | warmstart | coldstart ] Parameter linkup —— Enable linkup trap. It is sent when port status changes from linkdown to linkup.
  • Page 157: Snmp-Server Traps

    snmp-server traps Description The snmp-server traps command is used to enable SNMP extended traps. To disable the sending of SNMP extended traps, please use no snmp-server traps command. Syntax snmp-server traps { bandwidth-control | cpu | flash | ipaddr-change |loopback-detection | storm-control | spanning-tree } no snmp-server traps { bandwidth-control | cpu | flash | ipaddr-change |loopback-detection | storm-control | spanning-tree } Parameter...
  • Page 158: Snmp-Server Traps Mac

    snmp-server traps mac Description The snmp-server traps mac command is used to enable SNMP extended address-related traps which include four types: new, full, learn-mode-change and max-learned. To disable the sending of SNMP extended MAC address related traps, please use no snmp-server traps mac command.
  • Page 159: Rmon History

    Syntax snmp-server traps vlan [ create | delete ] no snmp-server traps vlan [create | delete ] Parameter create —— Enable VLAN-created trap. It is sent when new VLAN is created successfully. delete —— Enable VLAN-deleted traps. It is sent when VLAN is deleted successfully.
  • Page 160: Rmon Event

    seconds —— The interval to take samplings from the port, ranging from 10 to 3600 in seconds. By default, it is 1800. owner-name —— The owner of the history sample entry, ranging from 1 to 16 characters. By default, it is “monitor”. Command Mode Global Configuration Mode Example...
  • Page 161: Rmon Alarm

    Command Mode Global Configuration Mode Example Configure the user name of entry 1, 2, 3 and 4 as user1, the description of the event as description1, the type of event as log and the owner of the event as owner1: TL-SL2428(config)# rmon event 1-4 user user1 description description1 type log owner owner1 rmon alarm...
  • Page 162: Show Snmp-Server

    last sampled value from the current value, and then comparing the difference in the values with the threshold. By default, the Sample Type is “absolute”. r-hold —— The rising counter value that triggers the Rising Threshold alarm, ranging from 1 to 65535. By default, it is 100. r-event ——...
  • Page 163: Show Snmp-Server View

    Syntax show snmp-server Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display SNMP configuration globally: TL-SL2428# show snmp-server show snmp-server view Description The show snmp-server view command is used to display the View table. Syntax show snmp-server view Command Mode Privileged EXEC Mode and Any Configuration Mode Example...
  • Page 164: Show Snmp-Server User

    show snmp-server user Description The show snmp-server user command is used to display the User table. Syntax show snmp-server user Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the User table: TL-SL2428# show snmp-server user show snmp-server community Description The show snmp-server community command is used to display the Community table.
  • Page 165: Show Snmp-Server Engineid

    TL-SL2428# show snmp-server host show snmp-server engineID Description The show snmp-server engineID command is used to display the engineID of the SNMP. Syntax show snmp-server engineID Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the engineID: TL-SL2428# show snmp-server engineID show rmon history Description The show rmon history command is used to display the configuration of the...
  • Page 166: Show Rmon Alarm

    Description The show rmon event command is used to display the configuration of SNMP-RMON Event. Syntax show rmon event [ index ] Parameter index —— The index number of the entry selected to display the configuration, ranging from 1 to 12, in the format of 1-3, 5. You can select more than one entry for each command.

This manual is also suitable for:

Tl-sl2218Tl-sl2452Tl-sl2428

Table of Contents