TP-LinkメーカーTL-SG3424Pの使用説明書/サービス説明書
ページ先へ移動 of 220
TL-SG3424P JetS tream L2 Managed PoE Switch Rev: 1.0.0 1910010613.
I COPYRIGHT & TRADEMARKS S pecifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., L TD. Other brands and product names are trademarks or registered trademarks of t heir respective holders.
II CONTENTS Preface .............................................................................................................. 1 Chapter 1 Using the CLI ....................................................................................... 4 1.1 Accessi ng the CLI .
III show ma c-vlan .................................................................................................................. .... 21 Chapter 5 Protocol VLAN Commands ............................................................... 22 protocol-vla n template .
IV show lacp interface ............................................................................................................ .... 39 show lacp syst em-prior ity ...................................................................................
V arp detection trust- port ....................................................................................................... ... 59 arp detection (interfa ce)......................................................................................
VI show radius account ing ......................................................................................................... 79 Chapter 15 Log Comma nds ................................................................................. 80 logging loca l buffe r .
VII system-tim e dst ................................................................................................................ ..... 97 ip addr ess ................................................................................................
VIII Chapter 21 QoS Comma nds................................................................................ 1 17 qos ............................................................................................................................ .......
IX Chapter 25 ACL Comma nds ................................................................................137 acl time-s egm ent ............................................................................................................... .. 137 acl edit ti me-segm ent .
X igmp-snooping global .......................................................................................................... 1 61 igmp-snooping config ...............................................................................................
XI show snmp view ................................................................................................................. . 186 show snmp group .................................................................................................
XII show cluste r neighb our........................................................................................................ 2 05 show cluster ntd p gl obal ......................................................................................
1 Preface This Guide is intended for network administrator to provide referenced information about CLI (Command Line Interface). The device mentioned in this Guide stands for TL-SG3424P JetS tream L2 Managed PoE Switch.
2 Provide information about the co mmands used for protecting the swit ch from the ARP cheating or ARP Att ack. Chapter 13: DoS Defend Command Provide information about the commands used for DoS defend and detecting the DoS attack. Chapter 14: IEEE 802.
3 Protocol). Chapter 27: IGMP Commands Provide information about the commands used for configuring the IGMP Snooping (Internet Group Management Protocol Snooping). Chapter 28: SNMP Commands Provide information about the commands used for configuri ng the SNMP (Simple Network Management Protocol) functions.
4 Chapter 1 Using the CLI 1.1 Accessing the CLI Y ou can log on to the switch and access the CLI by the following two methods: 1. Log on to the switch by the console port on the switch. 2. Log on to the switch remotely by a T e lnet or SSH connection through an Ethernet port.
5 Figure 1-2 Connection Description 4. Select the port to connect in figure 1-3, and click OK . Figure 1-3 Select the port to connect 5. Configure the port selected in the step abov e as the following figure1-4 sho wn. Configure Bit s per second as 38400, Dat a bit s as 8, Parity as None, S top bit s as 1, Flo w control as None, and then click OK .
6 Figure 1-4 Port Settings 6. T ype the User name an d Password in the Hyper T erminal window , the factory default value for both of them is admin. The DOS pr ompt ” TP-LINK>” will appear after pressing the Enter button as figure1-5 shown. It indi cates that you can use the CLI now .
7 Figure 1-6 Open the Run window 3. T ype cmd in the prompt R un window a s figure 1-7 and click OK . Figure 1-7 Run Window 4. T ype telnet 192.168.0.1 in the command prompt shown as figure1-8, and press the Enter button.
8 5. T ype the User name and Passwo rd (the factory default value fo r both of them is admin) and press the Enter button, then you can use the CLI now , which is shown as figure1-9.
9 User EXEC Mode Primary mode once it is connected with the swi tch. TP-LINK> Use the exit command to disconnect the switch (except that the switch is connected through the Consol e port). Use the enable command to access Privileged EXEC mode. Privileged EXEC Mode Use the enable command to enter this mode from User EXEC mode.
10 you should access the corres ponding command mode firstly. z Global Configuration Mode : In this mode, global commands are provided, such as the Spanning Tree, Schedule Mode and so on. z Interface Configuration Mode : In this mode, users can c onfigure one or several ports, different ports corresponds to dif ferent commands a).
11 1.4 Conventions 1.4.1 Format Conventions The following conventions are used in this Guide: ¾ Items in square brackets [ ] are optional ¾ Items in braces { } are required ¾ Alternative items are grouped in braces and se parated by vertical bars. For example: speed {10 | 100 | 1000 } ¾ Bold indicates an unalterable keyword.
12 Chapter 2 User Interface enable Description The enable command is used to access Privileged EXEC Mode from User EXEC Mode. Synt ax enable Command Mode User EXEC Mode Example If you have set the pas.
13 disable Description The disable command is used to return to User EXEC Mode from Privileged EXEC Mode. Synt ax disable Command Mode Privileged EXEC Mode Example Return to User EXEC Mode from Privil.
14 Command Mode Any Configuration Mode Example Return to Global Configuration Mode from Interface Configuration Mode,an d then return to Privileged EXEC Mode: TP-LINK(config-if)# exit TP-LINK(config)#exit TP-LINK# end Description The end command is used to return to Privileged EXEC Mode.
15 Chapter 3 IEEE 802.1Q VLAN Commands VLAN (Virtual Local Area Network) technology is developed for the switch to divide the LAN into multiple logical LANs flexibly . Host s in the same VLAN can communicate with each other , regardless of their physical locations.
16 Create a VLAN, the vid of which is 12: TP-LINK(config)# vlan dat abase TP-LINK(config-vlan)#vlan 12 interface vlan Description The interface vlan command is used to access VLAN Interface Mode to configure the specified VLAN. Synt ax interface vlan vlan-id Parameter vlan-id ——VLAN ID,ranging from 1 to 4094.
17 TP-LINK(config-if)#description vlan2 switchport type Description The switchport type command is used to configur e the Link T ypes for the ports. Synt ax switchport type { access | trunk | general } Parameter access | trunk | general —— Link T ypes.
18 TP-LINK(config-if)# switchport allowed vlan add 2 switchport pvid Description The switchport pvid command is used to configur e the PVID for the switch ports. Synt ax switchport pvid vlan-id Parameter vlan-id —— VLAN ID, ranging from 1 to 4094.
19 show vlan Description The show vlan command is used to display t he information of IEEE 802.1Q VLAN . Synt ax show vlan [ vlan-id ] Parameter vlan-id —— VLAN ID, ranging from 1 to 4094. By default , display all the information of IEEE 802.1Q VLAN.
20 Chapter 4 MAC VLAN Commands MAC VLAN (Virtual Local Area Network) is the way to classify the VLANs based on MAC Address. A MAC address is relative to a single VLAN ID. The untagged packets and the priority-tagged packet s coming from the MAC address will be tagged with this VLAN ID.
21 Example Delete the existing MAC-Based VLAN entry with the MAC address of 00:00:00:00:00:02: TP-LINK(config)# mac-vlan remove 00:00:00:00:00:02 mac-vlan modify Description The mac-vlan modify command is used to modify the settings of t he subsistent MAC VLAN entry .
22 Chapter 5 Protocol VLAN Commands Protocol VLAN (V irtual Local Area Network) is the way to classify VLANs based on Protocols. A Protocol is relative to a single VLAN ID. The untagged p ackets and the priority-tagged pa ckets matching the protocol template w ill be tagged with this VLAN ID.
23 protocol-vlan vlan vid template index member-list no protocol-vlan entry-id Parameter vid ——VLAN ID , ranging from 1-4094. index ——The number of the Protocol template.Y ou can get the template corresponding to the number by the show protocol-vlan template command.
24 show protocol-vlan vlan Command Mode Any Configuration Mode Example Display information of the protocol-vlan entry: TP-LINK(config)# show protocol-vlan vlan.
25 Chapter 6 Voice VLAN Commands V oice VLANs are configured spec iall y for voice data stream. By configuring V oice VLANs and adding the ports with voice devic es attached to voice VLANs, you can perform QoS-related configuration for voice data, ens uring the transmission priority of voice data stream and voice quality .
26 Parameter aging-time ——Aging time (in minutes) to be set for the V oice VLAN. It ranges from 1 to 43200 and the default value is 1440. Command Mode Global Configuration Mode Example Set the agi.
27 voice-vlan oui remove mac-addr Parameter mac-addr —— The OUI address of the voice device. mask-addr —— The OUI address ma sk of the voice device. description ——Give a description to the OU I for identification which contains 16 characters at most.
28 switchport voice-vlan security Description The switchport voice-vl an security command is used to configure the V oice VLAN security mode. Synt ax switchport voice-vlan securit y {disable | enable} Parameter disable | enable —— disable/enable the security mode for the specified port .
29 The show voice-vlan oui command is used to display the configuration information of V oice VLAN OUI. Synt ax show voice-vlan oui Command Mode Any Configuration Mode Example Display the configuratio.
30 Chapter 7 GVRP Commands GVRP (GARP VLAN registration protocol) is an implementation of GARP (generic attribute registration protocol). GVRP allo ws the switch to automatically add or remove the VLA.
31 Example Enable the GVRP function for ports 2-6: TP-LINK(config)# interface range ethernet 2-6 TP-LINK(config-if)# gvrp gvrp registration Description The gvrp registration command is used to confi gure the GVRP registration type on the desired port.
32 Parameter leaveall | join | leave —— They are the three timers: leave All 、 join and leave. Once the LeaveAll T imer is set, the port with GVRP enabled can send a LeaveAll message after the timer times ou t, so that other GARP ports can re-register all the attribute information.
33 TP-LINK(config)# show gvrp global show gvrp interface Description The show gvrp interface command is used to displa y the GVRP configuration information of the s pecified Ethernet ports. Synt ax show gvrp interface [ ethernet port-num ] Parameter port-num ——The Ethernet port number .
34 Chapter 8 LAG Commands LAG (Link Aggregation Group) is to combine a number of ports together to make a single high-bandwidth data path, which can highly exte nd the bandwi dth.
35 interface range link-aggregation group-list no interface range link-aggregation group-list Command Mode Global Configuration Mode Parameter group-list ——The aggregation group list.
36 link-aggregation hash-algorithm Description The link-ag gregation hash-algorithm command is used to configure the Aggregate Arithmetic for LAG . Synt ax link-aggregation hash-algorithm { src_dst_mac | src_dst_ip } Parameter src_dst_mac —— The so urce and des tination MAC addresses.
37 TP-LINK(config)# interface link-aggregation 1 TP-LINK(config-if)# description movie server show interfaces link-aggregation Description The show interfaces link-aggrega tion command is used to display the configuration information of the A ggregate Arithmetic and the aggregation groups.
38 Chapter 9 LACP Commands LACP (Link Aggregation Control Prot ocol) is defined in IEEE802.3ad and en ables the dynamic link aggregation and disaggregation by ex changing LACP packet s with its pa rtner .
39 Command Mode Interface Configuration Mode ( interface ethernet / interface range ethernet ) Example Configure the admin key of port 1 as 1024: TP-LINK(config)# interface ethernet 1 TP-LINK(config-if)# lacp admin-key 1024 lacp port-priority Description The lacp port-priority command is used to set the port priority for a port.
40 Parameter port-num —— The Ethernet port number . By default, display the configuration information of all the Ethernet ports. Command Mode Any Configuration Mode Example Display the configurati.
41 Chapter 10 User Manage Commands User Manage Commands are used to configure the user name and password for users to log on to the Web management p age with a certain access level so as to protect the settings of the switch from being randomly changed.
42 user remove Description The user remove command is us ed to delete an existing user . The curr ent user can't be deleted by itself. Synt ax user remove user -name Parameter user-name —— An existing user name.
43 user modify type Description The user modify type command is used to modify the acce ss level for the existing user . The current user can't be modified by itself. Synt ax user modify ty pe user-name {guest | admin} Parameter user-name —— The existing user name.
44 Example Modify the password of tplink as newpwd: TP-LINK(config)# user modify p assword tplink p assword newpwd newpw d user access-control disable Description The user access-control disable command is used to cancel the user access-control.
45 TP-LINK(config)# user access-control ip-based 192.168.0.148 255.255.255.255 user access-control mac-based Description The user access-contro l mac-based command is used to limit the MAC Address of the users for login.
46 Example Enable the access-control of the ports 2, port4, port5, port6,and port8: TP-LINK(config)# user access-control port-based 2,4-6,8 user max-number Description The user max-number command is used to configur e the number of the users logging on at the same time.
47 user idle-timeout minutes no user idle-timeout Parameter minute ——The timeout time, ranging from 5 to 30 in minites. By default, the value is 10.
48 Command Mode Any Configuration Mode Example Display the security configurat ion information of the users: TP-LINK(config)# show user configuration.
49 Chapter 11 Binding Table Commands Y ou can bind the IP address, MAC address, VLAN and the connected Port number of the Host together , whic h can be the condition for the ARP Inspection to filter the pa ckets.
50 binding-table remove Description The binding-t able remove command is used to delete the IP-MAC –VID-POR T entry from the binding table. Synt ax binding-t able remove index idx Parameter idx —— The entry number needed to be deleted. Y ou can use the show binding-t able command to get the idx.
51 Enable the DHCP-snoopi ng function globally: TP-LINK(config)# dhcp-snooping dhcp-snooping global Description The dhcp-snooping global command is used to conf igure the DHCP snooping globally . T o restore to the default value, please us e no dhcp-snooping global command.
52 dhcp-snooping information enable Description The dhcp-snooping information enable command is used to enable the Option 82 function of DHCP Snooping.
53 Example Replace the Option 82 field of the pa ck ets with the switch defined one and then send out: TP-LINK(config)# dhcp-snooping information strategy replace dhcp-snooping information user-defined Description The dhcp-snooping information user-defined command is used to permit users to define the Option 82.
54 Example Configure the sub-option Remote ID fo r the customized Option 82 as tplink: TP-LINK(config)# dhcp-snooping information remote-id tplink dhcp-snooping information circuit-id Description The dhcp-snooping information circuit-id command is used to configure the sub-option Circuit ID for the customized Option 82.
55 Configure the port 2 to be a T rusted Port: TP-LINK(config)# interface ethernet 2 TP-LINK(config-if)# dhcp-snooping trusted dhcp-snooping mac-verify Description The dhcp-snooping mac-verify command is used to enable the MAC V erify feature. T o disable the MAC V erify feature, plea se use no dhcp-snooping mac-verify command.
56 value ——The value of Flow Control. T he options are 0/ 5/10/15/20/25/30 (packet/second). The default value is 0, which stands for disable. Command Mode Interface Configuration Mode ( interfac.
57 Command Mode Any Configuration Mode Example Display the IP-MAC-VID-PORT binding table: TP-LINK(config)# show binding-t able show dhcp-snooping global Description The show dhcp-snooping global command is used to display the global configuration of DHCP Snooping.
58 show dhcp-snooping interface Description The show dhcp-snooping interface command is used to display the interface configuration of DHCP Snooping. Synt ax show dhcp snooping interface [ eth ernet port-num ] Parameter port-num ——The number of the switch port.
59 Chapter 12 ARP Inspection Commands ARP (Address Resolution Protocol) Detect function is to protect the switch from the ARP cheating, such as the Network Gateway S poofi ng and Man-In-The-Middle Attack, etc. arp detection (global) Description The arp detection (global) command is used to enable the ARP Detection function globally .
60 port-list ——The specified Trusted Po rt list. Command Mode Global Configuration Mode Example Configure the ports 2-4,5-8 as the T rusted Port: TP-LINK(config)# arp detection trust-port 2-4,5-8 arp detection (interface) Description The arp detection (interface) command is us ed to enable the ARP Defend function.
61 value. T o restore to t he default speed, please use no arp detection limit-rate command. Synt ax arp detection limit-rate value no arp detection limit-rate Parameter value ——The value to specify the maxi mum amount of the received ARP packet s per second, ranging from 10 to 100 in pps(packet/second).
62 show arp detection global Description The show arp detection global command is used to display the ARP detection global configuration including the enable/disable status and the T rusted Port list.
63 The show arp detection st atistic command is used to display the number of the illegal ARP packet s received. Synt ax show arp detection st atistic Command Mode Any Configuration Mode Example Displ.
64 Chapter 13 DoS Defend Command DoS (Denial of Service) Attack is to occupy t he network bandwid th maliciously by the network attackers or the evil programs sending a lot of se rvice requests to the Ho st.
65 Parameter land —— Land attack. scan-synfin —— Scan SYNFIN attack. xma-scan —— Xma Scan attack. null-scan —— NULL Scan attack. port-less-than-1024 ——The SYN packet s whose Source Port less than 1024.
66 Chapter 14 IEEE 802.1X Commands IEEE 802.1X function is to provid e an access control for LAN ports via the authenticat ion. Only the supplicant passing the authenticat ion can access the LAN. dot1x Description The dot1x command is used to enable the IEEE 802.
67 transmission of EAP packets is termi nated at the switch and the EAP packets are converted to the other protocol (s uch as RADIUS) packe ts for transmission EAP-MD5: IEEE 802.1X authentication system uses extensib le authentication protocol (EAP) to exchange information between the switch and the client.
68 dot1x quiet-period Description The dot1x quiet-period command is used to enable t he quiet-perio d function. T o disable the f unction, please use no dot1x quiet-period command.
69 Example Configure the Quiet Period and the SupplicantTi meout as 12 seconds and 6 seconds: TP-LINK(config)# dot1x timer quiet-period 12 supp-timeout 6 dot1x retry Description The dot1x retry command is used to configure t he maximum transfer times of the repeated authentication request.
70 Command Mode Interface Configuration Mode ( interface ethernet / interface range ethernet ) Example Enable the IEEE 802.1X f unction for the port 1: TP-LINK(config)# interface ethernet 1 TP-LINK(config-if)# dot1x dot1x guest-vlan Description The dot1x guest-vlan command is used to enabl e the Guest VLAN function for a specified port.
71 no dot1x port-control Parameter auto | authorized-force | unauthorized-forc e —— The Control Mode for the port. Auto: In this mode, the port will normally work only after passing the 802.1X Authentication. Authorized-force: In this mode, the port can work normally without passing the 802.
72 Command Mode Interface Configuration Mode ( interface ethernet / interface range ethernet ) Example Configure the Control T ype for port 5 as port-based: TP-LINK(config)# interface ethernet 5 T.
73 radius authentication secondary-ip ip-addr no radius authentication secondary-ip Parameter ip-addr ——The IP address of the alternate aut hentication server . By default, it is 0.0.0.0. Command Mode Global Configuration Mode Example Configure the IP address of the alter nate authentication serv er as 10.
74 The radius authentication key command is used to configure the shared password for the switch and the authen tication servers to exchange messages. T o clear the radius authent ication key , please use no radius authentication key command.
75 radius accounting primary-ip Description The radius accounting primary-ip command is used to configure the IP address of the accounting server . Synt ax radius accounting primary-ip ip-addr Parameter ip-addr —— The IP address of the accounting server .
76 TP-LINK(config)# radius accounting secondary-ip 10.20.1.101 radius accounting port Description The radius accounting port command is used to set the UDP port of accounting server(s). T o restore to the default value, please use no radius accounting port .
77 Command Mode Global Configuration Mode Example Configure the shared password for the switch and the accounting servers as tplink: TP-LINK(config)# radius accounting key tplink radius response-timeo.
78 Synt ax show dot1x global Command Mode Any configuration Mode Example Display the configuration of 801.X globally: TP-LINK(config)# show dot1x global show dot1x interface Description The show dot1x interface command is used to display the port configuration of 801.
79 Any configuration Mode Example Display the configuration of the RADIUS authentic ation server: TP-LINK(config)# show radius authentication show radius accounting Description The show radius accounting command is used to display the configuration of the accounting server .
80 Chapter 15 Log C ommands The log information will record the settings and oper ation of the switch re spectively for you to monitor operation status and diagnose malfunction. logging local buffer Description The logging local buffer command is used to configure the severity level and the status of theconf iguration input to the log buffer .
81 The logging local flash command is used to configur e the l evel and the status of the log file input.T o restore to the default configur ation, please use no logging local flash command. The log file indica tes the flash sector for saving system log.
82 Example Clear the information in the log file: TP-LINK(config)# logging clear buffer logging loghost Description The logging loghost command is used to configure the Log Host. T o clear the configuration of the specified Log Host, please use no logging loghost command.
83 of the Local Log including t he log buffer and the log file. Synt ax show logging local-config Command Mode Any configuration Mode Example Display the configurat ion of the Local Log: TP-LINK(config)# show logging local-config show logging loghost Description The show logging loghost command is used to display the configuration of the log host.
84 Parameter leve l ——Severity level. There are 8 severity levels marked with values 0-7. The information will be displayed only when the log with the same or smaller severity level value. Display all the log information in the log buffer by default.
85 Chapter 16 SSH Commands SSH (Security Shell) can prov ide the unsecured remote management with security and powerful authentication to ensure the security of the management information. ssh server enable Description The ssh server enable command is used to en able SSH function.
86 TP-LINK(config)# ssh version v2 ssh idle-timeout Description The ssh idle-timeout command is used to specify the idle-timeout time of SSH. T o restore to the fact ory defaults, please use no ssh idle-timeout command. Synt ax ssh idle-timeout value no ssh idle-timeout Parameter value —— The Idle-timeout time.
87 S pecify the maximum number of the c onnections to the SSH server as 3: TP-LINK(config)# ssh max-client 3 ssh download Description The ssh max-client command is used to download the SSH key file from TFTP server .
88 Chapter 17 SSL Commands SSL ( Secure Sockets Layer ) , a security protocol, is to pr ovide a secure connection for the application layer protocol(e.g. H TTP) based on TCP . Adopting asymmetrical encryption tecnology , SSL uses key p air to encrypt/decrypt information.
89 Command Mode Global Configuration Mode Example Download a SSL Certificate named ssl-cert from TFTP ser ver with the IP Address of 192.168.0.148: TP-LINK(config)# ssl download certificate ssl-cert ip-address 192.168.0.148 ssl download key Description The ssl download key command is used to download a SSL key to the switch from TFTP server .
90 Display the global configuration of SSL: TP-LINK(config)# show ssl.
91 Chapter 18 Address Commands Address configuration can improv e the network security by conf iguring the Port Security and maintaining the address information by managing the Address T able. bridge address port-security Description The bridge address port-security command is used to configure port security .
92 Interface Configuration Mode ( interface ethernet / interface range ethernet ) Example Enable Port Security function for port1, select S tatic mode as the learn mode, and specify the maximum nu.
93 The bridge aging-time command is used to configure aging time for the dynamic address. T o return to the default configuration, please use no bridge aging-time command. Synt ax bridge aging-time aging-time no bridge aging-time Parameter aging-time —— The aging time for the dynamic addr ess.
94 00:1e:4b:04:01:5d: TP-LINK(config)# bridge address filtering 00:1e:4b:04:01:5d 1 show bridge port-security Description The show bridge port-security command is used to configure the Port Security for each port, such as conf igure the Max number of MAC addressed that can be learned on the port and the Learn Mod e.
95 show bridge aging-time Description The show bridge aging-time command is used to display the Aging T ime of the MAC address. Synt ax show bridge aging-time Command Mode Any Configuration Mode Examp.
96 Chapter 19 System Commands System Commands can be used to configure the System informat ion and System IP , reboot and reset the switch, upgrade the swit ch system and other operations. system-descript Description The system-descript command is used to configure the Device Name, De vice Location and System Contact.
97 system-time gmt { time-zone } { ntp-server } { backup-ntp-server } no system-time gmt { time-zone } { ntp-server } { backup-ntp-server } Parameter time-zone —— Y our local time-zone, and it ranges from -12 to 13. ntp-server —— The IP Address for the Primary NTP Server .
98 Synt ax system-time dst { start-date } { st art-time } {end -date } { end-time } no system-time dst Parameter start-date —— The start date of DST you set. start-time —— The start time of DST you set. end-date —— The end date of DST you set.
99 TP-LINK(config)# ip address 192.168.0.69 255.255.255.0 ip management-vlan Description The ip management-vlan command is used to conf igure the management VLAN, through which you can log on to the switch. Synt ax ip management-vlan { vlan-id } Parameter vlan-id —— VLAN ID, ranging from 1 to 4094.
100 Synt ax ip bootp-alloc Command Mode Global Configuration Mode Example Enable the BOOTP Protocol to obt ain IP address from BOOTP Server: TP-LINK(config)# ip bootp-alloc reset Description The reset command is used to reset the switch’s sof tware.
101 user-config backup Description The user-config backup command is used to backup t he configuration file by TFTP server . Synt ax user-config backup filename name ip-address ip-addr Parameter name —— S pecify the name for the config uration file which would be backuped.
102 192.168.0.148 and name this file config.cfg: TP-LINK# user-config load filename config.cfg ip-address 192.168.0.148 user-config save Description The user-config save command is used to save current settings.
103 ping Description The ping command is used to test the connecti vity between the switch and one node of the network. Synt ax ping { ip_addr } [ -n { count }] [ -l { count }] [ -i { count }] Parameter ip_addr —— The IP address of the destination node for ping test.
104 Command Mode User EXEC Mode and Privileged EXEC Mode Example T est the connectivity between the switch and the network device with the IP 192.168.0.131. If t he destination device has not been found after 20 maxHops , the connection between the switch and the destination device is failed to establish: TP-LINK# tracert 192.
105 Any Configuration Mode Example Display the system information: TP-LINK# show system-info show ip address Description The show ip address command is used to displa y MAC Address, IP Address, Subnet Mask and Default Gateway of t he system, whether the DHCP Client function is enabled or not and some other information.
106 show system-time dst Description The show system-time dst command is used to display the DST time information of the switch. Synt ax show system-time dst Command Mode Any Configuration Mode Exampl.
107 Chapter 20 Ethernet Configuration Commands Ethernet Configuration Commands can be used to configure the B andwidth Control, Negotiation Mode and S torm Control for Ethernet ports. interface ethernet Description The interfac e ethernet command is used to enter t he Interface Configuration Mode and configure one Ethernet port.
108 Command in the Interface Range Ether net Mode is executed independently on all ports in the range. It does not effect the execution on the other ports at all if the command results in an error on one port.
109 Interface Configuration Mode ( interface ethernet / interface range ethernet ) Example Disable Ethernet port3: TP-LINK(config)# interface ethernet 3 TP-LINK(config-if)# shut dow n flow-control Description The flow-control command is used to enable the flow -control function for a port.
11 0 10h —— 10 M half-duplex. 10f —— 10M full-duplex. 100h —— 1 00M half-duplex. 100f —— 100M full-dupl ex. 1000f —— 1000M full-d uplex.
111 Example Enable the S t orm Control func tion for port5 and specify the bc-rate as 128kbps, mc-rate as 512kbps and ul-rate as 2Mbp s: TP-LINK(config)# interface ethernet 5 TP-LINK(config-if)# storm.
11 2 TP-LINK(config)# interface ethernet 5 TP-LINK(config-if)# storm-control disable mc-rate storm-control disable ul-rate Description The storm-control disable ul-rate command is used to disable the UL-Frame control.
11 3 TP-LINK(config)# interface ethernet 5 TP-LINK(config-if)# port rate-limit ingress 5120 egress 1024 port rate-limit disable ingress Description The port rate-limit disable ingress command is used to disable the ingress-rate limit.
11 4 The show interface configuration command is used to display the configurations of an Ethernet port, in cluding Port-status, Flow Control, Negotiation Mode and Port-description. Synt ax show interface configuration { ethernet [ interface ] } Parameter interface —— The port selected to display the configurations.
11 5 Synt ax show interface counter s { ethernet [ interface ] } Parameter Interface —— The port selected to display the st atistic information. By default, the statistic information of all ports is displayed.
11 6 port —— The port-number of the port selected to display the rate -limit information. By default, the rate-limit in formation of all port s is displayed.
11 7 Chapter 21 QoS Commands QoS (Quality of Service) f unction is used to optimiz e the netw ork performanc e. It provides yo u with network servi ce experienc e of a bett er quality . qos Description The qos command is used to configure CoS (Class of Service) based on port.
11 8 divide packet s into 8 priorities. W hen IEEE 802.1P Priority is enabled, the packet s with IEEE 802.1Q tag are mapped to different priority levels based on IEEE 802.
11 9 TP-LINK(config)# qos dscp enable qos dscp config Description The qos dscp config command is used to con figure the mapping relation between DSCP Priority and 802.1P Priority . T o return to the default configuration, please use no qos dscp config command.
120 qos scheduler Description The qos scheduler command is used to configure the Schedule Mode. T o return to the default c onfiguration, please use no qos scheduler command. When the network is congested, the program that many packets complete for resources must be solved, usually in t he way of queue scheduling.
121 show qos port-based Description The show qos port-based command is used to display the configuration of QoS based on port priority . Synt ax show qos port-based [ interface-nu m ] Parameter interface-num —— The Ethernet port selected to di splay the configuration.
122 show qos dscp Command Mode Any Configuration Mode Example Display the configuration of DSCP Priority: TP-LINK# show qos dscp show qos scheduler Description The show qos schedule r command is used to displa y the schedule rule of the egress queues.
123 Chapter 22 Port Mirror Commands Port Mirror refers to the process of forwarding copies of packe ts from one port to a mirroring port. Usually , the mirroring port is connected to data diagnose device, which is used to analyze the mirrored packets for monitoring and troubleshooting the network.
124 same time. 3. Whether the mirroring port and mirrored ports are in the same VLAN or not is not demanded strictly . 4. The mirroring port and mirrored ports cannot be link-aggregation member . mirror remove group Description The mirror remove group command is used to remove mirror group.
125 show mirror Description The show mirror command is used to display the configuration of mirror group. Synt ax show mirror [group- num ] Parameter group-num —— The group numb er of mirrior group.
126 Chapter 23 Port isolation Commands Port Isolation provides a method of restricting traffic flow to improve the network security by forbidding the port to forward packets to the por ts that are not on its forwarding port list.
127 Example Display the forward-list of port 6: TP-LINK# show port isolation 6.
128 Chapter 24 PoE Commands PoE (Power over Ethernet) technology describes a system to transmit electrical power along with data to remote devices over standard twisted-p air cable in an Ethernet network. It is especially useful for supplying power to IP telephones, wi reless LAN access points, cameras and so on.
129 Command Mode Global Configuration Mode Example Configure the power disconnect method as deny-next-port: TP-LINK(config)# power inline disconnect-method deny-next-port power inline supply status De.
130 Interface Configuration Mode Example Enable the PoE priority as low for port 2.: TP-LINK(config)# interface ethernet 2 TP-LINK(config-if)# power inline priority low power inline consumption (inter.
131 name —— the time-range you ha ve configured. Command Mode Interface Configuration Mode Example Select the Seg2 as the time range for port 2.: TP-LINK(config)# interface ethernet 2 TP-LINK(conf.
132 {low|middle|high} [ consumption { power limit }] no power profile {p rofile name } Parameter profile name —— the name of the profile. supply -status —— the PoE status of the port in the profile. priority —— the PoE priority of the port in the profile.
133 working day . By default, the period mode is disabled. start-date —— The start date in Absoluteness Mode, in the format of MM/DD/YYYY . By default, it is 01/01/2000. end-date —— The end date in Absoluteness Mode, in the format of MM/DD/YYYY .
134 Define National Day , configuring the st art date as October 1st, and the end date as October 3rd: TP-LINK(config)# power holiday NationalDay 10/01 10/03 show power inline Description The show power inline command is used to display the PoE information of the system.
135 show power inline information Description The show pow er inline information command is used to display the PoE information of the certain port. Synt ax show power inline information [ ethernet port ] Parameter port —— The port selected to display the PoE information, ranging from 1 to 24.
136 Command Mode Any Configuration Mode Example Display the defined holiday: TP-LINK> show power holiday show power profile Description The show pow er profile command is used to display the defined PoE profile.
137 Chapter 25 ACL Commands ACL (Access Control List) is used to filter data p ackets by configur ing a series of match conditions, operations and time ranges. It prov ides a flexible and secured acce ss control policy and facilitates you to control the network security .
138 Example Add a time-range named tSeg1, with time-s lice1 from 8:30 to 12:00 at working day: TP-LINK(config)# acl time-segment tSeg1 wee k- da y working-day time-slice1 08:30-12:00 acl edit time-segment Description The acl edit time-segment command is used to edit T ime-Range.
139 acl holiday Description The acl holiday command is used to create holiday in Holiday Mode in the acl time-segment command. T o delete the corresponding holiday , please use no acl holiday command.
140 Example Create a MAC ACL whose ID is 20: TP-LINK(config)# acl create 20 acl rule mac-acl Description The acl rule mac-acl command is used to add MAC ACL rule.
141 not limited. Command Mode Global Configuration Mode Example Create a MAC ACL whose ID is 20, and add Rule 10 for it. In the rule, the source MAC address is 00:01:3F:48:16:23, the source MAC addres.
142 ethernet-type —— EtherT yp e contained in the ru le, in the format of 4-hex number . user-pri —— The user priority contained in th e rule, ranging from 0 to 7. By default, it is not limited. time-segmen t —— The time-range for the rule to take ef fect.
143 and permit means forwarding packets. By default, th e option is permit. source-ip —— The source IP address contained in the rule. source-ip-mask —— The source IP address mask. It is required if you typed the source IP address. destination-ip —— The destination IP address contained in the rule.
144 source-ip-mask —— The source IP address mask. It is required if you typed the source IP address. destination-ip —— The destination IP address contained in the rule. destination-ip-mask —— The destination IP address mask. It is required if you typed the destination IP address.
145 TP-LINK(config)# acl policy policy -add policy1 acl policy action-add Description The acl policy action-add command is used to add ACLs and create actions for the policy . T o delete the co rresponding actions, please use no acl policy action-add command.
146 TP-LINK(config)# acl policy policy -add policy1 TP-LINK(config)# acl policy action-add policy1 120 rate 1000 osd discard acl edit action Description The acl edit action command is used to edit actions for the policy .
147 bind relation, please use no acl bind to-port command. Synt ax acl bind to-port { policy-name } { port } no acl bind to-port { policy-name } { por t } Parameter policy-name —— The name of the policy desired to bind. port —— The numbe r of the port desired to bind.
148 T ime-Range. Synt ax show acl time-segmen t Command Mode Any Configuration Mode Example Display the configuration of T ime-Range: TP-LINK> show acl time-segment show acl holiday Description The show acl holiday command is used to display the defined holiday .
149 show acl bind Description The sho w acl bind command is used to display the configuration of Policy bind. Synt ax show acl bind Command Mode Any Configuration Mode Example Display the configuratio.
150 Chapter 26 MSTP Commands MSTP (Multiple S panning T ree Protocol), comp at ible with both STP and RSTP and subject to IEEE 802.1s, can disbranch a ri ng network. STP is to block redundant links and backup links as well as optimize paths. spanning-tree global Description The sp anning-tree global command is used to configure STP globally .
151 hold-count —— TxHold Count, which is the maximum number of BP DU packet s transmitted per Hello T ime interv al. TxHold Count ranges from 1 to 2 0 in pps. By default, it is 5. max-hops —— Max Hop s, which is the maximum number of hops that occur in a specific region before t he BPDU is discarded.
152 port. The lower value has the higher priority . expath-consum —— ExtPath Cost, which is us ed to choose the p ath and calculate the path cost s of ports in different MST regions. It is an important criterion on determining the root port. The lower value has the higher priority .
153 name —— The region name, used to identify MST region. It ranges from 1 to 32 characters. revision —— The revision for MST region identification, ranging from 0 to 65535.
154 Enable Instance 1, add VLAN 2, 3, 4, 5, 8 for it, and configure MSTI Priority as 4096: TP-LINK(config)# spanning-tree msti 1 st atus enable pri 4096 mapped 2-5,8 spanning-tree msti Description The sp anning-tree msti command is used to configure MSTP Instance Port.
155 S panning T ree globally . T o return to t he default configurat ion, please use no sp anning-tree tc-defen d command. A switch removes MAC address entries upon receiving TC-BPDUs.
156 is to prevent wrong network topology change caused by the role change of the current legal root bridge. TC —— Enable/ Disable TC Protect. By default, it is disabled. defend —— Enable/ Disable BPDU Protect. By default, it is disabled. BPDU Protect is to prevent the edge port fr om being attacked by maliciously created BPDUs.
157 Synt ax show spanning-tree global-info Command Mode Any Configuration Mode Example Display the current st atus of S panning T ree: TP-LINK# show spanning-tree global-info show spanning-tree global-config Description The show spanning-tree global-config command is used to display the global configuration of S panning T ree.
158 Display the configuration of port 5: TP-LINK(config)# show spanning-tree port-config 5 show spanning-tree region Description The show spanning-tree region command is used to display the Region configuration of MSTP .
159 The show spanning-tree msti port command is used to display the Instance Port configuration of S pan ning T ree. Synt ax show spanning-tree msti port { id } [ port ] Parameter id —— Instance ID, ranging from 1 to 8. port —— The port selected to display t he configuration.
160 port —— The port selected to display the configuration. By default, the Port Protect configuration of all ports is displayed. Command Mode Any Configuration Mode Example Display the Port Prote.
161 Chapter 27 IGMP Commands IGMP Snooping (Internet Group Management Prot ocol Snooping) is a multicast control mechanism running on Layer 2 switch. It can effectively prevent multicast groups being broadcasted in the network. igmp-snooping global Description The igmp-snooping global command is used to configure IGMP globally .
162 Synt ax igmp-snooping config st atus {disable | enable} fast-leave {di sable | enable} no igmp-snooping config Parameter status —— Enable/ Disable IGMP Snooping for the desired port. fast-leave —— Enable/ Disable Fast Leave feat u re for the desired port.
163 member-time —— Member Port T ime. Within this time, if the switch does not receive IGMP report message from the member port, it will consider this port is not a member port any more. Member Port Time ranges from 60 to 600 in seconds. By default, it is 260.
164 receive IGMP report message from the member port, it will consider this port is not a member port any more. Member Port Time ranges from 60 to 600 in seconds.
165 seconds. By default, it is 260. leave-time —— Leave Time, which is the interval between the switch reveiving a leave message from a host and the switch removing the host from the multicast groups. Leave T ime ranges from 1 to 30 in seconds. By default, it is 1.
166 configure the forward port as port 1: TP-LINK(config)# igmp-snooping st atic-entry-add 225.0.0.1 2 1 igmp-snooping filter-add Description The igmp-snooping filter-add command is used to c onfigure the multicast IP-range desired to filter . T o delete th e corresponding IP-range, please use no igmp-snooping filter-add command.
167 id —— IP-range ID, ranging from 1 to 30. start-ip —— The start multicast IP of the IP-range. end-ip —— The end multicast IP of the IP-range. Command Mode Global Configuration Mode Example Modify the multicast IP-range whose ID is 20 as 225.
168 Interface Configuration Mode ( interface ethernet / interface range ethernet ) Example Enable multicast filtering function for port 5, specif y Action Mode as accept, bound IP-range 2, 3, 4, a.
169 Example Display the IGMP configuration of port 2: TP-LINK> show igmp-snooping port-config 2 show igmp-snooping vlan-config Description The show igmp-snooping vlan-config command is used to display the VLAN configuration of IGMP .
170 Synt ax show igmp-snooping multi-ip-list Command Mode Any Configuration Mode Example Display the Multicast IP t able: TP-LINK> show igmp-snooping multi-ip-list show igmp-snooping filter-ip-addr Description The show igmp-snooping filter-ip-addr command is used to display the Multicast Filter IP-Range table.
171 TP-LINK> show igmp-snooping port-filter 5 show igmp-snooping packet-stat Description The show igmp-snooping packet-st at command is used to display the Packet S tatistics information of all ports.
172 Chapter 28 SNMP Commands SNMP (Simple Network Management Protocol) func tions are used to manage the network devices for a smooth communication, whic h can facilitate the network administrators to monitor the network nodes and implement the proper operation.
173 snmp view-add Description The snmp view-add command is used to add View . T o delete the corresponding View , please use no snmp view -add command. The OID (Object Identifier) of the SNMP p ackets is used to describe the managed objects of the switch, and the MIB (Management In formation Base) is the set of the OIDs.
174 privacy mode guarantee the high securi ty for the communication between the management station and the managed device. Synt ax snmp group-add { name } [ smode { v1 | v2c | v3 }] [ slev { noAuthNoP.
175 snmp user-add Description The snmp user-add command is used to add User . T o delete the corresponding User , plea se use no snmp user-add command. The User in a SNMP Group can manage the switch via the management station sof tware. The User and its Group have the same security level and access right.
176 encryption method is used. By def ault, the Privacy Mode is none. encrypt-pwd —— Privacy Password, rangin g from 1 to 16 characters. Command Mode Global Configuration Mode Example Add User adm.
177 snmp notify-add Description The snmp notify -add command is used to add Notification. T o delete the corresponding Notification, please use no snmp notify-add command.
178 Command Mode Global Configuration Mode Example Add a Notification entry , and configure t he IP Address o f the management Host as 192.168.0.1, the UDP port as 162, the User name of the management.
179 TP-LINK(config)# snmp-rmon history sample-cfg 1-3 1 100 snmp-rmon history owner Description The snmp-rmon history o wner command is used to conf igure the owner of the history sample entry . T o return to the default configur ation, please use no snmp-rmon history owner command.
180 Global Configuration Mode Example Enable the history sample entries 1,2,3,4 and 8: TP-LINK(config)# snmp-rmon history enable 1-4,8 snmp-rmon event user Description The snmp-rmon event user command is used to conf igure the user name of SNMP-RMON Event.
181 no snmp-rmon event description { index } Parameter index —— The index number of the event e n try , ranging from 1 to 12. Y ou can only select one entry for each command. description —— The description of the eve nt, ranging from 1 to 16 characters.
182 snmp-rmon event owner Description The snmp-rmon event owner command is used to configure the owner of SNMP-RMON Event. T o return to t he default configurat ion, please use no snmp-rmon event owner command.
183 Enable the SNMP-RMON Event entries 1,2,3,4 and 8: TP-LINK(config)# snmp-rmon event enable 1-4,8 snmp-rmon alarm config Description The snmp-rmon alarm config command is used to configure SNMP-RMON Alarm Management. T o return to the default configuration, please use no snmp-rmon alarm config command.
184 f-hold —— The falling counter value that tr iggers the Falling Threshold alarm, ranging from 1 to 65535. By default, it is 100. f-event —— Fall Event, which is the index of the corresponding event which will be triggered if the sampled value is lower than the Falling Threshold.
185 Configure the owner of entry 1 as owner1: TP-LINK(config)# snmp-rmon alarm owner 1 owner1 snmp-rmon alarm enable Description The snmp-rmon alarm enable command is used to enable SNMP-RMON Alarm Management entry . T o disable the corresponding ent ry , please use no snmp-rmon alarm enable command.
186 show snmp view Description The show snmp view command is used to display the View ta ble. Synt ax show snmp view Command Mode Any Configuration Mode Example Display the View table: TP-LINK> show snmp view show snmp group Description The show snmp group command is used to display the Group table.
187 TP-LINK> show snmp user show snmp community Description The sho w snmp community command is used to displa y the Community table. Synt ax show snmp community Command Mode Any Configuration Mode.
188 index —— The index nu mber of the entry sele cted to display the configuration, ranging from 1 to 12. Y ou can only select one entry for each command.
189 ranging from 1 to 12. Y ou can only select one entry for each command. By default, the configuration of all entries is displayed. Command Mode Any Configuration Mode Example Display the configurat.
190 Chapter 29 LLDP Commands LLDP function enables network devic es to advertise their own device information periodically to neighbors on the same LAN.
191 Command Mode Global Configuration Mode Example S pecify Hold Multiplier as 5: TP-LINK(config)# lld p hold-multiplier 5 lldp timer Description The lldp timer command is used to confi gure the parameters about transmission. T o return to the default configurat ion, please use no lldp timer command.
192 Rx_Only) to Tx&Rx (or Tx_Only), the fa st start mechanism will be enabled, that is, the transmit interval will be short en to a second, and several LLDPDUs will be sent out (the number of LLDPDUs equal s this parameter). The default value is 3.
193 The lld p admin-st atus command is used to configur e the port’s LLDP operat ing mode. T o return to the defaul t configurati on, please use no lldp admin-status command. Synt ax lld p admin-st atus {disa ble | tx | rx | txrx } no lld p admin-st atus Parameter disable —— Neither transmit nor receive LLDP frames.
194 lldp tlv-select Description The lld p tlv-select command is used to configure TL Vs to be included in outgoing LLDPDU. T o ex clude TL Vs, please use no lld p tlv-select command.
195 Interface Configuration Mode ( interface ethernet / interface range ethernet ) Example Enable the LLDP-MED status for port 6: TP-LINK(config)# interface ethernet 6 TP-LINK(config-if)# lldp med-status enable lldp med-tlv-select Description The lldp med-tlv-select command is used to configure TL Vs to be included in outgoing LLDPDU.
196 Parameter emergency-number —— Emergency number is Emergency Call Service ELIN identifier, which is used during emergency call setup to a traditional CAMA or ISDN trunk-based PSAP.
197 Synt ax show lldp interface [ ethernet port ] Parameter port —— The port selected to displa y the c onfiguration of LLDP , ranging from 1 to 24.
198 port —— The port selected to display the neighbor information, ranging from 1 to 24. Command Mode Any Configuration Mode Example Display the neighbor information of port 8: TP-LINK> show ll.
199 TP-LINK> show lldp med fast-count show lldp med interface Description The show lldp med interface command is used to display LLDP-MED configuration of the certain port. Synt ax show lldp med interface [ ethernet port ] Parameter port —— The port selected to displa y the c onfiguration of LLDP , ranging from 1 to 24.
200 show lldp med neighbor-information Description The show lld p med neighbor-information command is used to display the neighbor ’s LLDP-MED information of the certain port. Synt ax show lldp med neighbor-information [ port ] Parameter port —— The port selected to display the neighbor information, ranging from 1 to 24.
201 Chapter 30 Cluster Commands Cluster Management function enables a network administrator to manage the scattered devices in the network via a manag ement device. After a co mm ander switc h is configured, management and maintenance operations intended fo r the member devices in a cl uster is implemented by the commander device.
202 cluster ntdp Description The cluster ntd p command is used to configure NTDP globally . T o return to the default configuration, please use no cluster nt dp command. NTDP (Neighbor T opology Discovery Protocol) is used to collect the NDP information and neighboring connection information of each device in a specif ic network range.
203 TP-LINK(config)# cluster ntd p status enable interval 20 hop 5 hop-delay 300 port-delay 50 cluster explore Description The cluster explore command is used to enable the topology information collecting function manually .
204 cluster manage role-change Description The cluster manage role-change command is used to change the role of the current switch. According to their status and functions, switc hes in the cluster play different roles. Y ou c an specify the role the switch plays appropriate to your needs.
205 show cluster ndp port-status Description The show cluster nd p port-st atus command is used to display NDP configuration of the certain port. Synt ax show cluster ndp port-st atus [ port ] Parameter port —— The port selected to display the c onfiguration of NDP .
206 show cluster nt dp global Command Mode Any Configuration Mode Example Display the global configuration of NTDP: TP-LINK> show cluster nt dp global show cluster ntdp port-status Description The show cluster nt dp port-st atus command is used to display NTDP configuration of the certain port.
207 TP-LINK> show cluster nt dp device show cluster manage role Description The show cluster manage role command is used to display the role of the current switch.
デバイスTP-Link TL-SG3424Pの購入後に(又は購入する前であっても)重要なポイントは、説明書をよく読むことです。その単純な理由はいくつかあります:
TP-Link TL-SG3424Pをまだ購入していないなら、この製品の基本情報を理解する良い機会です。まずは上にある説明書の最初のページをご覧ください。そこにはTP-Link TL-SG3424Pの技術情報の概要が記載されているはずです。デバイスがあなたのニーズを満たすかどうかは、ここで確認しましょう。TP-Link TL-SG3424Pの取扱説明書の次のページをよく読むことにより、製品の全機能やその取り扱いに関する情報を知ることができます。TP-Link TL-SG3424Pで得られた情報は、きっとあなたの購入の決断を手助けしてくれることでしょう。
TP-Link TL-SG3424Pを既にお持ちだが、まだ読んでいない場合は、上記の理由によりそれを行うべきです。そうすることにより機能を適切に使用しているか、又はTP-Link TL-SG3424Pの不適切な取り扱いによりその寿命を短くする危険を犯していないかどうかを知ることができます。
ですが、ユーザガイドが果たす重要な役割の一つは、TP-Link TL-SG3424Pに関する問題の解決を支援することです。そこにはほとんどの場合、トラブルシューティング、すなわちTP-Link TL-SG3424Pデバイスで最もよく起こりうる故障・不良とそれらの対処法についてのアドバイスを見つけることができるはずです。たとえ問題を解決できなかった場合でも、説明書にはカスタマー・サービスセンター又は最寄りのサービスセンターへの問い合わせ先等、次の対処法についての指示があるはずです。