User ManualTable of ContentsPreface13Chapter 1 Using the CLI161.1 Accessing the CLI161.1.1 Logon by a console port161.1.2 Logon by Telnet181.2 CLI Command Modes231.3 Security Levels241.4 Conventions251.4.1 Format Conventions251.4.2 Special Characters251.4.3 Parameter Format25Chapter 2 User Interface27enable27enable password27disable28configure28exit28end29Chapter 3 IEEE 802.1Q VLAN Commands30vlan30interface vlan30name31switchport mode31switchport access vlan32switchport trunk allowed vlan32switchport general allowed vlan33switchport pvid34show vlan summary34show vlan brief35show vlan35Chapter 4 MAC-based VLAN Commands36mac-vlan mac-address36show mac-vlan36Chapter 5 Protocol-based VLAN Commands38protocol-vlan template38protocol-vlan vlan39protocol-vlan group39show protocol-vlan template40show protocol-vlan vlan40Chapter 6 Voice VLAN Commands41voice vlan41voice vlan aging time41voice vlan priority42voice vlan mac-address42switchport voice vlan mode43switchport voice vlan security44show voice vlan44show voice vlan oui45show voice vlan switchport45Chapter 7 GVRP Commands46gvrp(global)46gvrp(interface)46gvrp registration47gvrp timer47show gvrp global48show gvrp interface49Chapter 8 Etherchannel Commands50channel-group50port-channel load-balance51lacp system-priority51lacp port-priority52show etherchannel52show etherchannel load-balance53show lacp53show lacp sys-id54Chapter 9 User Manage Commands55user55user access-control ip-based56user access-control mac-based56user access-control port-based57user max-number58user idle-timeout58line59password60login60login local61show user account-list61show user configuration62Chapter 10 Binding Table Commands63ip source binding63ip dhcp snooping64ip dhcp snooping global65ip dhcp snooping information option66ip dhcp snooping information strategy66ip dhcp snooping information remote-id67ip dhcp snooping information circuit-id67ip dhcp snooping trust68ip dhcp snooping mac-verify69ip dhcp snooping limit rate69ip dhcp snooping decline70show ip source binding70show ip dhcp snooping71show ip dhcp snooping information71show ip dhcp snooping interface gigabitEthernet72Chapter 11 ARP Inspection Commands73ip arp inspection(global)73ip arp inspection trust73ip arp inspection(interface)74ip arp inspection limit-rate75ip arp inspection recover75show ip arp inspection76show ip arp inspection interface76show ip arp inspection statistics77clear ip arp inspection statistics77Chapter 12 DoS Defend Command78ip dos-prevent78ip dos-prevent type78show ip dos-prevent79Chapter 13 IEEE 802.1X Commands80dot1x system-auth-control80dot1x auth-method80dot1x guest-vlan(global)81dot1x quiet-period82dot1x timeout82dot1x max-reauth-req83dot1x83dot1x guest-vlan(interface)84dot1x port-control84dot1x port-method85radius86radius server-account87show dot1x global87show dot1x interface88show radius accounting88show radius authentication89Chapter 14 System Log Commands90logging buffer90logging file flash91clear logging91logging host index92show logging local-config93show logging loghost93show logging buffer93show logging flash94Chapter 15 SSH Commands95ip ssh server95ip ssh version95ip ssh timeout96ip ssh max-client96ip ssh download97show ip ssh97Chapter 16 SSL Commands99ip http secure-server99ip http secure-server download certificate99ip http secure-server download key100show ip http secure-server101Chapter 17 MAC Address Commands102mac address-table static102mac address-table aging-time103mac address-table filtering103mac address-table max-mac-count104show mac address-table address105show mac address-table aging-time105show mac address-table max-mac-count interface gigabitEthernet106show mac address-table interface gigabitEthernet106show mac address-table mac-num107show mac address-table mac107show mac address-table vlan108Chapter 18 System Configuration Commands109system-time manual109system-time ntp109system-time dst predefined111system-time dst date111system-time dst recurring112hostname113location114contact-info114reset115reboot115copy running-config start-up config115copy startup-config tftp116copy tftp startup-config116firmware upgrade117ping117tracert118loopback interface119show system-time119show system-time dst120show system-time ntp120show system-info121show cable-diagnostics interface121Chapter 19 Ethernet Configuration Commands122interface gigabitEthernet122interface range gigabitEthernet122description123shutdown123flow-control124duplex124speed125storm-control broadcast126storm-control multicast126storm-control unicast127bandwidth128clear counters128show interface status129show interface counters129show interface description130show interface flowcontrol130show interface configuration131show storm-control131show bandwidth132Chapter 20 QoS Commands133qos133qos dscp133qos queue cos-map134qos queue dscp-map135qos queue mode136show qos interface137show qos cos-map137show qos dscp-map138show qos queue mode138show qos status139Chapter 21 Port Mirror Commands140monitor session destination interface140monitor session source interface141show monitor session142Chapter 22 Port isolation Commands143port isolation143show port isolation interface143Chapter 23 Loopback Detection Commands145loopback-detection(global)145loopback-detection interval145loopback-detection recovery-time146loopback-detection(interface)146loopback-detection config147loopback-detection recover147show loopback-detection global148show loopback-detection interface148Chapter 24 ACL Commands150time-range150absolute150periodic151holiday152holiday(global)152access-list create153mac access-list153access-list standard154access-list extended155rule156access-list policy name157access-list policy action158redirect interface158redirect vlan159s-condition159s-mirror160qos-remark160access-list bind(interface)161access-list bind(vlan)162show time-range162show holiday162show access-list163show access-list policy163show access-list bind164Chapter 25 MSTP Commands165spanning-tree(global)165spanning-tree(interface)165spanning-tree common-config166spanning-tree mode167spanning-tree mst configuration167instantce168name169revision169spanning-tree mst instance170spanning-tree mst170spanning-tree priority171spanning-tree tc-defend172spanning-tree timer172spanning-tree hold-count173spanning-tree max-hops174spanning-tree bpdufilter174spanning-tree bpduguard175spanning-tree guard loop175spanning-tree guard root176spanning-tree guard tc176spanning-tree mcheck177show spanning-tree active177show spanning-tree bridge178show spanning-tree interface178show spanning-tree interface-security179show spanning-tree mst180Chapter 26 IGMP Commands181ip igmp snooping(global)181ip igmp snooping(interface)181ip igmp snooping immediate-leave182ip igmp snooping drop-unknown182ip igmp snooping vlan-config183ip igmp snooping multi-vlan-config184ip igmp snooping filter add-id185ip igmp snooping filter(global)186ip igmp snooping filter(interface)186ip igmp snooping filter maxgroup187ip igmp snooping filter mode187show ip igmp snooping188show ip igmp snooping interface188show ip igmp snooping vlan189show ip igmp snooping multi-vlan190show ip igmp snooping groups190show ip igmp snooping filter191Chapter 27 SNMP Commands192snmp-server192snmp-server view192snmp-server group193snmp-server user194snmp-server community196snmp-server host196snmp-server engineID198rmon history198rmon event199rmon alarm200show snmp-server202show snmp-server view202show snmp-server group202show snmp-server user203show snmp-server community203show snmp-server host204show snmp-server engineID204show rmon history204show rmon event205show rmon alarm205Chapter 28 Cluster Commands207cluster ndp207cluster ntdp208cluster explore209cluster209cluster candidate210cluster individual210show cluster ndp211show cluster ntdp211show cluster neighbour212show cluster manage role212Size: 1.41 MBPages: 212Language: EnglishOpen manual
User ManualTable of ContentsPackage Contents10Chapter 1 About this Guide111.1 Intended Readers111.2 Conventions111.3 Overview of This Guide11Chapter 2 Introduction152.1 Overview of the Switch152.2 Main Features152.3 Appearance Description162.3.1 Front Panel162.3.2 Rear Panel17Chapter 3 Login to the Switch183.1 Login183.2 Configuration18Chapter 4 System204.1 System Info204.1.1 System Summary204.1.2 Device Description224.1.3 System Time224.1.4 Daylight Saving Time244.1.5 System IP254.2 User Manage264.2.1 User Table264.2.2 User Config264.3 System Tools284.3.1 Config Restore284.3.2 Config Backup284.3.3 Firmware Upgrade294.3.4 System Reboot304.3.5 System Reset304.4 Access Security304.4.1 Access Control304.4.2 SSL Config324.4.3 SSH Config33Chapter 5 Switching395.1 Port395.1.1 Port Config395.1.2 Port Mirror405.1.3 Port Security435.1.4 Port Isolation455.1.5 Loopback Detection465.2 LAG475.2.1 LAG Table485.2.2 Static LAG495.2.3 LACP Config505.3 Traffic Monitor525.3.1 Traffic Summary525.3.2 Traffic Statistics535.4 MAC Address555.4.1 Address Table555.4.2 Static Address575.4.3 Dynamic Address585.4.4 Filtering Address60Chapter 6 VLAN636.1 802.1Q VLAN646.1.1 VLAN Config666.1.2 Port Config686.2 MAC VLAN706.3 Protocol VLAN716.3.1 Protocol Group Table746.3.2 Protocol Group746.3.3 Protocol Template756.4 Application Example for 802.1Q VLAN766.5 Application Example for MAC VLAN786.6 Application Example for Protocol VLAN796.7 GVRP81Chapter 7 Spanning Tree857.1 STP Config907.1.1 STP Config907.1.2 STP Summary927.2 Port Config927.3 MSTP Instance947.3.1 Region Config947.3.2 Instance Config957.3.3 Instance Port Config967.4 STP Security987.4.1 Port Protect987.4.2 TC Protect1017.5 Application Example for STP Function101Chapter 8 Multicast1058.1 IGMP Snooping1078.1.1 Snooping Config1088.1.2 Port Config1098.1.3 VLAN Config1108.1.4 Multicast VLAN1128.2 Multicast IP1158.2.1 Multicast IP Table1158.2.2 Static Multicast IP1168.3 Multicast Filter1178.3.1 IP-Range1178.3.2 Port Filter1188.4 Packet Statistics120Chapter 9 QoS1229.1 DiffServ1259.1.1 Port Priority1259.1.2 DSCP Priority1269.1.3 802.1P/CoS mapping1279.1.4 Schedule Mode1289.2 Bandwidth Control1299.2.1 Rate Limit1299.2.2 Storm Control1309.3 Voice VLAN1329.3.1 Global Config1349.3.2 Port Config1349.3.3 OUI Config136Chapter 10 ACL13810.1 Time-Range13810.1.1 Time-Range Summary13810.1.2 Time-Range Create13910.1.3 Holiday Config14010.2 ACL Config14010.2.1 ACL Summary14110.2.2 ACL Create14110.2.3 MAC ACL14210.2.4 Standard-IP ACL14310.2.5 Extend-IP ACL14310.3 Policy Config14510.3.1 Policy Summary14510.3.2 Policy Create14510.3.3 Action Create14610.4 Policy Binding14710.4.1 Binding Table14710.4.2 Port Binding14810.4.3 VLAN Binding14810.5 Application Example for ACL149Chapter 11 Network Security15211.1 IP-MAC Binding15211.1.1 Binding Table15211.1.2 Manual Binding15311.1.3 ARP Scanning15511.1.4 DHCP Snooping15611.2 ARP Inspection16211.2.1 ARP Detect16611.2.2 ARP Defend16711.2.3 ARP Statistics16811.3 DoS Defend16911.4 802.1X17111.4.1 Global Config17511.4.2 Port Config17711.4.3 Radius Server178Chapter 12 SNMP18012.1 SNMP Config18212.1.1 Global Config18212.1.2 SNMP View18312.1.3 SNMP Group18412.1.4 SNMP User18512.1.5 SNMP Community18712.2 Notification18912.3 RMON19112.3.1 History Control19212.3.2 Event Config19212.3.3 Alarm Config193Chapter 13 Cluster19613.1 NDP19713.1.1 Neighbor Info19713.1.2 NDP Summary19813.1.3 NDP Config20013.2 NTDP20113.2.1 Device Table20113.2.2 NTDP Summary20213.2.3 NTDP Config20313.3 Cluster20513.3.1 Cluster Summary20513.3.2 Cluster Config20613.4 Application Example for Cluster Function208Chapter 14 Maintenance21114.1 System Monitor21114.1.1 CPU Monitor21114.1.2 Memory Monitor21214.2 Log21314.2.1 Log Table21414.2.2 Local Log21514.2.3 Remote Log21514.2.4 Backup Log21614.3 Device Diagnose21714.3.1 Cable Test21714.3.2 Loopback21814.4 Network Diagnose21814.4.1 Ping21814.4.2 Tracert219Appendix A: Specifications221Appendix B: Configuring the PCs222Appendix C: Load Software using FTP225Appendix D: 802.1X Client Software230Appendix E: Glossary238Size: 3.75 MBPages: 241Language: EnglishOpen manual