T1500-28PCT Smart PoE Switch REV1.0.0 1910011255
IX ip igmp snooping filter(global) ... 154 ip igmp snooping f
89 Parameter ingress-rate —— Specify the bandwidth for receiving packets. Range: 1-1024000 for the gigaport. egress-rate —— Specify the bandwidth
90 Parameter port —— The Ethernet port number. Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the connective-statu
91 Parameter port —— The Ethernet port number. Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the description of a
92 Parameter port —— The Ethernet port number. Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the configurations o
93 Syntax show bandwidth [interface { fastEthernet port | gigabitEthernet port | range fastEthernet port-list | range gigabitEthernet port-list }] Pa
94 Chapter 13 QoS Commands QoS (Quality of Service) function is used to optimize the network performance. It provides you with network service exper
95 Syntax qos cos no qos cos Command Mode Global Configuration Mode User Guidelines IEEE 802.1P gives the Pri field in IEEE 802.1Q tag a recommended
96 qos queue cos-map Description The qos queue cos-map command is used to configure the mapping relation between IEEE 802.1P priority tag/IEEE 802.1
97 datagram are mapped to different priority levels based on DSCP priority mode; non-IP datagram with IEEE 802.1Q tag are mapped to different priorit
98 Parameter sp —— Strict-Priority Mode. In this mode, the queue with higher priority will occupy the whole bandwidth. Packets in the queue with lo
X lldp ... 180 lldp h
99 Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the configuration of QoS for port 5: T1500-28PCT# show qos interface
100 show qos queue mode Description The show qos queue mode command is used to display the schedule rule of the egress queues. Syntax show qos queue
101 Chapter 14 Port Mirror Commands Port Mirror refers to the process of forwarding copies of packets from one port to a monitoring port. Usually, t
102 monitor session source interface Description The monitor se ssion source inte rface command is used to configure the monitored port. To delete
103 T1500-28PCT(config)# monitor se ssion 1 source interface fastEthernet 1/0/4-5,1/0/7 rx Delete port 4 in monitor session 1 and its configurati
104 Chapter 15 Port Isolation Commands Port Isolation provides a method of restricting traffic flow to improve the network security by forbidding th
105 Syntax show port isolation interface [ fastEthernet port | gigabitEthernet port ] Parameter port —— The number of Ethernet port you want to sho
106 Chapter 16 Loopback Detection Commands With loopback detection feature enabled, the switch can detect loops using loopback detection packets. Wh
107 Example Specify the interval-time as 50 seconds: T1500-28PCT(config)# loopback-detection interval 50 loopback-detection recovery-time Description
108 Example Enable the loopback detection function of ports 1-3: T1500-28PCT(config)# interface range fastEthernet 1/0/1-3 T1500-28PCT(Config-if-rang
1 Preface This Guide is intended for network administrator to provide referenced information about CLI (Command Line Interface). The device mentioned
109 loopback-detection recover Description The loopback-detection recover command is used to remove the block status of selected ports, recovering th
110 show loopback-detection interface Description The show loopback-detection interface command is used to display the configuration of loopback de
111 Chapter 17 ACL Commands access-list create Description The access-list cre ate command is used to create standard-IP ACL, extend-IP ACL and Com
112 Example Create a MAC ACL whose ID is 23: T1500-28PCT(config)# mac access-list 23 access-list standard Description The access-list standard comman
113 T1500-28PCT(config)# access-list standar d 120 rule 10 permit sip 192.168.0.100 smask 255.255.255.0 access-list extended Description The acce
114 T1500-28PCT(config)# access-list extended 220 rule 11 permit sip 192.168.0.100 smask 255.255.255.0 access-list combined Description The acce
115 Command Mode Global Configuration Mode Example Create a Combined ACL whose ID is 320, and add Rule 12 for it. In the rule, the source mac address
116 Example Create a MAC ACL whose ID is 20, and add Rule 10 for it. In the rule, the source MAC address is 00:01:3F:48:16:23, the source MAC address
117 Mode. To delete the corresponding actions, please use no acce ss-list policy action command. Syntax access-list policy action policy-name acl-id
118 access-list bind(vlan) Description The acce ss-list bind command is used to bind a policy to a VLAN. To cancel the bind relation, please use no a
2 Chapter 12: Ethe rnet Configuration Commands Provide information about the commands used for configuring the Bandwidth Control, Negotiation Mode, a
119 show access-list policy Description The show access-list policy command is used to display the information of a specified policy. Syntax show acc
120 Chapter 18 DHCP Filtering Commands DHCP Filtering functions to monitor the process of hosts obtaining IP addresses from DHCP Servers by configu
121 Example Configure port 1 to be a trusted port: T1500-28PCT(config)#interface fastEthernet 1/0/1 T1500-28PCT(config-if)#ip dhcp filtering t
122 Chapter 19 PoE Commands PoE (Power over Ethernet) technology describes a system to transmit electrical power along with data to remote devices o
123 Parameter name —— The PoE profile name, ranging from 1 to 16 characters. If the name being assigned contains spaces then put it inside double quo
124 Syntax power time-range name no power time-range name Parameter name —— The PoE time-range name, ranging from 1 to 16 characters. Command Mode G
125 absolute Description The absolute command is used to create an absolute mode time-range for the PoE time-range of the switch. The switch will sup
126 Parameter week-day —— Periodic Mode, with “1-7”, “daily”, “off-day” and “working-day” options. “1-7” should be entered in the format of 1-3, 7
127 T1500-28PCT(config-pwr-time -range)# holiday exclude power inline consumption (interface) Description The power inline consumption command is u
128 system power limit, the PD linked to the port with lower priority will be disconnected. By default, the priority level is “low”. Command Mode Int
3 Chapter 1 Using the CLI 1.1 Accessing the CLI You can log on to the switch and access the CLI by logging on to the switch remotely by a Telnet
129 Syntax power inline profile name no power inline profile Parameter name —— The name of the PoE profile to be bound to the port. If the name bei
130 show power inline Description The show power inline command is used to display the global PoE information of the system. Syntax show power inline
131 Parameter port —— The Ethernet port number. Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the PoE information of
132 show power time-range Description The show po we r t i me -range command is used to display the configuration of PoE time-range. Syntax show powe
133 Chapter 20 MSTP Commands MSTP (Multiple Spanning Tree Protocol), compatible with both STP and RSTP and subject to IEEE 802.1s, can disbranch a r
134 Example Enable the STP function for port 2: T1500-28PCT(config)# interface fastEthernet 1/0/2 T1500-28PCT(config-if)# spanning-tree spanning-tree
135 point-to-point —— The P2P link status, with auto, open and close options. By default, the option is auto. If the two ports in the P2P link are ro
136 spanning-tree mst configuration Description The spanning-tree mst configuration command is used to access MST Configuration Mode from Global C
137 T1500-28PCT(config)# spanning-tree mst configuration T1500-28PCT(config-mst)# instance 1 vlan 1-100 Disable Instance 1, namely remove all the map
138 Parameters revision —— The revision level for MST region identification, ranging from 0 to 65535. Command Mode MST Configuration Mode Example Con
4 3. Type in the User name and Password (the factory default value for both of them are admin) and press the Enter button to enter User EXEC Mode ,
139 use no spanning-tree mst command. A port can play different roles in different spanning tree instance. You can use this command to configure the
140 Command Mode Global Configuration Mode Example Configure the bridge priority as 4096: T1500-28PCT(config)# spanning-tree priority 4096 spanning-t
141 Syntax spanning-tree timer {[ forward-t i me forward-time ] [ he llo-time hello-time ] [ max-age max-age ]} no spanning-tree time r Parame
142 Command Mode Global Configuration Mode Example Configure the hold-count of STP as 8pps: T1500-28PCT(config)# spanning-tree hold-count 8 spanning-
143 Command Mode Interface Configuration Mode (interface fastEthernet / interface range fastEthernet / interface gigabitEthernet / interface range gi
144 Syntax spanning-tree guard loop no spanning-tree guard loop Command Mode Interface Configuration Mode (interface fastEthernet / interface range f
145 function, please use no spanning-tree guard tc command. A switch removes MAC address entries upon receiving TC-BPDUs. If a malicious user contin
146 show spanning-tree active Description The show spanning-tree active command is used to display the active information of spanning-tree. Syntax
147 Syntax show spanning-tree interface [ fastEthernet port | gigabitEthernet port ] [ edge | ext-cost | int-cost | mode | p2p | priority
148 Display the protect information of port 1: T1500-28PCT(config)#show spanning-tree interface-secur ity fastEthernet 1/0/1 Display the interface
5 Figure 1-5 Enable SSH function Password Authentication Mode 1. Open the software to log on to the interface of PuTTY. Enter the IP address of
149 Chapter 21 IGMP Commands IGMP Snooping (Internet Group Management Protocol Snooping) is a multicast control mechanism running on Layer 2 switch.
150 Example Enable IGMP Snooping function of port 3: T1500-28PCT(config)# interface fastEthernet 1/0/3 T1500-28PCT(config-if)# ip igmp snooping ip i
151 Example Specify the operation to process unknown multicast as discard: T1500-28PCT(config)# ip igmp snooping drop-unknown ip igmp snooping vlan-c
152 port-list —— The list of Ethernet ports. Command Mode Global Configuration Mode Example Enable the IGMP Snooping function and modify Router Port
153 not a member port any more. Member Port Time ranges from 60 to 600 in seconds. By default, it is 260. leave-time —— Leave Time, which is the inte
154 Command Mode Interface Configuration Mode (interface fastEthernet / interface range fastEthernet / interface gigabitEthernet / interface range gi
155 the forward port list of the multicast group. Otherwise, the switch will drop the IGMP report message. In that way, you can control the multicast
156 ip igmp snooping filter mode Description The ip igmp snooping filter mode command is used to configure the Action mode for the desired port. Synt
157 show ip igmp snooping interface Description The show ip igmp snooping interface command is used to display the port configuration of IGMP snoopi
158 Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the IGMP snooping configuration information of VLAN 2: T1500-28PC
6 Figure 1-7 Log on the Switch Key Authentication M ode 1. Select the key type and key length, and generate SSH key. Figure 1-8 Generate SSH
159 static—— Display static multicast groups. static count—— The numbers of all static multicast groups. Command Mode Privileged EXEC Mode and Any C
160 Example Display all the multicast filter address information: T1500-28PCT(config)# show ip igmp snooping filter
161 Chapter 22 SNMP Commands SNMP (Simple Network Management Protocol) functions are used to manage the network devices for a smooth communication,
162 mib-oid —— MIB Object ID. It is the Object Identifier (OID) for the entry of View, ranging from 1 to 61 characters. include | exclude —— View T
163 By default, the Security Level is noAuthNoPriv. There is no need to configure this in SNMP v1 Mode and SNMP v2c Mode. read-view —— Select the
164 local | remote —— User Type, with local and remote options. Local indicates that the user is connected to a local SNMP engine, while remote mean
165 T1500-28PCT(config)# snmp-server user admin local group2 smode v3 slev authPriv cmode MD5 cpwd 11111 emode DES epwd 22222 snmp-server community D
166 Syntax snmp-server host ip udp-port user-name [ smode { v1 | v2c | v3 }] [ slev { noAuthNoPriv | authNoPriv | authPriv }] [ type { trap |
167 of the notifications as inform, the maximum time for the switch to wait as 1000 seconds, and the retries time as 100: T1500-28PCT(config)# snmp-s
168 snmp-server traps snmp Description The snmp-server traps snmp command is used to enable SNMP standard traps which include four types: linkup,
7 2. After the key is successfully generated, please save the public key and private key to a TFTP server. Figure 1-9 Save the Generated Key 3. Lo
169 Syntax snmp-server traps { bandwidth-control | cpu | flash | ipaddr-change | lldp | loopback-detection | storm-control | spanning-tree | memory }
170 Syntax snmp-server traps power [ over-max-pwr-budget | port-pwr-change | port-pwr-deny | port-pwr-over-30w | port-pwr-overload | port-sh
171 extended MAC address related traps, please use no snmp-server traps mac command. Syntax snmp-server traps mac [ new | full | learn-mode-change
172 delete —— Enable VLAN-deleted traps. It is sent when VLAN is deleted successfully. Command Mode Global Configuration Mode Example Enable all
173 Example Configure the sample port as Gi1/0/2 and the sample interval as 100 seconds for the entry 1-3: T1500-28PCT(config)# rmon history 1-3 inte
174 T1500-28PCT(config)# rmon event 1-4 user user1 description description1 type log owner owner1 rmon alarm Description The rmon alarm command i
175 f-hold —— The falling counter value that triggers the Falling Threshold alarm, ranging from 1 to 65535. By default, it is 100. f-event —— Fall Ev
176 show snmp-server view Description The show snmp-server view command is used to display the View table. Syntax show snmp-server view Command Mode
177 Example Display the User table: T1500-28PCT# show snmp-server user show snmp-server community Description The show snmp-server community comma
178 Syntax show snmp-server engineID Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the engineID: T1500-28PCT# show
8 Note: 1. The key type should accord with the type of the key file. 2. The SSH key downloading can not be interrupted. 4. After the public key i
179 Parameter index —— The index number of the entry selected to display the configuration, ranging from 1 to 12, in the format of 1-3, 5. You can se
180 Chapter 23 LLDP Commands LLDP function enables network devices to advertise their own device information periodically to neighbors on the same L
181 Parameter multiplier —— Configure the Hold Multiplier parameter. It ranges from 2 to 10. By default, it is 4. Command Mode Global Configuration M
182 be sent out (the number of LLDPDUs equals this parameter). The value ranges from 1 to 10 and the default value is 3. Command Mode Global Configur
183 Syntax lldp receive no lldp receive Command Mode Interface Configuration Mode (interface fastEthernet / interface range fastEthernet / interface
184 Syntax lldp snmp-trap no lldp snmp-trap Command Mode Interface Configuration Mode (interface fastEthernet / interface range fastEthernet / interf
185 lldp med-location Description The lldp med-location command is used to configure the Location Identification TLV's content in outgoing LLDPD
186 Status will be changed to Tx&Rx. To disable the LLDP-MED feature for the corresponding port, please use no lldp med-status command. Syntax ll
187 show lldp Description The show lldp command is used to display the global configuration of LLDP and LLDP-MED fast start repeat count number.
188 show lldp local-information interface Description The show lldp local-information interface command is used to display the LLDP and LLDP-MED lo
I COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Othe
9 5. Click Au t h under the SSH menu in the left Category list, and click Browse to download the private key file to SSH client software and click
189 Example Display the LLDP and LLDP-MED neighbor information of port 1/0/1: T1500-28PCT# show lldp neighbor-information interface fastEthernet 1/0
10 gigabitEthernet, Interface link-aggregation and some other modes, which is shown as the following diagram. The following table gives detailed inf
11 Mode Accessing Path Prompt Logout or Access the next mode Interface Configuration Mode Use the interface fastEthernet/gigabitEthernet port or
12 Vlan Configuration Mode: In this mode, users can create a VLAN and add a specified port to the VLAN. 3. Some commands are global, that mean
13 1.4.2 Special Characters You should pay attentions to the description below if the variable is a character string: These six characters ” <
14 Chapter 2 User Interface enable Description The enable command is used to access Privileged EXEC Mode from User EXEC Mode. Syntax enable Com
15 enable password Description The enable password command is used to set or change the password for users to access Privileged EXEC Mode from User
16 enable secret Description The enable secret command is used to set a secret password, which is using an MD5 encryption algorithm, for users to acc
17 disable Description The disable command is used to return to User EXEC Mode from Privileged EXEC Mode. Syntax disable Command Mode Privileged
18 Command Mode Privileged EXEC Mode and Any Configuration Mode Example Return to Global Configuration Mode from Interface Configuration Mode,
II CONTENTS Preface ... 1
19 Example Show the commands you have entered in the current mode: T1500-28PCT (config)# history 1 history clear history Description The clear hist
20 Chapter 3 IEEE 802.1Q VLAN Commands VLAN (Virtual Local Area Network) technology is developed for the switch to divide the LAN into multiple log
21 Parameter vlan-id —— Specify IEEE 802.1Q VLAN ID, ranging from 1 to 4094. Command Mode Global Configuration Mode Example Create VLAN Interface
22 Parameter vlan-list —— Specify IEEE 802.1Q VLAN ID list, ranging from 2 to 4094, in the format of 2-3, 5. It is multi-optional. tagged | untagged
23 Syntax show vlan summary Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the summarized information of IEEE 802.1Q
24 Example Display the information of vlan 5: T1500-28PCT(config)# show vlan 5 show interface switchport Description The show interface switchpor t
25 Chapter 4 Voice VLAN Commands Voice VLANs are configured specially for voice data stream. By configuring Voice VLANs and adding the ports with vo
26 Parameter time —— Aging time (in minutes) to be set for the Voice VLAN. It ranges from 1 to 43200 and the default value is 1440. Command Mode Gl
27 voice vlan mac-address Description The voice vlan mac-addre ss command is used to create Voice VLA N O UI. To delete the specified Voice VLAN OUI
28 Parameter manual | auto —— Port mode. Command Mode Interface Configuration Mode (interface fastEthernet / interface range fastEthernet / interf
III voice vlan ... 25 voice v
29 Syntax show voice vlan Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the configuration information of Voice VLA
30 Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the configuration information of Fast Ethernet port 1 in the Voice V
31 Chapter 5 Etherchannel Commands Etherchannel Commands are used to configure LAG and LACP function. LAG (Link Aggregation Group) is to combine a
32 port-channel load-balance Description The port-channe l load-balance command is used to configure the Aggregate Arithmetic for LAG. To return to
33 Command Mode Global Configuration Mode Example Configure the LACP system priority as 1024 globally: T1500-28PCT(config)# lacp system-priority 1024
34 Syntax show etherchannel [ channel-group-num ] { detail | summary } Parameter channel-group-num —— The EtherChannel Group number, ranging from 1
35 Parameter channel-group-num —— The EtherChannel Group number, ranging from 1 to 6. By default, it is empty, and will display the information of al
36 Chapter 6 User Management Commands User Management Commands are used to configure the user name and password for users to log on to the Web manag
37 Command Mode Global Configuration Mode User Guidelines 1. If the password you configured here is unencrypted and the global encryption function i
38 letters (case sensitive), underlines and sixteen special characters ( !$%'()*,-./[]{|} ). The password will be saved to the configuration fil
IV show logging loghost ... 47 show logging bu
39 Command Mode Global Configuration Mode Example Enable the access-control of the user whose IP address is 192.168.0.148: T1500-28PCT(config)# user
40 Syntax user access-control port-based interface { fastEthernet port | gigabitEthernet port | range fastEthernet port-list | range gigabitEthernet
41 Example Configure the number of the users as Admin and Guest logging on as 5 and 3: T1500-28PCT(config)# user max-num 5 3 user idle-timeout Descri
42 Example Display the information of the current users: T1500-28PCT(config)# show user account-list show user configuration Description The show u
43 Chapter 7 System Log Commands The log information will record the settings and operation of the switch respectively for you to monitor operation
44 logging file flash Description The logging file flash command is used to store the log messages in a flie in the flash on the switch. To disable
45 Command Mode Global Configuration Mode Example Specify the log file synchronization frequency as 10 hours: T1500-28PCT (config)#logging file flash
46 remotely monitor the settings and operation status of other devices through the log host. Syntax logging host index idx host-ip level no logging h
47 Example Clear the information in the log file: T1500-28PCT(config)# clear logging buffer show logging local-config Description The show logging lo
48 show logging buffer Description The show logging buffer command is used to display the log information in the log buffer according to the severity
V contact-info ... 70 ip manage
49 Example Display the log information with the level marked 0~3 in the log file: T1500-28PCT(config)# show logging flash level 3
50 Chapter 8 SSH Commands SSH (Security Shell) can provide the unsecured remote management with security and powerful authentication to ensure the s
51 Example Enable SSH v2: T1500-28PCT(config)# ip ssh version v2 ip ssh timeout Description The ip ssh timeout command is used to specify the idle-ti
52 Command Mode Global Configuration Mode Example Specify the maximum number of the connections to the SSH server as 3: T1500-28PCT(config)# ip ssh
53 Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the global configuration of SSH: T1500-28PCT(config)# show ip ssh
54 Chapter 9 SSL Commands SSL (Secure Sockets Layer), a security protocol, is to provide a secure connection for the application layer protocol(e.
55 Parameter ssl-cert —— The name of the SSL certificate which is selected to download to the switch. The length of the name ranges from 1 to 25 cha
56 show ip http secure-server Description The show ip http secure-server command is used to display the global configuration of SSL. Syntax show
57 Chapter 10 MAC Address Commands MAC address configuration can improve the network security by configuring the Port Security and maintaining the
58 mac address-table aging-time Description The mac address-table aging-t i me command is used to configure aging time for the dynamic address. To r
VI show interface counters ... 90 show interface d
59 Command Mode Global Configuration Mode Example Add a filtering address entry of which VLAN ID is 1 and MAC address is 00:1e:4b:04:01:5d: T1500-28P
60 Command Mode Interface Configuration Mode (interface fastEthernet / interface range fastEthernet / interface gigabitEthernet / interface range gig
61 Example Display the Aging Time of the MAC address: T1500-28PCT(config)# show mac address-table aging-time show mac address-table max-mac-count int
62 Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the address configuration of port 1: T1500-28PCT(config)# show mac
63 show mac address-table vlan Description The show mac address-table v lan command is used to display the MAC address configuration of the specif
64 Chapter 11 System Commands System Commands can be used to configure the System information and System IP, reboot and reset the switch, upgrade th
65 UTC-09:00 —— TimeZone for Alaska. UTC-08:00 —— TimeZone for Pacific Time(US Canada). UTC-07:00 —— TimeZone for Mountain Time(US Canada). UTC-06:00
66 Example Configure the system time mode as NTP, the time zone is UTC-12:00, the primary NTP server is 133.100.9.2 and the secondary NTP server is 1
67 system-time dst date Description The system-time dst date command is used to configure the one-off daylight saving time. The start date is in the
68 system-time dst recurring Description The system-time dst re curring command is used to configure the recurring daylight saving time. It can be
VII access-list create ... 111 mac access
69 T1500-28PCT(config)# system-time dst recurring first Sun May 02:00 last Sun Oct 02:00 45 hostname Description The hostname command is used to co
70 Example Configure the system location as SHENZHEN: T1500-28PCT(config)# location SHENSHEN contact-info Description The contact-info command is use
71 Example Set the VLAN 6 as IP management VLAN: T1500-28PCT(config)# ip management-vlan 6 ip address Description The ip addre ss command is used to
72 Syntax ip address-alloc dhcp Command Mode Interface Configuration Mode (interface vlan) Example Enable the DHCP Client function when the managemen
73 Command Mode Privileged EXEC Mode Example Reset the software of the switch: T1500-28PCT# reset reboot Description The reboot command is used to
74 copy startup-config tftp Description The copy startup-config tftp command is used to backup the configuration file to TFTP server. Syntax copy sta
75 T1500-28PCT# copy tftp startup-config ip-address 192.168.0.148 filename config firmware upgrade Description The firmware upgrade command is
76 count (-i) —— The interval to send ICMP request packets. It ranges from 100 to 1000 milliseconds. By default, this value is 1000. Command Mode U
77 loopback interface Description The loopback interface command is used to test whether the port is available or not. Syntax loopback interface {
78 show running-config Description The show running-config command is used to display the current operating configuration of the system or a specifi
VIII show power time-range ... 132 Chapter 20 MSTP
79 Command Mode Privileged EXEC Mode and Any Configuration Mode Example Display the DST time information of the switch T1500-28PCT# show system-ti
80 Example Show the cable-diagnostics of port 3: T1500-28PCT# show cable-diagnostics interface fastEthernet 1/0/3
81 Chapter 12 Ethernet Configuration Commands Ethernet Configuration Commands can be used to configure the Bandwidth Control, Negotiation Mode and S
82 User Guidelines Command in the Interface Range fastEthernet Mode is executed independently on all ports in the range. It does not effect the e
83 Parameter port-list —— The list of Gigabit Ethernet ports. Command Mode Global Configuration Mode User Guidelines Command in the Interface
84 shutdown Description The shutdown command is used to disable an Ethernet port. To enable this port again, please use no shutdown command. Syntax s
85 media-type Description The me dia -type command is used to configure the media type of Combo port. For a Combo port, the media type should be conf
86 Example Configure the Duplex Mode as full-duplex for port 3: T1500-28PCT(config)# interface fastEthernet 1/0/3 T1500-28PCT(config-if)# duplex
87 no storm-control broadcast Parameter rate —— Specify the bandwidth for receiving broadcast packets on the port. The packet traffic exceeding the
88 T1500-28PCT(config-if)# storm-control multicast storm-control unicast Description The storm-control unicast command is used to enable the unicast
Kommentare zu diesen Handbüchern