802.1X Client Software User Guide
Page 4
... common user terminal computer. The supplicant system is authenticated by the authenticator system. The 802.1X client software should be installed on the TP-Link switch prevents unauthorized clients from accessing the network. 802.1x operates in the typical client/server model. 802.1X Client Software The IEEE ...802.1x port-based authentication on the terminal computer in the Supplicant System. 2. When using the TP-Link switch as this user guide to acquire information about the installation and configuration of the 802.1X Client Software. 1 Installation 1.
... common user terminal computer. The supplicant system is authenticated by the authenticator system. The 802.1X client software should be installed on the TP-Link switch prevents unauthorized clients from accessing the network. 802.1x operates in the typical client/server model. 802.1X Client Software The IEEE ...802.1x port-based authentication on the terminal computer in the Supplicant System. 2. When using the TP-Link switch as this user guide to acquire information about the installation and configuration of the 802.1X Client Software. 1 Installation 1.
802.1X Client Software User Guide
Page 5
... EAP-MD5 or PAP authentication method specified in the following screen will appear. to accomplish the installation. 2 Configuration 1. This software is in the same directory with this interface, please ensure that both the TP-Link switch and the authentication server supports the authentication methods in the Authentication Server. Installation The 802.1X Client...
... EAP-MD5 or PAP authentication method specified in the following screen will appear. to accomplish the installation. 2 Configuration 1. This software is in the same directory with this interface, please ensure that both the TP-Link switch and the authentication server supports the authentication methods in the Authentication Server. Installation The 802.1X Client...
802.1X Client Software User Guide
Page 7
... Client will pop up after getting the new IP address. Handshake:When this option to allow the Client to load the following screen for configuring the connection properties. Obtain an IP address automatically: Select this option if the Client automatically obtains the IP address from the switch within a period. 4 Click...
... Client will pop up after getting the new IP address. Handshake:When this option to allow the Client to load the following screen for configuring the connection properties. Obtain an IP address automatically: Select this option if the Client automatically obtains the IP address from the switch within a period. 4 Click...
802.1X Client Software User Guide
Page 9
A2: No. Q3: Is it safe to download WinPcap 4.0.2 or the higher version for TP-Link switches. You are suggested to go to http://www.winpcap.org to set the password being automatically saved? A3: Yes. A1: It's because the ...supported DLL file is encrypted. 6 Q2: Is this error dialog box pop up when starting up the TP-Link 802.1X Client Software? The password saved in the configuration files is missing. This TP-Link 802.1X Client Software is customized for installation, and run the client software again. 3 FAQ Q1: Why does...
A2: No. Q3: Is it safe to download WinPcap 4.0.2 or the higher version for TP-Link switches. You are suggested to go to http://www.winpcap.org to set the password being automatically saved? A3: Yes. A1: It's because the ...supported DLL file is encrypted. 6 Q2: Is this error dialog box pop up when starting up the TP-Link 802.1X Client Software? The password saved in the configuration files is missing. This TP-Link 802.1X Client Software is customized for installation, and run the client software again. 3 FAQ Q1: Why does...
T1600G-28PSUN V3 CLI Reference Guide Guide
Page 3
... User Interface 16 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 2.9 2.10 enable ...16 service password-encryption 16 enable password...17 enable secret ...18 configure...19 exit...20 end ...20 clipaging ...21 history ...21 history clear ...22 Chapter 3 User Management Commands 23 3.1 user name (password)...23 3.2 ...user name (secret)...24 3.3 show user account-list...25 3.4 show user configuration...26 Chapter 4 System Configuration Commands 27 4.1 system-time manual ...27 4.2 system-time ntp ...27 4.3 system-time dst predefined ...29 4.4 system-time...
... User Interface 16 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 2.9 2.10 enable ...16 service password-encryption 16 enable password...17 enable secret ...18 configure...19 exit...20 end ...20 clipaging ...21 history ...21 history clear ...22 Chapter 3 User Management Commands 23 3.1 user name (password)...23 3.2 ...user name (secret)...24 3.3 show user account-list...25 3.4 show user configuration...26 Chapter 4 System Configuration Commands 27 4.1 system-time manual ...27 4.2 system-time ntp ...27 4.3 system-time dst predefined ...29 4.4 system-time...
T1600G-28PSUN V3 CLI Reference Guide Guide
Page 4
... show system-time dst...50 show system-time ntp ...50 show cable-diagnostics interface 51 show cpu-utilization...51 show memory-utilization...52 Chapter 5 EEE Configuration Commands 53 5.1 eee ...53 5.2 show interface eee...53 III
... show system-time dst...50 show system-time ntp ...50 show cable-diagnostics interface 51 show cpu-utilization...51 show memory-utilization...52 Chapter 5 EEE Configuration Commands 53 5.1 eee ...53 5.2 show interface eee...53 III
T1600G-28PSUN V3 CLI Reference Guide Guide
Page 5
...absolute ...57 7.3 periodic ...58 7.4 holiday (time-range mode)...59 7.5 holiday ...60 7.6 show holiday...60 7.7 show time-range ...61 Chapter 8 Port Configuration Commands 62 8.1 8.2 8.3 8.4 8.5 8.6 8.7 8.8 8.9 8.10 8.11 8.12 interface gigabitEthernet ...62 interface range gigabitEthernet 62 description ...63 shutdown ...64 ...65 jumbo-size ...66 speed ...66 clear counters...67 show interface status...68 show interface counters ...68 show interface configuration...69 Chapter 9 Port Isolation Commands 70 9.1 port isolation...70 9.2 show port isolation interface ...71 Chapter 10 Loopback ...
...absolute ...57 7.3 periodic ...58 7.4 holiday (time-range mode)...59 7.5 holiday ...60 7.6 show holiday...60 7.7 show time-range ...61 Chapter 8 Port Configuration Commands 62 8.1 8.2 8.3 8.4 8.5 8.6 8.7 8.8 8.9 8.10 8.11 8.12 interface gigabitEthernet ...62 interface range gigabitEthernet 62 description ...63 shutdown ...64 ...65 jumbo-size ...66 speed ...66 clear counters...67 show interface status...68 show interface counters ...68 show interface configuration...69 Chapter 9 Port Isolation Commands 70 9.1 port isolation...70 9.2 show port isolation interface ...71 Chapter 10 Loopback ...
T1600G-28PSUN V3 CLI Reference Guide Guide
Page 9
....25 debug spanning-tree...158 spanning-tree (global) ...159 spanning-tree (interface) ...159 spanning-tree common-config 160 spanning-tree mode ...161 spanning-tree mst configuration 162 instance...162 name...163 revision ...164 spanning-tree mst instance 165 spanning-tree mst ...165 spanning-tree priority ...166 spanning-tree timer ...167 spanning...
....25 debug spanning-tree...158 spanning-tree (global) ...159 spanning-tree (interface) ...159 spanning-tree common-config 160 spanning-tree mode ...161 spanning-tree mst configuration 162 instance...162 name...163 revision ...164 spanning-tree mst instance 165 spanning-tree mst ...165 spanning-tree priority ...166 spanning-tree timer ...167 spanning...
T1600G-28PSUN V3 CLI Reference Guide Guide
Page 11
... ipv6 interface...201 show ipv6 route ...202 show ipv6 route summary ...202 Chapter 23 IPv6 Address Configuration Commands 204 23.1 23.2 23.3 23.4 23.5 23.6 23.7 23.8 ipv6 enable...204 ipv6 address autoconfig...204 ipv6 address link-local ...205 ipv6 address dhcp ...206 ipv6 address ra ...206 ipv6 address eui-64 ...207...
... ipv6 interface...201 show ipv6 route ...202 show ipv6 route summary ...202 Chapter 23 IPv6 Address Configuration Commands 204 23.1 23.2 23.3 23.4 23.5 23.6 23.7 23.8 ipv6 enable...204 ipv6 address autoconfig...204 ipv6 address link-local ...205 ipv6 address dhcp ...206 ipv6 address ra ...206 ipv6 address eui-64 ...207...
T1600G-28PSUN V3 CLI Reference Guide Guide
Page 20
... 428 power inline priority...428 power inline supply...429 power inline profile ...430 power inline time-range...430 show power inline ...431 show power inline configuration interface 431 show power inline information interface 432 show power profile...432 Chapter 51 ARP Inspection Commands 434 51.1 51.2 51.3 51.4 51.5 51.6 51...
... 428 power inline priority...428 power inline supply...429 power inline profile ...430 power inline time-range...430 show power inline ...431 show power inline configuration interface 431 show power inline information interface 432 show power profile...432 Chapter 51 ARP Inspection Commands 434 51.1 51.2 51.3 51.4 51.5 51.6 51...
T1600G-28PSUN V3 CLI Reference Guide Guide
Page 22
... if not specially noted, and T1600G-28TS is intended for T1600G-28TS/ T1600G-52TS/ T1600G-28MPS/T1600G-18TS JetStream Gigabit L2 Managed Switch without any explanation. Chapter 9: Port Isolation Commands Provide information about the commands used for configuring the Loopback Detection function. 1 ...the commands used for Ethernet ports. For local sales information, visit https://www.tp-link.com. Chapter 5: EEE Configuration Commands Provide information about the commands used for configuring the time range. The commands in this Guide stands for network administrator to use...
... if not specially noted, and T1600G-28TS is intended for T1600G-28TS/ T1600G-52TS/ T1600G-28MPS/T1600G-18TS JetStream Gigabit L2 Managed Switch without any explanation. Chapter 9: Port Isolation Commands Provide information about the commands used for configuring the Loopback Detection function. 1 ...the commands used for Ethernet ports. For local sales information, visit https://www.tp-link.com. Chapter 5: EEE Configuration Commands Provide information about the commands used for configuring the time range. The commands in this Guide stands for network administrator to use...
T1600G-28PSUN V3 CLI Reference Guide Guide
Page 23
... Commands Provide information about the commands used for Address configuration. Chapter 12: MAC Address Commands Provide information about the commands used for configuring LAG (Link Aggregation Group) and LACP (Link Aggregation Control Protocol). Chapter 17: IGMP Snooping Commands Provide information about the commands used for configuring LLDP function. Chapter 21: LLDP Commands Provide information about...
... Commands Provide information about the commands used for Address configuration. Chapter 12: MAC Address Commands Provide information about the commands used for configuring LAG (Link Aggregation Group) and LACP (Link Aggregation Control Protocol). Chapter 17: IGMP Snooping Commands Provide information about the commands used for configuring LLDP function. Chapter 21: LLDP Commands Provide information about...
T1600G-28PSUN V3 CLI Reference Guide Guide
Page 24
Chapter 28: QoS Commands Provide information about the commands used for configuring Auto VoIP. Chapter 31 Auto VoIP Commands Provide information about the commands used for configuring the QoS function. Chapter 29: Bandwidth Commands Provide information about the commands used for configuring Port Security. Chapter 38 Port Security Commands Provide information about the commands...
Chapter 28: QoS Commands Provide information about the commands used for configuring Auto VoIP. Chapter 31 Auto VoIP Commands Provide information about the commands used for configuring the QoS function. Chapter 29: Bandwidth Commands Provide information about the commands used for configuring Port Security. Chapter 38 Port Security Commands Provide information about the commands...
T1600G-28PSUN V3 CLI Reference Guide Guide
Page 25
...the IP-MAC Binding entries. Chapter 47: DoS Defend Command Provide information about the commands used for configuring PoE function. Chapter 50: PoE Commands (For T1600G-28MPS only) Provide information about the commands used for DoS defend and detecting the DoS attack. Chapter ...together. Chapter 48: DLDP Commands Provide information about the commands used for configuring system log. 4 Chapter 53: System Log Commands Provide information about the commands used for configuring the DLDP (Device Link Detection Protocol). Chapter 49: SNMP Commands Provide information about the commands used...
...the IP-MAC Binding entries. Chapter 47: DoS Defend Command Provide information about the commands used for configuring PoE function. Chapter 50: PoE Commands (For T1600G-28MPS only) Provide information about the commands used for DoS defend and detecting the DoS attack. Chapter ...together. Chapter 48: DLDP Commands Provide information about the commands used for configuring system log. 4 Chapter 53: System Log Commands Provide information about the commands used for configuring the DLDP (Device Link Detection Protocol). Chapter 49: SNMP Commands Provide information about the commands used...
T1600G-28PSUN V3 CLI Reference Guide Guide
Page 29
Select the key type and key length, and generate SSH key. 2. Enter the login user name and password to log on the switch, and then enter enable to enter Privileged EXEC Mode, so you can accelerate the key generation. 8 The key length is in the above figure to configure the switch. Figure 1-7 Generate SSH Key Note: 1. During the key generation, randomly moving the mouse quickly can continue to log on the Switch ■ Key Authentication Mode 1. Figure 1-6 Log on to 3072 bits. 2. Click the Open button in the range of 512 to the switch.
Select the key type and key length, and generate SSH key. 2. Enter the login user name and password to log on the switch, and then enter enable to enter Privileged EXEC Mode, so you can accelerate the key generation. 8 The key length is in the above figure to configure the switch. Figure 1-7 Generate SSH Key Note: 1. During the key generation, randomly moving the mouse quickly can continue to log on the Switch ■ Key Authentication Mode 1. Figure 1-6 Log on to 3072 bits. 2. Click the Open button in the range of 512 to the switch.
T1600G-28PSUN V3 CLI Reference Guide Guide
Page 32
5. Click Browse to download the private key file to the switch without entering password, it indicates that the key has been successfully downloaded. Figure 1-11 Download the Private Key 6. After successful authentication, please enter the login user name. Figure 1-12 Log on to SSH client software and click Open. If you log on the Switch 1.2 CLI Command Modes The CLI is divided into different command modes: User EXEC Mode, Privileged EXEC Mode, Global Configuration Mode, Interface Configuration Mode and VLAN Configuration Mode. 11
5. Click Browse to download the private key file to the switch without entering password, it indicates that the key has been successfully downloaded. Figure 1-11 Download the Private Key 6. After successful authentication, please enter the login user name. Figure 1-12 Log on to SSH client software and click Open. If you log on the Switch 1.2 CLI Command Modes The CLI is divided into different command modes: User EXEC Mode, Privileged EXEC Mode, Global Configuration Mode, Interface Configuration Mode and VLAN Configuration Mode. 11
T1600G-28PSUN V3 CLI Reference Guide Guide
Page 33
... access Global Configuration mode. Enter configure command to User EXEC mode. Use the exit or the end command or press Ctrl+Z to return to disconnect the switch. T1600G-28TS> Use.... Global Configuration Mode Use the configure command to access VLAN Configuration mode. Use the vlan vlan-list to enter this mode from Privileged EXEC mode. T1600G-28TS (config-if)# or T1600G-28TS(config...current mode and access the next mode. Layer 2 Interface: Interface Configuration Mode Use the interface gigabitEthernet port, interface port-channel port-channel-id or interface ...
... access Global Configuration mode. Enter configure command to User EXEC mode. Use the exit or the end command or press Ctrl+Z to return to disconnect the switch. T1600G-28TS> Use.... Global Configuration Mode Use the configure command to access VLAN Configuration mode. Use the vlan vlan-list to enter this mode from Privileged EXEC mode. T1600G-28TS (config-if)# or T1600G-28TS(config...current mode and access the next mode. Layer 2 Interface: Interface Configuration Mode Use the interface gigabitEthernet port, interface port-channel port-channel-id or interface ...
T1600G-28PSUN V3 CLI Reference Guide Guide
Page 34
...to return to enter VLAN Interface mode from Global Configuration mode. Each command mode has its own set of specific commands. Interface Configuration Mode Use the interface vlan vlan-id command to Privileged EXEC mode. T1600G-28TS(config-if-range)# Enter the exit or the...so on. • Interface Configuration Mode: In this mode from Interface Configuration mode. Use the interface loopback id command to Global Configuration mode. T1600G-28TS (config-if)# or Use the switchport command to switch to enter Routed Port mode from Global Configuration mode. Note: 1. Mode ...
...to return to enter VLAN Interface mode from Global Configuration mode. Each command mode has its own set of specific commands. Interface Configuration Mode Use the interface vlan vlan-id command to Privileged EXEC mode. T1600G-28TS(config-if-range)# Enter the exit or the...so on. • Interface Configuration Mode: In this mode from Interface Configuration mode. Use the interface loopback id command to Global Configuration mode. T1600G-28TS (config-if)# or Use the switchport command to switch to enter Routed Port mode from Global Configuration mode. Note: 1. Mode ...
T1600G-28PSUN V3 CLI Reference Guide Guide
Page 35
... Conventions The following conventions are required to enter it to the VLAN. 3. d). Duplex-mode, flow control status. Interface range gigabitEthernet: Configure parameters for a link-aggregation, such as broadcast storm. Interface range link-aggregation: Configure parameters for Admin level by using the enable command. You can enter Privileged EXEC mode from User EXEC mode by...
... Conventions The following conventions are required to enter it to the VLAN. 3. d). Duplex-mode, flow control status. Interface range gigabitEthernet: Configure parameters for a link-aggregation, such as broadcast storm. Interface range link-aggregation: Configure parameters for Admin level by using the enable command. You can enter Privileged EXEC mode from User EXEC mode by...
T1600G-28PSUN V3 CLI Reference Guide Guide
Page 37
... the password to access Privileged EXEC Mode from User EXEC Mode: T1600G-28TS>enable Enter password: T1600G-28TS# 2.2 service password-encryption Description The service password-encryption command is used to encrypt the password when the password is defined or when the configuration is used to access Privileged EXEC Mode from being readable in...
... the password to access Privileged EXEC Mode from User EXEC Mode: T1600G-28TS>enable Enter password: T1600G-28TS# 2.2 service password-encryption Description The service password-encryption command is used to encrypt the password when the password is defined or when the configuration is used to access Privileged EXEC Mode from being readable in...