Tp-Link T2600G-28MPS (TL-SG3424P) [5/463] Chapter 12 user management commands 75

8.2 l2protocol-tunnel type ............................................................................................... 54
8.3 show l2protocol-tunnel global ................................................................................... 56
8.4 show l2protocol-tunnel interface ............................................................................... 56
Chapter 9 GVRP Commands .............................................................................. 58
9.1 gvrp ........................................................................................................................... 58
9.2 gvrp (interface).......................................................................................................... 58
9.3 gvrp registration ........................................................................................................ 59
9.4 gvrp timer .................................................................................................................. 60
9.5 show gvrp interface .................................................................................................. 61
9.6 show gvrp global ....................................................................................................... 61
Chapter 10 Voice VLAN Commands .................................................................... 63
10.1 voice vlan .................................................................................................................. 63
10.2 voice vlan aging ........................................................................................................ 63
10.3 voice vlan priority ...................................................................................................... 64
10.4 voice vlan mac-address ............................................................................................ 65
10.5 switchport voice vlan mode ...................................................................................... 65
10.6 switchport voice vlan security ................................................................................... 66
10.7 show voice vlan ........................................................................................................ 67
10.8 show voice vlan oui .................................................................................................. 67
10.9 show voice vlan switchport ....................................................................................... 68
Chapter 11 Etherchannel Commands ................................................................. 69
11.1 channel-group ........................................................................................................... 69
11.2 port-channel load-balance ........................................................................................ 70
11.3 lacp system-priority ................................................................................................... 71
11.4 lacp port-priority ........................................................................................................ 71
11.5 show etherchannel ................................................................................................... 72
11.6 show etherchannel load-balance.............................................................................. 73
11.7 show lacp .................................................................................................................. 73
11.8 show lacp sys-id ....................................................................................................... 74
Chapter 12 User Management Commands ......................................................... 75
12.1 user name (password) .............................................................................................. 75
12.2 user name (secret) ................................................................................................... 76
12.3 service password-recovery ....................................................................................... 77
12.4 user access-control ip-based ................................................................................... 78
12.5 user access-control mac-based ............................................................................... 79
IV

Содержание

Скачать