Tp-Link T2500-28TC V1 Руководство по использованию коммандной строки онлайн [20/352] 393821

Tp-Link T2500-28TC (TL-SL5428E) Руководство по командной строке онлайн [20/352] 174196
T2500-28TC
JetStream L2 Managed Switch CLI Guide
3
Provide information about the commands used for MAC address configuration.
Chapter 22: System Configuration Commands
Provide information about the commands used for configuring the System information and System
IP, reboot and reset the switch, upgrade the switch system and commands used for device
diagnose, including loopback test and cable test.
Chapter 23: IPv6 Address Configuration Commands
Provide information about the commands used for configuring the System IPv6 addresses.
Chapter 24: Ethernet Configuration Commands
Provide information about the commands used for configuring the Bandwidth Control, Negotiation
Mode, and Storm Control for ethernet ports.
Chapter 25: QoS Commands
Provide information about the commands used for configuring the QoS function.
Chapter 26: Port Mirror Commands
Provide information about the commands used for configuring the Port Mirror function.
Chapter 27: Port isolation Commands
Provide information about the commands used for configuring the Port isolation function.
Chapter 28: Loopback Detection Commands
Provide information about the commands used for loopback detection.
Chapter 29: DDM Commands
Provide information about the commands used for DDM (Digtal Diagnostic Monitoring) function.
Chapter 30: ACL Commands
Provide information about the commands used for configuring the ACL (Access Control List).
Chapter 31: MSTP Commands
Provide information about the commands used for configuring the MSTP (Multiple Spanning Tree
Protocol).
Chapter 32: Ethernet OAM Commands
Provide information about the commands used for configuring the Ethernet OAM (Operation,
Administration, and Maintenance) function.
Chapter 33: DLDP Commands
Provide information about the commands used for configuring the DLDP (Device Link Detection
Protocol).
Chapter 34: IGMP Snooping Commands
Provide information about the commands used for configuring the IGMP Snooping (Internet Group
Management Protocol Snooping).

Содержание

Скачать