На сайте 124184 инструкции общим размером 502.81 Гб , которые состоят из 6278551 страницы
Руководство пользователя D-LINK DXS-3400-24SC. Основные функции, характеристики и условия эксплуатации изложены на 1122 страницах документа в pdf формате.
Доступно к просмотру 1121 страница. Рекомендуем вам скачать файл инструкции, поскольку онлайн просмотр документа может сильно отличаться от оригинала.
DXS-3400 Series Lite Layer 3 Stackable 10GbE Managed Switch CLI Reference Guide Table of Contents 1. Introduction ................................................................................................................................................................ 1 2. Basic CLI Commands ............................................................................................................................................... 9 3. 802.1X Commands ................................................................................................................................................. 27 4. Access Control List (ACL) Commands ................................................................................................................... 41 5. Access Management Commands ........................................................................................................................... 72 6. ARP Spoofing Prevention Commands .................................................................................................................... 94 7. Asymmetric VLAN Commands ................................................................................................................................ 96 8. Authentication, Authorization, and Accounting (AAA) Commands ......................................................................... 97 9. Basic IPv4 Commands .......................................................................................................................................... 124 10. Basic IPv6 Commands .......................................................................................................................................... 134 11. Bidirectional Forwarding Detection (BFD) Commands ......................................................................................... 151 12. BPDU Protection Commands ................................................................................................................................ 156 13. Cable Diagnostics Commands .............................................................................................................................. 160 14. Command Logging Commands ............................................................................................................................ 163 15. Connectivity Fault Management (CFM) Commands ............................................................................................. 164 16. CPU Access Control List (ACL) Commands ......................................................................................................... 208 17. CPU Port Statistics Commands ............................................................................................................................ 212 18. Debug Commands ................................................................................................................................................ 215 19. DHCP Auto-Configuration Commands ................................................................................................................. 226 20. DHCP Client Commands ...................................................................................................................................... 228 21. DHCP Relay Commands ...................................................................................................................................... 232 22. DHCP Server Commands ..................................................................................................................................... 258 23. DHCP Server Screening Commands .................................................................................................................... 286 24. DHCP Snooping Commands ................................................................................................................................ 292 25. DHCPv6 Client Commands ................................................................................................................................... 307 26. DHCPv6 Guard Commands .................................................................................................................................. 310 27. DHCPv6 Relay Commands ................................................................................................................................... 315 28. DHCPv6 Server Commands ................................................................................................................................. 322 29. Digital Diagnostics Monitoring (DDM) Commands ................................................................................................ 339 30. D-Link Discovery Protocol (DDP) Client Commands ............................................................................................ 349 31. D-Link License Management System (DLMS) Commands .................................................................................. 352 32. D-Link Unidirectional Link Detection (DULD) Commands .................................................................................... 355 33. Domain Name System (DNS) Commands ............................................................................................................ 359 34. DoS Prevention Commands .................................................................................................................................. 366 35. Dynamic ARP Inspection Commands ................................................................................................................... 370 36. Enhanced Transmission Selection (ETS) Commands .......................................................................................... 384 37. Error Recovery Commands ................................................................................................................................... 388 38. Ethernet OAM Commands .................................................................................................................................... 391 39. Ethernet Ring Protection Switching (ERPS) Commands ...................................................................................... 409 40. External Alarm Commands ................................................................................................................................... 431 41. File System Commands ........................................................................................................................................ 434 i
DXS-3400 Series Lite Layer 3 Stackable 10GbE Managed Switch CLI Reference Guide 42. Filter Database (FDB) Commands ........................................................................................................................ 441 43. Filter NetBIOS Commands .................................................................................................................................... 455 44. GARP VLAN Registration Protocol (GVRP) Commands ...................................................................................... 457 45. Gratuitous ARP Commands .................................................................................................................................. 466 46. Interface Commands ............................................................................................................................................. 469 47. Internet Group Management Protocol (IGMP) Snooping Commands .................................................................. 490 48. IP Multicast (IPMC) Commands ............................................................................................................................ 515 49. IP Multicast Version 6 (IPMCv6) Commands ........................................................................................................ 519 50. IP Source Guard Commands ................................................................................................................................ 520 51. IP Utility Commands .............................................................................................................................................. 526 52. IP-MAC-Port Binding (IMPB) Commands ............................................................................................................. 534 53. IPv6 Snooping Commands ................................................................................................................................... 538 54. IPv6 Source Guard Commands ............................................................................................................................ 543 55. iSCSI Awareness Commands ............................................................................................................................... 549 56. Jumbo Frame Commands ..................................................................................................................................... 554 57. Layer 2 Protocol Tunnel (L2PT) Commands ........................................................................................................ 555 58. Link Aggregation Control Protocol (LACP) Commands ........................................................................................ 562 59. Link Layer Discovery Protocol (LLDP) Commands ............................................................................................... 569 60. Loopback Detection (LBD) Commands ................................................................................................................ 602 61. Loopback Test Commands ................................................................................................................................... 609 62. MAC Authentication Commands ........................................................................................................................... 611 63. Mirror Commands.................................................................................................................................................. 615 64. Multicast Listener Discovery (MLD) Snooping Commands .................................................................................. 623 65. Multicast VLAN Commands .................................................................................................................................. 646 66. Neighbor Discovery (ND) Inspection Commands ................................................................................................. 658 67. Network Access Authentication Commands ......................................................................................................... 662 68. Network Load Balancing (NLB) Commands ......................................................................................................... 676 69. Network Time Protocol (NTP) Commands ............................................................................................................ 679 70. Packet Debug Commands .................................................................................................................................... 693 71. Policy-based Routing (PBR) Commands .............................................................................................................. 696 72. Port Security Commands ...................................................................................................................................... 698 73. Power Saving Commands ..................................................................................................................................... 705 74. Precision Time Protocol (PTP) Commands .......................................................................................................... 711 75. Priority-based Flow Control (PFC) Commands ..................................................................................................... 713 76. Private VLAN Commands ..................................................................................................................................... 717 77. Protocol Independent Multicast (PIM) Snooping Commands ............................................................................... 726 78. Protocol Independent Commands......................................................................................................................... 732 79. Quality of Service (QoS) Commands .................................................................................................................... 742 80. QoS Amendment Data Center Bridge (DCB) Commands .................................................................................... 776 81. Quantized Congestion Notification (QCN) Commands ......................................................................................... 787 82. Remote Network MONitoring (RMON) Commands .............................................................................................. 800 83. Route Map Commands ......................................................................................................................................... 808 84. Router Advertisement (RA) Guard Commands .................................................................................................... 819 ii
DXS-3400 Series Lite Layer 3 Stackable 10GbE Managed Switch CLI Reference Guide 85. Routing Information Protocol (RIP) Commands .................................................................................................... 823 86. Routing Information Protocol Next Generation (RIPng) Commands .................................................................... 837 87. Safeguard Engine Commands .............................................................................................................................. 850 88. Secure File Transfer Protocol (SFTP) Server Commands ................................................................................... 858 89. Secure Shell (SSH) Commands ............................................................................................................................ 861 90. Secure Sockets Layer (SSL) Commands ............................................................................................................. 869 91. sFlow Commands.................................................................................................................................................. 877 92. Simple Mail Transfer Protocol (SMTP) Commands .............................................................................................. 883 93. Simple Network Management Protocol (SNMP) Commands ............................................................................... 888 94. Single IP Management (SIM) Commands ............................................................................................................ 912 95. Spanning Tree Protocol (STP) Commands .......................................................................................................... 923 96. Stacking Commands ............................................................................................................................................. 944 97. Storm Control Commands ..................................................................................................................................... 950 98. Surveillance VLAN Commands ............................................................................................................................. 955 99. Switch Port Commands ......................................................................................................................................... 961 100. Switch Resource Management (SRM) Commands .............................................................................................. 966 101. System File Management Commands .................................................................................................................. 968 102. System Log Commands ........................................................................................................................................ 982 103. Time and SNTP Commands ................................................................................................................................. 992 104. Time Range Commands ....................................................................................................................................... 999 105. Traffic Segmentation Commands ........................................................................................................................ 1002 106. Virtual LAN (VLAN) Commands .......................................................................................................................... 1004 107. Virtual LAN (VLAN) Tunnel Commands .............................................................................................................. 1023 108. Virtual Router Redundancy Protocol (VRRP) Commands .................................................................................. 1036 109. Virtual Router Redundancy Protocol Version 3 (VRRPv3) Commands .............................................................. 1044 110. Voice VLAN Commands ..................................................................................................................................... 1053 111. Web Authentication Commands .......................................................................................................................... 1061 112. Weighted Random Early Detection (WRED) Commands ................................................................................... 1066 Appendix A - Password Recovery Procedure ............................................................................................................. 1074 Appendix B - System Log Entries ............................................................................................................................... 1075 Appendix C - Trap Entries ........................................................................................................................................... 1104 Appendix D - RADIUS Attributes Assignment ............................................................................................................. 1114 Appendix E - IETF RADIUS Attributes Support .......................................................................................................... 1117 iii