TP-Link TL-SG5428 Switch User Manual


 
IV
interface range link-aggregation ............................................................................................40
link-aggregation.....................................................................................................................41
link-aggregation hash-algorithm ............................................................................................42
description.............................................................................................................................42
show interface link-aggregation.............................................................................................43
Chapter 10 LACP Commands .............................................................................. 44
lacp system-priority ...............................................................................................................44
lacp (interface).......................................................................................................................44
lacp admin-key ......................................................................................................................45
lacp port-priority.....................................................................................................................45
show lacp system-priority ......................................................................................................46
show lacp interface................................................................................................................46
Chapter 11 User Manage Commands.................................................................. 48
user add ................................................................................................................................4
8
user remove ..........................................................................................................................49
user modify status .................................................................................................................49
user modify type....................................................................................................................50
user modify password............................................................................................................50
user access-control disable...................................................................................................51
user access-control ip-based.................................................................................................51
user access-control mac-based.............................................................................................52
user access-control port-based .............................................................................................52
user max-number ..................................................................................................................53
user idle-timeout....................................................................................................................53
show user account-list...........................................................................................................54
show user configuration.........................................................................................................54
Chapter 12 Binding Table Commands................................................................. 56
binding-table user-bind..........................................................................................................56
binding-table remove.............................................................................................................57
dhcp-snooping.......................................................................................................................57
dhcp-snooping global ............................................................................................................58
dhcp-snooping information enable ........................................................................................59
dhcp-snooping information strategy ......................................................................................59
dhcp-snooping information user-defined ...............................................................................60
dhcp-snooping information remote-id ....................................................................................60
dhcp-snooping information circuit-id......................................................................................61