TP-Link T1700G-28TQ T1700G-28TQ V1 CLI Reference Guide - Page 5

Binding Table Commands

Page 5 highlights

9.1 user name (password 49 9.2 user name (secret 50 9.3 user access-control ip-based 51 9.4 user access-control mac-based 52 9.5 user access-control port-based 52 9.6 telnet ...53 9.7 show user account-list 54 9.8 show user configuration 54 9.9 show telnet-status...55 Chapter 10 HTTP and HTTPS Commands 56 10.1 10.2 10.3 10.4 10.5 10.6 10.7 10.8 10.9 10.10 10.11 10.12 ip http server ...56 ip http max-users ...56 ip http session timeout 57 ip http secure-server 58 ip http secure-protocol 58 ip http secure-ciphersuite 59 ip http secure-max-users 59 ip http secure-session timeout 60 ip http secure-server download certificate 61 ip http secure-server download key 61 show ip http configuration 62 show ip http secure-server 63 Chapter 11 Binding Table Commands 64 11.1 11.2 11.3 11.4 11.5 11.6 11.7 11.8 11.9 11.10 11.11 11.12 11.13 ip source binding ...64 ip dhcp snooping ...65 ip dhcp snooping vlan 66 ip dhcp snooping information option 66 ip dhcp snooping information strategy 67 ip dhcp snooping information remote-id 67 ip dhcp snooping information circuit-id 68 ip dhcp snooping trust 69 ip dhcp snooping mac-verify 69 ip dhcp snooping limit rate 70 ip dhcp snooping decline rate 71 show ip source binding 71 show ip dhcp snooping 72 IV

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269

IV
9.1
user name (password)
..............................................................................................
49
9.2
user name (secret)
...................................................................................................
50
9.3
user access-control ip-based
...................................................................................
51
9.4
user access-control mac-based
...............................................................................
52
9.5
user access-control port-based
................................................................................
52
9.6
telnet
.........................................................................................................................
53
9.7
show user account-list
..............................................................................................
54
9.8
show user configuration
............................................................................................
54
9.9
show telnet-status
.....................................................................................................
55
Chapter 10
HTTP and HTTPS Commands
...........................................................
56
10.1
ip http server
.............................................................................................................
56
10.2
ip http max-users
......................................................................................................
56
10.3
ip http session timeout
..............................................................................................
57
10.4
ip http secure-server
.................................................................................................
58
10.5
ip http secure-protocol
..............................................................................................
58
10.6
ip http secure-ciphersuite
.........................................................................................
59
10.7
ip http secure-max-users
..........................................................................................
59
10.8
ip http secure-session timeout
..................................................................................
60
10.9
ip http secure-server download certificate
................................................................
61
10.10
ip http secure-server download key
.........................................................................
61
10.11
show ip http configuration
.........................................................................................
62
10.12
show ip http secure-server
.......................................................................................
63
Chapter 11
Binding Table Commands
.................................................................
64
11.1
ip source binding
......................................................................................................
64
11.2
ip dhcp snooping
......................................................................................................
65
11.3
ip dhcp snooping vlan
...............................................................................................
66
11.4
ip dhcp snooping information option
........................................................................
66
11.5
ip dhcp snooping information strategy
.....................................................................
67
11.6
ip dhcp snooping information remote-id
...................................................................
67
11.7
ip dhcp snooping information circuit-id
.....................................................................
68
11.8
ip dhcp snooping trust
..............................................................................................
69
11.9
ip dhcp snooping mac-verify
.....................................................................................
69
11.10
ip dhcp snooping limit rate
........................................................................................
70
11.11
ip dhcp snooping decline rate
...................................................................................
71
11.12
show ip source binding
.............................................................................................
71
11.13
show ip dhcp snooping
.............................................................................................
72