TL-SL3428 JetStream L2 Managed Switch CLI Guide
iv
user modify status .................................................................................................................42
user modify type ....................................................................................................................43
user modify password............................................................................................................43
user access-control disable ...................................................................................................44
user access-control ip-based.................................................................................................44
user access-control mac-based.............................................................................................45
user access-control port-based .............................................................................................45
user max-number ..................................................................................................................46
user idle-timeout....................................................................................................................46
show user account-list...........................................................................................................47
show user configuration.........................................................................................................47
Chapter 10 Binding Table Commands................................................................. 49
binding-table user-bind ..........................................................................................................49
binding-table remove .............................................................................................................50
dhcp-snooping.......................................................................................................................50
dhcp-snooping global ............................................................................................................51
dhcp-snooping information enable ........................................................................................52
dhcp-snooping information strategy ......................................................................................52
dhcp-snooping information user-defined ...............................................................................53
dhcp-snooping information remote-id ....................................................................................53
dhcp-snooping information circuit-id......................................................................................54
dhcp-snooping trusted ...........................................................................................................54
dhcp-snooping mac-verify .....................................................................................................55
dhcp-snooping rate-limit ........................................................................................................55
dhcp-snooping decline...........................................................................................................56
show binding-table.................................................................................................................56
show dhcp-snooping global ...................................................................................................57
show dhcp-snooping information...........................................................................................57
show dhcp-snooping interface...............................................................................................58
Chapter 11 ARP Inspection Commands.............................................................. 59
arp detection (global).............................................................................................................59
arp detection trust-port ..........................................................................................................59
arp detection (interface).........................................................................................................60
arp detection limit-rate...........................................................................................................60
arp detection recover.............................................................................................................61
show arp detection global......................................................................................................62
show arp detection interface..................................................................................................62