©2008 Allied Telesis Inc. All rights reserved.
Software Version 5.2.1
AlliedWare Plus
TM
Operating System Software Reference C613-50003-00 REV E
vii
51. NTP Commands
52. Dynamic Host Configuration Protocol (DHCP) Introduction
Introduction ............................................................................................................................................................52.2
Configuring the DHCP Server.....................................................................................................................52.3
Configuring the DHCP Relay Agent ........................................................................................................52.5
Configuring the DHCP Client......................................................................................................................52.7
53. Dynamic Host Configuration Protocol (DHCP) Commands
54. SNMP Introduction
Introduction ............................................................................................................................................................54.2
Network Management Framework ..........................................................................................................54.2
Structure of Management Information ...................................................................................................54.4
The SNMP Protocol ..........................................................................................................................................54.8
SNMPv1 and SNMPv2c on the Switch ...............................................................................................54.13
SNMPv3 ...............................................................................................................................................................54.16
55. SNMP Commands
56. SNMP MIBs
Introduction ............................................................................................................................................................56.2
MIB-II MIB ................................................................................................................................................................56.3
TCP MIB ...................................................................................................................................................................56.5
UDP MIB ..................................................................................................................................................................56.6
IP Forwarding Table MIB.................................................................................................................................56.7
Ethernet-like Interface Types MIB..............................................................................................................56.8
Medium Attachment Unit (MAU) MIB...................................................................................................56.9
Host Resources MIB .......................................................................................................................................56.11
Bridge MIB ............................................................................................................................................................56.13
RMON MIB .........................................................................................................................................................56.15
57. SMTP Commands
58. RMON Commands
Introduction ............................................................................................................................................................58.2
59. Triggers Introduction
Introduction ............................................................................................................................................................59.2
Configuring a Trigger.........................................................................................................................................59.2
Troubleshooting Triggers................................................................................................................................59.4
60. Triggers Configuration
Introduction ............................................................................................................................................................60.2
Restrict Internet Access...................................................................................................................................60.2
Capturing Unusual CPU and RAM Activity .........................................................................................60.3
Seeing Daily Statistics ........................................................................................................................................60.4
Link Status................................................................................................................................................................60.5
61. Trigger Commands
62. Ping Polling Introduction
Introduction ............................................................................................................................................................62.2
How Ping Polling Works.................................................................................................................................62.2
Configuring Ping Polling ...................................................................................................................................62.4
Interaction with Other Protocols...............................................................................................................62.6
63. Ping Polling Commands
Introduction ............................................................................................................................................................63.2
Stacking
Reference
64. Stacking Introduction
Introduction ............................................................................................................................................................64.4
Stack Formation ...................................................................................................................................................64.7
VCS Fault Tolerance.......................................................................................................................................64.10