SUPPORTED STANDARDS, MIBS AND RFCS..........................................................................305
STATISTICS MONITORING ........................................................................................................306
RMON ALARMS............................................................................................................................307
27.
PERIODIC MONITORING .........................................................................................................312
INTRODUCTION ...........................................................................................................................312
FEATURE OVERVIEW .................................................................................................................312
SUPPORTED STANDARDS, MIBS AND RFCS..........................................................................314
DEFAULT PERIODIC MONITORING CONFIGURATION........................................................315
CONFIGURING AND DISPLAYING PERIODIC MONITORING .............................................316
CONFIGURATION EXAMPLES...................................................................................................326
RELATED COMMANDS............................................................................................................... 328
28.
LOGGING SYSTEM TRAP MESSAGES TO THE NVRAM ..................................................329
INTRODUCTION ...........................................................................................................................329
CONFIGURING THE TRAP LEVEL FOR STORED SYSTEM MESSAGES.............................329
CONFIGURING THE MESSAGE FORMAT ................................................................................329
NVRAM SYSTEM-TRAP LOGGING COMMANDS...................................................................330
29.
NVRAM CONFIGURATION HISTORY....................................................................................333
INTRODUCTION ...........................................................................................................................333
HISTORY LOG FORMAT AND GENERATION .........................................................................333
CONFIGURING HISTORY SETTINGS........................................................................................333
DISPLAYING THE CONFIGURATION HISTORY.....................................................................334
30.
CONFIGURING THE WATCHDOG FEATURES....................................................................337
OVERVIEW....................................................................................................................................337
ACCESSING WATCHDOG MODE ..............................................................................................337
CONFIGURING THE RESET-LOOP DETECTION FEATURE ..................................................338
CONFIGURING THE SNMP REQUEST FAILURE DETECTION FEATURE...........................339
CONFIGURING THE APPLICATION SUSPENSION DETECTION FEATURE.......................340
DISPLAYING THE WATCHDOG CONFIGURATION...............................................................341
31.
NTP CLIENT DESCRIPTION .....................................................................................................342
INTRODUCTION ...........................................................................................................................342
THE NTP TIMESERVER COMMANDS.......................................................................................342
WHY USE NTP PROTOCOL ? ......................................................................................................343
CONFIGURING AND DISPLAYING NTP SERVER SETTINGS...............................................343
MD5 AUTHENTICATION.............................................................................................................345
RUNNING THE NTP SERVER .....................................................................................................346
EXAMPLES ....................................................................................................................................347
CONFIGURATION EXAMPLE.....................................................................................................347
CONFIGURING DAYLIGHT SAVING TIME (DST) ..................................................................348
32.
REMOTE AUTHENTICATION DIAL-IN USER SERVICE (RADIUS) ................................351
INTRODUCTION ...........................................................................................................................351
BINOS RADIUS FEATURES ........................................................................................................351
DESCRIPTION OF COMMANDS.................................................................................................352
USING RADIUS TO CONFIGURE LOGIN AUTHENTICATION..............................................354
A RADIUS CONFIGURATION EXAMPLE .................................................................................355
33.
SECURE SHELL (SSH) ................................................................................................................357
INTRODUCTION ...........................................................................................................................357
SOME SECURITY CONSIDERATIONS ......................................................................................357
COMMANDS FOR MANAGING THE SSH SERVER.................................................................358
SUPPORTED CLIENTS .................................................................................................................359
SUPPORTED STANDARDS..........................................................................................................359
34.
802.1X PORT-BASED AUTHENTICATION .............................................................................360
INTRODUCTION ...........................................................................................................................360