7.2.11 spanning-tree mst config-digest-snooping............................... 7-30
Chapter 8 802.1X Configuration Command ................................................ 8-1
8.1 Domain Configuration Command .......................................................... 8-1
8.1.1 aaa............................................................................................... 8-1
8.1.2 access-limit.................................................................................. 8-2
8.1.3 default domain-name enbale....................................................... 8-4
8.1.4 domain......................................................................................... 8-5
8.1.5 show domain ............................................................................... 8-7
8.1.6 radius host ................................................................................... 8-8
8.1.7 state............................................................................................. 8-9
8.2 RADIUS Server Configuration Command ........................................... 8-10
8.2.1 client-ip ...................................................................................... 8-11
8.2.2 primary-ip................................................................................... 8-12
8.2.3 radius host ................................................................................. 8-14
8.2.4 realtime-account........................................................................ 8-15
8.2.5 second-ip ................................................................................... 8-16
8.2.6 secret-key .................................................................................. 8-17
8.2.7 show radius host ....................................................................... 8-19
8.2.8 username-format ....................................................................... 8-20
8.3
802.1X
Configuration Command ......................................................... 8-21
8.3.1 dot1x.......................................................................................... 8-22
8.3.2 dot1x daemon............................................................................ 8-23
8.3.3 dot1x eap-finish ......................................................................... 8-26
8.3.4 dot1x eap-transfer ..................................................................... 8-27
8.3.5 dot1x max-user.......................................................................... 8-28
8.3.6 dot1x port-control ...................................................................... 8-30
8.3.7 dot1x re-authenticate................................................................. 8-32
8.3.8 dot1x re-authentication.............................................................. 8-33
VII
Summary of Contents for QSW-2900
Page 2: ......
Page 16: ......
Page 84: ......
Page 105: ...3 21 QTECH config show vlan swap ...
Page 106: ......
Page 182: ...5 76 QTECH config time range tm1 QTECH config timerange tm1 ...
Page 192: ......
Page 224: ......
Page 281: ...9 17 Example Configure trusted key to be 12 QTECH config sntp trusted key 12 ...
Page 282: ......
Page 315: ...11 7 QTECH upload keyfile public tftp 1 1 1 1 pub txt ...
Page 316: ......