T
ABLE
OF
C
ONTENTS
xvi
ip ssh timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-25
ip ssh authentication-retries . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-26
ip ssh server-key size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-27
delete public-key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-28
ip ssh crypto host-key generate . . . . . . . . . . . . . . . . . . . . . . . . 21-28
ip ssh crypto zeroize . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-29
ip ssh save host-key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-30
show ip ssh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-31
show ssh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-31
show public-key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-32
802.1X Port Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-34
dot1x system-auth-control . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-35
dot1x default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-35
dot1x max-req . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-36
dot1x port-control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-36
dot1x operation-mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-37
dot1x re-authenticate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-38
dot1x re-authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-39
dot1x timeout quiet-period . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-39
dot1x timeout re-authperiod . . . . . . . . . . . . . . . . . . . . . . . . . . 21-40
dot1x timeout tx-period . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-41
show dot1x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-41
Management IP Filter Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-45
management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-45
show management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-46
22 Client Security Commands . . . . . . . . . . . . . . . . . . . . 22-1
Port Security Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-2
port security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-3
IP Source Guard Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-4
ip source-guard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-5
ip source-guard binding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-7
show ip source-guard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-9
show ip source-guard binding . . . . . . . . . . . . . . . . . . . . . . . . . . 22-9
DHCP Snooping Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-10
ip dhcp snooping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-11
ip dhcp snooping vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-13
Summary of Contents for 7824M/FSW - annexe 1
Page 2: ......
Page 24: ...TABLE OF CONTENTS xxiv ...
Page 28: ...TABLES xxviii ...
Page 32: ...FIGURES xxxii Figure 16 3 DNS Cache 16 7 ...
Page 34: ...GETTING STARTED ...
Page 46: ...SYSTEM DEFAULTS 1 12 ...
Page 62: ...SWITCH MANAGEMENT ...
Page 74: ...CONFIGURING THE SWITCH 3 12 ...
Page 112: ...BASIC MANAGEMENT TASKS 4 38 ...
Page 168: ...USER AUTHENTICATION 6 30 ...
Page 223: ...SHOWING PORT STATISTICS 9 33 Figure 9 12 Port Statistics ...
Page 230: ...ADDRESS TABLE SETTINGS 10 6 ...
Page 304: ...CLASS OF SERVICE 13 16 ...
Page 316: ...QUALITY OF SERVICE 14 12 ...
Page 338: ...MULTICAST FILTERING 15 22 ...
Page 346: ...DOMAIN NAME SERVICE 16 8 ...
Page 348: ...COMMAND LINE INTERFACE IP Interface Commands 35 1 ...
Page 362: ...OVERVIEW OF COMMAND LINE INTERFACE 17 14 ...
Page 494: ...USER AUTHENTICATION COMMANDS 21 48 ...
Page 514: ...CLIENT SECURITY COMMANDS 22 20 ...
Page 540: ...ACCESS CONTROL LIST COMMANDS 23 26 ...
Page 558: ...INTERFACE COMMANDS 24 18 ...
Page 576: ...MIRROR PORT COMMANDS 26 4 ...
Page 582: ...RATE LIMIT COMMANDS 27 6 ...
Page 616: ...SPANNING TREE COMMANDS 29 28 ...
Page 644: ...VLAN COMMANDS 30 28 ...
Page 664: ...CLASS OF SERVICE COMMANDS 31 20 ...
Page 678: ...QUALITY OF SERVICE COMMANDS 32 14 ...
Page 720: ...APPENDICES ...
Page 726: ...SOFTWARE SPECIFICATIONS A 6 ...
Page 730: ...TROUBLESHOOTING B 4 ...
Page 746: ...INDEX Index 6 ...
Page 747: ......