5.3.14 Suppression period settings following failed authentication
...................................................140
5.3.15 Set reauthentication interval
5.3.16 Set the reply wait time for the RADIUS server overall
...........................................................141
5.3.17 Set supplicant reply wait time
.................................................................................................141
5.3.19 Set the reply wait time for each RADIUS server
....................................................................142
5.3.20 Set number of times to resend requests to RADIUS server
....................................................143
5.3.21 Set RADIUS server shared password
......................................................................................143
5.3.22 Set time of RADIUS server usage prevention
.........................................................................144
5.3.23 Show port authentication information
.....................................................................................144
5.3.24 Show supplicant information
5.3.25 Show statistical information
5.3.26 Clear statistical information
5.3.27 Show RADIUS server setting information
..............................................................................147
5.3.28 Settings for redirect destination URL following successful Web authentication
5.3.29 Clear the authentication state
5.3.30 Setting the time for clearing the authentication state (system)
................................................148
5.3.31 Setting the time for clearing the authentication state (interface)
.............................................148
5.3.32 Locate the file for customizing the Web authentication screen
...............................................149
5.3.33 Delete the file for customizing the Web authentication screen
...............................................150
5.4.1 Set port security function
5.4.2 Register permitted MAC addresses
...........................................................................................151
5.4.3 Set operations used for security violations
................................................................................151
5.4.4 Show port security information
.................................................................................................151
5.5.1 Set automatic recovery from errdisable state
............................................................................152
5.5.2 Show error detection function information
...............................................................................153
5.6.1 Set PoE power supply function (system)
...................................................................................153
5.6.2 Set PoE power supply function (interface)
................................................................................154
5.6.3 Set description of PoE port
5.6.4 Set PoE port power supply priority
...........................................................................................155
5.6.5 Show PoE power supply information
........................................................................................155
6.1 FDB (Forwarding Data Base)
6.1.1 Set MAC address acquisition function
......................................................................................157
6.1.2 Set dynamic entry ageing time
6.2.4 Set secondary VLAN for primary VLAN
.................................................................................161
6.2.5 Set access port (untagged port)
6.2.6 Set associated VLAN of an access port (untagged port)
...........................................................163
6.2.7 Set trunk port (tagged port)
6.2.8 Set associated VLAN for trunk port (tagged port)
....................................................................164
6.2.9 Set native VLAN for trunk port (tagged port)
...........................................................................165
Command Reference | TOC |
7