advertisement
DXS-3600-32S 10GbE Layer 2/3 Switch CLI Reference Guide
802.1X Commands
2-1 dot1x default
This command is used to reset the IEEE 802.1X parameters on a specific port to their default settings.
dot1x default
Parameters
None.
Default
Command Mode
Port control mode - Auto
Port PAE type - None
Port control direction - Both
Quiet period when authentication fails - 60 seconds
Re-authentication interval when authentication succeeds - 3600 seconds
Default timeout value waiting for a response from RADIUS - 30 seconds
Default timeout value waiting for a reply from Supplicant - 30 seconds
Default transmission interval from the Authenticator to the Supplicant - 30 seconds
Default maximum number of authentication request - 2 times
Re-authentication state on the port - Disabled
Interface Configuration Mode.
Command Default Level
Level: 8
Usage Guideline
This command is used to reset all the IEEE 802.1X parameters on a specific port to their default settings.
Example
This example shows how to reset the 802.1X parameters on port 1.
DXS-3600-32S#configure terminal
DXS-3600-32S(config)#interface tenGigabitEthernet 1
DXS-3600-32S(config-if)#dot1x default
DXS-3600-32S(config-if)#
2-2 dot1x port-control
This command is used to manually control the authorization state on a specific port. Use the no form of this command to reset the authorization state of the specific port to its default state (auto).
dot1x port-control {auto | force-authorized | force-unauthorized} no dot1x port-control
Parameters auto force-authorized force-unauthorized
Specifies to enable IEEE 802.1X authentication. The state (authorized or unauthorized) for a specific port is determined according to the outcome of the authentication.
Specifies to force a specific port to change to the authorized state without an authentication exchange.
Specifies to deny all access on a specific port by forcing the port to change to the unauthorized state, ignoring all authentication attempts.
Default
The default authorization state is auto.
Command Mode
Interface Configuration Mode.
Command Default Level
Level: 8
Usage Guideline
The configuration for this command on a specific port won’t be in operation if you don’t configure the port as an IEEE 802.1X PAE authenticator by using the ‘dot1x
pae authenticator’ command.
6
DXS-3600-32S 10GbE Layer 2/3 Switch CLI Reference Guide
Example
This example shows how to deny all access to port 1.
DXS-3600-32S#configure terminal
DXS-3600-32S(config)#interface tenGigabitEthernet 1
DXS-3600-32S(config-if)#dot1x port-control force-unauthorized
DXS-3600-32S(config-if)#
2-3 dot1x pae authenticator
This command is used to configure a specific port as an IEEE 802.1X port access entity (PAE) authenticator. Use the no form of this command to disable IEEE 802.1X authentication on the port.
dot1x pae authenticator no dot1x pae
Parameters
Default
Command Mode
None.
The 802.1X is disabled on a port by default.
Interface Configuration Mode.
Command Default Level
Level: 8
Usage Guideline
You must also globally enable IEEE 802.1X authentication on the switch by using the
‘dot1x system-auth-control’ command.
Example
This example shows how to configure port 1 as an IEEE 802.1X PAE authenticator.
DXS-3600-32S#configure terminal
DXS-3600-32S(config)#interface tenGigabitEthernet 1
DXS-3600-32S(config-if)#dot1x pae authenticator
DXS-3600-32S(config-if)#
2-4 dot1x control-direction
This command is used to configure the direction of the traffic on a controlled port as unidirectional (in) or bidirectional
(both). Use the no form of this command to reset the control direction of a port to its default value (both).
dot1x control-direction {both | in} no dot1x control-direction
Parameters both in
Specifies to enable bidirectional control. Both incoming and outgoing traffic through an IEEE 802.1X-enabled port are prevented if the port is not in the authorized state.
Specifies to enable unidirectional control. Incoming traffic through an IEEE 802.1Xenabled port is prohibited if the port is not the authorized state.
Default
Command Mode
The default is in bidirectional mode.
Interface Configuration Mode.
Command Default Level
Level: 8
7
Usage Guideline
DXS-3600-32S 10GbE Layer 2/3 Switch CLI Reference Guide
The configuration for this command on a specific port won’t be in operation if you don’t configure the port as an IEEE 802.1X PAE authenticator by using the ‘dot1x
pae authenticator’ command.
When the port is in the force-unauthorized state or in the unauthorized state after authentication, the traffic is controlled based on the setting of this command.
When the port is in the force-authorized state or becomes authorized after authentication, the traffic will be allowed in both directions.
Example
This example shows how to specify the direction of traffic through Ethernet port 1.
The direction is set as unidirectional.
DXS-3600-32S#configure terminal
DXS-3600-32S(config)#interface tenGigabitEthernet 1
DXS-3600-32S(config-if)#dot1x control-direction in
DXS-3600-32S(config-if)#
2-5 dot1x timeout
This command is used to configure the IEEE 802.1X timers.
dot1x timeout {quiet-period <sec 0-65535> | reauth-period <sec 1-65535> | server-timeout <sec 1-65535> |
supp-timeout <sec 1-65535> | tx-period <sec 1-65535>}
Parameters
quiet-period <sec 0-
65535>
reauth-period <sec 1-
65535>
server-timeout <sec 1-
65535>
supp-timeout <sec 1-
65535>
Number of seconds that the switch will be in the quiet state in the wake of a failed authentication process. The range is 0 to 65535
Number of seconds between re-authentication attempts. The range is 1 to 65535.
Number of seconds that the switch will wait for the request from the authentication server before timing out the server. The range is 1 to 65535.
Number of seconds that the switch will wait for the response from the supplicant before timing out the supplicant. The range is 1 to 65535.
tx-period <sec 1-65535> Number of seconds that the switch will wait for a response to an EAP-Request or
Identity frame from the supplicant before retransmitting the request. The range is 1 to 65535
Default
Command Mode
The default quiet period when authentication fails is 60 seconds (quiet-period).
The default re-authentication interval when authentication succeeds is 3600 seconds
(reauth-period).
The default timeout value waiting for a response from RADIUS is 30 seconds
(server-timeout).
The default timeout value waiting for a reply from Supplicant is 30 seconds (supptimeout).
The default transmission interval from the Authenticator to the Supplicant is 30 seconds (tx-period).
Interface Configuration Mode.
Command Default Level
Level: 8
Usage Guideline
The ‘dot1x timeout reauth-period’ command is in operation only if you have enabled re-authentication by using the ‘dot1x re-authentication interface
configuration’ command.
8
DXS-3600-32S 10GbE Layer 2/3 Switch CLI Reference Guide
Example
This example shows how to configure the quiet period, reauthentication period, server timeout value, supplicant timeout value, and transmission period for Ethernet port 1 to be 20, 1000, 15, 15, and 10 seconds, respectively.
DXS-3600-32S#configure terminal
DXS-3600-32S(config)#interface tenGigabitEthernet 1
DXS-3600-32S(config-if)#dot1x timeout quiet-period 20
DXS-3600-32S(config-if)#dot1x timeout reauth-period 1000
DXS-3600-32S(config-if)#dot1x timeout server-timeout 15
DXS-3600-32S(config-if)#dot1x timeout supp-timeout 15
DXS-3600-32S(config-if)#dot1x timeout tx-period 10
DXS-3600-32S(config-if)#
2-6 dot1x max-req
This command is used to configure the maximum number of times that the backend authentication state machine will retransmit an Extensible Authentication Protocol (EAP) request frame to the supplicant before restarting the authentication process. Use the no form of this command to reset the maximum number of times to its default value.
dot1x max-req <int 1-10>
no dot1x max-req
Parameters
max-req <int 1-10> Number of times that the switch retransmits an EAP frame to the supplicant before restarting the authentication process. The range is 1 to 10.
Default
Command Mode
The default value is 2 times.
Interface Configuration Mode.
Command Default Level
Level: 8
Usage Guideline
This command is used to set the maximum number of times that the backend authentication state machine will retransmit an Extensible Authentication Protocol
(EAP) request frame to the supplicant before restarting the authentication process.
Example
This example shows how to set the maximum number of retries allowed on port 1.
The maximum number of retries is set to 3.
DXS-3600-32S#configure terminal
DXS-3600-32S(config)#interface tenGigabitEthernet 1
DXS-3600-32S(config-if)#dot1x max-req 3
DXS-3600-32S(config-if)#
2-7 dot1x reauthentication
This command is used to enable periodic reauthentication. Use the no form of this command to return to disable periodic reuthentication.
dot1x reauthentication no dot1x reauthentication
Parameters
Default
Command Mode
None.
The periodic reauthentication on interface is disabled by default.
Interface Configuration Mode.
Command Default Level
Level: 8
9
Usage Guideline
DXS-3600-32S 10GbE Layer 2/3 Switch CLI Reference Guide
You can configure the number of seconds between reauthentication attempts by using the ‘dot1x timeout reauth-period’ command.
Example
This example shows how to enable periodic reauthentication on Ethernet port 1.
DXS-3600-32S#configure terminal
DXS-3600-32S(config)#interface tenGigabitEthernet 1
DXS-3600-32S(config-if)#dot1x reauthentication
DXS-3600-32S(config-if)#
2-8 dot1x re-authenticate
This command is used to reauthenticate a specific port or a specific MAC address.
dot1x re-authenticate {interface <interface-id> | mac-address <mac-address>}
Parameters
interface <interface-id>
mac-address <mac-
address>
(Optional) Specifies a port to reauthenticate. Valid interfaces are physical ports.
(Optional) Specifies a MAC address to re-authenticate. The function can be used only if the authentication mode is host-based.
Default
This command has no default value.
Command Mode
Global Configuration Mode.
Command Default Level
Level: 8
Usage Guideline
Under port-based mode, use the parameter interface <interface-id> to reauthenticate a specific port. Under host-based mode, use the parameter mac-
address <mac-address> to reauthenticate a specific MAC address.
Example
This example shows how to reauthenticate Ethernet port 1.
DXS-3600-32S#configure terminal
DXS-3600-32S(config)#dot1x re-authenticate interface tenGigabitEthernet 1
DXS-3600-32S(config)#
2-9 dot1x initialize
This command is used to initialize the authenticator state machine on a specific port or associated with a specific MAC address.
dot1x initialize {interface <interface-id> | mac-address <mac-address>}
Parameters
interface <interface-id>
mac-address <mac-
address>
(Optional) Specifies a port on which the authenticator state machine will be initialized. Valid interfaces are physical ports.
(Optional) Specifies a MAC address with which the authenticator state machine associates will be initialized. The function can be used only if the authentication mode is host-based.
Default
Command Mode
None.
Global Configuration Mode.
Command Default Level
Level: 8
10
Usage Guideline
DXS-3600-32S 10GbE Layer 2/3 Switch CLI Reference Guide
Under port-based mode, use the parameter interface <interface-id> to initialize a specific port. Under host-based mode, use the parameter mac-address <mac-
address> to initialize a specific MAC address.
Example
This example shows how to initialize the authenticator state machine on Ethernet port 1.
DXS-3600-32S#configure terminal
DXS-3600-32S(config)#dot1x initialize interface tenGigabitEthernet 1
DXS-3600-32S(config)#
2-10 dot1x system-auth-control
This command is used to globally enable IEEE 802.1X authentication on the switch. Use the no form of this command to disable IEEE 802.1X function.
dot1x system-auth-control no dot1x system-auth-control
Parameters
Default
Command Mode
None.
802.1X is disabled globally by default.
Global Configuration Mode.
Command Default Level
Level: 8
Usage Guideline
Use this command to enable 802.1X authentication globally.
Example
This example shows how to enable IEEE 802.1X authentication on the switch.
DXS-3600-32S#configure terminal
DXS-3600-32S(config)#dot1x system-auth-control
DXS-3600-32S(config)#
2-11 dot1x system-max-user
This command is used to configure the maximum number of users that can be learned via 802.1X authentication. Use the no form of this command to reset to the defaulting settings.
dot1x system-max-user <int 1-4096>
no dot1x system-max-user
Parameters
<int 1-4096>
Specifies the maximum number of users.
Default
Command Mode
By default, the maximum number of users that can be learned via 802.1X authentication is 4096.
Global Configuration Mode.
Command Default Level
Level: 8
Usage Guideline
The setting is a global limitation on the maximum number of users that can be learned via 802.1X authentication. In addition to the global limitation, the maximum number of users per port is also limited.
11
DXS-3600-32S 10GbE Layer 2/3 Switch CLI Reference Guide
Example
This example shows how to configure the maximum number of users, that is allowed to be learned via the 802.1X authentication. The maximum number of users allowed is 128.
DXS-3600-32S#configure terminal
DXS-3600-32S(config)#dot1x system-max-user 128
DXS-3600-32S(config)#
2-12 dot1x port-max-user
This command is used to configure the maximum number of users that can be learned via 802.1X authentication on a specific port. Use the no form of this command to reset to the defaulting settings.
dot1x port-max-user <int 1-4096>
no dot1x port-max-user
Parameters
<int 1-4096>
Specifies the maximum number of users on a port.
Default
By default, the maximum number of users that can be learned via 802.1X authentication on a port is 16.
Interface Configuration Mode.
Command Mode
Command Default Level
Level: 8
Usage Guideline
The setting is an interface limitation on the maximum number of users that can be learned via 802.1X authentication. In addition to the interface limitation, the global maximum number of users is also limited.
Example
This example shows how to configure the maximum numbers of users allowed on port 1. The maximum number of users allowed is 32.
DXS-3600-32S#configure terminal
DXS-3600-32S(config)#interface tenGigabitEthernet 1
DXS-3600-32S(config-if)#dot1x port-max-user 32
DXS-3600-32S(config-if)#
2-13 dot1x system-fwd-pdu
This command is used to globally control the forwarding of EAPoL PDUs. Use the no form of this command to reset to the defaulting settings.
dot1x system-fwd-pdu no dot1x system-fwd-pdu
Parameters
Default
Command Mode
None.
802.1X can not forward EAPoL PDUs by default.
Global Configuration Mode.
Command Default Level
Level: 8
Usage Guideline
When 802.1X functionality is disabled globally or for a port, and if 802.1X is set to forward EAPoL PDUs both globally and for the port, a received EAPOL packet on the port will be flooded in the same VLAN to those ports which have 802.1X forwarding EAPoL PDUs enabled and 802.1X is disabled (globally or just for the port). 802.1X can not forward EAPoL PDUs by default.
12
DXS-3600-32S 10GbE Layer 2/3 Switch CLI Reference Guide
Example
This example shows how to enable the forwarding of EAPoL PDUs, globally, on the switch.
DXS-3600-32S#configure terminal
DXS-3600-32S(config)#dot1x system-fwd-pdu
DXS-3600-32S(config)#
2-14 dot1x port-fwd-pdu
This command used to control the forwarding of EAPoL PDUs on specific ports. Use the no form of this command to reset to the defaulting settings.
dot1x port-fwd-pdu no dot1x port-fwd-pdu
Parameters
Default
Command Mode
None.
802.1X can not forward EAPoL PDUs on all ports by default.
Interface Configuration Mode.
Command Default Level
Level: 8
Usage Guideline
This is a per-port setting to control the forwarding of EAPOL PDUs. When 802.1X functionality is disabled globally or for a port, and if 802.1X is set to forward EAPoL
PDUs both globally and for the port, a received EAPOL packet on the port will be flooded in the same VLAN to those ports which have 802.1X forwarding EAPoL
PDUs and 802.1X is disabled (globally or just for the port). 802.1X can not forward
EAPoL PDUs on all ports by default.
Example
This example shows how to enable the forwarding of EAPoL PDUs on port 1.
DXS-3600-32S#configure terminal
DXS-3600-32S(config)#dot1x system-fwd-pdu
DXS-3600-32S(config)#end
DXS-3600-32S#configure terminal
DXS-3600-32S(config)#interface tenGigabitEthernet 1
DXS-3600-32S(config-if)#no dot1x pae
DXS-3600-32S(config-if)#dot1x port-fwd-pdu
DXS-3600-32S(config-if)#
2-15 show dot1x
This command is used to display the IEEE 802.1X global configuration, interface configuration, authentication state, statistics, diagnostics, and session statistics.
show dot1x [[interface INTERFACE-ID] {auth-configuration | auth-state | statistics | diagnostics | session-
statistics}]
Parameters
interface INTERFACE-ID (Optional) Specifies a port to display authentication state, configuration, statistics, diagnostics, or session statistics.
auth-configuration auth-state
Displays the IEEE 802.1X interface configuration.
Displays the IEEE 802.1X authentication state.
statistics diagnostics session-statistics
Displays the IEEE 802.1X information about the authenticator statistics
Displays the IEEE 802.1X information about the authenticator diagnostics.
Displays the IEEE 802.1X information about the authenticator session statistics.
13
DXS-3600-32S 10GbE Layer 2/3 Switch CLI Reference Guide
Default
Command Mode
None.
Privileged EXEC Mode.
Command Default Level
Level: 3
Usage Guideline
Use this command display the IEEE 802.1X global configuration, interface configuration, authentication state, statistics, diagnostics, and session statistics.
When no interface is specified, information about all interfaces will be displayed.
Example
DXS-3600-32S#show dot1x
This example shows how to display the 802.1X global configuration.
802.1X : Disabled
Forward EAPOL PDU : Disabled
Max User : 4096
DXS-3600-32S#
Example
This example shows how to display the 802.1X configuration for the interface TGi/1.
DXS-3600-32S#show dot1x interface tenGigabitEthernet 1 auth-configuration
Interface : TGi/1
Capability : None
AdminCrlDir : Both
OperCrlDir : Both
Port Control : Auto
QuietPeriod : 60 sec
TxPeriod : 30 sec
SuppTimeout : 30 sec
ServerTimeout : 30 sec
MaxReq : 2 times
ReAuthPeriod : 3600 sec
ReAuthenticate : Disabled
Forward EAPOL PDU On Port : Disabled
Max User On Port : 16
DXS-3600-32S#
Example
This example shows how to display the 802.1X authentication state.
DXS-3600-32S#show dot1x auth-state
Status: A - Authorized; U - Unauthorized; (P): Port-Based 802.1X;Pri:Priority
Interface MAC Address Auth PAE State Backend State Status VID Pri
VID
------ ----------------- --- -------------- ------------- ------ ---- ---
TGi/1 00-00-00-00-00-01 10 Authenticated Idle A 4004 3
TGi/1 00-00-00-00-00-02 10 Authenticated Idle A 1234 -
TGi/1 00-00-00-00-00-04 30 Authenticating Response U - -
TGi/2 - (P) - Authenticating Request U - -
TGi/3 - (P) - Connecting Idle U - -
TGi/14 - (P) - Held Fail U - -
Total Authenticating Hosts :2
Total Authenticated Hosts :2
DXS-3600-32S#
14
DXS-3600-32S 10GbE Layer 2/3 Switch CLI Reference Guide
Example
This example shows how to display the 802.1X statistics for the interface TGi/1.
DXS-3600-32S#show dot1x interface tenGigabitEthernet 1 statistics
MAC Address : 00-00-00-00-00-02
Interface : TGi/1
EapolFramesRx 0
EapolFramesTx 6
EapolStartFramesRx 0
EapolReqIdFramesTx 6
EapolLogoffFramesRx 0
EapolReqFramesTx 0
EapolRespIdFramesRx 0
EapolRespFramesRx 0
InvalidEapolFramesRx 0
EapLengthErrorFramesRx 0
LastEapolFrameVersion 0
LastEapolFrameSource 00-00-00-00-00-03
DXS-3600-32S#
Example
This example shows how to display the 802.1X diagnostics for the interface TGi/1.
DXS-3600-32S#show dot1x interface tenGigabitEthernet 1 diagnostics
MAC Address : 00-00-00-00-00-02
Interface : TGi/1
EntersConnecting 20
EapLogoffsWhileConnecting 0
EntersAuthenticating 0
SuccessWhileAuthenticating 0
TimeoutsWhileAuthenticating 0
FailWhileAuthenticating 0
ReauthsWhileAuthenticating 0
EapStartsWhileAuthenticating 0
EapLogoffWhileAuthenticating 0
ReauthsWhileAuthenticated 0
EapStartsWhileAuthenticated 0
EapLogoffWhileAuthenticated 0
BackendResponses 0
BackendAccessChallenges 0
BackendOtherRequestsToSupplicant 0
BackendNonNakResponsesFromSupplicant 0
BackendAuthSuccesses 0
BackendAuthFails 0
DXS-3600-32S#
15
DXS-3600-32S 10GbE Layer 2/3 Switch CLI Reference Guide
Example
This example shows how to display the 802.1X session statistics for the interface
TGi/1.
DXS-3600-32S#show dot1x interface tenGigabitEthernet 1 session
MAC Address : 00-00-00-00-00-02
Interface : TGi/1
SessionOctetsRx 0
SessionOctetsTx 0
SessionFramesRx 0
SessionFramesTx 0
SessionId ether1_1-1
SessionAuthenticMethod Remote Authentication Server
SessionTime 3
SessionTerminateCause NotTerminatedYet
SessionUserName user_test
DXS-3600-32S#
16
advertisement
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Related manuals
advertisement
Table of contents
- 9 Basic CLI Commands
- 9 1-1 help
- 10 1-2 prompt
- 10 1-3 banner login
- 12 1-4 exit
- 12 1-5 end
- 14 802.1X Commands
- 14 2-1 dot1x default
- 14 2-2 dot1x port-control
- 15 2-3 dot1x pae authenticator
- 15 2-4 dot1x control-direction
- 16 2-5 dot1x timeout
- 17 2-6 dot1x max-req
- 17 2-7 dot1x reauthentication
- 18 2-8 dot1x re-authenticate
- 18 2-9 dot1x initialize
- 19 2-10 dot1x system-auth-control
- 19 2-11 dot1x system-max-user
- 20 2-12 dot1x port-max-user
- 20 2-13 dot1x system-fwd-pdu
- 21 2-14 dot1x port-fwd-pdu
- 21 2-15 show dot1x
- 25 Authentication, Authorization, and Accounting (AAA) Commands
- 25 3-1 aaa
- 25 3-2 aaa authentication login
- 26 3-3 aaa authentication enable
- 27 3-4 login authentication
- 27 3-5 aaa authorization exec
- 28 3-6 aaa authorization console
- 29 3-7 authorization exec
- 29 3-8 aaa accounting exec
- 30 3-9 accounting exec
- 31 3-10 ip http authentication aaa
- 32 3-11 aaa local authentication attempts
- 32 3-12 aaa local authentication lockout-time
- 33 3-13 aaa authentication network
- 33 3-14 aaa authorization network
- 34 3-15 aaa accounting network
- 35 3-16 aaa group server
- 35 3-17 server
- 36 3-18 show aaa
- 36 3-19 show aaa server group
- 37 3-20 show aaa authentication
- 38 3-21 show aaa authorization
- 38 3-22 show aaa accounting
- 39 3-23 show aaa application
- 42 Access Control List (ACL) Commands
- 42 4-1 ip access-list standard
- 42 4-2 permit | deny (ip standard access-list)
- 43 4-3 ip access-list extended
- 44 4-4 permit | deny (ip extended access-list)
- 46 4-5 ipv6 access-list
- 46 4-6 permit | deny (ipv6 access-list)
- 48 4-7 mac access-list
- 49 4-8 permit | deny (mac access-list)
- 50 4-9 expert access-list
- 51 4-10 permit | deny (expert access-list)
- 53 4-11 ip access-list resequence
- 54 4-12 list-remark text
- 54 4-13 show access-lists
- 55 4-14 ip access-group
- 56 4-15 ipv6 traffic-filter
- 57 4-16 mac access-group
- 57 4-17 expert access-group
- 58 4-18 show access-group
- 59 4-19 show ip access-group
- 59 4-20 show ipv6 access-group
- 60 4-21 show mac access-group
- 60 4-22 show expert access-group
- 61 4-23 vlan access-map
- 61 4-24 match ip / mac address
- 62 4-25 action
- 63 4-26 vlan filter
- 63 4-27 show vlan access-map
- 64 4-28 show vlan filter
- 65 Address Resolution Protocol (ARP) Commands
- 65 5-1 arp
- 65 5-2 arp timeout
- 66 5-3 clear arp cache
- 67 5-4 show arp
- 69 5-5 show arp counter
- 69 5-6 show arp timeout
- 70 5-7 show ip arp
- 71 Alternate Store and Forward (ASF) Commands
- 71 6-1 enable asf
- 71 6-2 no asf
- 71 6-3 show asf
- 73 Border Gateway Protocol (BGP) Commands
- 73 7-1 aggregate-address
- 73 7-2 bgp router-id
- 74 7-3 bgp aggregate-next-hop-check
- 75 7-4 bgp always-compare-med
- 75 7-5 bgp bestpath as-path ignore
- 76 7-6 bgp bestpath compare-confed-aspath
- 77 7-7 bgp bestpath compare-routerid
- 77 7-8 bgp bestpath med confed
- 78 7-9 bgp bestpath med missing-as-worst
- 78 7-10 bgp client-to-client reflection
- 79 7-11 bgp cluster-id
- 79 7-12 bgp confederation identifier
- 80 7-13 bgp confederation peers
- 81 7-14 bgp dampening
- 82 7-15 bgp default local-preference
- 83 7-16 bgp deterministic-med
- 84 7-17 bgp enforce-first-as
- 84 7-18 bgp fast-external-fallover
- 85 7-19 clear ip bgp
- 86 7-20 clear ip bgp dampening
- 87 7-21 clear ip bgp external
- 88 7-22 clear ip bgp flap-statistics
- 88 7-23 clear ip bgp peer-group
- 90 7-24 ip as-path access-list
- 90 7-25 ip community-list
- 92 7-26 neighbor activate
- 92 7-27 neighbor advertisement-interval
- 93 7-28 neighbor allowas-in
- 94 7-29 neighbor capability orf prefix-list
- 95 7-30 neighbor default-originate
- 96 7-31 neighbor description
- 97 7-32 neighbor ebgp-multihop
- 98 7-33 neighbor filter-list
- 98 7-34 neighbor maximum-prefix
- 99 7-35 neighbor next-hop-self
- 100 7-36 neighbor password
- 101 7-37 neighbor peer-group (add group member)
- 103 7-38 neighbor peer-group (create group)
- 103 7-39 neighbor prefix-list
- 104 7-40 neighbor remote-as
- 105 7-41 neighbor remove-private-as
- 106 7-42 neighbor route-map
- 106 7-43 neighbor route-reflector-client
- 107 7-44 neighbor send-community
- 108 7-45 neighbor shutdown
- 108 7-46 neighbor soft-reconfiguration inbound
- 109 7-47 neighbor timers
- 110 7-48 neighbor unsuppress-map
- 111 7-49 neighbor update-source
- 111 7-50 neighbor weight
- 112 7-51 network (BGP)
- 113 7-52 redistribute
- 114 7-53 route-preference
- 114 7-54 router bgp
- 115 7-55 show ip as-path access-list
- 116 7-56 show ip bgp
- 118 7-57 show ip bgp aggregate
- 119 7-58 show ip bgp cidr-only
- 120 7-59 show ip bgp community
- 122 7-60 show ip bgp community-list
- 123 7-61 show ip bgp confederation
- 124 7-62 show ip bgp dampening dampened-paths
- 125 7-63 show ip bgp dampening parameters
- 125 7-64 show ip bgp dampening flap-statistics
- 126 7-65 show ip bgp filter-list
- 127 7-66 show ip bgp inconsistent-as
- 129 7-67 show ip bgp neighbors
- 137 7-68 show ip bgp network
- 137 7-69 show ip bgp reflection
- 138 7-70 show ip bgp route-map
- 139 7-71 show ip bgp parameters
- 141 7-72 show ip bgp peer-group
- 143 7-73 show ip bgp quote-regexp
- 145 7-74 show ip bgp summary
- 146 7-75 show ip community-list
- 147 7-76 synchronization
- 147 7-77 timers bgp
- 148 7-78 debug ip bgp
- 148 7-79 debug ip bgp fsm-event
- 149 7-80 debug ip bgp packet
- 150 7-81 debug ip bgp error
- 150 7-82 debug ip bgp route-map
- 150 7-83 debug ip bgp access-list
- 151 7-84 debug ip bgp prefix-list
- 151 7-85 debug ip bgp show global
- 152 7-86 debug ip bgp show neighbors
- 153 7-87 debug ip bgp show peer-group
- 154 7-88 debug ip bgp show network
- 155 7-89 debug ip bgp show aggregate
- 155 7-90 debug ip bgp show damp
- 156 7-91 debug ip bgp show interface
- 157 7-92 debug ip bgp show timer
- 157 7-93 debug ip bgp show redistribution
- 158 7-94 debug ip bgp show as-path-access-list
- 159 7-95 debug ip bgp show community-list
- 160 Compound Authentication Commands
- 160 8-1 network-access guest-vlan
- 160 8-2 show network-access guest-vlan
- 161 8-3 network-access authentication-mode
- 161 8-4 show network-access auth-configure
- 163 Configuration Commands
- 163 9-1 show running-config
- 163 9-2 show bootup-config
- 164 9-3 execute flash:
- 165 9-4 configure replace
- 166 9-5 boot config flash
- 167 9-6 copy running-config
- 168 9-7 copy bootup-config
- 170 9-8 copy
- 174 Counter Commands
- 174 10-1 clear counters
- 174 10-2 show interfaces counters
- 175 10-3 show utilization
- 177 CPU Commands
- 177 11-1 show cpu
- 178 Debug Commands
- 178 12-1 debug enable
- 178 12-2 error-reboot enable
- 179 12-3 copy error-log
- 179 12-4 copy debug buffer
- 180 12-5 debug output
- 180 12-6 show error-log
- 181 12-7 clear error-log
- 181 12-8 show error-reboot
- 182 12-9 clear debug buffer
- 182 12-10 show debug buffer
- 183 12-11 show debug status
- 183 12-12 show tech-support
- 184 12-13 copy tech-support
- 185 12-14 debug show module_version
- 186 DHCP Relay Commands
- 186 13-1 service dhcp
- 186 13-2 ip helper-address
- 186 13-3 ip dhcp relay information option82
- 187 13-4 ip dhcp relay option60
- 187 13-5 ip dhcp relay option60 identifier
- 188 13-6 ip dhcp relay option60 default
- 188 13-7 show ip dhcp relay option60
- 189 13-8 ip dhcp relay option61
- 190 13-9 ip dhcp relay option61 identifier
- 190 13-10 ip dhcp relay option61 default
- 191 13-11 show ip dhcp relay option61
- 192 DHCP Server Commands
- 192 14-1 bootfile
- 192 14-2 default-router
- 193 14-3 dns-server
- 193 14-4 domain-name
- 194 14-5 hardware-address
- 194 14-6 host
- 195 14-7 ip dhcp excluded-address
- 195 14-8 ip dhcp ping packet
- 196 14-9 ip dhcp ping timeout
- 196 14-10 ip dhcp pool
- 197 14-11 lease
- 198 14-12 netbios-name-server
- 198 14-13 netbios-node-type
- 199 14-14 network
- 200 14-15 next-server
- 200 14-16 service dhcp
- 201 14-17 clear ip dhcp binding
- 201 14-18 clear ip dhcp conflict
- 202 14-19 show ip dhcp binding
- 202 14-20 show ip dhcp conflict
- 204 D-Link License Management System Commands
- 204 15-1 install dlms activation_code
- 204 15-2 show dlms license
- 206 Domain Name System (DNS) Commands
- 206 16-1 ip domain-lookup
- 206 16-2 ip name-server
- 206 16-3 ip host
- 207 16-4 clear host
- 207 16-5 show hosts
- 208 16-6 ip dns server
- 209 DoS Attack Prevention Commands
- 209 17-1 defense
- 211 17-2 show defense
- 212 Distance Vector Multicast Routing Protocol (DVMRP) Commands
- 212 18-1 ip dvmrp
- 212 18-2 ip dvmrp metric
- 213 18-3 show ip dvmrp interface
- 214 18-4 show ip dvmrp neighbor
- 215 18-5 show ip dvmrp route
- 217 Filter Database (FDB) Commands
- 217 19-1 mac-address-table aging-time
- 217 19-2 clear mac-address-table
- 218 19-3 mac-address-table static
- 219 19-4 mac-address-table filtering
- 220 19-5 mac-address-table notification
- 221 19-6 snmp trap mac-notification
- 221 19-7 show mac-address-table aging-time
- 221 19-8 show mac-address-table notification
- 222 19-9 show mac-address-table
- 225 File System Commands
- 225 20-1 dir
- 225 20-2 ls
- 226 20-3 cp
- 226 20-4 cd
- 227 20-5 rename
- 227 20-6 mkdir
- 228 20-7 rmdir
- 228 20-8 rm
- 228 20-9 del
- 229 20-10 makefs
- 229 20-11 pwd
- 231 GARP VLAN Registration Protocol (GVRP) Commands
- 231 21-1 clear gvrp statistics interface
- 231 21-2 gvrp (Global)
- 231 21-3 gvrp (Interface)
- 232 21-4 gvrp advertise (Interface)
- 233 21-5 gvrp dynamic-vlan-creation
- 233 21-6 forbidden vlan
- 234 21-7 gvrp timer
- 234 21-8 show gvrp
- 235 21-9 show gvrp statistics
- 237 Internet Group Management Protocol (IGMP) Commands
- 237 22-1 clear ip igmp group
- 237 22-2 ip igmp static-group
- 238 22-3 ip igmp last-member-query-interval
- 238 22-4 ip igmp query-interval
- 239 22-5 ip igmp query-max-response-time
- 239 22-6 ip igmp robustness-variable
- 240 22-7 ip igmp version
- 241 22-8 ip igmp check-subscriber-source-network
- 241 22-9 show ip igmp interface
- 242 22-10 show ip igmp groups
- 246 IGMP Snooping Commands
- 246 23-1 ip igmp snooping
- 246 23-2 ip igmp snooping fast-leave
- 247 23-3 ip igmp snooping mrouter
- 248 23-4 ip igmp snooping dyn-mr-aging-time
- 248 23-5 ip igmp snooping querier
- 249 23-6 ip igmp snooping static-group
- 250 23-7 ip igmp snooping max-response-time
- 251 23-8 ip igmp snooping query-interval
- 251 23-9 ip igmp snooping version
- 252 23-10 clear ip igmp snooping statistics
- 253 23-11 show ip igmp snooping
- 254 23-12 show ip igmp snooping querier
- 255 23-13 show ip igmp snooping groups
- 256 23-14 show ip igmp snooping static-group
- 257 23-15 show ip igmp snooping mrouter
- 258 23-16 show ip igmp snooping forwarding-table
- 259 23-17 show ip igmp snooping statistics
- 261 Interface Commands
- 261 24-1 interface out-band
- 261 24-2 shutdown
- 261 24-3 show interface out-band
- 263 IP Access List Commands
- 263 25-1 ip standard access-list
- 263 25-2 deny
- 264 25-3 permit
- 264 25-4 show ip standard access-list
- 266 IP Address Commands
- 266 26-1 ip address
- 266 26-2 ip address dhcp
- 267 26-3 ip directed-broadcast
- 267 26-4 ip default-gateway
- 268 26-5 show ip interface
- 269 IP Prefix List Commands
- 269 27-1 ip prefix-list
- 270 27-2 ip prefix-list description
- 270 27-3 clear ip prefix-list counter
- 271 27-4 show ip prefix-list
- 273 IP Multicast (IPMC) Commands
- 273 28-1 ip mroute
- 274 28-2 ip multicast-routing
- 274 28-3 show ip mroute
- 276 28-4 show ip rpf
- 277 28-5 show ip multicast interface
- 278 28-6 show ip multicast-routing
- 280 LINE Commands
- 280 29-1 line
- 280 29-2 exec-timeout
- 281 29-3 speed
- 281 29-4 show line
- 283 Link Aggregation Commands
- 283 30-1 aggregateport load-balance
- 283 30-2 lacp port-priority
- 284 30-3 lacp system-priority
- 284 30-4 lacp timeout
- 285 30-5 port-group
- 285 30-6 port-group mode
- 286 30-7 show aggregateport
- 286 30-8 show lacp summary
- 289 Link Layer Discovery Protocol (LLDP) Commands
- 289 31-1 lldp run
- 289 31-2 lldp forward
- 290 31-3 lldp message-tx-interval
- 290 31-4 lldp message-tx-hold-multiplier
- 291 31-5 lldp tx-delay
- 291 31-6 lldp reinit-delay
- 292 31-7 lldp notification-interval
- 293 31-8 lldp notification
- 293 31-9 lldp management-address
- 294 31-10 lldp transmit
- 295 31-11 lldp receive
- 295 31-12 lldp tlv-select
- 296 31-13 lldp dot1-tlv-select
- 298 31-14 lldp dot3-tlv-select
- 299 31-15 show lldp
- 299 31-16 show lldp management-address
- 300 31-17 show lldp interface
- 301 31-18 show lldp local interface
- 303 31-19 show lldp remote interface
- 305 31-20 show lldp statistic
- 305 31-21 show lldp statistic interface
- 307 LLDP-MED Commands
- 307 32-1 lldp-med fast-start-repeat-count
- 307 32-2 lldp-med notification-topo-change
- 307 32-3 lldp-med tlv-select
- 308 32-4 show lldp-med
- 309 32-5 show lldp-med interface
- 309 32-6 show lldp-med local
- 310 32-7 show lldp-med remote
- 312 Memory Commands
- 312 33-1 show memory
- 313 Mirror Commands
- 313 34-1 monitor session
- 314 34-2 no monitor session all
- 314 34-3 show monitor
- 316 Multicast Filter Mode Commands
- 316 35-1 multicast filtering-mode
- 316 35-2 show multicast filtering-mode
- 318 Network Connectivity Test Commands
- 318 36-1 ping
- 318 36-2 traceroute
- 320 Open Shortest Path First (OSPF) Version 2 Commands
- 320 37-1 area
- 320 37-2 area default-cost
- 321 37-3 area nssa
- 322 37-4 area range
- 323 37-5 area stub
- 323 37-6 area virtual-link
- 325 37-7 clear ip ospf process
- 325 37-8 default-information originate
- 326 37-9 default-metric
- 326 37-10 route-preference ospf
- 327 37-11 distribute-list in
- 328 37-12 ip ospf authentication
- 329 37-13 ip ospf authentication-key
- 329 37-14 ip ospf cost
- 330 37-15 ip ospf dead-interval
- 330 37-16 ip ospf hello-interval
- 331 37-17 ip ospf message-digest-key
- 332 37-18 ip ospf priority
- 332 37-19 network area
- 333 37-20 passive-interface
- 334 37-21 redistribute
- 335 37-22 router ospf
- 336 37-23 router-id
- 336 37-24 show ip ospf
- 338 37-25 show ip ospf area
- 339 37-26 show ip ospf database
- 341 37-27 show ip ospf interface
- 343 37-28 show ip ospf neighbor
- 343 37-29 show ip ospf virtual-link
- 344 37-30 show ip ospf virtual-neighbor
- 345 37-31 debug ip ospf
- 345 37-32 debug ip ospf neighbor
- 346 37-33 debug ip ospf interface
- 346 37-34 debug ip ospf lsa-originating
- 347 37-35 debug ip ospf lsa-flooding
- 347 37-36 debug ip ospf packet-receiving
- 348 37-37 debug ip ospf packet-transmitting
- 348 37-38 debug ip ospf spf
- 349 37-39 debug ip ospf timer
- 349 37-40 debug ip ospf virtual-link
- 350 37-41 debug ip ospf route
- 350 37-42 debug ip ospf redistribution
- 351 37-43 debug ip ospf show counter
- 352 37-44 debug ip ospf clear counter
- 352 37-45 debug ip ospf show database
- 353 37-46 debug ip ospf show request-list
- 354 37-47 debug ip ospf show redistribution
- 354 37-48 debug ip ospf show summary-list
- 355 37-49 debug ip ospf log
- 356 Password Recovery Commands
- 356 38-1 clear
- 356 38-2 reload
- 357 38-3 password-recover
- 357 38-4 show password-recover
- 359 Peripheral Commands
- 359 39-1 show system-info
- 359 39-2 show device-status
- 360 39-3 logging-server enable device
- 361 Protocol Independent Multicast (PIM) Commands
- 361 40-1 ip pim
- 361 40-2 ip pim query-interval
- 362 40-3 ip pim join-prune-interval
- 363 40-4 ip pim dr-priority
- 363 40-5 ip pim register-suppression
- 364 40-6 ip pim rp-address
- 365 40-7 ip pim rp-candidate
- 367 40-8 ip pim spt-threshold
- 367 40-9 ip pim rp-register-kat
- 368 40-10 ip pim bsr-candidate
- 369 40-11 ip pim old-register-checksum
- 369 40-12 ip pim ssm
- 370 40-13 show ip pim dense-mode interface
- 371 40-14 show ip pim neighbor
- 372 40-15 show ip pim sparse-mode bsr-router
- 373 40-16 show ip pim sparse-mode interface
- 374 40-17 show ip pim sparse-mode rp mapping
- 375 40-18 show ip pim sparse-mode rp-hash
- 376 40-19 show ip pim
- 377 40-20 debug ip pim ssm
- 379 Port Commands
- 379 41-1 interface
- 379 41-2 medium-type
- 380 41-3 speed
- 380 41-4 shutdown
- 381 41-5 description
- 381 41-6 duplex
- 382 41-7 flowcontrol
- 382 41-8 mtu
- 383 41-9 snmp trap link-status
- 383 41-10 show interface
- 385 Port Security Commands
- 385 42-1 switchport port-security
- 386 42-2 switchport port-security aging
- 387 42-3 switchport port-security mac-address
- 389 42-4 clear port-security
- 390 42-5 show port-security
- 393 Protocol Independent Commands
- 393 43-1 clear ip route
- 393 43-2 route-preference default
- 394 43-3 route-preference static
- 394 43-4 ip mtu
- 395 43-5 ip ecmp load-balance
- 396 43-6 ip route
- 397 43-7 show ip route-preference
- 399 43-8 show ip ecmp load-balance
- 399 43-9 show ip route
- 402 Quality of Service (QoS) Commands
- 402 44-1 class
- 402 44-2 class-map
- 403 44-3 match
- 404 44-4 mls qos cos
- 404 44-5 mls qos map dscp-cos
- 405 44-6 mls qos scheduler
- 405 44-7 mls qos trust
- 406 44-8 police sr-tcm
- 408 44-9 police tr-tcm cir
- 409 44-10 police rate
- 410 44-11 policy-map
- 411 44-12 priority-queue cos-map
- 412 44-13 queue bandwidth
- 413 44-14 rate-limit
- 413 44-15 service-policy
- 414 44-16 set
- 415 44-17 show class-map
- 415 44-18 show mls qos interface
- 416 44-19 show mls qos maps
- 416 44-20 show mls qos queueing
- 417 44-21 show mls qos rate-limit
- 418 44-22 show mls qos scheduler
- 418 44-23 show policy-map
- 419 44-24 wdrr-queue bandwidth
- 420 44-25 wrr-queue bandwidth
- 421 RADIUS Commands
- 421 45-1 radius-server host
- 421 45-2 radius-server key
- 422 45-3 radius-server retransmit
- 422 45-4 radius-server timeout
- 423 45-5 show radius statistics
- 424 45-6 show radius-server configuration
- 426 Routing Information Protocol (RIP) Commands
- 426 46-1 route-preference
- 426 46-2 distribute-list in (RIP)
- 427 46-3 ip rip authentication mode
- 427 46-4 ip rip authentication text-password
- 428 46-5 ip rip receive enable
- 429 46-6 ip rip receive version
- 430 46-7 ip rip send enable
- 430 46-8 ip rip send version
- 431 46-9 ip rip v2-broadcast
- 432 46-10 network
- 432 46-11 redistribute (RIP)
- 433 46-12 router rip
- 434 46-13 show ip rip
- 435 46-14 show ip rip interface
- 436 46-15 timers basic
- 437 46-16 version
- 438 Remote Network MONitoring (RMON) Commands
- 438 47-1 rmon collection stats
- 438 47-2 rmon collection history
- 439 47-3 rmon alarm
- 440 47-4 rmon event
- 440 47-5 show rmon statistics
- 441 47-6 show rmon history
- 442 47-7 show rmon alarm
- 443 47-8 show rmon event
- 444 Route Map Commands
- 444 48-1 route-map
- 445 48-2 match as-path
- 445 48-3 match community
- 446 48-4 match interface
- 446 48-5 match ip address
- 447 48-6 match ip next-hop
- 448 48-7 match ip route-source
- 448 48-8 match metric
- 449 48-9 match route-type
- 449 48-10 set as-path prepend
- 450 48-11 set community
- 450 48-12 set dampening
- 451 48-13 set ip next-hop
- 452 48-14 set local-preference
- 453 48-15 set metric
- 453 48-16 set metric-type
- 454 48-17 set origin
- 454 48-18 set weight
- 455 48-19 show route-map
- 456 Simple Network Management Protocol (SNMP) Commands
- 456 49-1 snmp-server
- 456 49-2 no enable service snmp-agent
- 457 49-3 snmp-server name
- 457 49-4 snmp-server contact
- 458 49-5 snmp-server location
- 458 49-6 snmp-server view
- 459 49-7 snmp-server group
- 461 49-8 snmp-server user
- 462 49-9 snmp-server community
- 462 49-10 snmp-server enable traps
- 463 49-11 snmp-server host
- 464 49-12 show snmp community
- 465 49-13 show snmp user
- 465 49-14 show snmp group
- 466 49-15 show snmp view
- 467 49-16 show snmp host
- 468 Simple Network Time Protocol (SNTP) and Clock Commands
- 468 50-1 sntp enable
- 468 50-2 sntp server
- 469 50-3 sntp interval
- 469 50-4 show sntp
- 470 50-5 clock set
- 471 50-6 clock timezone
- 471 50-7 clock summer-time
- 472 50-8 show clock
- 474 Secure Shell (SSH) Commands
- 474 51-1 ip ssh time-out
- 474 51-2 ip ssh authentication-retries
- 475 51-3 ip ssh port
- 475 51-4 ip ssh server enable
- 476 51-5 show ip ssh server
- 476 51-6 show ip ssh sessions
- 478 Spanning Tree Protocol (STP) Commands
- 478 52-1 spanning-tree (global configuration)
- 478 52-2 spanning-tree reset
- 478 52-3 spanning-tree (timers)
- 479 52-4 spanning-tree tx-hold-count
- 480 52-5 spanning-tree max-hops
- 480 52-6 spanning-tree mode
- 481 52-7 spanning-tree mst configure
- 482 52-8 instance
- 482 52-9 name
- 483 52-10 revision_level
- 484 52-11 spanning-tree mst
- 484 52-12 spanning-tree mst priority
- 485 52-13 clear spanning-tree detected-protocols
- 485 52-14 spanning-tree (interface configuration)
- 486 52-15 spanning-tree hello-time
- 486 52-16 spanning-tree externalcost
- 487 52-17 spanning-tree portfast
- 488 52-18 spanning-tree autoedge
- 488 52-19 spanning-tree guard root
- 489 52-20 spanning-tree link-type
- 489 52-21 spanning-tree tc-guard
- 490 52-22 show spanning-tree
- 492 52-23 show spanning-tree interface
- 493 52-24 show spanning-tree mst
- 495 Storm Control Commands
- 495 53-1 storm-control
- 496 53-2 storm-control action
- 496 53-3 storm-control interval
- 497 53-4 show storm-control
- 500 Switch Management Commands
- 500 54-1 login (Console)
- 500 54-2 logout
- 501 54-3 username
- 501 54-4 login local
- 502 54-5 password
- 502 54-6 login (Line)
- 502 54-7 enable
- 503 54-8 disable
- 503 54-9 enable password
- 504 54-10 service password-encryption
- 504 54-11 show privilege
- 505 54-12 privilege
- 506 Syslog Commands
- 506 55-1 logging on
- 506 55-2 logging server
- 507 55-3 logging console
- 507 55-4 logging trap
- 508 55-5 logging source
- 508 55-6 logging facility
- 509 55-7 logging count
- 510 55-8 clear logging
- 510 55-9 show logging
- 511 55-10 show logging count
- 511 55-11 logging buffered
- 512 55-12 save log
- 513 TACACS+ Commands
- 513 56-1 tacacs-server host
- 513 56-2 tacacs-server key
- 514 56-3 tacacs-server timeout
- 514 56-4 show tacacs statistics
- 515 56-5 show tacacs-server configuration
- 517 Telnet Commands
- 517 57-1 ip telnet server enable
- 517 57-2 telnet
- 518 Time Range Commands
- 518 58-1 time-range
- 518 58-2 periodic
- 519 58-3 show time-range
- 520 Traffic Segmentation Commands
- 520 59-1 switchport protected unidirectional
- 520 59-2 show protected-ports
- 522 Upgrade and Maintenance Commands
- 522 60-1 copy
- 522 60-2 boot system
- 523 60-3 show bootup
- 524 Virtual LAN (VLAN) Commands
- 524 61-1 vlan
- 525 61-2 name
- 525 61-3 switchport mode
- 526 61-4 switchport access vlan
- 527 61-5 switchport trunk allowed vlan
- 528 61-6 switchport hybrid allowed vlan
- 528 61-7 switchport native vlan
- 529 61-8 acceptable-frame
- 530 61-9 ingress-checking
- 530 61-10 mac-base (vlan)
- 531 61-11 subnet-base (vlan)
- 532 61-12 show vlan
- 534 61-13 protocol-vlan profile
- 535 61-14 protocol-vlan profile (interface)
- 536 61-15 show protocol-vlan
- 537 VLAN Mapping Commands
- 537 62-1 vlan mapping profile
- 537 62-2 vlan mapping rule
- 539 62-3 show vlan mapping profile
- 539 62-4 switchport vlan mapping profile
- 541 VLAN Tunnel Commands
- 541 63-1 switchport mode dot1q-tunnel
- 542 63-2 frame-tag tpid
- 542 63-3 switchport vlan mapping
- 544 63-4 inner-priority-trust
- 544 63-5 insert-dot1q-tag
- 545 63-6 vlan mapping miss drop
- 545 63-7 show dot1q-tunnel
- 546 63-8 show frame-tag tpid
- 546 63-9 show vlan mapping
- 548 Virtual Router Redundancy Protocol (VRRP) Commands
- 548 64-1 vrrp authentication
- 548 64-2 vrrp critical-ip
- 549 64-3 vrrp ip
- 549 64-4 vrrp preempt
- 550 64-5 vrrp priority
- 551 64-6 vrrp timers advertise
- 552 64-7 show vrrp
- 554 64-8 debug vrrp
- 554 64-9 debug vrrp errors
- 555 64-10 debug vrrp events
- 555 64-11 debug vrrp packets
- 556 64-12 debug vrrp state
- 556 64-13 debug vrrp log
- 558 Weighted Random Early Detection (WRED) Commands
- 558 65-1 clear random-detect drop-counter
- 558 65-2 random-detect
- 559 65-3 random-detect exponential-weight
- 559 65-4 random-detect profile
- 560 65-5 show queueing random-detect
- 561 65-6 show random-detect drop-counter
- 561 65-7 show random-detect profile
- 563 Appendix A - Password Recovery Procedure
- 564 Appendix B - System Log Entries
- 582 Appendix C - Trap Entries
- 584 Appendix D - List of Commands