Reference Guide

User session management........................................................................................................................................... 455
User session management commands................................................................................................................. 455
Telnet server...................................................................................................................................................................456
Telnet commands.....................................................................................................................................................457
Security........................................................................................................................................................................... 457
User re-authentication............................................................................................................................................458
Password strength.................................................................................................................................................. 458
Role-based access control..................................................................................................................................... 459
Assign user role........................................................................................................................................................459
RADIUS authentication...........................................................................................................................................460
TACACS+ authentication........................................................................................................................................460
SSH Server................................................................................................................................................................461
Virtual terminal line.................................................................................................................................................. 462
Enable login statistics..............................................................................................................................................462
Security commands.................................................................................................................................................463
Simple network management protocol........................................................................................................................474
SNMP commands....................................................................................................................................................475
OS10 image upgrade......................................................................................................................................................476
Boot system partition.............................................................................................................................................. 477
Upgrade commands.................................................................................................................................................477
8 Access Control Lists.................................................................................................................................. 482
IP ACLs............................................................................................................................................................................482
MAC ACLs...................................................................................................................................................................... 483
IP fragment handling..................................................................................................................................................... 483
IP fragments ACL.................................................................................................................................................... 483
L3 ACL rules................................................................................................................................................................... 484
Permit ACL with L3 information only.................................................................................................................... 484
Deny ACL with L3 information only.......................................................................................................................484
Permit all packets from host.................................................................................................................................. 484
Permit only rst fragments and non-fragmented packets from host............................................................... 484
Assign sequence number to lter................................................................................................................................ 484
User-provided sequence number.......................................................................................................................... 485
Auto-generated sequence number........................................................................................................................485
L2 and L3 ACLs..............................................................................................................................................................485
Assign and apply ACL lters.........................................................................................................................................486
Ingress ACL lters..........................................................................................................................................................487
Egress ACL lters...........................................................................................................................................................487
Clear access-list counters............................................................................................................................................ 488
IP prex-lists...................................................................................................................................................................488
Route-maps....................................................................................................................................................................489
Match routes..................................................................................................................................................................490
Set conditions................................................................................................................................................................ 490
continue Clause.............................................................................................................................................................. 491
ACL ow-based monitoring...........................................................................................................................................491
Flow-based mirroring............................................................................................................................................... 491
12
Contents