Reference Guide

Source IP address....................................................................................................................................................446
Authentication.......................................................................................................................................................... 447
NTP commands....................................................................................................................................................... 448
System clock.................................................................................................................................................................. 453
System Clock commands....................................................................................................................................... 453
User session management........................................................................................................................................... 454
User session management commands................................................................................................................. 454
Telnet server...................................................................................................................................................................456
Telnet commands.....................................................................................................................................................456
Security........................................................................................................................................................................... 457
User re-authentication............................................................................................................................................ 457
Password strength.................................................................................................................................................. 458
Role-based access control..................................................................................................................................... 458
Assign user role........................................................................................................................................................459
RADIUS authentication...........................................................................................................................................459
TACACS+ authentication........................................................................................................................................460
SSH Server................................................................................................................................................................461
Virtual terminal line...................................................................................................................................................461
Enable login statistics..............................................................................................................................................462
Security commands.................................................................................................................................................462
Simple network management protocol....................................................................................................................... 475
SNMP commands....................................................................................................................................................475
Uplink Failure Detection.................................................................................................................................................476
Congure uplink failure detection...........................................................................................................................477
UFD commands........................................................................................................................................................478
OS10 image upgrade..................................................................................................................................................... 482
Boot system partition..............................................................................................................................................482
Upgrade commands................................................................................................................................................ 483
8 Access Control Lists.................................................................................................................................. 488
IP ACLs........................................................................................................................................................................... 488
MAC ACLs...................................................................................................................................................................... 489
IP fragment handling..................................................................................................................................................... 489
IP fragments ACL.................................................................................................................................................... 489
L3 ACL rules................................................................................................................................................................... 490
Permit ACL with L3 information only.................................................................................................................... 490
Deny ACL with L3 information only.......................................................................................................................490
Permit all packets from host.................................................................................................................................. 490
Permit only rst fragments and non-fragmented packets from host...............................................................490
Assign sequence number to lter.................................................................................................................................491
User-provided sequence number........................................................................................................................... 491
Auto-generated sequence number.........................................................................................................................491
L2 and L3 ACLs.............................................................................................................................................................. 491
Assign and apply ACL lters......................................................................................................................................... 492
Ingress ACL lters..........................................................................................................................................................493
Egress ACL lters.......................................................................................................................................................... 493
12
Contents