Users Guide
crypto key generate................................................................................................................................................1299
crypto key zeroize rsa.............................................................................................................................................1301
debug ip ssh...............................................................................................................................................................1301
ip scp topdir.............................................................................................................................................................. 1302
ip ssh authentication-retries................................................................................................................................. 1302
ip ssh cipher..............................................................................................................................................................1303
ip ssh connection-rate-limit.................................................................................................................................. 1304
ip ssh hostbased-authentication..........................................................................................................................1304
ip ssh key-size..........................................................................................................................................................1305
ip ssh mac..................................................................................................................................................................1306
ip ssh password-authentication........................................................................................................................... 1307
ip ssh pub-key-file................................................................................................................................................... 1307
ip ssh rekey .............................................................................................................................................................. 1308
ip ssh rhostsfile........................................................................................................................................................ 1309
ip ssh rsa-authentication (Config)....................................................................................................................... 1310
ip ssh vrf.....................................................................................................................................................................1310
ip ssh source-interface............................................................................................................................................ 1311
ip ssh server...............................................................................................................................................................1312
ip ssh server vrf........................................................................................................................................................1314
show crypto...............................................................................................................................................................1315
show ip ssh................................................................................................................................................................ 1316
show ip ssh client-pub-keys...................................................................................................................................1317
show ip ssh rsa-authentication............................................................................................................................. 1318
ssh................................................................................................................................................................................1319
Secure DHCP Commands............................................................................................................................................ 1321
clear ip dhcp snooping............................................................................................................................................ 1321
ip dhcp relay.............................................................................................................................................................. 1321
ip dhcp snooping......................................................................................................................................................1322
ip dhcp snooping binding....................................................................................................................................... 1323
ip dhcp snooping database....................................................................................................................................1324
ip dhcp snooping database renew....................................................................................................................... 1324
ip dhcp snooping trust............................................................................................................................................1325
ip dhcp source-address-validation...................................................................................................................... 1325
ip dhcp snooping vlan............................................................................................................................................. 1326
show ip dhcp snooping...........................................................................................................................................1326
Role-Based Access Control Commands...................................................................................................................1327
aaa authorization role-only.................................................................................................................................... 1327
role.............................................................................................................................................................................. 1328
show role................................................................................................................................................................... 1329
show userroles......................................................................................................................................................... 1330
userrole...................................................................................................................................................................... 1330
Chapter 51: Service Provider Bridging......................................................................................1332
debug protocol-tunnel..................................................................................................................................................1332
protocol-tunnel.............................................................................................................................................................. 1333
protocol-tunnel destination-mac............................................................................................................................... 1334
protocol-tunnel enable................................................................................................................................................. 1335
protocol-tunnel rate-limit............................................................................................................................................ 1335
show protocol-tunnel................................................................................................................................................... 1336
32
Contents










