Administrator Guide
dot1x auth-fail-vlan................................................................................................................................................. 1404
dot1x auth-server.................................................................................................................................................... 1405
dot1x guest-vlan...................................................................................................................................................... 1405
dot1x mac-auth-bypass..........................................................................................................................................1406
dot1x max-eap-req.................................................................................................................................................. 1407
dot1x port-control................................................................................................................................................... 1408
dot1x quiet-period................................................................................................................................................... 1408
dot1x reauthentication............................................................................................................................................1409
dot1x reauth-max..................................................................................................................................................... 1410
dot1x server-timeout............................................................................................................................................... 1410
dot1x supplicant-timeout.........................................................................................................................................1411
dot1x tx-period..........................................................................................................................................................1412
show dot1x interface............................................................................................................................................... 1413
SSH and SCP Commands............................................................................................................................................ 1414
crypto key generate.................................................................................................................................................1414
crypto key zeroize rsa.............................................................................................................................................1416
debug ip ssh...............................................................................................................................................................1416
ip scp topdir............................................................................................................................................................... 1417
ip ssh authentication-retries..................................................................................................................................1418
ip ssh challenge–response–authentication........................................................................................................1418
ip ssh connection-rate-limit................................................................................................................................... 1419
ip ssh connection-rate-interval............................................................................................................................1420
ip ssh connection-rate-lockout............................................................................................................................ 1420
ip ssh hostbased-authentication..........................................................................................................................1420
ip ssh password-authentication............................................................................................................................ 1421
ip ssh rekey .............................................................................................................................................................. 1422
ip ssh pub-key-file................................................................................................................................................... 1423
ip ssh rhostsfile........................................................................................................................................................ 1424
ip ssh rsa-authentication (Config)...................................................................................................................... 1424
ip ssh server..............................................................................................................................................................1425
ip ssh server dns enable.........................................................................................................................................1428
ip ssh server vrf....................................................................................................................................................... 1428
ip ssh source-interface...........................................................................................................................................1429
ip ssh vrf....................................................................................................................................................................1430
show crypto............................................................................................................................................................... 1431
show ip ssh................................................................................................................................................................1432
show ip ssh client-pub-keys..................................................................................................................................1433
show ip ssh rsa-authentication............................................................................................................................ 1434
ssh............................................................................................................................................................................... 1435
Secure DHCP Commands............................................................................................................................................1437
clear ip dhcp snooping............................................................................................................................................1437
ip dhcp relay..............................................................................................................................................................1438
ip dhcp snooping......................................................................................................................................................1439
ip dhcp snooping binding....................................................................................................................................... 1439
ip dhcp snooping database renew.......................................................................................................................1440
ip dhcp snooping trust............................................................................................................................................ 1441
ip dhcp source-address-validation...................................................................................................................... 1442
ip dhcp snooping vlan............................................................................................................................................. 1442
show ip dhcp snooping...........................................................................................................................................1443
Role-Based Access Control Commands...................................................................................................................1444
32
Contents










