Tp-Link T1600G-28TS (TL-SG2424) [6/355] Chapter 12 dos defend commands 96

11.7 show ip arp inspection interface ............................................................................... 94
11.8 show ip arp inspection statistics ............................................................................... 94
11.9 clear ip arp inspection statistics ................................................................................ 95
Chapter 12 DoS Defend Commands .................................................................... 96
12.1 ip dos-prevent ........................................................................................................... 96
12.2 ip dos-prevent type ................................................................................................... 96
12.3 show ip dos-prevent ................................................................................................. 97
Chapter 13 System Log Commands .................................................................... 99
13.1 logging buffer ............................................................................................................ 99
13.2 logging buffer level ................................................................................................... 99
13.3 logging file flash ...................................................................................................... 100
13.4 logging file flash frequency ..................................................................................... 101
13.5 logging file flash level ............................................................................................. 102
13.6 logging host index ................................................................................................... 102
13.7 logging monitor ....................................................................................................... 103
13.8 logging monitor level ............................................................................................... 104
13.9 clear logging ........................................................................................................... 104
13.10 show logging local-config ....................................................................................... 105
13.11 show logging loghost .............................................................................................. 105
13.12 show logging buffer ................................................................................................ 106
13.13 show logging flash .................................................................................................. 107
Chapter 14 SSH Commands............................................................................... 108
14.1 ip ssh server ........................................................................................................... 108
14.2 ip ssh version .......................................................................................................... 108
14.3 ip ssh algorithm ...................................................................................................... 109
14.4 ip ssh timeout........................................................................................................... 110
14.5 ip ssh max-client ...................................................................................................... 110
14.6 ip ssh download ....................................................................................................... 111
14.7 remove public-key ................................................................................................... 112
14.8 show ip ssh .............................................................................................................. 112
Chapter 15 IEEE 802.1X Commands .................................................................. 113
15.1 dot1x system-auth-control ....................................................................................... 113
15.2 dot1x handshake ..................................................................................................... 114
15.3 dot1x auth-method ................................................................................................... 114
15.4 dot1x accounting ..................................................................................................... 115
15.5 dot1x guest-vlan(global) .......................................................................................... 116
5

Содержание

Похожие устройства

Скачать