Tp-Link T1700G-28TQ [5/345] Chapter 10 http and https commands 59

Chapter 9 User Management Commands ......................................................... 51
9.1 user name (password) .............................................................................................. 51
9.2 user name (secret) ................................................................................................... 52
9.3 user access-control ip-based ................................................................................... 53
9.4 user access-control mac-based ............................................................................... 54
9.5 user access-control port-based ................................................................................ 55
9.6 telnet ......................................................................................................................... 56
9.7 show user account-list .............................................................................................. 56
9.8 show user configuration............................................................................................ 57
9.9 show telnet-status ..................................................................................................... 57
Chapter 10 HTTP and HTTPS Commands ........................................................... 59
10.1 ip http server ............................................................................................................. 59
10.2 ip http max-users ...................................................................................................... 60
10.3 ip http session timeout .............................................................................................. 60
10.4 ip http secure-server ................................................................................................. 61
10.5 ip http secure-protocol .............................................................................................. 62
10.6 ip http secure-ciphersuite ......................................................................................... 62
10.7 ip http secure-max-users .......................................................................................... 63
10.8 ip http secure-session timeout .................................................................................. 64
10.9 ip http secure-server download certificate ................................................................ 65
10.10 ip http secure-server download key ......................................................................... 66
10.11 show ip http configuration ......................................................................................... 67
10.12 show ip http secure-server ....................................................................................... 67
Chapter 11 Binding Table Commands................................................................. 68
11.1 ip source binding ...................................................................................................... 68
11.2 ip dhcp snooping ...................................................................................................... 69
11.3 ip dhcp snooping vlan ............................................................................................... 70
11.4 ip dhcp snooping information option ........................................................................ 71
11.5 ip dhcp snooping information strategy ..................................................................... 71
11.6 ip dhcp snooping information remote-id ................................................................... 72
11.7 ip dhcp snooping information circuit-id ..................................................................... 73
11.8 ip dhcp snooping trust .............................................................................................. 74
11.9 ip dhcp snooping mac-verify ..................................................................................... 74
11.10 ip dhcp snooping limit rate ........................................................................................ 75
11.11 ip dhcp snooping decline rate ................................................................................... 76
11.12 show ip source binding ............................................................................................. 77
IV

Содержание

Скачать