Tp-Link T1600G-52TS V3 [16/471] Chapter 37 ieee 802 x commands 322

36.17 login authentication (ssh) ................................................................................................ 316
36.18 enable authentication (telnet) ........................................................................................ 317
36.19 enable authentication (ssh) ............................................................................................ 318
36.20 ip http login authentication............................................................................................. 318
36.21 ip http enable authentication ......................................................................................... 319
36.22 show aaa global ................................................................................................................ 320
36.23 enable-admin .................................................................................................................... 320
Chapter 37 IEEE 802.1x Commands
............................................................................ 322
37.1 dot1x system-auth-control ............................................................................................ 322
37.2 dot1x handshake.............................................................................................................. 323
37.3 dot1x auth-protocol ........................................................................................................ 323
37.4 dot1x vlan-assignment ................................................................................................... 324
37.5 dot1x accounting ............................................................................................................. 325
37.6 dot1x mab ......................................................................................................................... 326
37.7 dot1x guest-vlan .............................................................................................................. 326
37.8 dot1x timeout quiet-period ............................................................................................ 327
37.9 dot1x timeout supp-timeout .......................................................................................... 328
37.10 dot1x max- req ................................................................................................................. 329
37.11 dot1x .................................................................................................................................. 329
37.12 dot1x port-control ........................................................................................................... 330
37.13 dot1x port-method .......................................................................................................... 331
37.14 dot1x auth-init .................................................................................................................. 332
37.15 dot1x auth-reauth ............................................................................................................ 332
37.16 show dot1x global ............................................................................................................ 333
37.17 show dot1x interface ....................................................................................................... 334
37.18 show dot1x auth-state .................................................................................................... 334
Chapter 38 Port Security Commands
......................................................................... 336
38.1 mac address-table max-mac count .............................................................................. 336
38.2 show mac address-table max-mac-count .................................................................. 336
Chapter 39 Port Mirroring Commands
....................................................................... 338
39.1 monitor session destination interface ......................................................................... 338
39.2 monitor session source .................................................................................................. 339
39.3 show monitor session ..................................................................................................... 340
Chapter 40 ACL Commands
.......................................................................................... 342
40.1 access-list create ............................................................................................................ 342
XV

Содержание

Скачать