Tp-Link T1700X-16TS V2 [5/352] Chapter 10 http and https commands 60

8.6 show etherchannel load-balance.............................................................................. 50
8.7 show lacp .................................................................................................................. 50
8.8 show lacp sys-id ....................................................................................................... 51
Chapter 9 User Management Commands ......................................................... 52
9.1 user name (password) .............................................................................................. 52
9.2 user name (secret) ................................................................................................... 53
9.3 user access-control ip-based ................................................................................... 54
9.4 user access-control mac-based ............................................................................... 55
9.5 user access-control port-based ................................................................................ 56
9.6 telnet ......................................................................................................................... 57
9.7 show user account-list .............................................................................................. 57
9.8 show user configuration............................................................................................ 58
9.9 show telnet-status ..................................................................................................... 58
Chapter 10 HTTP and HTTPS Commands ........................................................... 60
10.1 ip http server ............................................................................................................. 60
10.2 ip http max-users ...................................................................................................... 61
10.3 ip http session timeout .............................................................................................. 61
10.4 ip http secure-server ................................................................................................. 62
10.5 ip http secure-protocol .............................................................................................. 63
10.6 ip http secure-ciphersuite ......................................................................................... 63
10.7 ip http secure-max-users .......................................................................................... 64
10.8 ip http secure-session timeout .................................................................................. 65
10.9 ip http secure-server download certificate ................................................................ 65
10.10 ip http secure-server download key ......................................................................... 66
10.11 show ip http configuration ......................................................................................... 67
10.12 show ip http secure-server ....................................................................................... 68
Chapter 11 Binding Table Commands................................................................. 69
11.1 ip source binding ...................................................................................................... 69
11.2 ip dhcp snooping ...................................................................................................... 70
11.3 ip dhcp snooping vlan ............................................................................................... 71
11.4 ip dhcp snooping information option ........................................................................ 71
11.5 ip dhcp snooping information strategy ..................................................................... 72
11.6 ip dhcp snooping information remote-id ................................................................... 73
11.7 ip dhcp snooping information circuit-id ..................................................................... 74
11.8 ip dhcp snooping trust .............................................................................................. 74
11.9 ip dhcp snooping mac-verify ..................................................................................... 75
IV

Содержание

Похожие устройства

Скачать