Tp-Link T1700G-28TQ V2 — управление пользователями и команды HTTP/HTTPS [5/354]

Превью страниц Страница 5 / 354
Chapter 9 User Management Commands ................................................................ 54
9.1 user name (password) ................................................................................................................. 54
9.2 user name (secret) ........................................................................................................................ 55
9.3 user access-control ip-based .................................................................................................. 56
9.4 user access-control mac-based ............................................................................................. 57
9.5 user access-control port-based ............................................................................................. 58
9.6 telnet ................................................................................................................................................. 59
9.7 show user account-list................................................................................................................ 59
9.8 show user configuration ............................................................................................................. 60
9.9 show telnet-status........................................................................................................................ 60
Chapter 10 HTTP and HTTPS Commands .................................................................. 62
10.1 ip http server .................................................................................................................................. 62
10.2 ip http max-users .......................................................................................................................... 63
10.3 ip http session timeout ............................................................................................................... 63
10.4 ip http secure-server ................................................................................................................... 64
10.5 ip http secure-protocol............................................................................................................... 65
10.6 ip http secure-ciphersuite ......................................................................................................... 65
10.7 ip http secure-max-users .......................................................................................................... 66
10.8 ip http secure-session timeout ................................................................................................ 67
10.9 ip http secure-server download certificate ......................................................................... 68
10.10 ip http secure-server download key ...................................................................................... 69
10.11 show ip http configuration ......................................................................................................... 70
10.12 show ip http secure-server ....................................................................................................... 70
Chapter 11 Binding Table Commands ......................................................................... 71
11.1 ip source binding .......................................................................................................................... 71
11.2 ip dhcp snooping .......................................................................................................................... 72
11.3 ip dhcp snooping vlan ................................................................................................................. 73
11.4 ip dhcp snooping information option ..................................................................................... 74
11.5 ip dhcp snooping information strategy ................................................................................. 74
11.6 ip dhcp snooping information remote-id .............................................................................. 75
11.7 ip dhcp snooping information circuit-id ................................................................................ 76
11.8 ip dhcp snooping trust ................................................................................................................ 77
11.9 ip dhcp snooping mac-verify .................................................................................................... 78
11.10 ip dhcp snooping limit rate ........................................................................................................ 78
11.11 ip dhcp snooping decline rate .................................................................................................. 79
11.12 show ip source binding ............................................................................................................... 80
IV

Содержание

2312

Изучите команды управления пользователями и настройки HTTP/HTTPS. Узнайте, как управлять доступом и безопасностью в сети с помощью простых команд.