XV
36.20
ip http login authentication
.....................................................................................................
317
36.21
ip http enable authentication
.................................................................................................
318
36.22
show aaa global
..........................................................................................................................
319
36.23
enable admin password
...........................................................................................................
319
36.24
enable admin secret
.................................................................................................................
320
36.25
enable-admin
..............................................................................................................................
322
Chapter 37
IEEE 802.1x Commands
...........................................................................
323
37.1
dot1x system-auth-control
....................................................................................................
323
37.2
dot1x handshake
.......................................................................................................................
324
37.3
dot1x auth-protocol
..................................................................................................................
324
37.4
dot1x vlan-assignment
............................................................................................................
325
37.5
dot1x accounting
.......................................................................................................................
326
37.6
dot1x mab
....................................................................................................................................
327
37.7
dot1x guest-vlan
........................................................................................................................
327
37.8
dot1x timeout quiet-period
....................................................................................................
328
37.9
dot1x timeout supp-timeout
..................................................................................................
329
37.10
dot1x max- req
...........................................................................................................................
330
37.11
dot1x
..............................................................................................................................................
330
37.12
dot1x port-control
.....................................................................................................................
331
37.13
dot1x port-method
....................................................................................................................
332
37.14
dot1x auth-init
.............................................................................................................................
333
37.15
dot1x auth-reauth
......................................................................................................................
333
37.16
show dot1x global
.....................................................................................................................
334
37.17
show dot1x interface
................................................................................................................
335
37.18
show dot1x auth-state interface
..........................................................................................
335
Chapter 38
Port Security Commands
........................................................................
337
38.1
mac address-table max-mac count
....................................................................................
337
38.2
show mac address-table max-mac-count
........................................................................
337
Chapter 39
Port Mirroring Commands
......................................................................
339
39.1
monitor session destination interface
................................................................................
339
39.2
monitor session source
...........................................................................................................
340
39.3
show monitor session
..............................................................................................................
341
Chapter 40
ACL Commands
.........................................................................................
343
40.1
access-list create
......................................................................................................................
343
40.2
access-list resequence
...........................................................................................................
343