Source IP address
....................................................................................................................................................
446
Authentication
..........................................................................................................................................................
447
NTP commands
.......................................................................................................................................................
448
System clock
..................................................................................................................................................................
453
System Clock commands
.......................................................................................................................................
453
User session management
...........................................................................................................................................
454
User session management commands
.................................................................................................................
454
Telnet server
...................................................................................................................................................................
456
Telnet commands
.....................................................................................................................................................
456
Security
...........................................................................................................................................................................
457
User re-authentication
............................................................................................................................................
457
Password strength
..................................................................................................................................................
458
Role-based access control
.....................................................................................................................................
458
Assign user role
........................................................................................................................................................
459
RADIUS authentication
...........................................................................................................................................
459
TACACS+ authentication
........................................................................................................................................
460
SSH Server
................................................................................................................................................................
461
Virtual terminal line
...................................................................................................................................................
461
Enable login statistics
..............................................................................................................................................
462
Security commands
.................................................................................................................................................
462
Simple network management protocol
.......................................................................................................................
475
SNMP commands
....................................................................................................................................................
475
Uplink Failure Detection
.................................................................................................................................................
476
Configure
uplink failure detection
...........................................................................................................................
477
UFD commands
........................................................................................................................................................
478
OS10 image upgrade
.....................................................................................................................................................
482
Boot system partition
..............................................................................................................................................
482
Upgrade commands
................................................................................................................................................
483
8 Access Control Lists
..................................................................................................................................
488
IP ACLs
...........................................................................................................................................................................
488
MAC ACLs
......................................................................................................................................................................
489
IP fragment handling
.....................................................................................................................................................
489
IP fragments ACL
....................................................................................................................................................
489
L3 ACL rules
...................................................................................................................................................................
490
Permit ACL with L3 information only
....................................................................................................................
490
Deny ACL with L3 information only
.......................................................................................................................
490
Permit all packets from host
..................................................................................................................................
490
Permit only
first
fragments and non-fragmented packets from host
...............................................................
490
Assign sequence number to
filter
.................................................................................................................................
491
User-provided sequence number
...........................................................................................................................
491
Auto-generated sequence number
.........................................................................................................................
491
L2 and L3 ACLs
..............................................................................................................................................................
491
Assign and apply ACL
filters
.........................................................................................................................................
492
Ingress ACL
filters
..........................................................................................................................................................
493
Egress ACL
filters
..........................................................................................................................................................
493
12
Contents