Chapter 9
User Management Commands
.........................................................
51
9.1
user name (password)
..............................................................................................
51
9.2
user name (secret)
...................................................................................................
52
9.3
user access-control ip-based
...................................................................................
53
9.4
user access-control mac-based
...............................................................................
54
9.5
user access-control port-based
................................................................................
55
9.6
telnet
.........................................................................................................................
56
9.7
show user account-list
..............................................................................................
56
9.8
show user configuration
............................................................................................
57
9.9
show telnet-status
.....................................................................................................
57
Chapter 10
HTTP and HTTPS Commands
...........................................................
59
10.1
ip http server
.............................................................................................................
59
10.2
ip http max-users
......................................................................................................
60
10.3
ip http session timeout
..............................................................................................
60
10.4
ip http secure-server
.................................................................................................
61
10.5
ip http secure-protocol
..............................................................................................
62
10.6
ip http secure-ciphersuite
.........................................................................................
62
10.7
ip http secure-max-users
..........................................................................................
63
10.8
ip http secure-session timeout
..................................................................................
64
10.9
ip http secure-server download certificate
................................................................
65
10.10
ip http secure-server download key
.........................................................................
66
10.11
show ip http configuration
.........................................................................................
67
10.12
show ip http secure-server
.......................................................................................
67
Chapter 11
Binding Table Commands
.................................................................
68
11.1
ip source binding
......................................................................................................
68
11.2
ip dhcp snooping
......................................................................................................
69
11.3
ip dhcp snooping vlan
...............................................................................................
70
11.4
ip dhcp snooping information option
........................................................................
71
11.5
ip dhcp snooping information strategy
.....................................................................
71
11.6
ip dhcp snooping information remote-id
...................................................................
72
11.7
ip dhcp snooping information circuit-id
.....................................................................
73
11.8
ip dhcp snooping trust
..............................................................................................
74
11.9
ip dhcp snooping mac-verify
.....................................................................................
74
11.10
ip dhcp snooping limit rate
........................................................................................
75
11.11
ip dhcp snooping decline rate
...................................................................................
76
11.12
show ip source binding
.............................................................................................
77
IV