7.10
ip http secure-server download key
.........................................................................
58
7.11
show ip http configuration
.......................................................................................
59
7.12
show ip http secure-server
......................................................................................
59
Chapter 8
Binding Table Commands
.................................................................
61
8.1
ip source binding
.....................................................................................................
61
8.2
ip dhcp snooping
.....................................................................................................
62
8.3
ip dhcp snooping vlan
.............................................................................................
63
8.4
ip dhcp snooping information option
........................................................................
64
8.5
ip dhcp snooping information strategy
.....................................................................
64
8.6
ip dhcp snooping information remote-id
..................................................................
65
8.7
ip dhcp snooping information circuit-id
....................................................................
66
8.8
ip dhcp snooping trust
.............................................................................................
67
8.9
ip dhcp snooping mac-verify
....................................................................................
67
8.10
ip dhcp snooping limit rate
......................................................................................
68
8.11
ip dhcp snooping decline rate
.................................................................................
69
8.12
show ip source binding
............................................................................................
70
8.13
show ip dhcp snooping
............................................................................................
70
8.14
show ip dhcp snooping interface
.............................................................................
71
8.15
show ip dhcp snooping information interface
..........................................................
71
Chapter 9
ARP Inspection Commands
..............................................................
73
9.1
ip arp inspection(global)
..........................................................................................
73
9.2
ip arp inspection trust
..............................................................................................
73
9.3
ip arp inspection(interface)
......................................................................................
74
9.4
ip arp inspection limit-rate
.......................................................................................
75
9.5
ip arp inspection recover
.........................................................................................
76
9.6
show ip arp inspection
.............................................................................................
76
9.7
show ip arp inspection interface
..............................................................................
77
9.8
show ip arp inspection statistics
..............................................................................
77
9.9
clear ip arp inspection statistics
...............................................................................
78
Chapter 10
DoS Defend Commands
....................................................................
79
10.1
ip dos-prevent
.........................................................................................................
79
10.2
ip dos-prevent type
..................................................................................................
79
10.3
show ip dos-prevent
................................................................................................
81
Chapter 11
System Log Commands
....................................................................
82
11.1
logging buffer
..........................................................................................................
82
11.2
logging buffer level
..................................................................................................
82
IV