IV
interface range link-aggregation
............................................................................................
40
link-aggregation
.....................................................................................................................
41
link-aggregation hash-algorithm
............................................................................................
42
description
.............................................................................................................................
42
show interface link-aggregation
.............................................................................................
43
Chapter 10
LACP Commands
..............................................................................
44
lacp system-priority
...............................................................................................................
44
lacp (interface)
.......................................................................................................................
44
lacp admin-key
......................................................................................................................
45
lacp port-priority
.....................................................................................................................
45
show lacp system-priority
......................................................................................................
46
show lacp interface
................................................................................................................
46
Chapter 11
User Manage Commands
..................................................................
48
user add
................................................................................................................................
48
user remove
..........................................................................................................................
49
user modify status
.................................................................................................................
49
user modify type
....................................................................................................................
50
user modify password
............................................................................................................
50
user access-control disable
...................................................................................................
51
user access-control ip-based
.................................................................................................
51
user access-control mac-based
.............................................................................................
52
user access-control port-based
.............................................................................................
52
user max-number
..................................................................................................................
53
user idle-timeout
....................................................................................................................
53
show user account-list
...........................................................................................................
54
show user configuration
.........................................................................................................
54
Chapter 12
Binding Table Commands
.................................................................
56
binding-table user-bind
..........................................................................................................
56
binding-table remove
.............................................................................................................
57
dhcp-snooping
.......................................................................................................................
57
dhcp-snooping global
............................................................................................................
58
dhcp-snooping information enable
........................................................................................
59
dhcp-snooping information strategy
......................................................................................
59
dhcp-snooping information user-defined
...............................................................................
60
dhcp-snooping information remote-id
....................................................................................
60
dhcp-snooping information circuit-id
......................................................................................
61