
21
33.29 IP ACCESS-GROUP...................................................................................................................... 33-21
33.30 SHOW ACCESS-LIST IP ................................................................................................................ 33-22
33.31 TIME-RANGE............................................................................................................................... 33-22
33.32 ABSOLUTE ................................................................................................................................. 33-23
33.33 PERIODIC ................................................................................................................................... 33-23
33.34 SHOW TIME-RANGE..................................................................................................................... 33-24
34 ARP INSPECTION COMMANDS......................................................................................................... 34-1
34.1 ARP ACCESS-LIST............................................................................................................................. 34-1
34.2 IP ARP INSPECTION FILTER VLAN........................................................................................................ 34-1
34.3 IP ARP INSPECTION LOG-BUFFER ....................................................................................................... 34-2
34.4 IP ARP INSPECTION TRUST ................................................................................................................ 34-3
34.5 IP ARP INSPECTION VALIDATE ............................................................................................................ 34-4
34.6 IP ARP INSPECTION VLAN .................................................................................................................. 34-5
34.7 IP ARP INSPECTION VLAN LOGGING .................................................................................................... 34-6
34.8 SHOW IP ARP INSPECTION ................................................................................................................. 34-7
34.9 SHOW IP ARP INSPECTION LOG .......................................................................................................... 34-8
35 IP SOURCE GUARD COMMANDS ..................................................................................................... 35-1
35.1 IP SOURCE BINDING .......................................................................................................................... 35-1
35.2 IP SOURCE MAXIMAL BINDING ............................................................................................................ 35-1
35.3 IP VERIFY SOURCE............................................................................................................................ 35-2
35.4 SHOW IP SOURCE BINDING ................................................................................................................ 35-3
36 DHCP SNOOPING COMMANDS......................................................................................................... 36-1
36.1 CLEAR DHCP SNOOPING.................................................................................................................... 36-1
36.2 DHCP SNOOPING .............................................................................................................................. 36-1
36.3 DHCP SNOOPING BINDING ................................................................................................................. 36-2
36.4 DHCP SNOOPING DATABASE .............................................................................................................. 36-3
36.5 DHCP SNOOPING INFORMATION OPTION ............................................................................................. 36-4
36.6 DHCP SNOOPING INFORMATION OPTION ALLOW-UNTRUSTED ............................................................... 36-5
36.7 DHCP SNOOPING TRUST.................................................................................................................... 36-6
36.8 DHCP SNOOPING VERIFY ................................................................................................................... 36-6
36.9 DHCP SNOOPING VLAN...................................................................................................................... 36-7
36.10 SHOW DHCP SNOOPING BINDING.................................................................................................... 36-8
36.11 SHOW DHCP SNOOPING CONFIG .................................................................................................... 36-8
36.12 SHOW DHCP SNOOPING STATISTICS ............................................................................................... 36-9
36.13 SHOW DHCP SNOOPING TRUSTED-SOURCES ................................................................................ 36-10
37 IEEE 802.1X COMMANDS................................................................................................................... 37-1
37.1 DOT1X INITIALIZE.............................................................................................................................. 37-1
37.2 DOT1X MAX-REAUTH-REQ ................................................................................................................. 37-1
37.3 DOT1X PORT-CONTROL .................................................................................................................... 37-2
37.4 DOT1X PROTOCOL-VERSION ............................................................................................................. 37-3
37.5 DOT1X QUIET-PERIOD....................................................................................................................... 37-3
37.6 DOT1X REAUTHENTICATION .............................................................................................................. 37-4
37.7 DOT1X RE-AUTHENTICAE .................................................................................................................. 37-5
CanogaOS Command Reference
Comentarios a estos manuales