UMN:CLI User Manual
V5808
6
4.5.2.1 Login to SSH Server ...................................................................................... 89
4.5.2.2 Secured File Copy ......................................................................................... 89
4.5.2.3 Authentication Key ......................................................................................... 89
4.6 802.1x Authentication .......................................................................... 90
4.6.1 802.1x Authentication ................................................................................. 92
4.6.1.1 Enabling 802.1x ............................................................................................. 92
4.6.1.2 RADIUS Server .............................................................................................. 92
4.6.1.3 Authentication Mode ...................................................................................... 93
4.6.1.4 Authentication Port ........................................................................................ 94
4.6.1.5 Force Authorization ........................................................................................ 94
4.6.1.6 Interval for Retransmitting Request/Identity Packet ....................................... 94
4.6.1.7 Interval of Authentication................................................................................ 94
4.6.1.8 Number of Requests to RADIUS Server ........................................................ 95
4.6.1.9 Interval of Request to RADIUS Server ........................................................... 95
4.6.2 802.1x Re-Authentication ........................................................................... 95
4.6.2.1 Enabling 802.1x Re-Authentication ................................................................ 95
4.6.2.2 Interval of Re-Authentication .......................................................................... 96
4.6.2.3 Interval of Requesting Re-Authentication ...................................................... 96
4.6.2.4 802.1x Re-Authentication............................................................................... 96
4.6.3 Initializing Authentication Status ................................................................. 97
4.6.4 Restoring Default Value ............................................................................. 97
4.6.5 Displaying 802.1x Configuration ................................................................ 97
4.6.6 802.1x User Authentication Statistics ......................................................... 97
4.6.7 Sample Configuration ................................................................................. 98
5 Port Configuration ............................................................................ 99
5.1 Ethernet Port Configuration ................................................................. 99
5.1.1 Enabling Ethernet Port ............................................................................... 99
5.1.2 Auto-Negotiation ........................................................................................ 99
5.1.3 Transmit Rate ........................................................................................... 100
5.1.4 Duplex Mode ............................................................................................ 100
5.1.5 Flow Control ............................................................................................. 100
5.1.6 Port Description ........................................................................................ 101
5.1.7 Network Service Port ............................................................................... 101
5.1.8 L2 Port Bridge .......................................................................................... 101
5.1.9 Port Crossover ......................................................................................... 102
5.1.10 Traffic Statistics ........................................................................................ 102
5.1.10.1 Packet Statistics ........................................................................................... 102
5.1.10.2 CPU Statistics .............................................................................................. 103
5.1.10.3 Protocol Statistics ........................................................................................ 104
5.1.11 Port Information ........................................................................................ 104
5.1.12 Port Debounce Timer ............................................................................... 105
5.2 Port Mirroring .................................................................................... 106
6 System Environment ...................................................................... 109
6.1 Environment Configuration ................................................................ 109
6.1.1 Host Name ............................................................................................... 109
6.1.2 Time and Date .......................................................................................... 109
6.1.3 Time Zone ................................................................................................. 110
6.1.4 Network Time Protocol (NTP) ................................................................... 111