Figures
– 26 –
Figure 170: Displaying a Summary of Applied AAA Accounting Methods 291
Figure 171: Displaying Statistics for AAA Accounting Sessions 291
Figure 172: Configuring AAA Authorization Methods 293
Figure 173: Showing AAA Authorization Methods 293
Figure 174: Configuring AAA Authorization Methods for Exec Service 294
Figure 175: Displaying the Applied AAA Authorization Method 294
Figure 176: Configuring User Accounts 296
Figure 177: Showing User Accounts 296
Figure 178: Configuring Global Settings for Web Authentication 298
Figure 179: Configuring Interface Settings for Web Authentication 299
Figure 180: Configuring Global Settings for Network Access 302
Figure 181: Configuring Interface Settings for Network Access 304
Figure 182: Configuring Link Detection for Network Access 305
Figure 183: Configuring a MAC Address Filter for Network Access 306
Figure 184: Showing the MAC Address Filter Table for Network Access 307
Figure 185: Showing Addresses Authenticated for Network Access 308
Figure 186: Configuring HTTPS 310
Figure 187: Downloading the Secure-Site Certificate 312
Figure 188: Configuring the SSH Server 315
Figure 189: Generating the SSH Host Key Pair 317
Figure 190: Showing the SSH Host Key Pair 317
Figure 191: Copying the SSH User’s Public Key 318
Figure 192: Showing the SSH User’s Public Key 319
Figure 193: Setting the Name of a Time Range 322
Figure 194: Showing a List of Time Ranges 322
Figure 195: Add a Rule to a Time Range 323
Figure 196: Showing the Rules Configured for a Time Range 323
Figure 197: Showing TCAM Utilization 324
Figure 198: Creating an ACL 325
Figure 199: Showing a List of ACLs 326
Figure 200: Configuring a Standard IPv4 ACL 327
Figure 201: Configuring an Extended IPv4 ACL 330
Figure 202: Configuring a Standard IPv6 ACL 331
Figure 203: Configuring an Extended IPv6 ACL 333
Figure 204: Configuring a MAC ACL 335