F
IGURES
– 35 –
Figure 140: Configuring AAA Accounting Methods 267
Figure 141: Showing AAA Accounting Methods 268
Figure 142: Configuring AAA Accounting Service for 802.1X Service 268
Figure 143: Configuring AAA Accounting Service for Exec Service 269
Figure 144: Displaying a Summary of Applied AAA Accounting Methods 269
Figure 145: Displaying Statistics for AAA Accounting Sessions 269
Figure 146: Configuring AAA Authorization Methods 271
Figure 147: Showing AAA Authorization Methods 271
Figure 148: Configuring AAA Authorization Methods for Exec Service 272
Figure 149: Displaying the Applied AAA Authorization Method 272
Figure 150: Configuring User Accounts 274
Figure 151: Showing User Accounts 274
Figure 152: Configuring Global Settings for Web Authentication 276
Figure 153: Configuring Interface Settings for Web Authentication 277
Figure 154: Configuring Global Settings for Network Access 280
Figure 155: Configuring Interface Settings for Network Access 282
Figure 156: Configuring Link Detection for Network Access 283
Figure 157: Configuring a MAC Address Filter for Network Access 284
Figure 158: Showing the MAC Address Filter Table for Network Access 284
Figure 159: Showing Addresses Authenticated for Network Access 286
Figure 160: Configuring HTTPS 287
Figure 161: Downloading the Secure-Site Certificate 289
Figure 162: Configuring the SSH Server 293
Figure 163: Generating the SSH Host Key Pair 294
Figure 164: Showing the SSH Host Key Pair 295
Figure 165: Copying the SSH User’s Public Key 296
Figure 166: Showing the SSH User’s Public Key 297
Figure 167: Setting the Name of a Time Range 299
Figure 168: Showing a List of Time Ranges 299
Figure 169: Add a Rule to a Time Range 300
Figure 170: Showing the Rules Configured for a Time Range 300
Figure 171: Showing TCAM Utilization 302
Figure 172: Creating an ACL 303
Figure 173: Showing a List of ACLs 303
Figure 174: Configuring a Standard IPv4 ACL 305
Figure 175: Configuring an Extended IPv4 ACL 307