xxvii
19-1 show ip interface Output Details....................................................................................................... 19-4
19-2 show ip arp Output Details ............................................................................................................... 19-9
20-1 RIP Configuration Task List and Commands ................................................................................... 20-1
22-1 show radius Output Details............................................................................................................... 22-7
22-2 show eapol Output Details.............................................................................................................. 22-22
22-3 show macauthentication Output Details .........................................................................................22-26
22-4 show macauthentication session Output Details ............................................................................ 22-27
22-5 show vlanauthorization Output Details ........................................................................................... 22-52
22-6 show maclock Output Details ......................................................................................................... 22-59
22-7 show maclock stations Output Details............................................................................................ 22-60
22-8 show pwa Output Details................................................................................................................ 22-69
23-1 show tacacs Output Details .............................................................................................................. 23-2
24-1 sFlow Definitions .............................................................................................................................. 24-2
24-2 show sflow receivers Output Descriptions........................................................................................ 24-6
A-1 Policy Capacities ................................................................................................................................A-1
A-2 Authentication Capacities...................................................................................................................A-2