xxv
set maclock trap .............................................................................................................................23-60
Configuring Port Web Authentication (PWA) .............................................................................................. 23-61
About PWA ........................................................................................................................................... 23-61
Purpose ................................................................................................................................................ 23-61
Commands ........................................................................................................................................... 23-61
show pwa........................................................................................................................................23-62
set pwa ...........................................................................................................................................23-63
show pwa banner ...........................................................................................................................23-64
set pwa banner...............................................................................................................................23-64
clear pwa banner............................................................................................................................23-65
set pwa displaylogo ........................................................................................................................23-65
set pwa ipaddress...........................................................................................................................23-66
set pwa protocol .............................................................................................................................23-66
set pwa guestname ........................................................................................................................23-67
clear pwa guestname .....................................................................................................................23-67
set pwa guestpassword..................................................................................................................23-68
set pwa gueststatus........................................................................................................................23-68
set pwa initialize .............................................................................................................................23-69
set pwa quietperiod ........................................................................................................................23-69
set pwa maxrequest .......................................................................................................................23-70
set pwa portcontrol .........................................................................................................................23-70
show pwa session ..........................................................................................................................23-71
set pwa enhancedmode .................................................................................................................23-72
Configuring Secure Shell (SSH) ................................................................................................................. 23-73
Purpose ................................................................................................................................................ 23-73
Commands ........................................................................................................................................... 23-73
show ssh status..............................................................................................................................23-73
set ssh ............................................................................................................................................23-73
set ssh hostkey...............................................................................................................................23-74
Configuring Access Lists ............................................................................................................................ 23-75
Purpose ................................................................................................................................................ 23-75
Commands ........................................................................................................................................... 23-75
show access-lists............................................................................................................................23-75
access-list (standard) .....................................................................................................................23-76
access-list (extended).....................................................................................................................23-77
ip access-group ..............................................................................................................................23-79
Index
Figures
1-1 SecureStack C2 Startup Screen......................................................................................................... 1-6
1-2 Sample CLI Defaults Description........................................................................................................ 1-8
1-3 Performing a Keyword Lookup ........................................................................................................... 1-8
1-4 Performing a Partial Keyword Lookup................................................................................................ 1-9
1-5 Scrolling Screen Output...................................................................................................................... 1-9
1-6 Abbreviating a Command................................................................................................................. 1-10
10-1 Example of VLAN Propagation via GVRP...................................................................................... 10-21
Tables
1-1 Default Settings for Basic Switch Operation....................................................................................... 1-2
1-2 Default Settings for Router Operation ................................................................................................ 1-4
1-3 Basic Line Editing Commands.......................................................................................................... 1-10
3-1 Required CLI Setup Commands......................................................................................................... 3-1
3-2 Optional CLI Setup Commands.......................................................................................................... 3-2
3-3 show system lockout Output Details................................................................................................... 3-8