EasyManua.ls Logo

Enterasys SecureStack C2

Enterasys SecureStack C2
607 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
xxiii
show maclock .................................................................................................................................18-47
show maclock stations....................................................................................................................18-48
set maclock enable.........................................................................................................................18-49
set maclock disable ........................................................................................................................18-50
set maclock.....................................................................................................................................18-50
clear maclock..................................................................................................................................18-51
set maclock static ...........................................................................................................................18-52
clear maclock static ........................................................................................................................18-52
set maclock firstarrival ....................................................................................................................18-53
clear maclock firstarrival.................................................................................................................18-53
set maclock agefirstarrival ..............................................................................................................18-54
clear maclock agefirstarrival ...........................................................................................................18-55
set maclock move...........................................................................................................................18-55
set maclock trap .............................................................................................................................18-56
Configuring Port Web Authentication (PWA) .............................................................................................. 18-57
About PWA ........................................................................................................................................... 18-57
Purpose ................................................................................................................................................ 18-57
Commands ........................................................................................................................................... 18-57
show pwa........................................................................................................................................18-58
set pwa ...........................................................................................................................................18-59
show pwa banner ...........................................................................................................................18-60
set pwa banner...............................................................................................................................18-60
clear pwa banner............................................................................................................................18-61
set pwa displaylogo ........................................................................................................................18-61
set pwa ipaddress...........................................................................................................................18-62
set pwa protocol .............................................................................................................................18-62
set pwa guestname ........................................................................................................................18-63
clear pwa guestname .....................................................................................................................18-63
set pwa guestpassword..................................................................................................................18-64
set pwa gueststatus........................................................................................................................18-64
set pwa initialize .............................................................................................................................18-65
set pwa quietperiod ........................................................................................................................18-65
set pwa maxrequest .......................................................................................................................18-66
set pwa portcontrol .........................................................................................................................18-66
show pwa session ..........................................................................................................................18-67
set pwa enhancedmode .................................................................................................................18-68
Configuring Secure Shell (SSH) ................................................................................................................. 18-68
Purpose ................................................................................................................................................ 18-68
Commands ........................................................................................................................................... 18-68
show ssh status ..............................................................................................................................18-68
set ssh ............................................................................................................................................18-69
set ssh hostkey...............................................................................................................................18-69
Configuring Access Lists ............................................................................................................................ 18-70
Purpose ................................................................................................................................................ 18-70
Commands ........................................................................................................................................... 18-70
show access-lists............................................................................................................................18-70
access-list (standard) .....................................................................................................................18-71
access-list (extended).....................................................................................................................18-73
ip access-group ................................................................................................................
..............18-74
Configuring Access Lists ............................................................................................................................ 18-75
Purpose ................................................................................................................................................ 18-75
Commands ........................................................................................................................................... 18-75
show access-lists............................................................................................................................18-75
access-list (standard) .....................................................................................................................18-76
access-list (extended).....................................................................................................................18-77
ip access-group ..............................................................................................................................18-79

Table of Contents

Related product manuals