Index-4 Riverstone Networks RS 3000 Switch Router Getting Started Guide
Index
remote monitoring....................................2-3
RIP............................................................2-5
v1 .......................................................2-5
v2 .......................................................2-5
RMON......................................................2-7
RMON v2.................................................2-8
routing ......................................................2-4
IP........................................................2-4
IPX.....................................................2-5
L3 lookup tables ................................2-5
routing protocols ...............................2-2, 2-5
RS 3000
default name.......................................4-4
security...............................................2-6
S
safety precautions.....................................3-1
SAP...........................................................2-5
save active .......................................4-6, 4-10
save startup...............................................4-7
saving active configuration to startup ......4-6
saving configuration changes ...................4-6
scratchpad.................................................4-6
secondary IP addresses.............................2-5
Secure Session Shells...............................2-7
security .....................................................2-6
application ACLs...............................2-7
applying ACLs to SNMP.................4-16
destination ACLs ...............................2-7
destination filters ...............................2-6
flow ACLs .........................................2-7
flow filters..........................................2-6
RADIUS ............................................2-7
source ACLs ......................................2-7
source filters.......................................2-6
SSH....................................................2-7
TACACS............................................2-7
TACACS+ .........................................2-7
serial port................................................2-10
session persistence....................................2-8
set autoboot bootp ....................................5-7
set command............................ 4-13, 5-5, 5-7
setting basic system information ..............4-9
setting boot source....................................5-5
setting date and time.................................4-9
setting passwords....................................4-12
setting system contact...............................4-9
setting system location .............................4-9
setting system name..................................4-9
setting trap target ....................................4-15
setting up SNMP ....................................4-15
skipconfig ...............................................4-14
SNMP ............................................. 2-3, 4-15
applying ACLs.................................4-16
community string .............................4-15
disabling authentication traps ..........4-16
improving security ...........................4-16
initial configuration..........................4-15
MIBs ................................................4-17
privilege ...........................................4-15
security.............................................4-16
supported MIBs................................4-17
trap-source .......................................4-16
software upgrade ......................................5-1
specification
GBIC...................................... 2-24, 2-41
SSL persistence ........................................2-8
starting the command line interface .........4-4
startup configuration.................................4-6
static route to trap target.........................4-15
statistics ....................................................2-7
layer-2 ................................................2-7
layer-3 ................................................2-8
layer-4 ................................................2-8
LFAP..................................................2-8
MIB II ................................................2-7
Open APIs..........................................2-8
RMON ...............................................2-7
RMON v2 ..........................................2-8
sticky persistence......................................2-8
strict priority queuing ...............................2-7
supported MIBs ......................................4-17
SYSLOG
error..................................................4-21
facility-type......................................4-22
fatal ..................................................4-21
informational....................................4-21
setting levels ....................................4-22
syslog.conf file.................................4-22
warning ............................................4-21
SYSLOG levels ......................................4-21
SYSLOG message types ........................4-21
SYSLOG parameters..............................4-21
syslog.conf file .......................................4-22
system image add .....................................5-2