Users Guide

Table Of Contents
ip ssh cipher..............................................................................................................................................................1248
ip ssh connection-rate-limit.................................................................................................................................. 1249
ip ssh hostbased-authentication..........................................................................................................................1249
ip ssh key-size..........................................................................................................................................................1250
ip ssh password-authentication............................................................................................................................1251
ip ssh pub-key-file....................................................................................................................................................1251
ip ssh mac..................................................................................................................................................................1252
ip ssh rekey .............................................................................................................................................................. 1253
ip ssh rhostsfile........................................................................................................................................................ 1254
ip ssh rsa-authentication (Config)...................................................................................................................... 1255
ip ssh server..............................................................................................................................................................1255
ip ssh server vrf....................................................................................................................................................... 1258
ip ssh source-interface.......................................................................................................................................... 1259
ip ssh vrf....................................................................................................................................................................1260
show crypto.............................................................................................................................................................. 1260
show ip ssh................................................................................................................................................................ 1261
show ip ssh client-pub-keys..................................................................................................................................1262
show ip ssh rsa-authentication............................................................................................................................ 1263
ssh............................................................................................................................................................................... 1264
Secure DHCP Commands........................................................................................................................................... 1266
clear ip dhcp snooping............................................................................................................................................1266
ip dhcp relay..............................................................................................................................................................1267
ip dhcp snooping......................................................................................................................................................1267
ip dhcp snooping binding....................................................................................................................................... 1268
ip dhcp snooping database....................................................................................................................................1269
ip dhcp snooping database renew....................................................................................................................... 1270
ip dhcp snooping trust............................................................................................................................................1270
ip dhcp source-address-validation....................................................................................................................... 1271
ip dhcp snooping vlan.............................................................................................................................................. 1271
show ip dhcp snooping........................................................................................................................................... 1272
Role-Based Access Control Commands...................................................................................................................1272
aaa authorization role-only.................................................................................................................................... 1273
enable......................................................................................................................................................................... 1274
role...............................................................................................................................................................................1274
show role................................................................................................................................................................... 1275
show userroles..........................................................................................................................................................1276
userrole.......................................................................................................................................................................1277
Chapter 51: Service Provider Bridging......................................................................................1279
debug protocol-tunnel..................................................................................................................................................1279
protocol-tunnel.............................................................................................................................................................. 1280
protocol-tunnel destination-mac................................................................................................................................ 1281
protocol-tunnel enable................................................................................................................................................. 1282
protocol-tunnel rate-limit............................................................................................................................................ 1282
show protocol-tunnel................................................................................................................................................... 1283
Chapter 52: sFlow.................................................................................................................... 1285
sflow collector................................................................................................................................................................1286
sflow enable (Global)....................................................................................................................................................1287
Contents
31