Reference Guide

User session management........................................................................................................................................... 454
User session management commands................................................................................................................. 454
Telnet server...................................................................................................................................................................455
Telnet commands.....................................................................................................................................................456
Security...........................................................................................................................................................................456
User re-authentication............................................................................................................................................ 457
Password strength...................................................................................................................................................457
Role-based access control..................................................................................................................................... 458
Assign user role........................................................................................................................................................458
RADIUS authentication...........................................................................................................................................459
TACACS+ authentication........................................................................................................................................459
SSH Server...............................................................................................................................................................460
Virtual terminal line...................................................................................................................................................461
Enable login statistics...............................................................................................................................................461
Security commands.................................................................................................................................................462
Simple network management protocol........................................................................................................................474
SNMP commands....................................................................................................................................................474
OS10 image upgrade......................................................................................................................................................476
Boot system partition.............................................................................................................................................. 477
Upgrade commands.................................................................................................................................................477
8 Access Control Lists.................................................................................................................................. 482
IP ACLs............................................................................................................................................................................482
MAC ACLs...................................................................................................................................................................... 483
IP fragment handling..................................................................................................................................................... 483
IP fragments ACL.................................................................................................................................................... 483
L3 ACL rules................................................................................................................................................................... 484
Permit ACL with L3 information only.................................................................................................................... 484
Deny ACL with L3 information only.......................................................................................................................484
Permit all packets from host.................................................................................................................................. 484
Permit only rst fragments and non-fragmented packets from host............................................................... 484
Assign sequence number to lter................................................................................................................................ 484
User-provided sequence number.......................................................................................................................... 485
Auto-generated sequence number........................................................................................................................485
L2 and L3 ACLs..............................................................................................................................................................485
Assign and apply ACL lters.........................................................................................................................................486
Ingress ACL lters.......................................................................................................................................................... 487
Egress ACL lters...........................................................................................................................................................487
Clear access-list counters............................................................................................................................................ 488
IP prex-lists...................................................................................................................................................................488
Route-maps....................................................................................................................................................................489
Match routes..................................................................................................................................................................490
Set conditions................................................................................................................................................................ 490
continue Clause.............................................................................................................................................................. 491
ACL ow-based monitoring...........................................................................................................................................491
Flow-based mirroring............................................................................................................................................... 491
12
Contents