Operator`s manual

Table Of Contents
Riverstone Networks RS 8000/8600 Switch Router Getting Started Guide Index-5
improving security 
initial configuration  
MIBs  
privilege  
security 
supported MIBs  
trap-source  
soft fail over   
software   
software upgrade  
specification
GBIC 
specifications 
SSL persistence  
starting the command line interface  
startup configuration  
static route to trap target 
statistics 
layer-2 
layer-3 
layer-4 
LFAP  
MIB II  
Open APIs  
RMON   
RMON v2   
sticky persistence  
strict priority queuing  
support@riverstonenet.com  $ 
supported MIBs  
SYSLOG
error  
facility-type 
fatal  
informational  
setting levels  
syslog.conf file 
warning  
SYSLOG levels 
SYSLOG message types  
SYSLOG parameters 
syslog.conf file  
system image add  
system image choose 
system image list  
system information 
system messages 
system promimage upgrade  , 
system set backup-cm-timeout 
system set contact 
system set date 
system set location   
system set name  
system set syslog level  
system show active-config  
system show dns  
system show version, 
T
T3 WIC
jumpers  
T3/E3
shield grounding  
TACACS  
TACACS+
TCP persistence  
Telnet to back-CM  
TFTP server  , , 
loading software 
ToS octet rewrites   
traffic control queues 
traffic control queuing   
trap target  
static route 
trap-source  
troubleshooting $
U
unicast routing protocols
BGP  
IS-IS 
OSPF 
RIP   
upgrade  
upgrading  
upgrading boot image
image-file-name  
ip add route  
system promimage upgrade   
system show version   
upgrading boot PROM software  
Upgrading FPGA
Upgrading FPGA Code  
upgrading software