Download Print this page

Dell Force10 TeraScale E Series Reference Manual page 1322

Ftos command line, ftos 8.4.2.7

Advertisement

Defaults
Command Modes
Command
History
Example
Trace List Commands
clear counters ip trace-group
e
Syntax
1322
|
Security
-p port-number
(OPTIONAL) Enter the keyword
Range: 1 to 65536
Default: 22
{
|
}
-v
1
2
(OPTIONAL) Enter the keyword
Default: The version from the protocol negotiation
As above.
EXEC Privilege
Version 7.9.1.0
Introduced VRF
Version 7.6.1.0
Introduced for S-Series
Version 7.5.1.0
Added IPv6 support; Introduced for C-Series
pre-Version 6.1.1.0
Introduced for E-Series
Figure 51-14. ssh Command Example
FTOS#ssh 123.12.1.123 -l ashwani -p 5005 -v 2
IP trace lists create an Access Control List (ACLs) to trace all traffic into the E-Series switch. This
feature is useful for tracing Denial of Service (DOS) attacks.
Note:
For other Access Control List commands, see the chapters
Group
and
Chapter 9, Access Control Lists
clear counters ip trace-group
deny
deny tcp
deny udp
ip trace-group
ip trace-list
permit
permit tcp
permit udp
seq
show config
show ip accounting trace-lists
Erase all counters maintained for trace lists.
clear counters ip trace-group [trace-list-name]
-p
followed by the port number.
-v
followed by the SSH version 1 or 2.
Chapter 10, ACL VLAN
(ACL).

Advertisement

loading