Nokia ESB26 User Manual page 6

Gigabit ethernet switch
Table of Contents

Advertisement

SUPPORTED STANDARDS, MIBS AND RFCS.......................................................................... 305
STATISTICS MONITORING ........................................................................................................ 306
RMON ALARMS............................................................................................................................ 307
27. PERIODIC MONITORING ......................................................................................................... 312
INTRODUCTION ........................................................................................................................... 312
FEATURE OVERVIEW ................................................................................................................. 312
SUPPORTED STANDARDS, MIBS AND RFCS.......................................................................... 314
DEFAULT PERIODIC MONITORING CONFIGURATION........................................................ 315
CONFIGURING AND DISPLAYING PERIODIC MONITORING ............................................. 316
CONFIGURATION EXAMPLES................................................................................................... 326
RELATED COMMANDS............................................................................................................... 328
28. LOGGING SYSTEM TRAP MESSAGES TO THE NVRAM .................................................. 329
INTRODUCTION ........................................................................................................................... 329
CONFIGURING THE MESSAGE FORMAT ................................................................................ 329
NVRAM SYSTEM-TRAP LOGGING COMMANDS................................................................... 330
29. NVRAM CONFIGURATION HISTORY.................................................................................... 333
INTRODUCTION ........................................................................................................................... 333
HISTORY LOG FORMAT AND GENERATION ......................................................................... 333
CONFIGURING HISTORY SETTINGS........................................................................................ 333
DISPLAYING THE CONFIGURATION HISTORY..................................................................... 334
30. CONFIGURING THE WATCHDOG FEATURES.................................................................... 337
OVERVIEW .................................................................................................................................... 337
ACCESSING WATCHDOG MODE .............................................................................................. 337
CONFIGURING THE RESET-LOOP DETECTION FEATURE .................................................. 338
DISPLAYING THE WATCHDOG CONFIGURATION............................................................... 341
31. NTP CLIENT DESCRIPTION ..................................................................................................... 342
INTRODUCTION ........................................................................................................................... 342
THE NTP TIMESERVER COMMANDS....................................................................................... 342
WHY USE NTP PROTOCOL ? ...................................................................................................... 343
CONFIGURING AND DISPLAYING NTP SERVER SETTINGS ............................................... 343
MD5 AUTHENTICATION............................................................................................................. 345
RUNNING THE NTP SERVER ..................................................................................................... 346
EXAMPLES .................................................................................................................................... 347
CONFIGURATION EXAMPLE..................................................................................................... 347
CONFIGURING DAYLIGHT SAVING TIME (DST) .................................................................. 348
32. REMOTE AUTHENTICATION DIAL-IN USER SERVICE (RADIUS) ................................ 351
INTRODUCTION ........................................................................................................................... 351
BINOS RADIUS FEATURES ........................................................................................................ 351
DESCRIPTION OF COMMANDS................................................................................................. 352
USING RADIUS TO CONFIGURE LOGIN AUTHENTICATION.............................................. 354
A RADIUS CONFIGURATION EXAMPLE ................................................................................. 355
33. SECURE SHELL (SSH) ................................................................................................................ 357
INTRODUCTION ........................................................................................................................... 357
SOME SECURITY CONSIDERATIONS ...................................................................................... 357
COMMANDS FOR MANAGING THE SSH SERVER................................................................. 358
SUPPORTED CLIENTS ................................................................................................................. 359
SUPPORTED STANDARDS.......................................................................................................... 359
34. 802.1X PORT-BASED AUTHENTICATION ............................................................................. 360
INTRODUCTION ........................................................................................................................... 360

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents