STATISTICS MONITORING ........................................................................................................ 306
RMON ALARMS............................................................................................................................ 307
27. PERIODIC MONITORING ......................................................................................................... 312
INTRODUCTION ........................................................................................................................... 312
FEATURE OVERVIEW ................................................................................................................. 312
CONFIGURATION EXAMPLES................................................................................................... 326
RELATED COMMANDS............................................................................................................... 328
INTRODUCTION ........................................................................................................................... 329
INTRODUCTION ........................................................................................................................... 333
OVERVIEW .................................................................................................................................... 337
ACCESSING WATCHDOG MODE .............................................................................................. 337
31. NTP CLIENT DESCRIPTION ..................................................................................................... 342
INTRODUCTION ........................................................................................................................... 342
WHY USE NTP PROTOCOL ? ...................................................................................................... 343
MD5 AUTHENTICATION............................................................................................................. 345
RUNNING THE NTP SERVER ..................................................................................................... 346
EXAMPLES .................................................................................................................................... 347
CONFIGURATION EXAMPLE..................................................................................................... 347
INTRODUCTION ........................................................................................................................... 351
BINOS RADIUS FEATURES ........................................................................................................ 351
DESCRIPTION OF COMMANDS................................................................................................. 352
33. SECURE SHELL (SSH) ................................................................................................................ 357
INTRODUCTION ........................................................................................................................... 357
SUPPORTED CLIENTS ................................................................................................................. 359
SUPPORTED STANDARDS.......................................................................................................... 359
INTRODUCTION ........................................................................................................................... 360