Enterasys SECURESTACK C3 Configuration Manual page 28

Stackable switches
Hide thumbs Also See for SECURESTACK C3:
Table of Contents

Advertisement

show ipv6 ospf................................................................................................................................ 25-29
show ipv6 ospf area........................................................................................................................ 25-31
show ipv6 ospf abr.......................................................................................................................... 25-32
show ipv6 ospf asbr ........................................................................................................................ 25-33
show ipv6 ospf database ................................................................................................................ 25-34
show ipv6 ospf interface ................................................................................................................. 25-38
show ipv6 ospf interface stats ........................................................................................................ 25-40
show ipv6 ospf neighbor................................................................................................................. 25-42
show ipv6 ospf range...................................................................................................................... 25-44
show ipv6 ospf stub table ............................................................................................................... 25-45
show ipv6 ospf virtual-link............................................................................................................... 25-46
Overview of Authentication and Authorization Methods ............................................................................... 26-1
RADIUS Filter-ID Attribute and Dynamic Policy Profile Assignment ...................................................... 26-3
Setting the Authentication Login Method ...................................................................................................... 26-4
Purpose .................................................................................................................................................. 26-4
Commands ............................................................................................................................................. 26-4
show authentication login ................................................................................................................. 26-4
set authentication login..................................................................................................................... 26-4
clear authentication login.................................................................................................................. 26-5
Configuring RADIUS ..................................................................................................................................... 26-6
Purpose .................................................................................................................................................. 26-6
Commands ............................................................................................................................................. 26-6
show radius ...................................................................................................................................... 26-6
set radius .......................................................................................................................................... 26-7
clear radius ....................................................................................................................................... 26-9
show radius accounting .................................................................................................................. 26-10
set radius accounting...................................................................................................................... 26-10
clear radius accounting................................................................................................................... 26-11
show radius interface...................................................................................................................... 26-12
set radius interface ......................................................................................................................... 26-12
clear radius interface ...................................................................................................................... 26-13
Configuring 802.1X Authentication ............................................................................................................. 26-15
Purpose ................................................................................................................................................ 26-15
Commands ........................................................................................................................................... 26-15
show dot1x ..................................................................................................................................... 26-15
show dot1x auth-config................................................................................................................... 26-17
set dot1x ......................................................................................................................................... 26-18
set dot1x auth-config ...................................................................................................................... 26-19
clear dot1x auth-config ................................................................................................................... 26-20
show eapol ..................................................................................................................................... 26-21
set eapol ......................................................................................................................................... 26-23
clear eapol ...................................................................................................................................... 26-23
Configuring MAC Authentication ................................................................................................................ 26-25
Purpose ................................................................................................................................................ 26-25
Commands ........................................................................................................................................... 26-25
show macauthentication ................................................................................................................. 26-25
show macauthentication session .................................................................................................... 26-27
set macauthentication..................................................................................................................... 26-28
set macauthentication password .................................................................................................... 26-28
clear macauthentication password ................................................................................................. 26-29
set macauthentication port ............................................................................................................. 26-29
set macauthentication portinitialize................................................................................................. 26-30
set macauthentication portquietperiod............................................................................................ 26-30
xxvi

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents