Contents
14
Chapter 42: DHCP Snooping Commands ................................................................................................617
ARP SECURITY .......................................................................................................................................619
ARP SECURITY VIOLATION...................................................................................................................620
CLEAR ARP SECURITY STATISTICS ....................................................................................................622
CLEAR IP DHCP SNOOPING BINDING..................................................................................................623
CLEAR IP DHCP SNOOPING STATISTICS............................................................................................625
IP DHCP SNOOPING...............................................................................................................................626
IP DHCP SNOOPING AGENT-OPTION ..................................................................................................627
IP DHCP SNOOPING AGENT-OPTION ALLOW-UNTRUSTED .............................................................628
IP DHCP SNOOPING BINDING...............................................................................................................629
IP DHCP SNOOPING DELETE-BY-CLIENT............................................................................................631
IP DHCP SNOOPING DELETE-BY-LINKDOWN .....................................................................................632
IP DHCP SNOOPING MAX-BINDINGS ...................................................................................................633
IP DHCP SNOOPING SUBSCRIBER-ID .................................................................................................635
IP DHCP SNOOPING TRUST..................................................................................................................637
IP DHCP VERIFY MAC-ADDRESS .........................................................................................................638
IP DHCP SNOOPING VIOLATION ..........................................................................................................640
IP SOURCE BINDING..............................................................................................................................642
SERVICE DHCP SNOOPING ..................................................................................................................644
SHOW ARP SECURITY...........................................................................................................................646
SHOW ARP SECURITY INTERFACE .....................................................................................................648
SHOW ARP SECURITY STATISTICS .....................................................................................................650
SHOW IP DHCP SNOOPING ..................................................................................................................652
SHOW IP DHCP SNOOPING BINDING ..................................................................................................654
SHOW IP DHCP SNOOPING INTERFACE .............................................................................................656
SHOW IP SOURCE BINDING..................................................................................................................658
Section V: Event Messages ....................................................................................................................661
Chapter 43: Event Log ...............................................................................................................................663
Overview...................................................................................................................................................664
Displaying the Event Log..........................................................................................................................665
Clearing the Event Log .............................................................................................................................666
Chapter 44: Event Log Commands ..........................................................................................................667
CLEAR LOG ............................................................................................................................................669
CLEAR LOG BUFFERED.........................................................................................................................670
CLEAR LOG PERMANENT .....................................................................................................................671
LOG BUFFERED......................................................................................................................................672
LOG CONSOLE .......................................................................................................................................674
LOG PERMANENT ..................................................................................................................................676
NO LOG BUFFERED ...............................................................................................................................677
NO LOG CONSOLE .................................................................................................................................679
NO LOG PERMANENT ............................................................................................................................680
SHOW LOG..............................................................................................................................................682
SHOW LOG CONFIG...............................................................................................................................685
SHOW LOG PERMANENT ......................................................................................................................687
SHOW LOG PERMANENT TAIL..............................................................................................................688
SHOW LOG REVERSE............................................................................................................................689
SHOW LOG TAIL .....................................................................................................................................690
Chapter 45: Syslog Client .........................................................................................................................691
Overview...................................................................................................................................................692
Creating Syslog Server Definitions...........................................................................................................693
Deleting Syslog Server Definitions ...........................................................................................................696
Komentarze do niniejszej Instrukcji