Allied Telesis AT-9000/28POE Switch User Manual


  Open as PDF
of 1480
 
AT-9000 Switch Command Line User’s Guide
7
Table 110. Deleting ARP Entries ....................................................................................................................................1114
Table 111. ARP Commands ...........................................................................................................................................1117
Table 112. SHOW ARP Command .................................................................................................................................1122
Table 113. Abbreviated List of MIB Object Names and OID Numbers ...........................................................................1134
Table 114. RMON Commands .......................................................................................................................................1141
Table 115. MIB Object Names and ID Numbers ............................................................................................................1148
Table 116. SHOW RMON ALARM Command ................................................................................................................1159
Table 117. SHOW RMON EVENT Command ................................................................................................................1160
Table 118. SHOW RMON HISTORY Command ............................................................................................................1162
Table 119. SHOW RMON STATISTICS Command .......................................................................................................1164
Table 120. Access Control List ID Number Ranges .......................................................................................................1167
Table 121. ACCESS-LIST Commands for Creating Numbered IPv4 ACLs ...................................................................1169
Table 122. Blocking Ingress Packets Example ...............................................................................................................1171
Table 123. Blocking Traffic with Two IPv4 Addresses ....................................................................................................1171
Table 124. Creating a Permit ACL Followed by a Deny ACL Example ..........................................................................1172
Table 125. Permit ACLs IPv4 Packets Example .............................................................................................................1173
Table 126. ACL Filters Tagged IPv4 Packets Example ..................................................................................................1174
Table 127. Numbered IPv4 ACL with ICMP Packets Example .......................................................................................1175
Table 128. Numbered IPv4 ACL with Protocol Example ................................................................................................1177
Table 129. Numbered IPv4 ACL with TCP Port Packets Example .................................................................................1179
Table 130. Numbered IPv4 ACL with UDP Port Example ..............................................................................................1181
Table 131. Numbered MAC ACL Example .....................................................................................................................1183
Table 132. Assigning Numbered IPv4 ACLs .................................................................................................................1185
Table 133. Assigning MAC Address ACLs Example ......................................................................................................1185
Table 134. Removing Numbered IP ACLs Example .......................................................................................................1187
Table 135. Removing MAC Address ACLs Example ......................................................................................................1188
Table 136. Assigning Numbered IP ACLs to VTY Lines Example ..................................................................................1189
Table 137. Assigning MAC ACLs to VTY Lines Example ............................................................................
...................1190
Table 138. Assigning Named IPv4 ACLs to VTY Lines Example ...................................................................................1191
Table 139. Assigning Named IPv4 ACLs to VTY Lines Example ...................................................................................1192
Table 140. Removing Numbered IP ACLs from VTY Lines Example .............................................................................1194
Table 141. Deleting Numbered IP ACLs Example 1 .......................................................................................................1195
Table 142. Deleting Numbered IP ACLs Example 2 .......................................................................................................1195
Table 143. Access Control List Commands ....................................................................................................................1199
Table 144. Protocol Numbers .........................................................................................................................................1216
Table 145. Quality of Service Commands ......................................................................................................................1235
Table 146. SHOW MLS QOS INTERFACE Command ..................................................................................................1251
Table 147. Local Manager Account Commands .............................................................................................................1271
Table 148. Telnet Server Commands .............................................................................................................................1287
Table 149. Telnet Client Commands ..............................................................................................................................1295
Table 150. Secure Shell Server Commands ..................................................................................................................1311
Table 151. Non-secure HTTP Web Browser Server Commands ...................................................................................1327
Table 152. Secure HTTPS Web Browser Server Commands ........................................................................................1347
Table 153. SHOW IP HTTPS Command ........................................................................................................................1359
Table 154. RADIUS and TACACS+ Client Commands ..................................................................................................1377
Table 155. SHOW RADIUS Command ..........................................................................................................................1396
Table 156. SHOW TACACS Command .........................................................................................................................1398
Table 157. System Monitoring Commands .....................................................................................................................1403