NETGEAR XSM7224S-100NAS Switch User Manual


 
ProSafe XSM7224S Managed Stackable Switch CLI Manual, Software Version 9.0
Command List 10-5
v1.0, November 2010
dot1x initialize ........................................................................................................................................................3-67
dot1x max-req .........................................................................................................................................................3-67
dot1x max-users .....................................................................................................................................................3-68
dot1x port-control ..................................................................................................................................................3-68
dot1x port-control all ...........................................................................................................................................3-69
dot1x re-authenticate ............................................................................................................................................3-70
dot1x re-authentication ........................................................................................................................................3-70
dot1x system-auth-control ..................................................................................................................................3-70
dot1x system-auth-control monitor .................................................................................................................3-74
dot1x timeout ..........................................................................................................................................................3-71
dot1x unauthenticated-vlan ................................................................................................................................3-72
dot1x user .................................................................................................................................................................3-73
drop ............................................................................................................................................................................5-21
dvlan-tunnel ethertype .........................................................................................................................................3-47
enable (Privileged EXEC access) ......................................................................................................................7-4
enable authentication ............................................................................................................................................7-10
enable password .....................................................................................................................................................6-28
enable ...........................................................................................................................................................................9-1
enable (Instance) ......................................................................................................................................................9-6
encapsulation ..........................................................................................................................................................4-13
ezconfig ......................................................................................................................................................................7-2
filedescr ......................................................................................................................................................................6-5
group ............................................................................................................................................................................9-8
hardware-address ...................................................................................................................................................6-42
host .............................................................................................................................................................................6-43
http port .......................................................................................................................................................................9-2
https port .....................................................................................................................................................................9-2
idle-timeout .............................................................................................................................................................9-12
interface ......................................................................................................................................................................3-2
interface lag ...............................................................................................................................................................3-3
interface range ..........................................................................................................................................................3-3
interface vlan .............................................................................................................................................................3-3
interface (Captive Portal) ....................................................................................................................................9-13
ip access-group .......................................................................................................................................................5-42
ip access-list ............................................................................................................................................................5-40
ip access-list rename .............................................................................................................................................5-41
ip address ....................................................................................................................................................................4-9
ip address-conflict-detect run ............................................................................................................................6-90
ip arp inspection filter ........................................................................................................................................3-137
ip arp inspection limit ........................................................................................................................................3-136