IV
line.........................................................................................................................................46
password...............................................................................................................................47
login.......................................................................................................................................
47
login local ..............................................................................................................................48
show user account-list...........................................................................................................48
show user configuration.........................................................................................................49
Chapter 9 Binding Table Commands................................................................. 50
ip source binding ...................................................................................................................50
ip dhcp snooping ...................................................................................................................51
ip dhcp snooping global.........................................................................................................52
ip dhcp snooping information option......................................................................................53
ip dhcp snooping information strategy...................................................................................53
ip dhcp snooping information remote-id.................................................................................54
ip dhcp snooping information circuit-id ..................................................................................54
ip dhcp snooping trust ...........................................................................................................55
ip dhcp snooping mac-verify..................................................................................................56
ip dhcp snooping limit rate.....................................................................................................56
ip dhcp snooping decline.......................................................................................................57
show ip source binding..........................................................................................................57
show ip dhcp snooping..........................................................................................................58
show ip dhcp snooping information .......................................................................................58
show ip dhcp snooping interface ...........................................................................................59
Chapter 10 ARP Inspection Commands.............................................................. 60
ip arp inspection(global) ........................................................................................................60
ip arp inspection trust ............................................................................................................60
ip arp inspection(interface) ....................................................................................................61
ip arp inspection limit-rate......................................................................................................61
ip arp inspection recover .......................................................................................................62
show ip arp inspection...........................................................................................................63
show ip arp inspection interface ............................................................................................63
show ip arp inspection statistics ............................................................................................64
clear ip arp inspection statistics.............................................................................................64
Chapter 11 DoS Defend Command...................................................................... 65
ip dos-prevent........................................................................................................................65
ip dos-prevent type................................................................................................................65
show ip dos-prevent ..............................................................................................................66