Riverstone Networks RS 2100 User Manual
Page 76
Index-4 Riverstone Networks RS 2100 Switch Router Getting Started Guide
set command
............................ 4-13
setting basic system information
.............. 4-9
setting boot source
.................................... 5-5
setting date and time
................................. 4-9
setting passwords
.................................... 4-12
setting system contact
............................... 4-9
setting system location
............................. 4-9
setting system name
................................. 4-9
setting trap target
.................................... 4-15
setting up SNMP
.................................... 4-15
skipconfig
............................................... 4-13
SNMP
..................................................... 4-15
applying ACLs
................................. 4-16
community string
............................. 4-15
disabling authentication traps
.......... 4-16
improving security
........................... 4-16
initial configuration
......................... 4-15
MIBs
................................................ 4-17
privilege
........................................... 4-15
security
............................................. 4-16
supported MIBs
............................... 4-17
trap-source
....................................... 4-16
software upgrade
...................................... 5-1
specifications
............................................ 3-2
SSL persistence
........................................ 2-7
starting the command line interface
......... 4-4
startup configuration
................................ 4-6
static route to trap target
......................... 4-15
statistics
.................................................... 2-6
layer-2
................................................ 2-6
layer-3
................................................ 2-6
layer-4
................................................ 2-6
LFAP
.................................................. 2-6
MIB II
................................................ 2-6
Open APIs
.......................................... 2-6
RMON
............................................... 2-6
RMON v2
.......................................... 2-6
sticky persistence
...................................... 2-7
strict priority queuing
............................... 2-6
.................... A-1
supported MIBs
...................................... 4-17
SYSLOG
error
.................................................. 4-20
facility-type
...................................... 4-21
fatal
.................................................. 4-20
informational
.................................... 4-20
setting levels
.................................... 4-20
syslog.conf file
................................. 4-21
warning
............................................4-20
SYSLOG levels
......................................4-20
SYSLOG message types
........................4-20
SYSLOG parameters
..............................4-20
syslog.conf file
.......................................4-21
system image add
.....................................5-2
system image choose
................................5-2
system image list
......................................5-2
system information
...................................4-9
system messages
.....................................4-20
system promimage upgrade
.............. 5-3
,
system set contact
.....................................4-9
system set date
..........................................4-9
system set location
....................................4-9
system set name
........................................4-9
system set syslog level
...........................4-20
system show active-config
.....................4-10
system show dns
.....................................4-19
system show version
......................... 5-1
,
T
TACACS
..................................................2-5
TACACS+
................................................2-5
TCP persistence
........................................2-6
TFTP server
...................................... 5-1
,
loading software
.................................5-5
ToS octet rewrites
.....................................2-6
traffic control queues
................................2-6
traffic control queuing
..............................2-6
trap target
................................................4-15
static route
........................................4-15
trap-source
..............................................4-16
troubleshooting
........................................ A-1
U
unicast routing protocols
BGP
....................................................2-4
IS-IS
...................................................2-4
OSPF
..................................................2-4
RIP
.....................................................2-4
upgrading boot image
image-file-name
.................................5-3
ip add route
........................................5-3
system promimage upgrade
...............5-3
system show version
..........................5-3
upgrading boot PROM software
...............5-3