beautypg.com

Allied Telesis AT-8100 Series User Manual

Page 14

background image

Contents

14

NO IP IGMP SNOOPING MROUTER ...................................................................................................... 619
SHOW IP IGMP SNOOPING ................................................................................................................... 620

Chapter 42

: IGMP Snooping Querier ........................................................................................................ 623

Overview................................................................................................................................................... 624

Assigning Multiple Queriers ............................................................................................................... 625

Guidelines................................................................................................................................................. 628
Configuring the Feature............................................................................................................................ 629

Configuring One Querier .................................................................................................................... 629
Configuring Multiple Queriers............................................................................................................. 630

Chapter 43

: IGMP Snooping Querier Commands ................................................................................... 633

IP IGMP QUERY-INTERVAL ................................................................................................................... 634
IP IGMP SNOOPING QUERIER .............................................................................................................. 635
NO IP IGMP SNOOPING QUERIER........................................................................................................ 636
SHOW IP IGMP INTERFACE .................................................................................................................. 637

Chapter 44

: DHCP Snooping Commands ................................................................................................ 639

ARP SECURITY ....................................................................................................................................... 641
ARP SECURITY VIOLATION................................................................................................................... 642
CLEAR ARP SECURITY STATISTICS .................................................................................................... 644
CLEAR IP DHCP SNOOPING BINDING.................................................................................................. 645
CLEAR IP DHCP SNOOPING STATISTICS ............................................................................................647
IP DHCP SNOOPING............................................................................................................................... 648
IP DHCP SNOOPING AGENT-OPTION ..................................................................................................649
IP DHCP SNOOPING AGENT-OPTION ALLOW-UNTRUSTED ............................................................. 650
IP DHCP SNOOPING BINDING............................................................................................................... 651
IP DHCP SNOOPING DELETE-BY-CLIENT............................................................................................653
IP DHCP SNOOPING DELETE-BY-LINKDOWN ..................................................................................... 654
IP DHCP SNOOPING MAX-BINDINGS ................................................................................................... 655
IP DHCP SNOOPING SUBSCRIBER-ID .................................................................................................657
IP DHCP SNOOPING TRUST.................................................................................................................. 659
IP DHCP VERIFY MAC-ADDRESS .........................................................................................................660
IP DHCP SNOOPING VIOLATION .......................................................................................................... 662
IP SOURCE BINDING.............................................................................................................................. 664
SERVICE DHCP SNOOPING .................................................................................................................. 666
SHOW ARP SECURITY........................................................................................................................... 668
SHOW ARP SECURITY INTERFACE ..................................................................................................... 670
SHOW ARP SECURITY STATISTICS ..................................................................................................... 672
SHOW IP DHCP SNOOPING .................................................................................................................. 674
SHOW IP DHCP SNOOPING BINDING ..................................................................................................676
SHOW IP DHCP SNOOPING INTERFACE ............................................................................................. 678
SHOW IP SOURCE BINDING.................................................................................................................. 680

Section V:

Event Messages .................................................................................................................... 683

Chapter 45

: Event Log ...............................................................................................................................685

Overview................................................................................................................................................... 686
Displaying the Event Log.......................................................................................................................... 687
Clearing the Event Log ............................................................................................................................. 688

Chapter 46

: Event Log Commands .......................................................................................................... 689

CLEAR LOG ............................................................................................................................................ 691
CLEAR LOG BUFFERED......................................................................................................................... 692
CLEAR LOG PERMANENT ..................................................................................................................... 693