Allied Telesis AT-FS970M Series User Manual
Page 14

Contents
14
Chapter 42
: DHCP Snooping Commands ................................................................................................617
ARP SECURITY .......................................................................................................................................619
ARP SECURITY VIOLATION...................................................................................................................620
CLEAR ARP SECURITY STATISTICS ....................................................................................................622
CLEAR IP DHCP SNOOPING BINDING..................................................................................................623
CLEAR IP DHCP SNOOPING STATISTICS............................................................................................625
IP DHCP SNOOPING...............................................................................................................................626
IP DHCP SNOOPING AGENT-OPTION ..................................................................................................627
IP DHCP SNOOPING AGENT-OPTION ALLOW-UNTRUSTED .............................................................628
IP DHCP SNOOPING BINDING...............................................................................................................629
IP DHCP SNOOPING DELETE-BY-CLIENT............................................................................................631
IP DHCP SNOOPING DELETE-BY-LINKDOWN .....................................................................................632
IP DHCP SNOOPING MAX-BINDINGS ...................................................................................................633
IP DHCP SNOOPING SUBSCRIBER-ID .................................................................................................635
IP DHCP SNOOPING TRUST..................................................................................................................637
IP DHCP VERIFY MAC-ADDRESS .........................................................................................................638
IP DHCP SNOOPING VIOLATION ..........................................................................................................640
IP SOURCE BINDING..............................................................................................................................642
SERVICE DHCP SNOOPING ..................................................................................................................644
SHOW ARP SECURITY...........................................................................................................................646
SHOW ARP SECURITY INTERFACE .....................................................................................................648
SHOW ARP SECURITY STATISTICS .....................................................................................................650
SHOW IP DHCP SNOOPING ..................................................................................................................652
SHOW IP DHCP SNOOPING BINDING ..................................................................................................654
SHOW IP DHCP SNOOPING INTERFACE .............................................................................................656
SHOW IP SOURCE BINDING..................................................................................................................658
Event Messages ....................................................................................................................661
Chapter 43
: Event Log ...............................................................................................................................663
Overview...................................................................................................................................................664
Displaying the Event Log..........................................................................................................................665
Clearing the Event Log .............................................................................................................................666
Chapter 44
: Event Log Commands ..........................................................................................................667
CLEAR LOG ............................................................................................................................................669
CLEAR LOG BUFFERED.........................................................................................................................670
CLEAR LOG PERMANENT .....................................................................................................................671
LOG BUFFERED......................................................................................................................................672
LOG CONSOLE .......................................................................................................................................674
LOG PERMANENT ..................................................................................................................................676
NO LOG BUFFERED ...............................................................................................................................677
NO LOG CONSOLE .................................................................................................................................679
NO LOG PERMANENT ............................................................................................................................680
SHOW LOG..............................................................................................................................................682
SHOW LOG CONFIG...............................................................................................................................685
SHOW LOG PERMANENT ......................................................................................................................687
SHOW LOG PERMANENT TAIL..............................................................................................................688
SHOW LOG REVERSE............................................................................................................................689
SHOW LOG TAIL .....................................................................................................................................690
Chapter 45
: Syslog Client .........................................................................................................................691
Overview...................................................................................................................................................692
Creating Syslog Server Definitions...........................................................................................................693
Deleting Syslog Server Definitions ...........................................................................................................696