beautypg.com

Allied Telesis AT-FS970M Series User Manual

Page 14

background image

Contents

14

Chapter 42

: DHCP Snooping Commands ................................................................................................617

ARP SECURITY .......................................................................................................................................619
ARP SECURITY VIOLATION...................................................................................................................620
CLEAR ARP SECURITY STATISTICS ....................................................................................................622
CLEAR IP DHCP SNOOPING BINDING..................................................................................................623
CLEAR IP DHCP SNOOPING STATISTICS............................................................................................625
IP DHCP SNOOPING...............................................................................................................................626
IP DHCP SNOOPING AGENT-OPTION ..................................................................................................627
IP DHCP SNOOPING AGENT-OPTION ALLOW-UNTRUSTED .............................................................628
IP DHCP SNOOPING BINDING...............................................................................................................629
IP DHCP SNOOPING DELETE-BY-CLIENT............................................................................................631
IP DHCP SNOOPING DELETE-BY-LINKDOWN .....................................................................................632
IP DHCP SNOOPING MAX-BINDINGS ...................................................................................................633
IP DHCP SNOOPING SUBSCRIBER-ID .................................................................................................635
IP DHCP SNOOPING TRUST..................................................................................................................637
IP DHCP VERIFY MAC-ADDRESS .........................................................................................................638
IP DHCP SNOOPING VIOLATION ..........................................................................................................640
IP SOURCE BINDING..............................................................................................................................642
SERVICE DHCP SNOOPING ..................................................................................................................644
SHOW ARP SECURITY...........................................................................................................................646
SHOW ARP SECURITY INTERFACE .....................................................................................................648
SHOW ARP SECURITY STATISTICS .....................................................................................................650
SHOW IP DHCP SNOOPING ..................................................................................................................652
SHOW IP DHCP SNOOPING BINDING ..................................................................................................654
SHOW IP DHCP SNOOPING INTERFACE .............................................................................................656
SHOW IP SOURCE BINDING..................................................................................................................658

Section V:

Event Messages ....................................................................................................................661

Chapter 43

: Event Log ...............................................................................................................................663

Overview...................................................................................................................................................664
Displaying the Event Log..........................................................................................................................665
Clearing the Event Log .............................................................................................................................666

Chapter 44

: Event Log Commands ..........................................................................................................667

CLEAR LOG ............................................................................................................................................669
CLEAR LOG BUFFERED.........................................................................................................................670
CLEAR LOG PERMANENT .....................................................................................................................671
LOG BUFFERED......................................................................................................................................672
LOG CONSOLE .......................................................................................................................................674
LOG PERMANENT ..................................................................................................................................676
NO LOG BUFFERED ...............................................................................................................................677
NO LOG CONSOLE .................................................................................................................................679
NO LOG PERMANENT ............................................................................................................................680
SHOW LOG..............................................................................................................................................682
SHOW LOG CONFIG...............................................................................................................................685
SHOW LOG PERMANENT ......................................................................................................................687
SHOW LOG PERMANENT TAIL..............................................................................................................688
SHOW LOG REVERSE............................................................................................................................689
SHOW LOG TAIL .....................................................................................................................................690

Chapter 45

: Syslog Client .........................................................................................................................691

Overview...................................................................................................................................................692
Creating Syslog Server Definitions...........................................................................................................693
Deleting Syslog Server Definitions ...........................................................................................................696