beautypg.com

Canogaos command reference 21 – CANOGA PERKINS 9175 Command Reference User Manual

Page 23

background image

CanogaOS Command Reference

21

33.29

IP ACCESS

-

GROUP

...................................................................................................................... 33-21

33.30

SHOW ACCESS

-

LIST IP

................................................................................................................ 33-22

33.31

TIME

-

RANGE

............................................................................................................................... 33-22

33.32

ABSOLUTE

................................................................................................................................. 33-23

33.33

PERIODIC

................................................................................................................................... 33-23

33.34

SHOW TIME

-

RANGE

..................................................................................................................... 33-24

34

ARP INSPECTION COMMANDS ..................................................................................................... 34-1

34.1

ARP ACCESS

-

LIST

............................................................................................................................. 34-1

34.2

IP ARP INSPECTION FILTER VLAN

........................................................................................................ 34-1

34.3

IP ARP INSPECTION LOG

-

BUFFER

....................................................................................................... 34-2

34.4

IP ARP INSPECTION TRUST

................................................................................................................ 34-3

34.5

IP ARP INSPECTION VALIDATE

............................................................................................................ 34-4

34.6

IP ARP INSPECTION VLAN

.................................................................................................................. 34-5

34.7

IP ARP INSPECTION VLAN LOGGING

.................................................................................................... 34-6

34.8

SHOW IP ARP INSPECTION

................................................................................................................. 34-7

34.9

SHOW IP ARP INSPECTION LOG

.......................................................................................................... 34-8

35

IP SOURCE GUARD COMMANDS.................................................................................................. 35-1

35.1

IP SOURCE BINDING

.......................................................................................................................... 35-1

35.2

IP SOURCE MAXIMAL BINDING

............................................................................................................ 35-1

35.3

IP VERIFY SOURCE

............................................................................................................................ 35-2

35.4

SHOW IP SOURCE BINDING

................................................................................................................ 35-3

36

DHCP SNOOPING COMMANDS ..................................................................................................... 36-1

36.1

CLEAR DHCP SNOOPING

.................................................................................................................... 36-1

36.2

DHCP SNOOPING

.............................................................................................................................. 36-1

36.3

DHCP SNOOPING BINDING

................................................................................................................. 36-2

36.4

DHCP SNOOPING DATABASE

.............................................................................................................. 36-3

36.5

DHCP SNOOPING INFORMATION OPTION

............................................................................................. 36-4

36.6

DHCP SNOOPING INFORMATION OPTION ALLOW

-

UNTRUSTED

............................................................... 36-5

36.7

DHCP SNOOPING TRUST

.................................................................................................................... 36-6

36.8

DHCP SNOOPING VERIFY

................................................................................................................... 36-6

36.9

DHCP SNOOPING VLAN

...................................................................................................................... 36-7

36.10

SHOW DHCP SNOOPING BINDING

.................................................................................................... 36-8

36.11

SHOW DHCP SNOOPING CONFIG

.................................................................................................... 36-8

36.12

SHOW DHCP SNOOPING STATISTICS

............................................................................................... 36-9

36.13

SHOW DHCP SNOOPING TRUSTED

-

SOURCES

................................................................................ 36-10

37

IEEE 802.1X COMMANDS ............................................................................................................... 37-1

37.1

DOT

1

X INITIALIZE

.............................................................................................................................. 37-1

37.2

DOT

1

X MAX

-

REAUTH

-

REQ

................................................................................................................. 37-1

37.3

DOT

1

X PORT

-

CONTROL

.................................................................................................................... 37-2

37.4

DOT

1

X PROTOCOL

-

VERSION

............................................................................................................. 37-3

37.5

DOT

1

X QUIET

-

PERIOD

....................................................................................................................... 37-3

37.6

DOT

1

X REAUTHENTICATION

.............................................................................................................. 37-4

37.7

DOT

1

X RE

-

AUTHENTICAE

.................................................................................................................. 37-5