SUPPORTED STANDARDS, MIBS AND RFCS..........................................................................305
STATISTICS MONITORING ........................................................................................................306
RMON ALARMS............................................................................................................................ 307
27. PERIODIC MONITORING .........................................................................................................312
INTRODUCTION ........................................................................................................................... 312
FEATURE OVERVIEW ................................................................................................................. 312
SUPPORTED STANDARDS, MIBS AND RFCS..........................................................................314
DEFAULT PERIODIC MONITORING CONFIGURATION........................................................315
CONFIGURING AND DISPLAYING PERIODIC MONITORING .............................................316
CONFIGURATION EXAMPLES...................................................................................................326
RELATED COMMANDS............................................................................................................... 328
28. LOGGING SYSTEM TRAP MESSAGES TO THE NVRAM ..................................................329
INTRODUCTION ........................................................................................................................... 329
CONFIGURING THE TRAP LEVEL FOR STORED SYSTEM MESSAGES.............................329
CONFIGURING THE MESSAGE FORMAT................................................................................ 329
NVRAM SYSTEM-TRAP LOGGING COMMANDS...................................................................330
29. NVRAM CONFIGURATION HISTORY....................................................................................333
INTRODUCTION ........................................................................................................................... 333
HISTORY LOG FORMAT AND GENERATION ......................................................................... 333
CONFIGURING HISTORY SETTINGS........................................................................................ 333
DISPLAYING THE CONFIGURATION HISTORY..................................................................... 334
30. CONFIGURING THE WATCHDOG FEATURES....................................................................337
OVERVIEW....................................................................................................................................337
ACCESSING WATCHDOG MODE .............................................................................................. 337
CONFIGURING THE RESET-LOOP DETECTION FEATURE .................................................. 338
CONFIGURING THE SNMP REQUEST FAILURE DETECTION FEATURE...........................339
CONFIGURING THE APPLICATION SUSPENSION DETECTION FEATURE....................... 340
DISPLAYING THE WATCHDOG CONFIGURATION............................................................... 341
31. NTP CLIENT DESCRIPTION..................................................................................................... 342
INTRODUCTION ........................................................................................................................... 342
THE NTP TIMESERVER COMMANDS.......................................................................................342
WHY USE NTP PROTOCOL ?...................................................................................................... 343
CONFIGURING AND DISPLAYING NTP SERVER SETTINGS............................................... 343
MD5 AUTHENTICATION.............................................................................................................345
RUNNING THE NTP SERVER ..................................................................................................... 346
EXAMPLES .................................................................................................................................... 347
CONFIGURATION EXAMPLE.....................................................................................................347
CONFIGURING DAYLIGHT SAVING TIME (DST) ..................................................................348
32. REMOTE AUTHENTICATION DIAL-IN USER SERVICE (RADIUS) ................................ 351
INTRODUCTION ........................................................................................................................... 351
BINOS RADIUS FEATURES ........................................................................................................ 351
DESCRIPTION OF COMMANDS................................................................................................. 352
USING RADIUS TO CONFIGURE LOGIN AUTHENTICATION.............................................. 354
A RADIUS CONFIGURATION EXAMPLE ................................................................................. 355
33. SECURE SHELL (SSH) ................................................................................................................ 357
INTRODUCTION ........................................................................................................................... 357
SOME SECURITY CONSIDERATIONS ...................................................................................... 357
COMMANDS FOR MANAGING THE SSH SERVER.................................................................358
SUPPORTED CLIENTS................................................................................................................. 359
SUPPORTED STANDARDS..........................................................................................................359
34. 802.1X PORT-BASED AUTHENTICATION ............................................................................. 360
INTRODUCTION ........................................................................................................................... 360