Riverstone Networks RS 2100 User Manual

Page 76

Advertising
background image

Index-4 Riverstone Networks RS 2100 Switch Router Getting Started Guide

set command

............................ 4-13

,

5-5

,

5-7

setting basic system information

.............. 4-9

setting boot source

.................................... 5-5

setting date and time

................................. 4-9

setting passwords

.................................... 4-12

setting system contact

............................... 4-9

setting system location

............................. 4-9

setting system name

................................. 4-9

setting trap target

.................................... 4-15

setting up SNMP

.................................... 4-15

skipconfig

............................................... 4-13

SNMP

..................................................... 4-15

applying ACLs

................................. 4-16

community string

............................. 4-15

disabling authentication traps

.......... 4-16

improving security

........................... 4-16

initial configuration

......................... 4-15

MIBs

................................................ 4-17

privilege

........................................... 4-15

security

............................................. 4-16

supported MIBs

............................... 4-17

trap-source

....................................... 4-16

software upgrade

...................................... 5-1

specifications

............................................ 3-2

SSL persistence

........................................ 2-7

starting the command line interface

......... 4-4

startup configuration

................................ 4-6

static route to trap target

......................... 4-15

statistics

.................................................... 2-6

layer-2

................................................ 2-6

layer-3

................................................ 2-6

layer-4

................................................ 2-6

LFAP

.................................................. 2-6

MIB II

................................................ 2-6

Open APIs

.......................................... 2-6

RMON

............................................... 2-6

RMON v2

.......................................... 2-6

sticky persistence

...................................... 2-7

strict priority queuing

............................... 2-6

[email protected]

.................... A-1

supported MIBs

...................................... 4-17

SYSLOG

error

.................................................. 4-20

facility-type

...................................... 4-21

fatal

.................................................. 4-20

informational

.................................... 4-20

setting levels

.................................... 4-20

syslog.conf file

................................. 4-21

warning

............................................4-20

SYSLOG levels

......................................4-20

SYSLOG message types

........................4-20

SYSLOG parameters

..............................4-20

syslog.conf file

.......................................4-21

system image add

.....................................5-2

system image choose

................................5-2

system image list

......................................5-2

system information

...................................4-9

system messages

.....................................4-20

system promimage upgrade

.............. 5-3

,

5-4

system set contact

.....................................4-9

system set date

..........................................4-9

system set location

....................................4-9

system set name

........................................4-9

system set syslog level

...........................4-20

system show active-config

.....................4-10

system show dns

.....................................4-19

system show version

......................... 5-1

,

5-3

T

TACACS

..................................................2-5

TACACS+

................................................2-5

TCP persistence

........................................2-6

TFTP server

...................................... 5-1

,

5-6

loading software

.................................5-5

ToS octet rewrites

.....................................2-6

traffic control queues

................................2-6

traffic control queuing

..............................2-6

trap target

................................................4-15

static route

........................................4-15

trap-source

..............................................4-16

troubleshooting

........................................ A-1

U

unicast routing protocols

BGP

....................................................2-4

IS-IS

...................................................2-4

OSPF

..................................................2-4

RIP

.....................................................2-4

upgrading boot image

image-file-name

.................................5-3

ip add route

........................................5-3

system promimage upgrade

...............5-3

system show version

..........................5-3

upgrading boot PROM software

...............5-3

Advertising