AT-8100 Switch Command Line User’s Guide
39
Figure 231. SHOW RMON EVENT Command................................................................................................................1368
Figure 232. SHOW RMON HISTORY Command............................................................................................................1370
Figure 233. SHOW RMON STATISTICS Command.......................................................................................................1372
Figure 234. Password Prompt for Command Mode Restriction ......................................................................................1377
Figure 235. Command Mode Restriction Error Message ................................................................................................1377
Figure 236. Displaying the Local Manager Accounts in the Running Configuration........................................................1385
Figure 237. SHOW TELNET Command..........................................................................................................................1401
Figure 238. SHOW TELNET Command..........................................................................................................................1406
Figure 239. SSH Remote Management of a Member Switch..........................................................................................1419
Figure 240. SHOW CRYPTO KEY HOSTKEY Command ..............................................................................................1434
Figure 241. SHOW SSH SERVER Command.................................................................................................................1435
Figure 242. SHOW IP HTTP Command..........................................................................................................................1442
Figure 243. SHOW IP HTTP Command..........................................................................................................................1447
Figure 244. SHOW IP HTTPS Command........................................................................................................................1462
Figure 245. SHOW IP HTTPS Command........................................................................................................................1475
Figure 246. SHOW RADIUS Command ..........................................................................................................................1485
Figure 247. SHOW TACACS Command.........................................................................................................................1488
Figure 248. SHOW RADIUS Command ..........................................................................................................................1512
Figure 249. SHOW TACACS Command.........................................................................................................................1514
Figure 250. SHOW ACCESS-LIST Command................................................................................................................1555
Figure 251. SHOW INTERFACE ACCESS-GROUP Command .....................................................................................1556
Figure 252. SHOW IPV6 ACL Command........................................................................................................................1556
Figure 253. SHOW TIME-RANGE Command .................................................................................................................1557
Figure 254. SHOW ACCESS-LIST Command................................................................................................................1640
Figure 255. SHOW INTERFACE ACCESS-GROUP Command .....................................................................................1641
Figure 256. SHOW IPV6 ACCESS-LIST Command .......................................................................................................1642
Figure 257. SHOW TIME-RANGE Command .................................................................................................................1643
Figure 258. SHOW MLS QOS Command .......................................................................................................................1689
Figure 259. SHOW CLASS-MAP Command...................................................................................................................1689
F
igure 260. SHOW POLICY-MAP command ..................................................................................................................1690
Figure 261. SHOW MLS QOS AGGREGATE-POLICER Command...............................................................................1690
Figure 262. SHOW MLS QOS INTERFACE Command— Strict Priority.........................................................................1691
Figure 263. SHOW MLS QOS MAPS COS-QUEUE Command .....................................................................................1691
Figure 264. SHOW MLS QOS MAPS DSCP-QUEUE Command ...................................................................................1693
Figure 265. SHOW MLS QOS MAPS POLICED-DSCP Command ................................................................................1694
Figure 266. SHOW CLASS-MAP Command with TCP Flags..........................................................................................1725
Figure 267. CoS Priority to CoS Queue Mapping............................................................................................................1736
Figure 268. SHOW CLASS-MAP Command...................................................................................................................1764
Figure 269. SHOW POLICY-MAP Command..................................................................................................................1765
Figure 270. SHOW MLS QOS Command .......................................................................................................................1767
Figure 271. SHOW MLS QOS AGGREGATE-POLICER ................................................................................................1768
Figure 272. SHOW MLS QOS INTERFACE Command - Strict Priority ..........................................................................1770
Figure 273. SHOW MLS QOS INTERFACE Command - Strict Priority (continued) .......................................................1771
Figure 274. SHOW MLS QOS INTERFACE Command - WRR......................................................................................1771
Figure 275. SHOW MLS QOS MAPS COS-QUEUE Command .....................................................................................1773
Figure 276. SHOW MLS QOS MAPS DSCP-QUEUE Command ...................................................................................1775
Figure 277. SHOW MLS QOS MAPS POLICED-DSCP Command ................................................................................1777
Figure 278. Default Mapping of WRR Queues ................................................................................................................1782
Fi
gure 279. Mapping of WRR Queues.............................................................................................................................1783
Figure 280. SHOW MLS QOS INTERFACE STORM-STATUS Command.....................................................................1795
Figure 281. SHOW MLS QOS INTERFACE STORM-STATUS Command.....................................................................1798
Figure 282. SHOW IP INTERFACE Command...............................................................................................................1845
Figure 283. SHOW IP ROUTE Command.......................................................................................................................1847
Figure 284. Static and RIP Route Elements in the SHOW IP ROUTE Command ..........................................................1848
Figure 285. Enabling RIP Example..................................................................................................................................1851
Figure 286. Enabling Authentication Example.................................................................................................................1854
Figure 287. Automatic Summarization Example..............................................................................................................1856
Figure 288. SHOW IP RIP Command .............................................................................................................................1860
Figure 289. SHOW IP RIP Command .............................................................................................................................1895
Figure 290. SHOW IP RIP COUNTER Command...........................................................................................................1897
Kommentare zu diesen Handbüchern