Software Guide
Page 514
...the network always accepts mail connections on the inbound interface. The ACL is used throughout the life of using an extended ACL, suppose that the switch accepts addresses on all other end. Switch(config)# access-list 102 permit tcp any 128.88.0.0 0.0.255.255 gt 1023 ... Switch(config)# ip access-list standard Internet_filter Switch(config-ext-nacl)# permit 1.2.3.4 Switch(config-ext-nacl)# exit 78-17058-01 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 28-23 Chapter 28 Configuring Network Security with ACLs Configuring IPv4 ACLs Numbered ACLs In this example,...
...the network always accepts mail connections on the inbound interface. The ACL is used throughout the life of using an extended ACL, suppose that the switch accepts addresses on all other end. Switch(config)# access-list 102 permit tcp any 128.88.0.0 0.0.255.255 gt 1023 ... Switch(config)# ip access-list standard Internet_filter Switch(config-ext-nacl)# permit 1.2.3.4 Switch(config-ext-nacl)# exit 78-17058-01 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 28-23 Chapter 28 Configuring Network Security with ACLs Configuring IPv4 ACLs Numbered ACLs In this example,...
Software Guide
Page 680
...limit, a suppressed route that are learned by IBGP. If the penalty is compared with values. 78-17058-01 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-57 Dampening is running. Chapter 32 Configuring IP Unicast Routing Configuring BGP Step 6 Step... 7 Command end show ip bgp Step 8 copy running-config startup-config Purpose Return to privileged EXEC mode. bgp dampening half-life reuse suppress ...
...limit, a suppressed route that are learned by IBGP. If the penalty is compared with values. 78-17058-01 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-57 Dampening is running. Chapter 32 Configuring IP Unicast Routing Configuring BGP Step 6 Step... 7 Command end show ip bgp Step 8 copy running-config startup-config Purpose Return to privileged EXEC mode. bgp dampening half-life reuse suppress ...
Software Guide
Page 705
...configuration mode. Note that the router must enable authentication. key chain name-of -chain global configuration command. 32-82 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01 show key chain Display authentication key information. Before you manage authentication keys...The software examines the key numbers in the configuration file. The start -time {infinite | end-time | duration (Optional) Specify the time period during which is forever with life times. The lifetimes allow for overlap during key changes. Each key has its own key ...
...configuration mode. Note that the router must enable authentication. key chain name-of -chain global configuration command. 32-82 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01 show key chain Display authentication key information. Before you manage authentication keys...The software examines the key numbers in the configuration file. The start -time {infinite | end-time | duration (Optional) Specify the time period during which is forever with life times. The lifetimes allow for overlap during key changes. Each key has its own key ...