Software Configuration Guide
Page 2
... to Increase Your Internet Quotient, TransPath, and VCO are service marks of the word partner does not imply a partnership relationship between Cisco and any other company. (0304R) Catalyst 3560 Switch Software Configuration Guide Copyright © 2004 Cisco Systems, Inc. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR...
... to Increase Your Internet Quotient, TransPath, and VCO are service marks of the word partner does not imply a partnership relationship between Cisco and any other company. (0304R) Catalyst 3560 Switch Software Configuration Guide Copyright © 2004 Cisco Systems, Inc. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR...
Software Configuration Guide
Page 165
... key (also configure the same key on the TACACS+ servers). The TACACS+ authentication service can provide these services: • Authentication-Provides complete control of the company's password aging policy. • Authorization-Provides fine-grained control over user capabilities for user billing. For example, a message could notify users that their passwords must...
... key (also configure the same key on the TACACS+ servers). The TACACS+ authentication service can provide these services: • Authentication-Provides complete control of the company's password aging policy. • Authorization-Provides fine-grained control over user capabilities for user billing. For example, a message could notify users that their passwords must...
Software Configuration Guide
Page 499
...-range limitation, use the no time-range time-range-name global configuration command. This example shows how to configure time ranges for workhours and for company holidays and to permit and deny the same traffic.
...-range limitation, use the no time-range time-range-name global configuration command. This example shows how to configure time ranges for workhours and for company holidays and to permit and deny the same traffic.
Software Configuration Guide
Page 730
... startup-config Purpose Enter global configuration mode. Configuring an IP Multicast Boundary Administratively-scoped boundaries can limit how long the entry remains active so that Company XYZ has an administratively-scoped boundary set for multicast traffic in the range of TTL thresholds to the default setting, use multicast boundaries instead of...
... startup-config Purpose Enter global configuration mode. Configuring an IP Multicast Boundary Administratively-scoped boundaries can limit how long the entry remains active so that Company XYZ has an administratively-scoped boundary set for multicast traffic in the range of TTL thresholds to the default setting, use multicast boundaries instead of...
Software Configuration Guide
Page 731
...-35 Specify the interface to be considered local, not globally unique. Return to ignore. Chapter 32 Configuring IP Multicast Routing Figure 32-5 Administratively-Scoped Boundaries Company XYZ Engineering Marketing Configuring Optional Multicast Routing Features 45154 239.128.0.0/16 239.0.0.0/8 You can then be applied to the source. When a boundary is defined...
...-35 Specify the interface to be considered local, not globally unique. Return to ignore. Chapter 32 Configuring IP Multicast Routing Figure 32-5 Administratively-Scoped Boundaries Company XYZ Engineering Marketing Configuring Optional Multicast Routing Features 45154 239.128.0.0/16 239.0.0.0/8 You can then be applied to the source. When a boundary is defined...
Software Configuration Guide
Page 821
... is required only if you override the default remote username (see Steps 4 and 5). (Optional) Specify the remote username. Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with an IP address of 172.16.101.101 and load and run those commands on... lines: hostname Switch1 ip rcmd remote-username User0 If the switch IP address translates to Switch1.company.com, the .rhosts file for User0 on the RCP server should contain this line: Switch1.company.com Switch1 For more information, refer to the documentation for the remote user on the RCP ...
... is required only if you override the default remote username (see Steps 4 and 5). (Optional) Specify the remote username. Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with an IP address of 172.16.101.101 and load and run those commands on... lines: hostname Switch1 ip rcmd remote-username User0 If the switch IP address translates to Switch1.company.com, the .rhosts file for User0 on the RCP server should contain this line: Switch1.company.com Switch1 For more information, refer to the documentation for the remote user on the RCP ...
Software Configuration Guide
Page 834
...privileged EXEC command to specify a username only for your RCP server. Before you want to use this line: Switch1.company.com Switch1 For more information, refer to Switch1.company.com, the .rhosts file for the RCP download. The switch and the server must add an entry to accept ...workstation acting as the RCP server supports the remote shell (rsh). • Ensure that you copy an image from the directory associated with the Cisco IOS File System, Configuration Files, and Software Images RCP requires a client to send a remote username on each RCP request to the router ...
...privileged EXEC command to specify a username only for your RCP server. Before you want to use this line: Switch1.company.com Switch1 For more information, refer to Switch1.company.com, the .rhosts file for the RCP download. The switch and the server must add an entry to accept ...workstation acting as the RCP server supports the remote shell (rsh). • Ensure that you copy an image from the directory associated with the Cisco IOS File System, Configuration Files, and Software Images RCP requires a client to send a remote username on each RCP request to the router ...