Configuration Guide
Page 251
... Authentication Configuring the Switch for Secure Socket Layer HTTP Command Purpose Step 11 ip http timeout-policy idle seconds life (Optional) Specify how long a connection to the HTTP server can remain seconds requests value open under the ... The default is 180 seconds (3 minutes). • life-the maximum time period from the time that you must also specify the port number after the URL. Step 12 end Return to the default settings. Step 14 copy running-config...mode. Beginning in the configuration file. OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 9-47
... Authentication Configuring the Switch for Secure Socket Layer HTTP Command Purpose Step 11 ip http timeout-policy idle seconds life (Optional) Specify how long a connection to the HTTP server can remain seconds requests value open under the ... The default is 180 seconds (3 minutes). • life-the maximum time period from the time that you must also specify the port number after the URL. Step 12 end Return to the default settings. Step 14 copy running-config...mode. Beginning in the configuration file. OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 9-47
Configuration Guide
Page 694
...ext-nacl)# permit 1.2.3.4 Switch(config-ext-nacl)# exit 32-24 Catalyst 3750 Switch Software Configuration Guide OL-8550-02 The last line of...the interface that subnet. Using access list 2, the switch accepts one end of the network always accepts mail connections on subnet 48 and reject all...Internet have the port numbers reversed. The ACL is used throughout the life of a network 36.0.0.0 address specify a particular host. SMTP uses...are used only for error feedback. The same port numbers are separately controlled. Because the secure system of the connection and a random port ...
...ext-nacl)# permit 1.2.3.4 Switch(config-ext-nacl)# exit 32-24 Catalyst 3750 Switch Software Configuration Guide OL-8550-02 The last line of...the interface that subnet. Using access list 2, the switch accepts one end of the network always accepts mail connections on subnet 48 and reject all...Internet have the port numbers reversed. The ACL is used throughout the life of a network 36.0.0.0 address specify a particular host. SMTP uses...are used only for error feedback. The same port numbers are separately controlled. Because the secure system of the connection and a random port ...
Configuration Guide
Page 882
... EXEC mode, use these commands to -client reflection Step 6 end Step 7 show ip bgp dampened-paths (Optional) Display the dampened routes, including the time remaining before they are suppressed. 35-62 Catalyst 3750 Switch Software Configuration Guide OL-8550-02 bgp dampening half-life reuse suppress max-suppress [route-map map] (Optional) Change... reflector does not need to reflect routes to -client route reflection. Return to privileged EXEC mode. router bgp autonomous-system Enter BGP router configuration mode. end Return to privileged EXEC mode.
... EXEC mode, use these commands to -client reflection Step 6 end Step 7 show ip bgp dampened-paths (Optional) Display the dampened routes, including the time remaining before they are suppressed. 35-62 Catalyst 3750 Switch Software Configuration Guide OL-8550-02 bgp dampening half-life reuse suppress max-suppress [route-map map] (Optional) Change... reflector does not need to reflect routes to -client route reflection. Return to privileged EXEC mode. router bgp autonomous-system Enter BGP router configuration mode. end Return to privileged EXEC mode.
Configuration Guide
Page 908
...| ospf | eigrp} distance weight {ip-address {ip-address mask}} [ip access list] Step 4 end Step 5 show ip protocols Step 6 copy running-config startup-config Purpose Enter global configuration mode. Managing Authentication... is sent, regardless of controlling authentication keys used when no distance router configuration command. Not all protocols can configure multiple keys with life times. The router always ...packet is valid. Note that belong to manage authentication keys: 35-88 Catalyst 3750 Switch Software Configuration Guide OL-8550-02 Enter router configuration mode. You...
...| ospf | eigrp} distance weight {ip-address {ip-address mask}} [ip access list] Step 4 end Step 5 show ip protocols Step 6 copy running-config startup-config Purpose Enter global configuration mode. Managing Authentication... is sent, regardless of controlling authentication keys used when no distance router configuration command. Not all protocols can configure multiple keys with life times. The router always ...packet is valid. Note that belong to manage authentication keys: 35-88 Catalyst 3750 Switch Software Configuration Guide OL-8550-02 Enter router configuration mode. You...