62 |
For More About Operations and Facilities
For more detail about operating the switch, and for full command syntax definitions, see the Operation chapter in the
■How to use the User Authentication Facility, RADIUS, TACACs or TACACS+ for authenticating users who log on to the switch, and ensuring that only authorised login accounts are used.
■How to use the HTTP Client, which you can use to download software files onto the switch, and the HTTP Server.
■How to use the Mail Subsystem.
■How to use LDAP to load PKI certificates and CRLs onto your switch.
■How to use Switch Startup Operations
■How to use FLASH compaction to regain storage space on the switch. Read “Warning about FLASH memory” on page 9 before you attempt to do this.
■How to set aliases to represent common command strings.
■How to define a remote security officer, so you can manage the security features remotely via Telnet.
See other chapters in the
■Use the logging facility to monitor network activity and to select and display the results (see the Logging Facility chapter).
■Use SNMP to manage the switch remotely (see the Simple Network Management Protocol (SNMP) chapter and Appendix C: SNMP MIBs).
■Use the command line to create, delete and modify configuration scripts (see the Scripting chapter).
■Set up triggers to automatically run specified scripts at specified times, or at specified events (see the Trigger Facility chapter).
■Use NTP to synchronise your switch’s time clock with those of other network devices (see the Network Time Protocol (NTP) chapter).
■Use software to test whether the switch’s hardware functions correctly (see the Test Facility chapter).
Software Release 2.6.1