How to Use This Guide
– 4 –
Conventions
The following conventions are used throughout this guide to show information:
Note:
Emphasizes important information or calls your attention to related features
or instructions.
Caution:
Alerts you to a potential hazard that could cause loss of data, or damage
the system or equipment.
Revision History
This section summarizes the changes in each revision of this guide.
Revision Date Change Description
v1.2.2.0 01/2017 New:
•"Switch Clustering" on page 152
•"Flow Sampling Commands" on page 193
•"mac-authentication reauth-time" on page 267
•"network-access max-mac-count" on page 270
•"network-access mode mac-authentication" on
page 271
•"network-access port-mac-filter" on page 272
•"mac-authentication intrusion-action" on page 273
•"mac-authentication max-mac-count" on page 273
•"Web Authentication" on page 276
•"ip dhcp snooping information option remote-id" on
page 288
•"ip dhcp snooping information option circuit-id" on
page 292
•"dos-protection echo-chargen" on page 314
•"dos-protection tcp-flooding" on page 315
•"dos-protection udp-flooding" on page 317
•"dos-protection win-nuke" on page 318
•"switchport dot1q-tunnel priority map" on page 471
•"ERPS Commands" on page 489
•"Loopback Detection Commands" on page 417
•"qos map cos-queue" on page 526
•"qos map dscp-queue" on page 528
•"show qos map cos-queue" on page 530
•"show qos map dscp-queue" on page 531
•"IP Routing Commands" on page 689
•"show ip igmp snooping statistics" on page 566
•"File Management" on page 100 – SFTP
•"Denial of Service Protection" on page 314
•"dir" on page 107