SUPPORTED STANDARDS, MIBS AND RFCS.......................................................................... 305STATISTICS MONITORING ........................................................................................................ 306RMON ALARMS............................................................................................................................ 30727. PERIODIC MONITORING ......................................................................................................... 312INTRODUCTION ........................................................................................................................... 312FEATURE OVERVIEW ................................................................................................................. 312SUPPORTED STANDARDS, MIBS AND RFCS.......................................................................... 314DEFAULT PERIODIC MONITORING CONFIGURATION........................................................ 315CONFIGURING AND DISPLAYING PERIODIC MONITORING ............................................. 316CONFIGURATION EXAMPLES................................................................................................... 326RELATED COMMANDS............................................................................................................... 32828. LOGGING SYSTEM TRAP MESSAGES TO THE NVRAM .................................................. 329INTRODUCTION ........................................................................................................................... 329CONFIGURING THE TRAP LEVEL FOR STORED SYSTEM MESSAGES............................. 329CONFIGURING THE MESSAGE FORMAT ................................................................................ 329NVRAM SYSTEM-TRAP LOGGING COMMANDS................................................................... 33029. NVRAM CONFIGURATION HISTORY.................................................................................... 333INTRODUCTION ........................................................................................................................... 333HISTORY LOG FORMAT AND GENERATION ......................................................................... 333CONFIGURING HISTORY SETTINGS........................................................................................ 333DISPLAYING THE CONFIGURATION HISTORY..................................................................... 33430. CONFIGURING THE WATCHDOG FEATURES.................................................................... 337OVERVIEW .................................................................................................................................... 337ACCESSING WATCHDOG MODE .............................................................................................. 337CONFIGURING THE RESET-LOOP DETECTION FEATURE .................................................. 338CONFIGURING THE SNMP REQUEST FAILURE DETECTION FEATURE........................... 339CONFIGURING THE APPLICATION SUSPENSION DETECTION FEATURE....................... 340DISPLAYING THE WATCHDOG CONFIGURATION............................................................... 34131. NTP CLIENT DESCRIPTION ..................................................................................................... 342INTRODUCTION ........................................................................................................................... 342THE NTP TIMESERVER COMMANDS....................................................................................... 342WHY USE NTP PROTOCOL ? ...................................................................................................... 343CONFIGURING AND DISPLAYING NTP SERVER SETTINGS ............................................... 343MD5 AUTHENTICATION............................................................................................................. 345RUNNING THE NTP SERVER ..................................................................................................... 346EXAMPLES .................................................................................................................................... 347CONFIGURATION EXAMPLE..................................................................................................... 347CONFIGURING DAYLIGHT SAVING TIME (DST) .................................................................. 34832. REMOTE AUTHENTICATION DIAL-IN USER SERVICE (RADIUS) ................................ 351INTRODUCTION ........................................................................................................................... 351BINOS RADIUS FEATURES ........................................................................................................ 351DESCRIPTION OF COMMANDS................................................................................................. 352USING RADIUS TO CONFIGURE LOGIN AUTHENTICATION.............................................. 354A RADIUS CONFIGURATION EXAMPLE ................................................................................. 35533. SECURE SHELL (SSH) ................................................................................................................ 357INTRODUCTION ........................................................................................................................... 357SOME SECURITY CONSIDERATIONS ...................................................................................... 357COMMANDS FOR MANAGING THE SSH SERVER................................................................. 358SUPPORTED CLIENTS ................................................................................................................. 359SUPPORTED STANDARDS.......................................................................................................... 35934. 802.1X PORT-BASED AUTHENTICATION ............................................................................. 360INTRODUCTION ........................................................................................................................... 360