Utilities - Cisco Catalyst 4500 Series Software Configuration Manual

Cisco ios xe release 3.9.xe and cisco ios release 15.2(5)ex
Hide thumbs Also See for Catalyst 4500 Series:
Table of Contents

Advertisement

Chapter 1
Product Overview
For information on configuring broadcast suppression, see
Path Forwarding."

Utilities

Supported utilities include the following:
Layer 2 Traceroute
Layer 2 traceroute allows the switch to identify the physical path that a packet takes from a source device
to a destination device. Layer 2 traceroute supports only unicast source and destination MAC addresses.
For information about Layer 2 Traceroute, see
Time Domain Reflectometry
Time Domain Reflectometry (TDR) is a technology used for diagnosing the state and reliability of
cables. TDR can detect open, shorted, or terminated cable states. The calculation of the distance to the
failure point is also supported.
For information about TDR, see
Debugging Features
The switch has several commands to help you debug your initial setup. These commands are included in
the following command groups:
For more information, refer to the command reference guide.
Web-based Authentication
The web-based authentication feature, known as Web Authentication Proxy, enables you to authenticate
end users on host systems that do not run the IEEE 802.1X supplicant. When you initiate an HTTP
session, this feature intercepts ingress HTTP packets from the host and sends an HTML login page to
your. You key in the credentials, which the web-based authentication feature sends to the AAA server
for authentication. If authentication succeeds, web-based authentication sends a Login-Successful
HTML page to the host and applies the access policies returned by the AAA server.
For information on configuring web-based authentication, see
Authentication."
platform
debug platform
Catalyst 4500 Series Switch, Cisco IOS Software Configuration Guide - Cisco IOS XE 3.9.xE and IOS 15.2(5)Ex
Chapter 10, "Checking Port Status and Connectivity."
Chapter 10, "Checking Port Status and Connectivity."
Chapter 37, "Configuring Unicast Reverse
Chapter 52, "Configuring Web-Based
Security Features
1-43

Advertisement

Table of Contents
loading

Table of Contents