A10 - ACOS System Configuration & Administration Cheat Sheet (2024)

access­-list

Standard. Configure a standard Access Control List (ACL) to permit or deny source IP addresses.

access­-list

Extended. Configure an extended Access Control List (ACL) to permit or deny traffic based on source and destin­ation IP addresses, IP protocol, and TCP/UDP ports.

accounting

Configure TACACS+ as the accounting method for recording inform­ation about user activi­ties.

admin

Configure an admin account for management access to ACOS.

admin-­lockout

Set lockout parameters for admin sessions.

admin-­session clear

Clear current ACOS admin sessions.

arp

Create a static ARP entry.

arp-ti­meout

Change the aging timer for dynamic ARP entries.

audit

Configure command auditing.

authen­tic­ation console type

Configure a console authen­tic­ation type.

authen­tic­ation enable

Config­uration authen­tic­ation of admin enable (Privi­leged mode) access.

authen­tic­ation login privil­ege­-mode

Place admins into the CLI directly at the Privileged EXEC level following successful authen­tic­ation. The admin does not need to navigate to the Privileged EXEC level from the User EXEC level.

authen­tic­ation mode

Enable tiered authen­tic­ation.

authen­tic­ation multip­le-­aut­h-r­eject

Configure support for multiple concurrent admin sessions using the same account.

authen­tic­ation type

Set the authen­tic­ation method used to authen­ticate admini­str­ative access to ACOS.

author­ization

Configure author­ization for contro­lling access to functions in the CLI. The ACOS device can use TACACS+ for author­izing commands executed under a specified privilege level. This command also allows you to specify the level for author­ization debugging.

backup log

Configure log backup options and save a backup of the system log.

backup store

Configure and save file access inform­ation for backup. When you back up system inform­ation, you can save typing by specifying the name of the store instead of the options in the store.

backup system

Back up the system. The startu­p-c­onfig file, and SSL certif­icates and keys will be backed up to a tar file.

backup­-pe­riodic

Schedule periodic backups.

banner

Set the banners to be displayed when an admin logs onto the CLI or accesses the Privileged EXEC mode.

bfd echo

Enables echo support for Bidire­ctional Forwarding Detection (BFD).

bfd enable

Globally enable BFD packet proces­sing.

bfd interval

Configure BFD timers.

bgp

The commands in this section apply globally to the BGP process running on the ACOS device.

bootimage

Specify the boot image location from which to load the system image the next time the Thunder Series is rebooted.

boot-b­loc­k-fix

Repair the master boot record (MBR) on the hard drive or compact flash.

bridge­-vl­an-­group

Configure a bridge VLAN group for VLAN-t­o-VLAN bridging.

captur­e-c­onfig

This command configures DDoS packet capture so that the packets causing DDoS violations can be reviewed and analyzed.

class-list

Configure a class list.

conver­t-s­tar­tup­-config

Convert config­uration profile from version 3.0/3.1 to 3.2.

copy

Copy a runnin­g-c­onfig or startu­p-c­onfig.

ddos

Configure DDoS Mitigation settings.

debug

Legacy debug command. It is recomm­ended to use the AXdebug subsystem instead of these

debug

commands.

delete

Delete an axdebug capture file.

diff

Display a side-b­y-side comparison of the commands in a pair of locally stored config­ura­tions.

disabl­e-f­ailsafe

Disable fail-safe monitoring for softwa­re-­related errors.

disabl­e-m­ana­gement service

Disable management access to specific protocols on specific Ethernet interf­aces.

do

Run a Privileged EXEC level command from a config­uration level prompt, without leaving the config­uration level.

domain­-group

Create a group of related

domain­-list

config­ura­tions

domain­-list

Create a domain classi­fic­ation list.

enable­-core

Change the file size of core dumps.

enable­-ma­nag­ement

Enable management access to specific protocols on specific Ethernet interf­aces.

enable­-pa­ssword

Set the enable password, which secures access to the Privileged EXEC level of the CLI.

end

Return to the Privileged EXEC level of the CLI.

enviro­nment temper­ature threshold

Configure the temper­ature condition under which a log is generated.

enviro­nment update­-in­terval

Configure the hardware polling interval for fault detection and log genera­tion.

erase

Erase the startu­p-c­onfig file. This command returns the device to its factory default config­uration after the next reload or reboot.

exit

Return to the Privileged EXEC level of the CLI.

export

Export a file to a remote site using the specified transport method.

export­-pe­riodic

Export file to a remote site period­ically.

fail-safe

Configure fail-safe automatic recovery.

fan-speed

Control fan speed setting.

glid

Configure a Global Limit ID (GLID). A GLID is a set of traffic limits that can be used with other features, such as DDoS Mitiga­tion.

hd-monitor enable

Enable hard disk monitoring on your ACOS device.

hostname

Set the ACOS device’s hostname.

icmpv6­-ra­te-­limit

Configure ICMPv6 rate limiting for IPv6 to protect against denial­-of­-se­rvice (DoS) attacks.

icmp-r­ate­-limit

Configure ICMP rate limiting, to protect against denial­-of­-se­rvice (DoS) attacks.

import

Get a file from a remote site.

import­-pe­riodic

Get files from a remote site period­ically.

interface

Access the CLI config­uration level for an interface.

ip

Configure global IP settings.

ipmi

Configure Intell­igent Platform Management Interface (IPMI) settings on the ACOS device.

ipv6

Configure global IPv6 settings.

key

Configure a key chain for use by routing authen­tic­ation features.

lacp-p­ass­through

Configure an LACP tunnel for LACP passth­rough. This feature allows the ACOS device to forward traffic on one trunk that originates on another trunk that is down. With this feature, if an LACP trunk goes down, the other trunk is used to continue connec­tivity for the traffic.

lacp system­-pr­iority

Set the Link Aggreg­ation Control Protocol (LACP) priority.

ldap-s­erver

Set Lightw­eight Directory Access Protocol (LDAP) parameters for authen­tic­ating admini­str­ative access to the ACOS device.

link

Link the “start­up-­config” token to the specified config­uration profile. By default, “start­up-­config” is linked to “default”, which means the config­uration profile stored in the image area from which the ACOS device most recently rebooted.

lldp enable

Enable the Link Layer Detection Protocol (LLDP). You can enable LLDP to either receive only, transmit only, or transmit and receive.

lldp manage­men­t-a­ddress

Specify the hostname or IP address and Ethernet interface to use as the management interface for the LLDP agent on the ACOS device.

lldp notifi­cation interval

Configure the interval between transm­ission of LLDP notifi­cations during normal transm­ission periods. (In the IEEE 802.3AB specif­ica­tion, this the msgTxI­nterval parame­ter.)

lldp system­-de­scr­iption

Defines the alpha-­numeric string that describes the system in the network.

lldp system­-name

Defines the string that will be assigned as the system name.

lldp tx fast-count

Set the initial value for the txFast variable, which determines the number of LLDP data packets that are transm­itted during a fast transm­ission period. (In the IEEE 802.3AB specif­ica­tion, this the txFastInit parame­ter.)

lldp tx fast-i­nterval

Configure the LLDP PDU transm­ission interval for fast periods. (In the IEEE 802.3AB specif­ica­tion, this the msgFastTx parame­ter.)

lldp tx hold

Configure the time to live (TTL) transm­ission interval that is carried in LLDP frames during normal (non-fast) periods. (In the IEEE 802.3AB specif­ica­tion, this the msgTxHold parame­ter.)

lldp tx interval

Configure the LLDP packet transmit interval. (In the IEEE 802.3AB specif­ica­tion, this the msgTxI­nterval parame­ter.)

lldp tx reinit­-delay

Configure the delay between a change to admini­str­ative “disabled” status of LDDP and reinit­ial­ization of the protocol.

locale

Set the locale for the current terminal session.

logging auditlog host

Configure audit logging to an external server.

logging buffered

Configure the event log on the ACOS device.

logging console

Set the logging level for messages sent to the console.

logging email-­address

Specify the email addresses to which to send event messages.

logging email buffer

Configure log email settings.

logging email filter

Configure a filter for emailing log messages.

logging export

Send the messages that are in the event buffer to an external file server.

logging facility

Enable logging facili­ties.

logging host

Specify a Syslog server to which to send event messages.

logging monitor

Set the logging level for messages sent to the terminal monitor.

logging syslog

Set the syslog logging level for events sent to the syslog host.

logging trap

Set the logging level for traps sent to the SNMP host.

mac-ad­dress

Configure a static MAC address.

mac-ag­e-time

Set the aging time for dynamic (learned) MAC entries. An entry that remains unused for the duration of the aging time is removed from the MAC table.

maximu­m-paths

Change the maximum number of paths a route can have in the Forwarding Inform­ation Base (FIB).

mirror­-port

Specify a port to receive copies of another port’s traffic.

monitor

Specify event thresholds for utiliz­ation of resources.

multi-­config

Enable simult­aneous admin sessions.

multi-­ctr­l-cpu

Enable use of more than one CPU for control proces­sing.

netflow common max-pa­cke­t-q­ueu­e-time

Specify the maximum amount of time ACOS can hold onto a NetFlow record packet in the queue before sending it to the NetFlow collector. ACOS holds a NetFlow packet in the queue until the packet payload is full of record data or until the queue timer expires.

netflow common select­or-­alg­orithm random

Configures the algorithm that Netflow uses to sample traffic. The only option is the random algorithm.

netflow monitor

Enable ACOS to act as a NetFlow exporter, for monitoring traffic and exporting the data to one or more NetFlow collectors for analysis.

no

Remove a config­uration command from the running config­ura­tion.

ntp

Configure Network Time Protocol (NTP) parame­ters.

ntp-status

Get the status of the NTP servers.

overla­y-t­unnel

Configure a remote tunnel endpoint for remote sites where protected objects reside. This can be used in conjun­ction with OSPF neighbor adjacency via GRE or VXLAN tunnels.

pki delete

Deletes a self-s­igned certif­icate or the CSR file.

radius­-server host

Set RADIUS parame­ters, for authen­tic­ating admini­str­ative access to the ACOS device.

restore

Restore the startu­p-c­onfig, aFleX policy files, <<when aFlex support is added>> and SSL certif­icates and keys from a .tar file previously created by the backup command. The restored config­uration takes effect following a reboot.

router log file

Configure router logging to a local file.

router log log-buffer

Sends router logs to the logging buffer.

router protocol

Enter the config­uration mode for a dynamic routing protocol.

route-map

Configure a route map.

runnin­g-c­onfig

Enable display of file inform­ation in the runnin­g-c­onfig.

run-hw­-diag

Access the hardware diagno­stics menu.

sflow

Configure parameters for sFlow packet sampling.

single­-bo­ard­-mode forced

On the Thunder 14045 device with dual processing modules, this command causes all traffic to be processed by the master only.

smtp

Configure a Simple Mail Transfer Protocol (SMTP) server to use for sending emails from the ACOS device.

ssh-lo­gin­-gr­ace­-time

Configures the time to establish an SSH connec­tion.

sshd

Perform an SSHD operation on the system.

system all-vl­an-­limit

Set the global traffic limits for all VLANs. The limit applies system­-wide to all VLANs; collec­tively, all ACOS device VLANs cannot exceed the specified limit.

system anomaly

Enable logging for packet anomaly events. This type of logging applies to system­-wide attacks such as SYN attacks.

system asic-m­mu-­fai­l-safe

Configures fail-safe parameters for the Layer 2/3 ASIC.

system attack

Enable logging for DDoS attacks. This type of logging applies to violations of DDoS Mitigation rules.

A10 - ACOS System Configuration & Administration Cheat Sheet (2024)
Top Articles
Jaaroverzicht binnenland 2024
EcoTank L8050 A4 Wi-Fi Ink Tank Photo Printer | Consumer | Inkjet Printers | Printers | Products | Epson Europe
Mate Me If You May Sapir Englard Pdf
Flixtor The Meg
The Realcaca Girl Leaked
According To The Wall Street Journal Weegy
Craigslist Chautauqua Ny
Hmr Properties
FAQ: Pressure-Treated Wood
Spartanburg County Detention Facility - Annex I
Dc Gas Login
Payment and Ticket Options | Greyhound
Immortal Ink Waxahachie
Wal-Mart 140 Supercenter Products
Zack Fairhurst Snapchat
Why Is 365 Market Troy Mi On My Bank Statement
Huntersville Town Billboards
Brazos Valley Busted Newspaper
Scream Queens Parents Guide
Village
Dove Cremation Services Topeka Ks
Xxn Abbreviation List 2017 Pdf
Bolly2Tolly Maari 2
O'reilly's In Mathis Texas
Lacey Costco Gas Price
Pioneer Library Overdrive
950 Sqft 2 BHK Villa for sale in Devi Redhills Sirinium | Red Hills, Chennai | Property ID - 15334774
Alternatieven - Acteamo - WebCatalog
Greyson Alexander Thorn
Citibank Branch Locations In Orlando Florida
Homewatch Caregivers Salary
Stolen Touches Neva Altaj Read Online Free
Roch Hodech Nissan 2023
2008 Chevrolet Corvette for sale - Houston, TX - craigslist
Trivago Myrtle Beach Hotels
Captain Billy's Whiz Bang, Vol 1, No. 11, August, 1920&#10;America's Magazine of Wit, Humor and Filosophy
Emily Tosta Butt
Brandon Spikes Career Earnings
Sofia With An F Mugshot
Lamont Mortuary Globe Az
What to Do at The 2024 Charlotte International Arts Festival | Queen City Nerve
Mauston O'reilly's
From Grindr to Scruff: The best dating apps for gay, bi, and queer men in 2024
9294027542
Craigslist Pets Charleston Wv
Lira Galore Age, Wikipedia, Height, Husband, Boyfriend, Family, Biography, Net Worth
Solving Quadratics All Methods Worksheet Answers
Electric Toothbrush Feature Crossword
Wvu Workday
Vrca File Converter
Gameplay Clarkston
Haunted Mansion Showtimes Near The Grand 14 - Ambassador
Latest Posts
Article information

Author: Pres. Carey Rath

Last Updated:

Views: 6026

Rating: 4 / 5 (41 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Pres. Carey Rath

Birthday: 1997-03-06

Address: 14955 Ledner Trail, East Rodrickfort, NE 85127-8369

Phone: +18682428114917

Job: National Technology Representative

Hobby: Sand art, Drama, Web surfing, Cycling, Brazilian jiu-jitsu, Leather crafting, Creative writing

Introduction: My name is Pres. Carey Rath, I am a faithful, funny, vast, joyous, lively, brave, glamorous person who loves writing and wants to share my knowledge and understanding with you.