throbber
Case 5:14-cv-05344-BLF Document 345-4 Filed 07/01/16 Page 2 of 18
`
`3COM® SWITCH 4500
`QUICK REFERENCE GUIDE
`
`About the Web Interface
`This guide details the commands available on the Web and the Command Line Interfaces. The tables contained in
`this document reference the CLI commands and the equivalent Web Interface menu items that allow the same
`configuration to be made using the web interface.
`
`■
`
`■
`
`About the Command Line Interface
`To use the command line interface (CLI) of your unit, please refer to the following points for assistance:
`■ When initially accessing the CLI, press Enter when prompted. The User View displays. This is indicated by the
`chevron brackets around the name of the unit at the prompt, for example, <4500>.
`In System View, square brackets appear around the name of the unit at the prompt, for example, [4500].
`■ You must be in the System View menu to access the configurable CLI commands.
`■ Some commands can be entered directly at any prompt from anywhere in the interface.
`If you enter part of a command followed by a ? (with no space between), the CLI will show you all the
`commands that begin in that way.
`■ To display command parameters:
`At the prompt, enter the name of the command followed by a space and ?. For example:
`<4500>boot ?
`The following parameters are displayed:
`boot-loader
`bootrom
`<4500>
`To specify boot loader, enter the command as follows:
`<4500>boot boot-loader ?
`You only need to enter ? if parameters exist for the command.
`■ To display parent menus:
`At the prompt, enter quit.
`■ To display the User View menu:
`Press <CTRL+Z>.
`■ To obtain help:
`At the prompt, enter ?.
`■ The term ‘view’ may be used interchangeably with the term ‘menu’.
`■ The undo command is placed before the command you wish to undo, for example, undo set authentica-
`tion password.
`■ <CTRL+A> places the cursor back to the start of the command line.
`■ Enter the first few characters of a command and press TAB to enter the full command without having to
`input the entire command (where there is only one command that starts with the entered characters).
`■ Use the Up Arrow key at the prompt to repeat the previous command string.
`■ Use Delete to delete the character after the cursor; Backspace deletes the character before the cursor.
`■ When entering physical port numbers, Enter the port number as x/0/z, where x is the unit number and z is
`the physical port number.
`
`1
`
`Exhibit 2038 Page 1 of 17
`IPR2016-00309
`
`

`
`Case 5:14-cv-05344-BLF Document 345-4 Filed 07/01/16 Page 3 of 18
`Further Information
`For further information about how to use the command line interface, refer to the Command Reference Guide and
`the Configuration Guide, which are both available as PDF documents on the CD that accompanied the unit.
`
`Menus
`This section provides a summary of menus and commands supported by the agent for each of the supported
`hardware platform variants. Any matching web commands available in the web interface are also shown.
`
`Commands marked with ‘*’ are available on the Switch 4500 PWR only.
`
`Table 1 Command Line Editing
`<Ctrl+A>
`<Tab>
`
`Moves the cursor to the start of the command line
`Command completion
`
`Web Command
`
`Table 2 Commands Available in Any View
`Command
`Description
`?
`Help
`display
`Display current system information
`display acl
`View detailed configuration information about the ACL
`display am
`View the status of access management function
`display arp
`View the ARP mapping table
`display arp timer aging
`View the current setting of the dynamic ARP map aging timer
`display boot-loader
`View the APP file used for this boot and the one that will be
`used at next boot
`View details about the information channel
`View the date and time
`View statistics of the configuration agent
`View the connection information of all or specified users
`Display the occupancy of the CPU
`Display the current configuration parameters
`
`display channel
`display clock
`display config-agent
`display connection
`display cpu
`display current-
`configuration
`display debugging
`display device
`display dhcp client
`
`View the enabled debugging process
`Display device information
`View detailed information about address allocation to DHCP
`client
`View information about DHCP server group
`View information about the DHCP server group
`corresponding to the VLAN interface
`
`View the current configuration information about all running
`modules
`
`display dhcp-server
`display dhcp-server
`interface vlan-interface
`display diagnostic-
`information
`display domain
`View the configuration of ISP domains
`display dot1x
`View the relevant information of 802.1x
`display fan
`View the working state of the built-in fans
`display fib
`View the summary of the Forwarding Information Base
`display fib ip_address
`View the FIB entries matching a destination IP address (range)
`display fib acl
`View the FIB entries matching a specific ACL
`display fib ip-prefix
`View the FIB entries matching a specific prefix list
`display fib statistics
`View the total number of FIB entries
`display ftm route
`Display Fabric topology management route
`display ftm information
`Display Fabric topology management information
`display ftm topology database Display Fabric topology management database
`display ftp-server
`View the parameters of the current FTP server
`display ftp-user
`View the parameters of current FTP user
`
`2
`
`Exhibit 2038 Page 2 of 17
`IPR2016-00309
`
`

`
`Case 5:14-cv-05344-BLF Document 345-4 Filed 07/01/16 Page 4 of 18
`
`Web Command
`
`Port -> Statistics
`
`Description
`View the saved history of commands
`View the statistics information about ICMP packets
`View IGMP snooping configuration information
`
`Command
`display history-command
`display icmp statistics
`display igmp-snooping
`configuration
`display igmp-snooping group View IP multicast groups and MAC multicast groups
`display igmp-snooping
`View the statistics information on IGMP snooping
`statistics
`display info-center
`
`View the configuration of system log and the information
`recorded in the memory buffer
`View port configuration information
`View the information about specified or all VLAN interfaces
`
`View all the host names and the corresponding IP addresses
`View the information of an IP interface
`
`display interface
`display interface vlan-
`interface
`display ip host
`display ip interface vlan-
`interface
`display ip ip-prefix
`display ip socket
`
`View the IP address prefix list
`Display the information about the sockets in the current
`system
`View the statistics information about IP packets
`View the routing table summary
`View the routing information of the specified destination
`address
`
`display ip statistics
`display ip routing-table
`display ip routing-table
`X.X.X.X
`display ip routing-table
`View the routing information in the specified destination
`X.X.X.X X.X.X.X
`address range
`display ip routing-table acl View the route filtered through specified basic access control
`list (ACL)
`View the route information that passed the filtering rule
`according the input ip prefix list name
`
`display ip routing-table ip-
`prefix
`display ip routing-table
`protocol
`display ip routing-table
`radix
`display ip routing-table
`statistics
`display ip routing-table
`verbose
`display isolate port
`display lacp system-id
`display link-aggregation
`interface
`display link-aggregation
`summary
`display link-aggregation
`verbose
`display local-user
`display local-server
`statistics
`display loopback-detection
`display mac-address
`display mac-address aging-
`time
`display mac-authentication
`
`display memory
`display mirror
`
`View the route information of specified protocol
`
`View radix tree of routing table
`
`Summary statistics of all routes
`
`Detail information of routing table
`
`View port isolation information
`View actor system ID
`View detailed link aggregation information at a designated
`port
`
`View summary information of all aggregation groups
`
`View detailed information of a designated port
`
`View the relevant information of all (or specified) local users
`View the configuration information of local RADIUS server
`group
`
`View if port loopback detection has been enabled and details
`View MAC address table information
`View the aging time of the dynamic entry in the MAC
`address table
`
`Display the global information on centralized MAC address
`authentication
`Display memory information
`View port mirroring configuration
`
`3
`
`Exhibit 2038 Page 3 of 17
`IPR2016-00309
`
`

`
`Case 5:14-cv-05344-BLF Document 345-4 Filed 07/01/16 Page 5 of 18
`
`Description
`NTP connection
`NTP status and configuration information
`Trace the time synchronization information
`View active ACL interface information
`
`Web Command
`
`Command
`display ntp sessions
`display ntp status
`display ntp trace
`display packet-filter
`interface
`display packet-filter unit id View active ACL unit identifier
`display password-control
`Display password-control information
`display password-control
`Display blacklist information
`blacklist
`display password-control
`super
`display poe disconnect*
`display poe interface*
`display poe powersupply*
`display port
`display power
`display qos cos-local-
`precedence-map
`display qos-interface [x]
`
`Display super user's password-control information
`
`Display PoE Disconnect Mode
`Specify interface e1, 0, n
`Display PoE Power Supply Status
`View ports where link type is Hybrid, Trunk, or a combination
`View the working state of the built-in power supply
`View "COS->Local-precedence" map
`
`View QoS setting information of all interfaces. X = unit
`number or interface information (E1,0,1)
`View the parameter setting of traffic rate limitation in the
`interface output direction. X = unit number or interface
`information (E1,0,1)
`View the settings of the traffic mirro X= unit number or
`interface information (E1, 0, 1)r
`
`View the settings of traffic limit. X= unit number or interface
`information (E1,0,1)
`
`display qos-interface [x]
`line-rate
`display qos-interface [x]
`mirrored-to
`display qos-interface [x]
`traffic-limit
`display radius
`
`display radius statistics
`display remote ping
`
`View the configuration information of all RADIUS server
`groups or a specified one
`View the statistics information of RADIUS packet
`Display the remote-ping test historay and the latest test
`results.
`Display remote-ping history table
`Display remote-ping results table
`View the current RIP running state
`View RMON alarm information
`View RMON events
`View RMON event log
`View the latest RMON history sampling information
`Display alarm information about extended RMON
`View RMON statistics
`View the configured route policy
`Display the router’s ID
`Display local key pair and public key of the server
`
`display remote-ping history
`display remote-ping results
`display rip
`display rmon alarm
`display rmon event
`display rmon eventlog
`display rmon history
`display rmon prialarm
`display rmon statistics
`display route-policy
`display router id
`display rsa local-key-pair
`public
`display rsa peer-public-key Display a designated RSA public key
`display saved-configuration View configuration files stored in flash memory of the Switch
`display schedule reboot
`Display the configuration of the schedule reboot terminal
`service parameters of the current router
`View information about the SNMP-agent engine ID of current
`device
`display snmp-agent community View the currently configured community names
`
`display snmp-agent
`
`4
`
`Exhibit 2038 Page 4 of 17
`IPR2016-00309
`
`

`
`Case 5:14-cv-05344-BLF Document 345-4 Filed 07/01/16 Page 6 of 18
`
`Web Command
`
`Command
`display snmp-agent group
`
`Description
`View group name, safe mode, state of various views and
`storage modes
`display snmp-agent mib-view View the MIB view configuration information of the Switch
`display snmp-agent
`View current state of SNMP communication
`statistics
`display snmp-agent sys-info View the system information of SNMP configuration
`display snmp-agent usm-user View information of all the SNMP usernames in the group
`username list
`display ssh server status
`Display the SSH server status information
`display ssh server session
`Display SSH server session information
`display ssh server-info
`Display SSH Server information
`display ssh user-information Display information of about the user, including username,
`corresponding key, and authentication type
`Display configuration filenames used for system start-up.
`View the stop accounting buffer radius-scheme requests
`
`display startup
`display stop-accounting-
`buffer radius-scheme
`display stop-accounting-
`buffer session id
`display stop-accounting-
`buffer time-range
`display stop-accounting-
`buffer user-name
`display tcp statistics
`display tcp status
`display this
`display udp-helper server
`
`display udp statistics
`display unit
`
`display user-interface
`display users
`display version
`
`display voice vlan oui
`display voice vlan status
`display vlan
`display xrn-fabric
`quit
`super
`return
`tracert
`
`Table 3 User View
`<4500>
`
`Command
`boot boot-loader
`boot bootrom
`cd
`clock datetime
`clock summer-time
`
`Display the stop accounting session identifier
`
`View the stop accounting time range
`
`Display the stop accounting user name
`
`View the statistics information about TCP packets
`View the TCP connection state
`Display the running configuration of the current view
`View the information of destination Helper server
`corresponding to a VLAN interface
`View UDP traffic statistic information
`View information about the port in a specific unit. Specify
`unit number and interface.
`View information about the user interface
`View information about the current user interface
`Display software version, issue date and the basic hardware
`configurations
`Display the OUI address supported by the current system
`Display information about Voice VLAN features
`View information about the specified or all VLANs
`View the information of the entire xrn fabric
`Exit from current command view
`Assign user a higher user level.
`Return to user view from any view other than user view
`Check the network routes and troubleshoot the network
`
`Description
`Specify the application file (.app) used for booting the Switch
`Upgrade bootrom
`Change the current directory
`Configure the current date and time
`Configure summer time on the Switch
`
`Web Command
`
`5
`
`Exhibit 2038 Page 5 of 17
`IPR2016-00309
`
`

`
`Case 5:14-cv-05344-BLF Document 345-4 Filed 07/01/16 Page 7 of 18
`
`Web Command
`
`Administration -> Reboot
`
`Command
`clock timezone
`copy
`debugging
`debugging arp packet
`debugging dhcp client
`debugging dhcp-relay
`debugging lacp packet
`debugging lacp state
`
`debugging link-aggregation
`error
`debugging link-aggregation
`event
`debugging mac-authentication
`event
`debugging ssh server
`debugging udp-helper
`delete
`dir
`display snmp-agent local-
`engineid
`display system-guard
`fabric save-unit-id
`format
`free user-interface
`ftp
`
`language-mode
`lock
`mkdir
`more
`move
`ping
`pwd
`reboot
`rename
`reset acl counter
`reset arp
`reset counters interface
`reset dot1x statistics
`reset igmp-snooping
`statistics
`reset ip statistics
`reset lacp statistics
`reset logbuffer
`reset password-control
`history-record
`reset password-control
`history-record super
`reset password-control
`blacklist
`
`Description
`Configure local timezone
`Copy from one file to another
`Enable system debugging functions
`Enable ARP debugging
`Enable DHCP client debugging
`Enable DHCP relay debugging
`Enable LACP packets debugging at a designated port or ports
`Enable LACP state machines debugging on a designated port
`or ports
`Enable link aggregation errors debugging
`
`Enable link aggregation events debugging
`
`Enable the centralized MAC address authentication
`debugging switch
`
`Display debugging information in running SSH
`Enable UDP Helper debugging
`Delete a file
`List files on a file system
`Display the engine ID of the local SNMP entity
`
`Display system-guard module options
`Save Unit ID
`Format the storage device on the Switch
`Reset a specified user interface
`Establish control connection with the remote FTP Server and
`enter FTP Client View (See Table 10, “FTP Client View,” on
`page 13)
`Specify the language environment
`Lock current user terminal interface
`Create a new directory
`Display the contents of a file
`Move the file
`ping another station
`Display current working directory
`Reset switch
`Rename a file
`Clear ACL statistics
`Reset ARP mapping entries
`Reset statistical information on the port
`Reset 802.1x statistics information
`Reset IGMP Snooping statistics information
`
`Clear IP statistics information
`Clear LACP statistics at a designated port or all ports
`Reset information in log buffer
`Reset password history record
`
`Reset the super user's password controls
`
`Delete infomation in blacklist
`
`6
`
`Exhibit 2038 Page 6 of 17
`IPR2016-00309
`
`

`
`Case 5:14-cv-05344-BLF Document 345-4 Filed 07/01/16 Page 8 of 18
`
`Description
`Command
`reset radius statistics
`Clear the statistic information related to the RADIUS protocol
`reset recycle-bin
`Delete contents of recycle bin
`reset saved-configuration
`Delete configuration files
`reset stop-accounting-buffer Delete the stopping accounting requests from the buffer
`according to the specified RADIUS server name
`Clear statistics for STP
`Clear TCP statistics information
`Reset information in trap buffer
`Clear UDP statistics information
`Delete an existing directory
`Save current configuration
`Schedule a reboot of the Switch at specified time
`Configure the Switch to be rebooted after a specified time
`delay
`Send information to other user terminal interface
`Enable BOOTROM access
`
`reset stp
`reset tcp statistics
`reset trapbuffer
`reset udp statistics
`rmdir
`save
`schedule reboot at
`schedule reboot delay
`
`Web Command
`
`Administration -> Initialize
`
`Save Configuration
`
`send
`startup bootrom-access
`enable
`startup saved-configuration Configure the configuration file used for starting the system Administration -> Restore
`Configuration
`
`system-view
`
`telnet
`terminal debugging
`
`terminal logging
`terminal monitor
`terminal trapping
`tftp get
`
`tftp put
`
`undelete
`undo
`xmodem
`
`Table 4 System View
`<4500>sys
`
`Command
`acl number
`
`am enable
`am trap enable
`arp check enable
`arp static
`
`arp timer aging
`change unit-id
`change self-unit
`command-privilege level
`copy configuration
`cut connection
`
`Enter the system view (See Table 4, “System View,” on
`page 7)
`Establish one Telnet connection
`Configure to display the debugging information on the
`terminal
`Enable terminal log information display
`Enable the log debugging/log/trap on the terminal monitor
`Enable terminal trap information display
`Download a file from the specified directory of the TFTP
`server
`Upload a file from the Switch to the specified directory on the
`TFTP server
`Recover a deleted file
`Cancel the current setting
`Establish an xmodem connnection
`
`Description
`Define ACL identified by a number or a name, and then enter
`the corresponding ACL view (See Table , “[4500]rip ,” on
`page 17)
`Enable the access management function
`Enable the access management trap
`Enable the checking of ARP entries
`Configure the static ARP mapping entries in an ARP mapping
`table
`Configure the dynamic ARP aging timer
`Change the ID of the Switch
`Change the ID of the Switch
`Specify the command level
`Copy source port configuration to destination port
`Disconnect a user or a category of users by force
`
`7
`
`Administration -> Restore
`Configuration
`Administration -> Backup
`Configuration
`
`Web Command
`Device -> ACL
`Security-> Authorized IP
`
`Exhibit 2038 Page 7 of 17
`IPR2016-00309
`
`

`
`Case 5:14-cv-05344-BLF Document 345-4 Filed 07/01/16 Page 9 of 18
`
`Web Command
`Device -> IP Route
`
`Command
`delete static-routes all
`dhcp-server [x] ip
`domain
`
`Description
`Delete all the static routes
`Configure the IP address of the DHCP Server used by the
`DHCP Server group. X= group number
`Configure an ISP domain or enter the view of an existing ISP
`domain
`dot1x
`Specify 802.1x configuration information
`dot1x authentication-method
`Specify authentication method for 802.1x users
`dot1x dhcp-launch
`Trigger system authentication when receiving DHCP packet(s)
`dot1x max-user
`Specify maximal on-line user number per port
`dot1x port-control
`Specify port authenticated status
`dot1x port-method
`Specify port controlled method
`dot1x quiet-period
`Enable quiet period timer
`dot1x retry
`Specify maximal request times
`dot1x supp-proxy-check
`Check whether user(s) access the networks by proxy or not
`dot1x timer
`Specify timer parameters
`dot1x timer handshake-period Set the handshake period of 802.1x
`end-station polling ip-
`Configure the Switch to periodically test specified end-
`address
`stations by sending PING packets
`execute
`fabric-port [x] enable
`file prompt
`ftm stacking-vlan
`ftp server
`ftp timeout
`header
`igmp-snooping enable
`igmp-snooping disable
`igmp-snooping host-aging-
`time
`igmp-snooping max-response-
`time
`igmp-snooping router-aging-
`time
`info-center channel name
`Rename a channel
`info-center console channel Configure the channel through which log information is
`output to the console
`info-center enable
`Enable the system log
`info-center logbuffer
`Configure to output information to the memory buffer
`info-center monitor channel Configure the channel to output the log information to the
`user terminal
`Specify new channel for transmitting the SNMP information
`Add or delete a record to the information channel
`Turn on the information synchronization on the specified
`Switch
`Configure the timestamp output format in debugging/trap
`information
`Output information to the trap buffer
`Enter Ethernet Port View (See Table 15, “Ethernet Port View,”
`on page 15)
`Enable VLAN interface and enter VLAN interface view (See
`Table 14, “VLAN Inteface View,” on page 14)
`Configure the host name and the host IP address
`
`Run the batch file
`Specify the fabric port of the Switch. Specify x = Gig interface Port -> Administration
`Modify prompt modes of file operations
`Specify the stacking VLAN of the Switch
`Start or shutdown the FTP server
`Configure the FTP connection timeout interval
`Define the login banner
`IGMP snooping enable
`IGMP snooping disable
`Configure the port aging time of the multicast group
`members
`
`Device -> XRN Fabric
`
`Device -> IGMP Snooping
`
`Configure the maximum response time for a query
`
`Configure the router port aging time of IGMP Snooping
`
`info-center snmp channel
`info-center source
`info-center switch-on
`
`info-center timestamp
`
`info-center trapbuffer
`interface Gig Ethernet
`
`interface vlan-interface
`
`ip host
`
`Device -> VLAN Interface
`Administration -> IP Setup
`
`8
`
`Exhibit 2038 Page 8 of 17
`IPR2016-00309
`
`

`
`Case 5:14-cv-05344-BLF Document 345-4 Filed 07/01/16 Page 10 of 18
`
`Command
`ip http
`ip ip-prefix
`ip route-static
`lacp system-priority
`link-aggregation group [x]
`description
`link-aggregation group [x]
`mode
`local-server
`local-user
`
`local-user password-display-
`mode
`loopback-detection enable
`loopback-detection interval-
`time
`mac-address
`mac-address timer
`
`mac-authentication
`
`mac-authentication authmode
`mac-authentication
`authpassword
`mac-authentication
`authusername
`mac-authentication domain
`
`mac-authentication timer
`
`Description
`Configure HTTP
`Configure an address prefix list or one of its items
`Configure a static route
`Configure LACP system priority value
`Configure a descriptor for an aggregation group
`
`Web Command
`Security -> Authorized IP
`
`Device -> IP Route
`Port -> LACP
`Port -> Link Aggregation
`
`Create a manual or static aggregation group. X=1-32
`
`Port -> Link Aggregation
`
`Specify local RADIUS server configuration information
`Specify local user configuration and enter local-user view (See
`Table 5, “Local-user View,” on page 11)
`Specify password display mode
`
`Administration ->
`System Access
`
`Enable port loopback detection
`Configure the detection interval for the external loopback
`condition of each port
`
`Configure MAC address
`Configure the aging time of the Layer-2 dynamic address
`table entry
`Enable the centralized MAC address authentication feature on
`a specified port or globally
`Specify MAC authenticate authmode config
`Specify the fixed password
`
`Specify the fixed username
`
`Configure the ISP domain used by the centralized MAC
`address authentication user
`Configure timer parameters of the centralized MAC address
`authentication
`Free memory for routing protocols to run normally
`Specify the memory limit
`Display memory safety
`NTP access control
`Authenticate NTP timie source
`Specify NTP authentication keyid
`
`Specify the maximum connections
`
`memory auto-establish
`memory limit
`memory safety
`ntp-service access
`ntp-service authentication
`ntp-service authentication-
`keyid
`ntp-service max-dynamic-
`sessions
`ntp-service reliable
`Specify trusted keyid of NTP
`ntp-service source-interface
`The interface correcponding to the sending NTP packet
`ntp-service unicast-peer
`Specify the NTP peer
`ntp-service unicast-server
`Specify the NTP server
`password-control
`Specify password controls
`password-control super
`Super user's password controls
`poe disconnect*
`Set PoE disconnect mode
`poe legacy enable*
`Enable Legacy detection
`poe power-management*
`Power Management
`poe update*
`Update PoE firmware
`private-group-id
`Tunnel Private Group ID attribute description mode
`qos cos-local-precedence-map Configure “CoS Local-precedence” mapping table
`radius nas-ip
`Specify the source address of the RADIUS packet sent from
`NAS
`
`9
`
`Exhibit 2038 Page 9 of 17
`IPR2016-00309
`
`

`
`Case 5:14-cv-05344-BLF Document 345-4 Filed 07/01/16 Page 11 of 18
`
`Command
`radius scheme
`
`remote-ping
`remote-ping-agent enable
`return
`rip
`
`rmon alarm
`rmon event
`rmon prialarm
`route-policy
`
`rsa local-key-pair create
`rsa local-key-pair destroy
`
`rsa peer-public-key
`
`set unit “[name]”
`sftp server enable
`snmp-agent community
`
`snmp-agent group
`
`snmp-agent local-engineid
`
`snmp-agent mib-view
`snmp-agent packet max-size
`snmp-agent sys-info
`snmp-agent target-host
`
`snmp-agent trap enable
`
`snmp-agent trap life
`snmp-agent trap queue-size
`
`snmp-agent trap source
`snmp-agent usm-user
`
`Description
`Specify RADIUS configuration information and enter the
`RADIUS view (See Table 11, “RADIUS Server Group View,” on
`page 13)
`Specify the remote-ping test class
`Enable a remote-ping client
`Return to user view from any view other than user view
`Enable RIP and enter RIP view (See Table 17, “RIP View,” on
`page 17)
`Add an entry to the alarm table
`Add an entry to the event table
`Add an entry to the extended RMON alarm table
`Specify a route policy and enter route policy view (See
`Table 16, “Route Policy View,” on page 16)
`Create local RSA host key pair and server key pair
`Remove all RSA key pairs at the server, including host key pair
`and Server key pair
`Enter the public key view (See Table 8, “Public Key Edit
`View,” on page 12)
`Set the unit number name. “[name]”= text string
`Enable SFTP Server
`Configure community access name and access to SNMP
`
`Configure an SNMP group
`
`Configure a name for a local or remote SNMP engine on the
`Switch
`Create or update the view information
`Specify the size of an SNMP packet
`Configure system information of running SNMP
`Configure destination of SNMP notification
`
`Enable/disable the device to send Trap messages
`
`Configure the timeout of Trap packets
`Configure the information queue length of Trap packets sent
`to the destination host
`Configure the source address for sending Trap packets
`Configure users in an SNMP group
`
`Web Command
`
`Administration -> SNMP ->
`Community String
`Administration -> SNMP ->
`Group
`
`Administration -> SNMP ->
`Traps
`Administration -> SNMP ->
`Traps
`
`Administration -> SNMP ->
`Users
`
`Establish one telnet connection
`Assign the SSH client an RSA Key
`
`ssh2
`ssh client (SSH server IP
`address or name) assign rsa-
`key (key name)
`ssh client first-time enable Set SSH client attribute of authenticating user for the first
`time access
`Define SSH authentication retry times value
`
`ssh server authentication-
`retries (number of retries,
`1-5)
`ssh server timeout (value in
`seconds, 1-120)
`ssh user (username) service-
`type sftp
`ssh user (sername) assign
`rsakey (key name)
`
`Define timeout value for SSH registration authentication
`
`Set SSH User service types, either stelnet, sft, or all. All is both
`stelnet and sftp.
`
`Associate an existing public key with a designated user
`
`10
`
`Exhibit 2038 Page 10 of 17
`IPR2016-00309
`
`

`
`Case 5:14-cv-05344-BLF Document 345-4 Filed 07/01/16 Page 12 of 18
`
`Description
`Define an authentication type for a designated user; either
`password, RSA, or public key.
`
`Web Command
`
`Command
`ssh user (username)
`authentication-type
`(authenticaltion type)
`stp
`stp bpdu-protection
`stp mcheck
`stp mode
`stp pathcost-standard
`stp priority
`stp root primary
`
`stp root secondary
`
`stp timeout-factor
`stp timer forward-delay
`stp timer hello
`stp timer max-age
`super password level
`
`sysname
`
`system-guard
`tcp timer fin-timeout
`tcp timer syn-timeout
`tcp window
`
`tftp-server
`udp-helper enable
`udp-helper port
`user-interface
`
`vlan
`
`voice vlan
`voice vlan aging
`voice vlan mac_address
`voice vlan mode auto
`voice vlan security enable
`web set-package
`xrn-fabric authentication-
`mode
`
`Table 5 Local-user View
`[4500]local-user admin
`
`Device -> Spanning Tree
`Device -> Spanning Tree
`
`Device -> Spanning Tree
`
`Device -> Spanning Tree
`Device -> Spanning Tree
`
`Device -> Spanning Tree
`
`Enable Spanning Tree Protocol
`Enable BPDU protection
`Force the port to work in RSTP mode
`Configure the RSTP running mode
`Standard to be used for calculating the default Path Cost
`Configure the bridge priority of the Switch
`Configure the current switch as the primary root of a
`spanning tree
`Configure the current switch as a secondary root of a
`specified spanning tree
`Configure multiple of hello time
`Device -> Spanning Tree
`Configure the time of forward delay
`Device -> Spanning Tree
`Configure hello time for Switch
`Configure the max age of the Switch for judging stp packets Device -> Spanning Tree
`Configure a password for changing the user from a lower
`user level to a higher user level
`Specify the name of the Switch
`
`Administration -> SNMP ->
`Setup
`
`Configure the System-guard feature
`Configure the TCP finwait timer
`Configure the TCP synwait timer
`Configure size of transmission and receiving buffers of
`connection-oriented socket
`Configure the TFTP server
`Enable UDP Helper function
`Configure the UDP port with relay function
`Configure the user terminal interface and enter the view (See
`Table 6, “User-interface view,” on page 12)
`Configure VLAN and enter VLAN view (See Table 13, “VLAN
`View,” on page 14)
`Globally enable the Voice VLAN features of one VLAN
`Configure the aging time of Voice VLAN
`Set the MAC address that the Voice VLAN can control
`Set the Voice VLAN in auto mode
`Enable the Voice VLAN security mode
`Change the default web source file name
`Configure authentication mode of the fabric
`
`Device -> VLAN
`
`Device -> Voice VLAN
`Device -> Voice VLAN
`Device -> Voice VLAN
`Device -> Voice VLAN
`Device -> Voice VLAN
`
`Device->XRN Fabric
`
`Command
`attribute
`
`level
`
`Description
`Configure some attributes for specified local user
`
`Configure user priority level
`
`password password-control
`aging
`password-control length
`
`Specify password aging
`
`Specify password length
`
`Web Command
`Administration -> System
`Access
`Administration -> System
`Access
`Administration -> System
`Access
`
`11
`
`Exhibit 2038 Page 11 of 17
`IPR2016-00309
`
`

`
`Case 5:14-cv-05344-BLF Document 345-4 Filed 07/01/16 Page 13 of 18
`
`Command
`service-type
`state
`
`Description
`Configure a service type for a particular user
`Configure the state of the current user
`
`Web Command
`
`Table 6 User-interface view
`[4500]user-interface 1
`
`Command
`acl
`
`Description
`Reference ACL and implement the ACL control to the TELNET
`users
`Configure local password authentication method
`Configure to automatically run a specified command after a
`user logs on
`Configure the data bits for AUX (Console) port
`Configure the flow control mode on AUX (Console) port
`Configure the size of the history command buffer
`Configure the timeout function
`Configure the parity mode on AUX (Console) port
`Set user interface protocol
`Configure how many lines can be displayed on a screen of
`the terminal
`set authentication password Configure the password for local authentication
`
`authentication-mode
`auto-execute command
`
`databits
`flow-control
`history-command max-size
`idle-timeout
`parity
`protocol
`screen-length
`
`Web Command
`Security -> Authorized IP
`
`Administration -> System
`Access
`
`shell
`speed
`
`stopbits
`user privilege level
`
`Enable terminal service of a user interface
`Specify the transmission rate on the AUX (Console) port in
`bit/s
`Configure the stop bits on the AUX (Console) port
`Configure which level of command a user can use after logon
`from a specific user interface
`
`Table 7 VTY User-interface View
`[4500]user-interface 1 integer (0-12)
`[4500]user-interface 1 aux
`[4500]user-interface 1 vty
`
`Command
`protocol inbound
`
`Description
`Configure the protocols supported by a designated user
`interface
`
`Web Command
`
`Tabl

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket