GE MULTILINK ML1200 User Manual

Page 5

Advertising
background image

TOC

TABLE OF CONTENTS

MULTILINK ML1200 MANAGED FIELD SWITCH – INSTRUCTION MANUAL

TOC–III

S

ECURITY

L

OGS

..................................................................................................................... 6-8

A

UTHORIZED

M

ANAGERS

..................................................................................................... 6-10

CONFIGURING PORT SECURITY WITH ENERVISTA SOFTWARE ..................................... 6-12

C

OMMANDS

............................................................................................................................ 6-12

L

OGS

....................................................................................................................................... 6-15

A

UTHORIZED

M

ANAGERS

..................................................................................................... 6-16

7: ACCESS USING RADIUS

INTRODUCTION TO 802.1X ............................................................................................................ 7-1

D

ESCRIPTION

.......................................................................................................................... 7-1

802.1

X

P

ROTOCOL

............................................................................................................... 7-1

CONFIGURING 802.1X THROUGH THE COMMAND LINE INTERFACE ......................... 7-4

C

OMMANDS

............................................................................................................................ 7-4

E

XAMPLE

................................................................................................................................. 7-6

CONFIGURING 802.1X WITH ENERVISTA SECURE

WEB MANAGEMENT SOFTWARE ............................................................ 7-9

C

OMMANDS

............................................................................................................................ 7-9

8: ACCESS USING
TACACS+

INTRODUCTION TO TACACS+ ....................................................................................................... 8-1

O

VERVIEW

.............................................................................................................................. 8-1

TACACS+ F

LOW

.................................................................................................................. 8-2

TACACS+ P

ACKET

............................................................................................................... 8-2

CONFIGURING TACACS+ THROUGH THE COMMAND LINE INTERFACE .................... 8-4

C

OMMANDS

............................................................................................................................ 8-4

E

XAMPLE

................................................................................................................................. 8-4

CONFIGURING TACACS+ WITH ENERVISTA SECURE

WEB MANAGEMENT SOFTWARE ............................................................ 8-6

9: PORT MIRRORING AND
SETUP

PORT MIRRORING .............................................................................................................................. 9-1

D

ESCRIPTION

.......................................................................................................................... 9-1

PORT MIRRORING USING THE COMMAND LINE INTERFACE .......................................... 9-2

C

OMMANDS

............................................................................................................................ 9-2

PORT SETUP ......................................................................................................................................... 9-3

C

OMMANDS

............................................................................................................................ 9-3

F

LOW

C

ONTROL

.................................................................................................................... 9-5

B

ACK

P

RESSURE

.................................................................................................................... 9-5

B

ROADCAST

S

TORMS

............................................................................................................ 9-7

L

INK

L

OSS

A

LERT

.................................................................................................................. 9-9

PORT MIRRORING USING ENERVISTA SECURE

WEB MANAGEMENT SOFTWARE ............................................................ 9-11

C

OMMANDS

............................................................................................................................ 9-11

P

ORT

S

ETUP

........................................................................................................................... 9-12

B

ROADCAST

S

TORMS

............................................................................................................ 9-15

10: VLAN

VLAN DESCRIPTION .......................................................................................................................... 10-1

O

VERVIEW

.............................................................................................................................. 10-1

T

AG

VLAN

VS

. P

ORT

VLAN ............................................................................................... 10-3

CONFIGURING PORT VLANS THROUGH THE COMMAND LINE INTERFACE ............. 10-5

D

ESCRIPTION

.......................................................................................................................... 10-5

C

OMMANDS

............................................................................................................................ 10-5

CONFIGURING PORT VLANS WITH ENERVISTA SECURE

Advertising