GE ML1600 User Manual

Page 5

Advertising
background image

TOC

TABLE OF CONTENTS

MULTILINK ML1600 ETHERNET COMMUNICATIONS SWITCH – INSTRUCTION MANUAL

TOC–III

D

ATE

AND

T

IME

..................................................................................................................... 5-9

N

ETWORK

T

IME

..................................................................................................................... 5-10

SYSTEM CONFIGURATION ................................................................................................ 5-13

S

AVING

AND

L

OADING

– C

OMMAND

L

INE

........................................................................ 5-13

C

ONFIG

FILE

........................................................................................................................... 5-13

D

ISPLAYING

CONFIGURATION

.............................................................................................. 5-16

S

AVING

C

ONFIGURATION

..................................................................................................... 5-19

S

CRIPT

F

ILE

............................................................................................................................ 5-21

S

AVING

AND

L

OADING

– E

NER

V

ISTA

S

OFTWARE

............................................................. 5-22

H

OST

N

AMES

......................................................................................................................... 5-25

E

RASING

C

ONFIGURATION

................................................................................................... 5-26

IPV6 ........................................................................................................................................ 5-30

I

NTRODUCTION

TO

IP

V

6 ....................................................................................................... 5-30

W

HAT

S

CHANGED

IN

IPV6? ............................................................................................... 5-30

IP

V

6 A

DDRESSING

................................................................................................................ 5-31

C

ONFIGURING

IP

V

6 .............................................................................................................. 5-32

L

IST

OF

COMMANDS

IN

THIS

CHAPTER

............................................................................... 5-33

6: ACCESS
CONSIDERATIONS

SECURING ACCESS ............................................................................................................ 6-1

D

ESCRIPTION

.......................................................................................................................... 6-1

P

ASSWORDS

........................................................................................................................... 6-1

P

ORT

S

ECURITY

F

EATURE

..................................................................................................... 6-2

CONFIGURING PORT SECURITY THROUGH THE COMMAND LINE INTERFACE .. 6-3

C

OMMANDS

............................................................................................................................ 6-3

S

ECURITY

L

OGS

..................................................................................................................... 6-9

A

UTHORIZED

M

ANAGERS

..................................................................................................... 6-10

CONFIGURING PORT SECURITY WITH ENERVISTA SOFTWARE .............................. 6-12

C

OMMANDS

............................................................................................................................ 6-12

L

OGS

....................................................................................................................................... 6-14

A

UTHORIZED

M

ANAGERS

..................................................................................................... 6-15

7: ACCESS USING RADIUS

INTRODUCTION TO 802.1X .............................................................................................. 7-1

D

ESCRIPTION

.......................................................................................................................... 7-1

802.1

X

P

ROTOCOL

............................................................................................................... 7-1

CONFIGURING 802.1X THROUGH THE COMMAND LINE INTERFACE ................... 7-4

C

OMMANDS

............................................................................................................................ 7-4

E

XAMPLE

................................................................................................................................. 7-6

CONFIGURING 802.1X WITH ENERVISTA SECURE WEB MANAGEMENT

SOFTWARE ........................................................................................... 7-9

C

OMMANDS

............................................................................................................................ 7-9

8: ACCESS USING
TACACS+

INTRODUCTION TO TACACS+ ......................................................................................... 8-1

O

VERVIEW

.............................................................................................................................. 8-1

TACACS+ F

LOW

.................................................................................................................. 8-2

TACACS+ P

ACKET

............................................................................................................... 8-2

CONFIGURING TACACS+ THROUGH THE COMMAND LINE INTERFACE .............. 8-4

C

OMMANDS

............................................................................................................................ 8-4

E

XAMPLE

................................................................................................................................. 8-4

CONFIGURING TACACS+ WITH ENERVISTA SECURE WEB MANAGEMENT

SOFTWARE ........................................................................................... 8-6

Advertising