GE MULTILINK ML2400 User Manual

Page 5

Advertising
background image

TOC

TABLE OF CONTENTS

MULTILINK ML2400 ETHERNET COMMUNICATIONS SWITCH – INSTRUCTION MANUAL

TOC–III

SETTING PARAMETERS ...................................................................................... 5-8

S

ETTING

S

ERIAL

P

ORT

P

ARAMETERS

....................................................................................5-8

S

YSTEM

P

ARAMETERS

.............................................................................................................5-8

D

ATE

AND

T

IME

.......................................................................................................................5-9

N

ETWORK

T

IME

.......................................................................................................................5-10

SYSTEM CONFIGURATION ................................................................................. 5-14

S

AVING

AND

L

OADING

– C

OMMAND

L

INE

..........................................................................5-14

C

ONFIG

FILE

.............................................................................................................................5-14

D

ISPLAYING

CONFIGURATION

................................................................................................5-17

S

AVING

C

ONFIGURATION

.......................................................................................................5-20

S

CRIPT

F

ILE

..............................................................................................................................5-22

S

AVING

AND

L

OADING

– E

NER

V

ISTA

S

OFTWARE

...............................................................5-23

H

OST

N

AMES

...........................................................................................................................5-26

E

RASING

C

ONFIGURATION

.....................................................................................................5-27

IPV6 .......................................................................................................................... 5-31

I

NTRODUCTION

TO

IP

V

6 .........................................................................................................5-31

W

HAT

S

CHANGED

IN

IPV6? .................................................................................................5-31

IP

V

6 A

DDRESSING

..................................................................................................................5-32

C

ONFIGURING

IP

V

6 ................................................................................................................5-33

L

IST

OF

COMMANDS

IN

THIS

CHAPTER

.................................................................................5-34

6: ACCESS

CONSIDERATIONS

SECURING ACCESS .............................................................................................. 6-1

D

ESCRIPTION

............................................................................................................................6-1

P

ASSWORDS

.............................................................................................................................6-1

P

ORT

S

ECURITY

F

EATURE

.......................................................................................................6-2

CONFIGURING PORT SECURITY

THROUGH THE COMMAND LINE INTERFACE .................. 6-3

C

OMMANDS

..............................................................................................................................6-3

A

LLOWING

MAC A

DDRESSES

...............................................................................................6-4

S

ECURITY

L

OGS

.......................................................................................................................6-8

A

UTHORIZED

M

ANAGERS

.......................................................................................................6-10

CONFIGURING PORT SECURITY WITH ENERVISTA SOFTWARE .............. 6-12

C

OMMANDS

..............................................................................................................................6-12

L

OGS

.........................................................................................................................................6-15

A

UTHORIZED

M

ANAGERS

.......................................................................................................6-16

7: ACCESS USING

RADIUS

INTRODUCTION TO 802.1X ................................................................................. 7-1

D

ESCRIPTION

............................................................................................................................7-1

802.1

X

P

ROTOCOL

.................................................................................................................7-1

CONFIGURING 802.1X THROUGH THE COMMAND LINE INTERFACE ..... 7-4

C

OMMANDS

..............................................................................................................................7-4

E

XAMPLE

...................................................................................................................................7-6

CONFIGURING 802.1X WITH ENERVISTA

SECURE WEB MANAGEMENT SOFTWARE ........................ 7-9

C

OMMANDS

..............................................................................................................................7-9

Advertising