AMX NXA-ENET8-2POE Instruction Manual page 6

Gigabit poe ethernet switch
Hide thumbs Also See for NXA-ENET8-2POE:
Table of Contents

Advertisement

Configuring the NXA-ENET8-2POE ..................................................................40
Overview ......................................................................................................................... 40
Configuring System Information.......................................................................................................... 40
Setting an IP Address..................................................................................................... 40
Setting an IPV4 Address....................................................................................................................... 40
Setting an IPV6 Address....................................................................................................................... 41
Usage Guidelines ................................................................................................................................................ 42
Configuring NTP Service....................................................................................................................... 42
Configuring Remote Log Messages ...................................................................................................... 43
Command Usage................................................................................................................................................. 43
Configuring Power Reduction ........................................................................................ 43
Controlling LED Intensity...................................................................................................................... 43
Command Usage................................................................................................................................................. 44
Reducing Power to Idle Queue Circuits................................................................................................ 44
Command Usage................................................................................................................................... 44
Configuring Thermal Protection..................................................................................... 45
Command Usage................................................................................................................................................. 45
Configuring Port Connections........................................................................................ 46
Configuring Security ...................................................................................................... 47
Configuring User Accounts................................................................................................................... 47
Command Usage................................................................................................................................................. 47
Configuring User Privilege Levels......................................................................................................... 48
Configuring The Authentication Method For Management Access ..................................................... 49
Usage Guidelines ................................................................................................................................................ 49
Configuring SSH.................................................................................................................................... 50
Usage Guidelines .................................................................................................................................. 50
Configuring HTTPS ............................................................................................................................... 50
Usage Guidelines ................................................................................................................................................ 50
Filtering IP Addresses for Management Access................................................................................... 51
Using Simple Network Management Protocol ............................................................... 51
Configuring SNMP System and Trap Settings ...................................................................................... 52
Setting SNMPV3 Community Access Strings........................................................................................ 54
Configuring SNMPV3 Users .................................................................................................................. 54
Configuring SNMPV3 Groups................................................................................................................ 55
Configuring SNMPV3 Views .................................................................................................................. 56
Configuring SNMPV3 Group Access Rights .......................................................................................... 56
Configuring Port Limit Controls............................................................................................................ 57
Configuring Authentication Through Network Access Servers ........................................................... 58
Usage Guidelines ................................................................................................................................................ 62
RADIUS Attributes Used in Identifying a QoS Class........................................................................................... 62
RADIUS Attributes Used in Identifying a VLAN ID.............................................................................................. 63
Guest VLAN Operation ........................................................................................................................................ 63
Further Guidelines for Port Admin State ............................................................................................................ 63
Filtering Traffic With Access Control Lists............................................................................................ 64
NXA-ENET8-2POE - Instruction Manual
Table of Contents
4

Advertisement

Table of Contents
loading

Table of Contents