Enterasys SecureStack C2 C2G170-24 Configuration Manual page 25

Stackable switches
Hide thumbs Also See for SecureStack C2 C2G170-24:
Table of Contents

Advertisement

Purpose .................................................................................................................................................. 21-1
Commands ............................................................................................................................................. 21-1
show ipv6 status ............................................................................................................................... 21-1
set ipv6 ............................................................................................................................................. 21-2
set ipv6 address ............................................................................................................................... 21-3
show ipv6 address............................................................................................................................ 21-4
clear ipv6 address ............................................................................................................................ 21-4
set ipv6 gateway............................................................................................................................... 21-5
clear ipv6 gateway............................................................................................................................ 21-6
show ipv6 neighbors......................................................................................................................... 21-6
show ipv6 netstat.............................................................................................................................. 21-7
ping ipv6 ........................................................................................................................................... 21-8
traceroute ipv6.................................................................................................................................. 21-9
Overview ....................................................................................................................................................... 22-1
Limitations .............................................................................................................................................. 22-2
Preparing a Mixed Stack for IPv6 Proxy Routing ......................................................................................... 22-2
Commands ................................................................................................................................................... 22-3
ipv6 proxy-routing ............................................................................................................................. 22-3
show ipv6 proxy-routing.................................................................................................................... 22-3
Chapter 23: Authentication and Authorization Configuration
Overview of Authentication and Authorization Methods ............................................................................... 23-1
RADIUS Filter-ID Attribute and Dynamic Policy Profile Assignment ...................................................... 23-2
Configuring RADIUS ..................................................................................................................................... 23-3
Purpose .................................................................................................................................................. 23-3
Commands ............................................................................................................................................. 23-4
show radius ...................................................................................................................................... 23-4
set radius .......................................................................................................................................... 23-5
clear radius ....................................................................................................................................... 23-7
show radius accounting .................................................................................................................... 23-7
set radius accounting........................................................................................................................ 23-8
clear radius accounting..................................................................................................................... 23-9
Configuring 802.1X Authentication ............................................................................................................. 23-11
Purpose ................................................................................................................................................ 23-11
Commands ........................................................................................................................................... 23-11
show dot1x ..................................................................................................................................... 23-11
show dot1x auth-config................................................................................................................... 23-13
set dot1x ......................................................................................................................................... 23-14
set dot1x auth-config ...................................................................................................................... 23-15
clear dot1x auth-config ................................................................................................................... 23-16
show eapol ..................................................................................................................................... 23-17
set eapol ......................................................................................................................................... 23-19
clear eapol ...................................................................................................................................... 23-19
Configuring MAC Authentication ................................................................................................................ 23-21
Purpose ................................................................................................................................................ 23-21
Commands ........................................................................................................................................... 23-21
show macauthentication ................................................................................................................. 23-21
show macauthentication session .................................................................................................... 23-23
set macauthentication..................................................................................................................... 23-24
set macauthentication password .................................................................................................... 23-24
clear macauthentication password ................................................................................................. 23-25
set macauthentication port ............................................................................................................. 23-25
xxiii

Advertisement

Table of Contents
loading

This manual is also suitable for:

C2h124-24Securestack c2

Table of Contents