Sign In
Upload
Manuals
Brands
Enterasys Manuals
Switch
C5K125-24
Enterasys C5K125-24 Manuals
Manuals and User Guides for Enterasys C5K125-24. We have
2
Enterasys C5K125-24 manuals available for free PDF download: Configuration Manual, Quick Reference
Enterasys C5K125-24 Configuration Manual (452 pages)
Fixed Switch platforms
Brand:
Enterasys
| Category:
Switch
| Size: 4.41 MB
Table of Contents
Table of Contents
7
About this Guide
25
Conventions Used in this Guide
25
How to Use this Guide
25
Important Notice
25
Related Documents
25
Chapter 1 : Setting up a Switch for the First Time
27
Before You Begin
27
Connecting to the Switch
28
Downloading New Firmware
29
Deleting a Backup Image File
31
Additional Configuration Tasks
31
Setting User Accounts and Passwords
32
Controlling In-Band Access to the Switch
32
Changing SNMP Defaults
33
Saving the Configuration and Connecting Devices
33
Configuring a Stack of New Switches
34
Where to Go Next
35
Getting Help
36
Downloading Firmware Via the Serial Port
36
Chapter 2 : Configuring Switches in a Stack
39
About Switch Operation in a Stack
39
Stack Initialization
39
Configuration Management
40
Installing a New Stackable System of up to Eight Units
40
Installing Previously-Configured Systems in a Stack
41
Adding a New Unit to an Existing Stack
41
Removing Units from an Existing Stack
42
Stack Disruption Times
42
Creating a Virtual Switch Configuration
42
Example
43
Considerations about Using "Clear Config" in a Stack
43
Configuring Standalone A4 Stack Ports
44
When Uplink Ports Are Configured as Ethernet Ports
44
Chapter 3: CLI Basics
45
Switch Management Methods
45
Using the Command Line Interface
45
Starting a CLI Session
45
Connecting Using Telnet or SSH
46
Connecting Using the Console Port
46
CLI Startup Screen
46
Logging in
47
Using a Default User Account
47
Using an Administratively Configured User Account
47
Clearing and Closing the CLI
47
Navigating the Command Line Interface
47
CLI Command Defaults Descriptions
47
Getting Help with CLI Syntax
47
CLI Command Modes
48
Performing Keyword Lookups
48
Sample CLI Defaults Description
48
Performing a Keyword Lookup
48
Performing a Partial Keyword Lookup
48
Displaying Scrolling Screens
49
Abbreviating and Completing Commands
49
Scrolling Screen Output
49
Abbreviating a Command
49
Basic Line Editing Commands
50
Configuring CLI Properties
50
CLI Properties Configuration Commands
50
Example CLI Properties Configuration
51
CLI Properties Display Commands
51
CLI Properties Show Commands
51
Chapter 4 : System Configuration
53
Factory Default Settings
53
Default Settings for Basic Switch Operation
53
Advanced Configuration
53
Factory Default Settings
54
Default Settings for Router Operation
56
Initial Configuration Overview
57
Advanced Configuration Overview
58
Licensing Advanced Features
60
License Implementation Differences
60
Licensing in a Stack Environment
61
Node-Locked Licensing
61
Non-Node-Locked Licensing
61
Applying Node-Locked Licenses in a Stack
62
Applying Non-Node-Locked Licenses in a Stack
62
Adding a New Member to a Licensed Stack
63
Displaying and Clearing Licenses
63
SNTP Configuration
63
Authentication Key and Trusted Key List
64
Broadcast Listening Mode
64
SNTP Authentication
64
Unicast Polling Mode
64
Configuring SNTP
65
SNTP Defaults
65
Default SNTP Parameters
65
Managing and Displaying SNTP
66
SNTP Configuration Example
67
DHCP Configuration
68
DHCP Relay Agent
68
DHCP Server
68
Automatic IP Address Pools
69
Configuring a DHCP Server
69
IP Address Pools
69
Manual IP Address Pools
69
DHCP Configuration on a Non-Routing System
70
DHCP Configuration on a Routing System
70
DHCP Server Defaults
72
Managing and Displaying DHCP Server Parameters
72
Managing and Displaying DHCP Server
72
Default DHCP Server Parameters
72
Configuring DHCP IP Address Pools
73
Automatic IP Address Pool Configuration
73
Manual IP Pool Configuration
73
Configuring Additional Pool Parameters
75
Telnet Overview
75
Configuring Pool Parameters
75
Configuring Telnet
76
SSH Overview
76
Configuring SSH
76
MAC Address Settings
76
Age Time
76
Limiting MAC Addresses to Specific Vlans
77
New MAC Address Detection
77
Setting the MAC Algorithm Mode
77
Configuring Node Aliases
78
Chapter 5: User Account and Password Management
81
User Account Overview
81
Emergency Access User Account
82
Account Lockout
83
Port Lockout
83
User Account Configuration
83
Password Management Overview
86
System Level Password Settings
86
Defaults
87
User Account and Password Parameter Defaults by Security Mode
87
System Password Settings Configuration
88
User Account and Password Parameter Defaults by Security Mode
88
Password Reset Button Functionality
89
Management Authentication Notification MIB Functionality
89
Chapter 6: Firmware Image and File Management
91
Managing the Firmware Image
91
Downloading a Firmware Image
91
Downloading from a TFTP or SFTP Server
92
Setting the Boot Firmware
93
Reverting to a Previous Image
93
Setting TFTP Parameters
94
Managing Switch Configuration and Files
94
Configuration Persistence Mode
94
Using an I-Series Memory Card
95
Memory Card Operation
95
Displaying and Saving the Configuration and Creating a Backup
95
Creating a Backup Configuration File
96
Displaying the Configuration
96
Applying a Saved Configuration
97
Managing Files
98
File Management Commands
98
Chapter 7: Configuring System Power and Poe
99
Configuring Redundant Power Supplies
99
Power over Ethernet Overview
99
Implementing Poe
100
Allocation of Poe Power to Modules
100
Poe Powered Device Classes
100
When Manual Mode Is Configured
101
Management of Poe Power to Pds
101
Configuring Poe
102
Poe Settings Supported on Enterasys Devices
102
Stackable A4, B3, and C3 Devices
103
Stackable B5 and C5 Devices
104
G-Series Devices
105
Example Poe Configuration
108
Poe Display Commands
108
Poe Show Commands
108
Chapter 8: Port Configuration
109
Port Configuration Overview
109
Port String Syntax Used in the CLI
109
Examples
110
Console Port Settings
110
VT100 Terminal Mode
111
Port Settings
111
Port Name or Alias
111
Port Status
111
Auto-Negotiation and Advertised Ability
112
MDI / MDIX Cable Type
112
Port Speed and Duplex Mode
112
Broadcast Suppression Threshold
113
Jumbo Frame Support
113
Port Flow Control
113
Protected Port Mode
114
Displaying Port Status
114
Displaying Cable Status
115
Configuring SFP Ports for 100BASE-FX
115
Displaying Port Status
115
Example
116
Configuring Port Link Flap Detection
116
Basic Link Flap Detection Configuration
117
Linkflap Default Parameters
117
Example
118
Link Flap Detection Display Commands
119
Transmit Queue Monitoring
119
Link Flap Detection Show Commands
119
Transmit Queue Monitoring Tasks
119
Port Mirroring
120
Mirroring Features
120
Configuring Port Mirroring
121
Remote Port Mirroring
121
Configuring Remote Port Mirroring
122
Configuring SMON MIB Port Mirroring
123
Procedures
123
Chapter 9 : Configuring Vlans
125
VLAN Overview
125
Using Vlans to Partition Your Network
125
Implementing Vlans
126
VLAN Business Scenario
126
Preparing for VLAN Configuration
127
Understanding How Vlans Operate
127
Learning Modes and Filtering Databases
127
VLAN Assignment and Forwarding
128
Receiving Frames from VLAN Ports
128
Forwarding Decisions
129
Example of a VLAN Switch in Operation
129
Inside the Switch
129
Frame Format
129
VLAN Support on Enterasys Switches
130
Configurable Range
130
Maximum Active Vlans
130
Port-Based Vlans
130
Static and Dynamic Vlans
130
VLAN Types
130
GARP VLAN Registration Protocol (GVRP) Support
131
How It Works
131
Policy-Based Vlans
131
Configuring Vlans
132
Example of VLAN Propagation Using GVRP
132
Configuring Static Vlans
133
Default Settings
133
Default VLAN Parameters
133
Example Configuration
135
Creating a Secure Management VLAN
135
Configuring Dynamic Vlans
136
Configuring Protocol-Based VLAN Classification
137
Example Configuration
137
Monitoring Vlans
138
Terms and Definitions
138
Displaying VLAN Information
138
VLAN Terms and Definitions
138
Chapter 10: Configuring User Authentication
141
User Authentication Overview
141
Implementing User Authentication
142
Authentication Methods
142
IEEE 802.1X Using EAP
142
MAC-Based Authentication (MAC)
142
Multi-User and Multiauth Authentication
143
Port Web Authentication (PWA)
143
Applying Policy to Multiple Users on a Single Port
145
Authenticating Multiple Users with Different Methods on a Single Port
146
Remote Authentication Dial-In Service (RADIUS)
147
Selecting Authentication Method When Multiple Methods Are Validated
147
How RADIUS Data Is Used
148
The RADIUS Filter-ID
148
RFC 3580 - VLAN Authorization
148
Policy Maptable Response
150
Configuring Authentication
152
Default Authentication Parameters
152
Configuring IEEE 802.1X
154
Configuring MAC-Based Authentication
155
Configuring Port Web Authentication (PWA)
156
Configuring Multiauth Authentication
157
Optionally Enable Guest Network Privileges
157
Setting Multiauth Authentication Mode
157
PWA Guest Networking Privileges Configuration
157
Setting Multiauth Authentication Precedence
158
Setting Multiauth Authentication Port Properties
158
Setting Multiauth Authentication Timers
159
Displaying Multiauth Configuration Information
160
Configuring VLAN Authorization
160
Displaying Multiauth Authentication Configuration
160
Configuring RADIUS
161
Configuring the Authentication Server
161
Configuring User + IP Phone Authentication
162
Example
163
Authentication Configuration Example
165
Stackable Fixed Switch Authentication Configuration Example Overview
165
Configuring Multiauth Authentication
166
Configuring the Engineering Group 802.1X End-User Stations
166
Creating RADIUS User Accounts on the Authentication Server
166
Enabling RADIUS on the Switch
166
Configuring the Printer Cluster for MAC-Based Authentication
167
Configuring the Public Area PWA Station
168
Terms and Definitions
168
Authentication Configuration Terms and Definitions
168
Chapter 11: Configuring Link Aggregation
171
Link Aggregation Overview
171
Using Link Aggregation in a Network
171
Implementing Link Aggregation
172
LACP Operation
172
How a LAG Forms
173
LAG Formation
174
Attached Ports
175
LAG2 Port Priority Assignments
175
Lags Moved to Attached State
176
LAG Port Parameters
177
Single Port Attached State Rules
177
Flexible Link Aggregation Groups
178
Static Port Assignment
178
Configuring Link Aggregation
179
Default Link Aggregation Parameters
179
Managing Link Aggregation
180
Link Aggregation Configuration Example
181
Displaying Link Aggregation Information and Statistics
181
Link Aggregation Example
182
LAG and Physical Port Admin Key Assignments
183
Configuring the S8 Distribution Switch
184
Configuring the Fixed Switch Stack 1
184
Configuring the Fixed Switch Stack 2
184
Configuring the Server
185
Terms and Definitions
185
Link Aggregation Configuration Terms and Definitions
185
Chapter 12: Configuring SNMP
187
SNMP Overview
187
Implementing SNMP
187
SNMP Concepts
188
Manager/Agent Model Components
188
Message Functions
188
SNMP Message Functions
188
Trap Versus Inform Messages
189
Access to MIB Objects
189
Community Name Strings
189
User-Based
189
SNMP Support on Enterasys Switches
189
Snmpv1 Andv2C Network Management Components
190
Snmpv3 User-Based Security Model (USM) Enhancements
190
Versions Supported
190
Terms and Definitions
191
SNMP Terms and Definitions
191
Security Models and Levels
192
Access Control
192
SNMP Security Models and Levels
192
Configuring SNMP
193
Configuration Basics
193
How SNMP Processes a Notification Configuration
193
Device Start up Configuration
194
SNMP Defaults
194
Default Enterasys SNMP Configuration
194
Configuring Snmpv1/Snmpv2C
195
Creating a New Configuration
195
Adding to or Modifying the Default Configuration
196
Configuring Snmpv3
196
Configuring an Snmpv3 Inform or Trap Engine ID
199
Configuring an SNMP View
200
Configuring Secure SNMP Community Names
201
Example
203
Reviewing SNMP Settings
204
Commands to Review SNMP Settings
204
Chapter 13: Configuring Neighbor Discovery
205
Neighbor Discovery Overview
205
Neighbor Discovery Operation
205
Communication between LLDP-Enabled Devices
207
Lldp-Med
207
LLDPDU Frames
209
Lldp-Med
209
Configuring LLDP
211
LLDP Configuration Commands
211
Basic LLDP Configuration
213
Example LLDP Configuration: Location Information
213
Example LLDP Configuration: Time to Live
213
LLDP Display Commands
214
Configuring Enterasys Discovery Protocol
214
Enterasys Discovery Protocol Configuration Commands
214
LLDP Show Commands
214
Example Enterasys Discovery Protocol Configuration
215
Enterasys Discovery Protocol Show Commands
215
Configuring Cisco Discovery Protocol
215
Cisco Discovery Protocol Configuration Commands
216
Example Cisco Discovery Protocol Configuration
216
Cisco Discovery Protocol Show Commands
216
Chapter 14 : Configuring Syslog
219
System Logging Overview
219
Syslog Operation
220
Syslog Operation on Enterasys Devices
220
Filtering by Severity and Facility
220
Syslog Components and Their Use
221
Syslog Terms and Definitions
221
Basic Syslog Scenario
223
Basic System Scenario
223
Interpreting Messages
224
Example
224
About Security Audit Logging
224
Syslog Message Components
224
Security Events Logged
225
Trap Generation
225
Format Examples
226
Configuring Syslog
226
Syslog Command Precedence
226
About Server and Application Severity Levels
227
Configuring Syslog Server(S)
227
Example
227
Displaying System Logging Defaults
228
Modifying Default Settings
228
Modifying Syslog Server Defaults
228
Reviewing and Configuring Logging for Applications
228
Syslog Server Default Settings
228
Displaying Current Application Severity Levels
229
Enabling Console Logging and File Storage
229
Displaying to the Console and Saving to a File
229
Adjusting Settings to Allow for Logging at the Debug Level
230
Configuration Examples
230
Enabling a Server and Console Logging
230
Configuring Spanning Tree
231
Chapter 15 : Configuring Spanning Tree
231
Spanning Tree Protocol Overview
231
Why Use Spanning Trees
232
Spanning Tree on Enterasys Platforms
232
Redundant Link Causes a Loop in a Non-STP Network
232
Loop Avoided When STP Blocks a Duplicate Path
232
STP Operation
233
Multiple Spanning Tree Operation
234
Rapid Spanning Tree Operation
234
Multiple Spanning Tree Overview
235
Functions and Features Supported on Enterasys Devices
236
Maximum SID Capacities
236
Network Diameter
236
Port Forwarding
236
Spanning Tree Versions
236
Maximum SID Capacities Per Platform
236
Disabling Spanning Tree
237
STP Features
237
Loop Protect
237
Spanguard
237
Multisource Detection
238
Updated 802.1T
238
Spanning Tree Basics
239
Assigning Path Costs
239
Electing the Root Bridge
239
Spanning Tree Bridge Protocol Data Units
239
Paths to Root
240
Root Port Selection Based on Lowest Cost or Bridge ID
240
Root Port Selection Based on Lowest Port ID
241
Identifying Designated, Alternate, and Backup Port Roles
242
Spanning Tree Port Role Overview
242
Assigning Port States
243
Spanning Tree Port Roles
243
Spanning Tree Port States
243
RSTP Operation
244
MSTP Operation
244
Common and Internal Spanning Tree (CIST)
244
MST Region
245
Example of an MST Region
245
Multiple Spanning Tree Instances (MSTI)
246
Multiple Spanning Tree Instance Support
246
MSTI 1 in a Region
248
MSTI2 in the same Region
248
Configuring STP and RSTP
249
Example of Multiple Regions and Mstis
249
Reviewing and Enabling Spanning Tree
250
Adjusting Spanning Tree Parameters
250
Example
250
Setting a Port Priority
251
Setting Bridge Priority Mode and Priority
251
Spanning Tree Port Default Settings
251
Assigning Port Costs
252
Adjusting Bridge Protocol Data Unit (BPDU) Intervals
252
BPDU Interval Defaults
252
Enabling the Backup Root Function
253
Adjusting RSTP Parameters
253
Defining Edge Port Status
254
Configuring MSTP
254
Example 1: Configuring MSTP for Traffic Segregation
255
Traffic Segregation in a Single STP Network Configuration
255
Traffic Segregation in an MSTP Network Configuration
256
Example 2: Configuring MSTP for Maximum Bandwidth Utilization
257
Maximum Bandwidth Utilization in a Single STP Network Configuration
257
Adjusting MSTP Parameters
258
Maximum Bandwidth in an MSTP Network Configuration
258
Monitoring MSTP
259
Understanding and Configuring Spanguard
259
What Is Spanguard
259
Commands for Monitoring MSTP
259
How Does It Operate
260
Configuring Spanguard
260
Enabling and Adjusting Spanguard
260
Reviewing and Setting Edge Port Status
260
Monitoring Spanguard Status and Settings
261
Understanding and Configuring Loop Protect
261
How Does It Operate
261
What Is Loop Protect
261
Commands for Monitoring Spanguard
261
Port Modes and Event Triggers
262
Example: Basic Loop Protect Configuration
262
Configuring Loop Protect
263
Basic Loop Protect Scenario
263
Spanning Tree Without Loop Protect
263
Spanning Tree with Loop Protect
263
Enabling or Disabling Loop Protect
264
Specifying Loop Protect Partners
264
Setting the Loop Protect Event Threshold and Window
264
Enabling or Disabling Loop Protect Event Notifications
265
Setting the Disputed BPDU Threshold
265
Monitoring Loop Protect Status and Settings
265
Commands for Monitoring Loop Protect
265
Terms and Definitions
266
Spanning Tree Terms and Definitions
266
Chapter 16: Configuring Policy
269
Using Policy in Your Network
269
Standard and Enhanced Policy on Enterasys Platforms
270
Implementing Policy
270
Policy Configuration Overview
270
Using the Enterasys Netsight Policy Manager
270
Understanding Roles in a Secure Network
271
The Policy Role
271
Defining Policy Roles
271
Adding Tagged, Untagged, and Forbidden Ports to the VLAN Egress Lists
272
Assigning a Class of Service to a Role
272
Setting a Default VLAN for a Role
272
Defining Policy Rules
273
Admin Rules
273
Traffic Classification Rules
273
Admin Rule Parameters
273
Policy Rule Traffic Descriptions/Classifications
274
Valid Data Values for Traffic Classification Rules
274
Applying Policy
275
Applying a Default Policy
276
Applying Policies Dynamically
276
Blocking Non-Edge Protocols at the Edge Network Layer
276
Non-Edge Protocols
276
Configuring Policy
277
Displaying Policy Configuration and Statistics
279
Policy Configuration Example
280
College-Based Policy Configuration
280
Roles
281
Policy Domains
281
Basic Edge
281
Platform Configuration
282
Premium Distribution
282
Premium Edge
282
Standard Edge
282
Configuring Guest Policy on Edge Platforms
283
Configuring Policy for the Edge Student Fixed Switch
283
Configuring Phonefs Policy for the Edge Fixed Switch
284
Configuring Policy for the Edge Faculty Fixed Switch
285
Terms and Definitions
286
Policy Configuration Terms and Definitions
286
Chapter 17: Configuring Quality of Service
287
Quality of Service Overview
287
Implementing Qos
287
Quality of Service Operation
288
Class of Service (Cos)
288
Cos Settings
289
Cos Flood Control State
289
Cos Hardware Resource Reference
289
Cos Priority and Tos Rewrite
289
Cos Configuration Terminology
289
Cos Reference
290
Port Group and Type
290
Assigning and Marking Traffic with a Priority
290
Cos Settings Reference to Port Resource Mapping
291
Port Resources
291
Port Configuration
291
Preferential Queue Treatment for Packet Forwarding
292
Strict Priority Queuing
292
Weighted Fair Queuing
292
Strict Priority Queuing Packet Behavior
292
Hybrid Queuing
293
Weighted Fair Queuing Packet Behavior
293
Rate Limiting
294
Hybrid Queuing Packet Behavior
294
Flood Control
295
Cos Hardware Resource Configuration
295
Cos Port Configuration Layer
295
IRL Configuration
295
Rate Limiting Clipping Behavior
295
Cos Port Resource Layer
296
Cos Reference Layer
296
Cos Settings Layer
296
Enable Cos State
296
IRL Configuration Example Show Command Output
296
Flood Control Configuration
298
Cos Port Configuration Layer
298
Cos Port Resource Layer
298
Cos Reference Layer
298
Cos Settings Layer
298
Enable Cos State
298
Flood Control Configuration Example Show Command Output
298
Enabling Cos State
299
The Qos CLI Command Flow
300
Port Priority and Transmit Queue Configuration
301
Example
301
Mapping Port Priority to Transmit Queues
301
Setting Port Priority
301
Example
302
Setting Transmit Queue Arbitration
302
Port Traffic Rate Limiting
303
Examples
303
Chapter 18: Configuring Network Monitoring
305
Basic Network Monitoring Features
305
Console/Telnet History Buffer
305
Network Diagnostics
306
Switch Connection Statistics
306
Users
307
Rmon
307
RMON Monitoring Group Functions and Commands
307
RMON Design Considerations
308
Configuring RMON
309
Default RMON Parameters
309
Sflow
313
Managing RMON
313
Displaying RMON Information and Statistics
313
Using Sflow in Your Network
314
Definitions
314
Sflow Definitions
314
Sflow Agent Functionality
315
Sampling Mechanisms
315
Counter Sampling
315
Packet Flow Sampling
315
Configuring Sflow
316
Overview
316
Sampling Implementation Notes
316
Default Sflow Parameters
317
Procedure
318
Displaying Sflow Information
319
Managing Sflow
319
Chapter 19: Configuring Multicast
321
Using Multicast in Your Network
321
Implementing Multicast
321
Multicast Operation
322
Internet Group Management Protocol (IGMP)
322
Overview
322
IGMP Support on Enterasys Devices
323
IGMP Querier Determining Group Membership
323
Example: Sending a Multicast Stream
324
Sending a Multicast Stream with no Directly Attached Hosts
324
Distance Vector Multicast Routing Protocol (DVMRP)
325
DVMRP Support on Enterasys Devices
325
Overview
325
Overview
331
Protocol Independent Multicast (PIM)
331
DVMRP Pruning and Grafting
331
PIM Traffic Flow
332
PIM Support on Enterasys Devices
333
PIM-SM Message Types
333
PIM Terms and Definitions
334
Configuring IGMP
335
Layer 2 IGMP Configuration Commands
336
Layer 3 IGMP Configuration Commands
336
Basic IGMP Configuration
337
Example IGMP Configuration on Layer 3
337
IGMP Display Commands
338
Configuring DVMRP
338
DVMRP Configuration Commands
338
Layer 2 IGMP Show Commands
338
Layer 3 IGMP Show Commands
338
Basic DVMRP Configuration
339
Example DVMRP Configuration
339
DVMRP Configuration on Two Routers
339
Displaying DVMRP Information
340
Configuring PIM-SM
341
Design Considerations
341
PIM-SM Configuration Commands
341
DVMRP Show Commands
341
PIM-SM Set Commands
341
Basic PIM-SM Configuration
342
Example Configuration
342
PIM-SM Configuration
343
PIM-SM Display Commands
344
PIM-SM Show Commands
344
Chapter 20: IP Configuration
345
Enabling the Switch for Routing
345
Router Configuration Modes
345
Testing Network Connectivity
345
Entering Router Configuration Modes
346
Router CLI Configuration Modes
346
Example
347
Routing Interfaces
347
Ipv4 Interface Addresses
347
IP Static Routes
348
Testing Network Connectivity
349
Configuring Static Routes
349
The ARP Table
350
ARP Configuration
351
Proxy ARP
351
IP Broadcast Settings
351
Directed Broadcast
351
UDP Broadcast Forwarding
352
UDP Broadcast Forwarding Port Default
352
DHCP and BOOTP Relay
353
IP Broadcast Configuration
353
Configuring ICMP Redirects
354
Terms and Definitions
354
IP Routing Terms and Definitions
354
Chapter 21: Ipv4 Basic Routing Protocols
357
Configuring RIP
357
Using RIP in Your Network
357
RIP Configuration Overview
357
RIP Router Configuration
357
RIP Interface Configuration
358
Routing Protocol Route Preferences
358
RIP Configuration Example
359
RIP Default Values
359
Configuring IRDP
361
IRDP Configuration Example
361
IRDP Configuration Overview
361
Using IRDP in Your Network
361
IRDP Default Values
361
Chapter 22: Configuring Ospfv2
366
OSPF Areas
366
OSPF Router Types
367
Designated Router
367
Authentication
367
Basic OSPF Topology Configuration
367
Configuring the Router ID
368
Basic OSPF Topology
368
Configuring the Designated Router
369
Configuring Router Priority
370
Example
370
OSPF Designated Router Topology
370
Configuring the Administrative Distance for OSPF Routes
371
Configuring SPF Timers
371
Configuring OSPF Areas
372
Configuring Area Range
372
Example
372
Configuring a Stub Area
373
OSPF Summarization Topology
373
Stub Area Default Route Cost
374
Example
374
OSPF Stub Area Topology
374
Configuring a Not so Stubby Area (NSSA)
375
Configuring Area Virtual-Links
376
Example
376
OSPF NSSA Topology
376
Virtual Link Topology
377
Configuring Area Virtual-Link Authentication
378
Configuring Area Virtual-Link Timers
378
Configuring Route Redistribution
378
Configuring Passive Interfaces
378
Configuring OSPF Interfaces
379
Configuring Authentication
379
Configuring Interface Cost
379
Configuring Interface Priority
379
Configuring OSPF Interface Timers
380
Default Settings
380
Default OSPF Parameters
380
Configuration Procedures
381
Basic OSPF Router Configuration
381
OSPF Area Configuration
382
OSPF Interface Configuration
382
Managing and Displaying OSPF Configuration and Statistics
383
OSPF Management Tasks
383
Chapter 23: Configuring VRRP
385
VRRP Overview
385
VRRP Virtual Router Creation
386
VRRP Master Election
386
Basic VRRP Topology
386
Enabling Master Preemption
387
Enabling ICMP Replies
387
Configuring VRRP Authentication
387
Enabling the VRRP Virtual Router
387
Configuring VRRP
387
Default VRRP Parameters
387
Configuration Examples
388
Basic VRRP Configuration
388
Basic Configuration Example
389
Multiple Backup VRRP Configuration
390
Multi-Backup VRRP Configuration Example
390
Terms and Definitions
392
VRRP Configuration Terms and Definitions
392
Chapter 24 : Configuring Access Control Lists
393
Using Access Control Lists (Acls) in Your Network
393
Implementing Acls
393
ACL Configuration Overview
394
Creating Ipv4 Acls
394
Creating Ipv6 and MAC Acls
394
Creating ACL Rules
395
Ipv4 Rules
395
Ipv6 Rules
396
MAC Rules
396
Managing Acls
396
Deleting Acls and Rules
396
Moving ACL Rules
397
Replacing ACL Rules
397
Inserting ACL Rules
398
Applying Acls
398
Configuring Acls
399
Configuring Ipv4 Acls
399
Example
400
Configuring Ipv6 Acls
400
Example
401
Configuring MAC Acls
402
Example
402
Access Control Lists on the A4
403
ACL Rule Precedence
403
Configuring A4 Acls
404
Extended Ipv4 ACL Configuration
404
MAC ACL Configuration
405
Chapter 25: Configuring and Managing Ipv6
407
Managing Ipv6
407
Configuring Ipv6 Management
408
Example
408
Ipv6 Routing Configuration
409
Overview
409
Monitoring Network Connections at the Switch Level
409
Defaults
410
Ipv6 Default Conditions
410
Setting Routing General Parameters
411
Configuring Routing Interfaces
411
Ipv6 Addressing
411
Configuration Examples
412
Enabling an Interface for Ipv6 Routing
412
Creating Tunnel Interfaces
413
Basic Ipv6 over Ipv4 Tunnel
414
Configuring Static Routes
415
Viewing Routing Information
416
Displaying Routing Information
416
Testing Network Connectivity
417
Ipv6 Neighbor Discovery
417
Duplicate Address Detection
417
Cache Management
418
Neighbor Solicitation Messages
418
Router Advertisements
418
Neighbor Discovery Configuration
419
Dhcpv6 Configuration
420
Dhcpv6 Relay Agent Configuration
420
Dhcpv6 Server Configuration
421
Pool Configuration
421
Server Configuration
421
Configuration Examples
422
Default Conditions
422
Viewing Dhcpv6 Statistics
424
Displaying Dhcpv6 Statistics
424
Chapter 26 : Configuring Security Features
425
Security Mode Configuration
425
About the Security Mode
425
Configuring the Security Mode
426
Security Mode and SNMP
426
SNMP Commands Affected by Security Mode Settings
426
Security Mode and User Authentication and Passwords
427
Security Mode and System Logging
427
Security Mode and File Management
428
Ipsec Configuration
428
About Ipsec
428
Logging Commands Affected by Security Mode Settings
428
File Management Commands Affected by Security Mode Settings
428
Ipsec Defaults
429
Ipsec Configuration
429
RADIUS Management Authentication
430
Request Transmission
430
Example
431
Password Changing
431
Response Validation
431
MAC Locking
431
First Arrival Configuration
432
MAC Locking Notifications
432
Disabling and Enabling Ports
433
MAC Locking Defaults
433
MAC Locking Configuration
434
Tacacs
435
Command Authorization and Accounting
436
Session Authorization and Accounting
436
TACACS+ Client Functionality
436
Configuring the Source Address
437
Default Settings
437
TACACS+ Parameters
437
Basic TACACS+ Configuration
438
Example TACACS+ Configuration
439
TACACS+ Display Commands
439
TACACS+ Show Commands
439
Service Acls
440
Configuring a Service Access Control List
441
Restricting Management Access to the Console Port
441
DHCP Snooping
442
DHCP Message Processing
442
Basic Configuration
443
Building and Maintaining the Database
443
Rate Limiting
443
Configuration Notes
444
Default Parameter Values
444
DHCP Snooping Default Parameters
444
Managing DHCP Snooping
445
Displaying DHCP Snooping Information
445
Dynamic ARP Inspection
446
Functional Description
446
Optional ARP Packet Validation
446
Static Mappings
446
Eligible Interfaces
447
Interaction with Other Functions
447
Logging Invalid Packets
447
Packet Forwarding
447
Rate Limiting
447
Basic Configuration
448
Default Parameter Values
448
Managing Dynamic ARP Inspection
448
Dynamic ARP Inspection Default Parameters
448
Displaying Dynamic ARP Inspection Information
448
Example Configuration
449
Non-Routing Example
449
Managing Dynamic ARP Inspection
449
Routing Example
450
Dhcp Snooping Configuration
451
Dynamic Arp Inspection Configuration
451
Vlan Configuration
451
Advertisement
Enterasys C5K125-24 Quick Reference (2 pages)
Gigabit Ethernet Switch
Brand:
Enterasys
| Category:
Network Router
| Size: 0.64 MB
Advertisement
Related Products
Enterasys C5K125-24P2
Enterasys C5K125-48
Enterasys C5K125-48P2
Enterasys C5K175-24
Enterasys C5G124-24
Enterasys C5G124-24P2
Enterasys C5G124-48
Enterasys C5G124-48P2
Enterasys SecureStack C2 C2H124-48P
Enterasys SecureStack C2 C2K122-24
Enterasys Categories
Switch
Network Router
Network Hardware
Wireless Access Point
Software
More Enterasys Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL