About This Guide; Using This Guide; Structure Of This Guide - Enterasys SecureStack C2 Configuration Manual

Stackable switches
Hide thumbs Also See for SecureStack C2:
Table of Contents

Advertisement

Welcome to the Enterasys Networks SecureStack C2 Configuration Guide. This manual explains 
how to access the device's Command Line Interface (CLI) and how to use it to configure 
SecureStack C2 switch devices. 
Depending on the firmware version used in your SecureStack device, some features described in
this document may not be supported. Refer to the Release Notes shipped with your device to
determine which features are supported.

Using This Guide

A general working knowledge of basic network operations and an understanding of CLI 
management applications is helpful before configuring the SecureStack device. 
This manual describes how to do the following:
Access the SecureStack CLI.
Use CLI commands to perform network management and device configuration operations
Establish and manage Virtual Local Area Networks (VLANs).
Establish and manage static and dynamically‐assigned policy classifications.
Establish and manage priority classification.
Configure IP routing and routing protocols, including RIP versions 1 and 2, OSPF, DVMRP, 
IRDP, and VRRP.
Configure security protocols, including 802.1X and RADIUS, SSHv2, MAC locking, and MAC 
authentication.
Configure access control lists (ACLs).

Structure of This Guide

The guide is organized as follows: 
Chapter
CLI interface, an overview of local management requirements, an overview of the device's factory 
default settings, and information about using the Command Line Interface (CLI).
Chapter
manage stacked switches.
Chapter
firmware image, how to configure WebView and Telnet, how to manage configuration files, how 
to set the login password, and how to exit the CLI.
Chapter
supported by the device.
1, Introduction, provides an overview of the tasks that can be accomplished using the 
2, Configuring Switches in a Stack, provides information about how to configure and 
3, Basic Configuration, provides how to set basic system properties, how to download a 
4, Discovery Protocol Configuration provides how to configure discovery protocols 

About This Guide

Important Notice
SecureStack C2 Configuration Guide xxvii

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SecureStack C2 and is the answer not in the manual?

Questions and answers

Table of Contents