Enterasys SecureStack C2 C2G170-24 Configuration Manual page 27

Stackable switches
Hide thumbs Also See for SecureStack C2 C2G170-24:
Table of Contents

Advertisement

set maclock trap ............................................................................................................................. 23-60
Configuring Port Web Authentication (PWA) .............................................................................................. 23-61
About PWA ........................................................................................................................................... 23-61
Purpose ................................................................................................................................................ 23-61
Commands ........................................................................................................................................... 23-61
show pwa........................................................................................................................................ 23-62
set pwa ........................................................................................................................................... 23-63
show pwa banner ........................................................................................................................... 23-64
set pwa banner ............................................................................................................................... 23-64
clear pwa banner ............................................................................................................................ 23-65
set pwa displaylogo ........................................................................................................................ 23-65
set pwa ipaddress........................................................................................................................... 23-66
set pwa protocol ............................................................................................................................. 23-66
set pwa guestname ........................................................................................................................ 23-67
clear pwa guestname ..................................................................................................................... 23-67
set pwa guestpassword .................................................................................................................. 23-68
set pwa gueststatus........................................................................................................................ 23-68
set pwa initialize ............................................................................................................................. 23-69
set pwa quietperiod ........................................................................................................................ 23-69
set pwa maxrequest ....................................................................................................................... 23-70
set pwa portcontrol ......................................................................................................................... 23-70
show pwa session .......................................................................................................................... 23-71
set pwa enhancedmode ................................................................................................................. 23-72
Configuring Secure Shell (SSH) ................................................................................................................. 23-73
Purpose ................................................................................................................................................ 23-73
Commands ........................................................................................................................................... 23-73
show ssh status .............................................................................................................................. 23-73
set ssh ............................................................................................................................................ 23-73
set ssh hostkey............................................................................................................................... 23-74
Configuring Access Lists ............................................................................................................................ 23-75
Purpose ................................................................................................................................................ 23-75
Commands ........................................................................................................................................... 23-75
show access-lists............................................................................................................................ 23-75
access-list (standard) ..................................................................................................................... 23-76
access-list (extended)..................................................................................................................... 23-77
ip access-group .............................................................................................................................. 23-79
Figures
1-1
SecureStack C2 Startup Screen......................................................................................................... 1-6
1-2
Sample CLI Defaults Description........................................................................................................ 1-8
1-3
Performing a Keyword Lookup ........................................................................................................... 1-8
1-4
Performing a Partial Keyword Lookup ................................................................................................ 1-9
1-5
Scrolling Screen Output...................................................................................................................... 1-9
1-6
Abbreviating a Command ................................................................................................................. 1-10
10-1
Example of VLAN Propagation via GVRP ...................................................................................... 10-21
Tables
1-1
Default Settings for Basic Switch Operation ....................................................................................... 1-2
1-2
Default Settings for Router Operation ................................................................................................ 1-4
1-3
Basic Line Editing Commands.......................................................................................................... 1-10
3-1
Required CLI Setup Commands......................................................................................................... 3-1
3-2
Optional CLI Setup Commands.......................................................................................................... 3-2
3-3
show system lockout Output Details................................................................................................... 3-8
xxv

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SecureStack C2 C2G170-24 and is the answer not in the manual?

This manual is also suitable for:

C2h124-24Securestack c2

Table of Contents