About This Guide; Using This Guide; Structure Of This Guide - Enterasys SecureStack C2 C2G170-24 Configuration Manual

Stackable switches
Hide thumbs Also See for SecureStack C2 C2G170-24:
Table of Contents

Advertisement

Welcome to the Enterasys
access the device's Command Line Interface (CLI) and how to use it to configure SecureStack C2 
switch devices. 
Depending on the firmware version used in your SecureStack device, some features described in
this document may not be supported. Refer to the Release Notes shipped with your device to
determine which features are supported.

Using This Guide

A general working knowledge of basic network operations and an understanding of CLI 
management applications is helpful before configuring the SecureStack device. 
This manual describes how to do the following:
Access the SecureStack CLI.
Use CLI commands to perform network management and device configuration operations
Establish and manage Virtual Local Area Networks (VLANs).
Establish and manage static and dynamically‐assigned policy classifications.
Establish and manage priority classification.
Configure IP routing and routing protocols, including RIP versions 1 and 2, OSPF, DVMRP, 
IRDP, and VRRP.
Configure security protocols, including 802.1X and RADIUS, SSHv2, MAC locking, and MAC 
authentication.
Configure access control lists (ACLs).

Structure of This Guide

The guide is organized as follows: 
Chapter
CLI interface, an overview of local management requirements, an overview of the device's factory 
default settings, and information about using the Command Line Interface (CLI).
Chapter
manage stacked switches.
Chapter
firmware image, how to configure WebView and Telnet, how to manage configuration files, how 
to set the login password, and how to exit the CLI.
Chapter
features.
®
 SecureStack™ C2 Configuration Guide. This manual explains how to 
1, Introduction, provides an overview of the tasks that can be accomplished using the 
2, Configuring Switches in a Stack, provides information about how to configure and 
3, Basic Configuration, provides how to set basic system properties, how to download a 
4, Activating Licensed Features, describes the commands used to enable licensed 

About This Guide

Important Notice
SecureStack C2 Configuration Guide xxix

Advertisement

Table of Contents
loading

This manual is also suitable for:

C2h124-24Securestack c2

Table of Contents