GarrettCom MNS-6K-SECURE 14.1.4 Switch User Manual


 
Configuring IPv6 ...................................................................... 74
List of commands in this chapter .......................................... 75
5 – DHCP Server .................................................................. 77
Modes of Operation ................................................................ 78
Technical Details ...................................................................... 79
DHCP Discovery ..................................................................... 79
DHCP Offers ........................................................................... 80
DHCP Request ......................................................................... 80
DHCP Acknowledgement ...................................................... 80
DHCP Information ................................................................. 81
DHCP Release .......................................................................... 81
Client Configuration ................................................................ 81
MNS-6K-SECURE Implementation .................................... 81
List of commands in this chapter .......................................... 83
6 – SNTP Server ................................................................... 84
SNTP - prerequisites ................................................................... 84
Background ............................................................................... 84
Stratum clocks ........................................................................... 85
MNS-6K-SECURE Implementation .................................... 87
List of commands in this chapter .......................................... 88
7 – Access Considerations .................................................... 89
Securing access ............................................................................. 89
Passwords .................................................................................. 89
Port Security .............................................................................. 90
Network security .......................................................................... 90
Configuring Port Security ........................................................... 90
Syslog and Logs ........................................................................ 96
Authorized managers ............................................................. 102
List of commands in this chapter ........................................ 103
v