GE ML1600 Switch User Manual


 
TOC TABLE OF CONTENTS
MULTILINK ML1600 ETHERNET COMMUNICATIONS SWITCH – INSTRUCTION MANUAL TOC–III
DATE AND TIME .....................................................................................................................5-9
N
ETWORK TIME .....................................................................................................................5-10
SYSTEM CONFIGURATION ................................................................................................ 5-13
S
AVING AND LOADING – COMMAND LINE ........................................................................5-13
C
ONFIG FILE ...........................................................................................................................5-13
D
ISPLAYING CONFIGURATION ..............................................................................................5-16
S
AVING CONFIGURATION .....................................................................................................5-19
S
CRIPT FILE ............................................................................................................................5-21
S
AVING AND LOADING – ENERVISTA SOFTWARE .............................................................5-22
H
OST NAMES .........................................................................................................................5-25
E
RASING CONFIGURATION ...................................................................................................5-26
IPV6 ........................................................................................................................................ 5-30
I
NTRODUCTION TO IPV6 .......................................................................................................5-30
W
HATS CHANGED IN IPV6? ...............................................................................................5-30
IP
V6 ADDRESSING ................................................................................................................5-31
C
ONFIGURING IPV6 ..............................................................................................................5-32
L
IST OF COMMANDS IN THIS CHAPTER ...............................................................................5-33
6: ACCESS
CONSIDERATIONS
SECURING ACCESS ............................................................................................................ 6-1
D
ESCRIPTION ..........................................................................................................................6-1
P
ASSWORDS ...........................................................................................................................6-1
P
ORT SECURITY FEATURE .....................................................................................................6-2
CONFIGURING PORT SECURITY THROUGH THE COMMAND LINE INTERFACE .. 6-3
C
OMMANDS ............................................................................................................................6-3
S
ECURITY LOGS .....................................................................................................................6-9
A
UTHORIZED MANAGERS .....................................................................................................6-10
CONFIGURING PORT SECURITY WITH ENERVISTA SOFTWARE .............................. 6-12
C
OMMANDS ............................................................................................................................6-12
L
OGS .......................................................................................................................................6-14
A
UTHORIZED MANAGERS .....................................................................................................6-15
7: ACCESS USING RADIUS INTRODUCTION TO 802.1X .............................................................................................. 7-1
D
ESCRIPTION ..........................................................................................................................7-1
802.1
X PROTOCOL ...............................................................................................................7-1
CONFIGURING 802.1X THROUGH THE COMMAND LINE INTERFACE ................... 7-4
C
OMMANDS ............................................................................................................................7-4
E
XAMPLE .................................................................................................................................7-6
CONFIGURING 802.1X WITH ENERVISTA SECURE WEB MANAGEMENT
SOFTWARE ........................................................................................... 7-9
C
OMMANDS ............................................................................................................................7-9
8: ACCESS USING
TACACS+
INTRODUCTION TO TACACS+ ......................................................................................... 8-1
O
VERVIEW ..............................................................................................................................8-1
TACACS+ F
LOW ..................................................................................................................8-2
TACACS+ P
ACKET ...............................................................................................................8-2
CONFIGURING TACACS+ THROUGH THE COMMAND LINE INTERFACE .............. 8-4
C
OMMANDS ............................................................................................................................8-4
E
XAMPLE .................................................................................................................................8-4
CONFIGURING TACACS+ WITH ENERVISTA SECURE WEB MANAGEMENT
SOFTWARE ........................................................................................... 8-6