160
ExtremeWare 7.2e Installation and User Guide
Security
Where <url> is the DNS name of the switch. For example,
configure netlogin base-url
network-access.ne
t makes the switch send DNS responses back to the netlogin clients when a DNS
query is made for
network-access.net
.
To configure the network login redirect page, use the following command:
configure netlogin redirect-page <url>
Where
<url>
defines the redirection information for the users once logged in. This redirection
information is used only in case the redirection info is missing from RADIUS server. For example,
configure netlogin base-url http://www.extremenetworks.com
redirects all users to this URL
after they get logged in.
To enable or disable the network login session refresh, use one of the following commands:
enable netlogin session-refresh {<minutes>}
disable netlogin session-refresh
Where
<minutes>
ranges from 1 - 255. The default setting is 3 minutes.
enable netlogin
session-refresh {<minutes>}
makes the logout window refresh itself at every configured time
interval.
Session -refresh
is disabled by default.
To enable or disable network login logout privilege, use one of the following commands:
enable netlogin logout-privilege
disable netlogin logout-privilege
This command turns the privilege for netlogin users to logout by popping up (or not popping up) the
logout window.
Logout-privilege
is enabled by default.
To enable or disable network login, use one of the following commands:
enable netlogin [web-based | dot1x]
disable netlogin [web-based |dot1x]
By default netlogin is enabled.
To show all network login parameters, use the following command:
show netlogin
Switch Protection
Switch protection features enhance the robustness of switch performance. In this category are the
following features:
•
Routing Access Profiles
•
Denial of Service Protection
Routing Access Profiles
Routing access profiles are used to control the advertisement or recognition of routing protocols, such as
RIP or OSPF. Routing access profiles can be used to ‘hide’ entire networks, or to trust only specific
sources for routes or ranges of routes. The capabilities of routing access profiles are specific to the type
of routing protocol involved, but are sometimes more efficient and easier to implement than access lists.
Summary of Contents for ExtremeWare 7.2e
Page 14: ...14 ExtremeWare 7 2 0 Software User Guide Contents...
Page 18: ...18 ExtremeWare 7 2e Installation and User Guide Preface...
Page 80: ...80 ExtremeWare 7 2e Installation and User Guide Accessing the Switch...
Page 102: ...102 ExtremeWare 7 2e Installation and User Guide Virtual LANs VLANs...
Page 108: ...108 ExtremeWare 7 2e Installation and User Guide Forwarding Database FDB...
Page 180: ...180 ExtremeWare 7 2e Installation and User Guide Security...
Page 194: ...194 ExtremeWare 7 2e Installation and User Guide Ethernet Automatic Protection Switching...
Page 218: ...218 ExtremeWare 7 2e Installation and User Guide Spanning Tree Protocol STP...
Page 248: ...248 ExtremeWare 7 2e Installation and User Guide Interior Gateway Protocols...
Page 256: ...256 ExtremeWare 7 2e Installation and User Guide IP Multicast Routing...
Page 308: ...308 ExtremeWare 7 2e Installation and User Guide Using ExtremeWare Vista on the Summit 400...
Page 316: ...316 ExtremeWare 7 2e Installation and User Guide Technical Specifications...
Page 324: ...324 ExtremeWare 7 2e Installation and User Guide Software Upgrade and Boot Options...