TOC
TABLE OF CONTENTS
MULTILINK ML2400 ETHERNET COMMUNICATIONS SWITCH – INSTRUCTION MANUAL
TOC–III
S
ETTING
S
ERIAL
P
ORT
P
ARAMETERS
....................................................................................5-8
S
YSTEM
P
ARAMETERS
.............................................................................................................5-8
D
ATE
AND
T
IME
.......................................................................................................................5-9
N
ETWORK
T
IME
.......................................................................................................................5-10
SYSTEM CONFIGURATION ..................................................................................................5-13
S
AVING
AND
L
OADING
– C
OMMAND
L
INE
..........................................................................5-13
C
ONFIG
FILE
.............................................................................................................................5-13
D
ISPLAYING
CONFIGURATION
................................................................................................5-16
S
AVING
C
ONFIGURATION
.......................................................................................................5-19
S
CRIPT
F
ILE
..............................................................................................................................5-21
S
AVING
AND
L
OADING
– E
NER
V
ISTA
S
OFTWARE
...............................................................5-22
H
OST
N
AMES
...........................................................................................................................5-24
E
RASING
C
ONFIGURATION
.....................................................................................................5-25
IPV6 ..........................................................................................................................................5-29
I
NTRODUCTION
TO
IP
V
6 .........................................................................................................5-29
W
HAT
’
S
CHANGED
IN
IPV6? .................................................................................................5-29
IP
V
6 A
DDRESSING
..................................................................................................................5-30
C
ONFIGURING
IP
V
6 ................................................................................................................5-31
L
IST
OF
COMMANDS
IN
THIS
CHAPTER
.................................................................................5-32
6: ACCESS
CONSIDERATIONS
SECURING ACCESS ..............................................................................................................6-1
D
ESCRIPTION
............................................................................................................................6-1
P
ASSWORDS
.............................................................................................................................6-1
P
ORT
S
ECURITY
F
EATURE
.......................................................................................................6-2
CONFIGURING PORT SECURITY THROUGH THE COMMAND LINE INTERFACE ....6-3
C
OMMANDS
..............................................................................................................................6-3
S
ECURITY
L
OGS
.......................................................................................................................6-8
A
UTHORIZED
M
ANAGERS
.......................................................................................................6-10
CONFIGURING PORT SECURITY WITH ENERVISTA SOFTWARE ................................6-12
C
OMMANDS
..............................................................................................................................6-12
L
OGS
.........................................................................................................................................6-14
A
UTHORIZED
M
ANAGERS
.......................................................................................................6-15
7: ACCESS USING RADIUS
INTRODUCTION TO 802.1X ................................................................................................7-1
D
ESCRIPTION
............................................................................................................................7-1
802.1
X
P
ROTOCOL
.................................................................................................................7-1
CONFIGURING 802.1X THROUGH THE COMMAND LINE INTERFACE .....................7-4
C
OMMANDS
..............................................................................................................................7-4
E
XAMPLE
...................................................................................................................................7-6
CONFIGURING 802.1X WITH ENERVISTA SECURE WEB MANAGEMENT
SOFTWARE .............................................................................................7-9
C
OMMANDS
..............................................................................................................................7-9
8: ACCESS USING
INTRODUCTION TO ...........................................................................................8-1
O
VERVIEW
................................................................................................................................8-1
F
LOW
....................................................................................................................8-2
P
ACKET
.................................................................................................................8-2
CONFIGURING THROUGH THE COMMAND LINE INTERFACE ................8-4
C
OMMANDS
..............................................................................................................................8-4
E
XAMPLE
...................................................................................................................................8-4