C
ONTENTS
iv
Setting the Switch’s IP Address . . . . . . . . . . . . . . . . . . . . . . . . 3-17
Manual Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-19
Using DHCP/BOOTP . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-20
Managing Firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-22
Downloading System Software from a Server . . . . . . . . . . 3-22
Saving or Restoring Configuration Settings . . . . . . . . . . . . . . . 3-24
Downloading Configuration Settings from a Server . . . . . 3-25
Resetting the System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-26
Setting the System Clock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-27
Configuring SNTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-27
Setting the Time Zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-29
Simple Network Management Protocol . . . . . . . . . . . . . . . . . . . . . . . . 3-30
Setting Community Access Strings . . . . . . . . . . . . . . . . . . . . . . 3-30
Specifying Trap Managers and Trap Types . . . . . . . . . . . . . . . . 3-31
User Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-33
Configuring the Logon Password . . . . . . . . . . . . . . . . . . . . . . . 3-33
Configuring Local/Remote Logon Authentication . . . . . . . . . 3-34
Configuring HTTPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-38
Replacing the Default Secure-site Certificate . . . . . . . . . . 3-40
Configuring the Secure Shell . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-41
Generating the Host Key Pair . . . . . . . . . . . . . . . . . . . . . . 3-43
Configuring the SSH Server . . . . . . . . . . . . . . . . . . . . . . . . 3-46
Configuring Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-48
Configuring 802.1x Port Authentication . . . . . . . . . . . . . . . . . . 3-51
Displaying 802.1x Global Settings . . . . . . . . . . . . . . . . . . . 3-52
Configuring 802.1x Global Settings . . . . . . . . . . . . . . . . . . 3-55
Configuring Port Authorization Mode . . . . . . . . . . . . . . . 3-56
Displaying 802.1x Statistics . . . . . . . . . . . . . . . . . . . . . . . . 3-58
Access Control Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-60
Configuring Access Control Lists . . . . . . . . . . . . . . . . . . . . . . . 3-60
Setting the ACL Name and Type . . . . . . . . . . . . . . . . . . . . 3-61
Configuring a Standard IP ACL . . . . . . . . . . . . . . . . . . . . . 3-63
Configuring an Extended IP ACL . . . . . . . . . . . . . . . . . . . 3-64
Configuring a MAC ACL . . . . . . . . . . . . . . . . . . . . . . . . . . 3-67
Configuring ACL Masks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-70
Specifying the Mask Type . . . . . . . . . . . . . . . . . . . . . . . . . . 3-70
Configuring an IP ACL Mask . . . . . . . . . . . . . . . . . . . . . . . 3-71
Configuring a MAC ACL Mask . . . . . . . . . . . . . . . . . . . . . 3-74
Binding a Port to an Access Control List . . . . . . . . . . . . . . . . . 3-76
Summary of Contents for 8648T - annexe 1
Page 2: ......
Page 34: ...INTRODUCTION 1 10 ...
Page 48: ...INITIAL CONFIGURATION 2 14 ...
Page 159: ...PORT CONFIGURATION 3 111 Figure 3 48 Displaying Etherlike and RMON Statistics ...
Page 411: ...DNS COMMANDS 4 167 ...
Page 536: ...COMMAND LINE INTERFACE 4 291 ...
Page 542: ...TROUBLESHOOTING B 2 ...
Page 555: ......