160
ExtremeWare 7.2e Installation and User Guide
Security
Where <url> is the DNS name of the switch. For example,
configure netlogin base-url
network-access.ne
t makes the switch send DNS responses back to the netlogin clients when a DNS
query is made for
network-access.net
.
To configure the network login redirect page, use the following command:
configure netlogin redirect-page <url>
Where
<url>
defines the redirection information for the users once logged in. This redirection
information is used only in case the redirection info is missing from RADIUS server. For example,
configure netlogin base-url http://www.extremenetworks.com
redirects all users to this URL
after they get logged in.
To enable or disable the network login session refresh, use one of the following commands:
enable netlogin session-refresh {<minutes>}
disable netlogin session-refresh
Where
<minutes>
ranges from 1 - 255. The default setting is 3 minutes.
enable netlogin
session-refresh {<minutes>}
makes the logout window refresh itself at every configured time
interval.
Session -refresh
is disabled by default.
To enable or disable network login logout privilege, use one of the following commands:
enable netlogin logout-privilege
disable netlogin logout-privilege
This command turns the privilege for netlogin users to logout by popping up (or not popping up) the
logout window.
Logout-privilege
is enabled by default.
To enable or disable network login, use one of the following commands:
enable netlogin [web-based | dot1x]
disable netlogin [web-based |dot1x]
By default netlogin is enabled.
To show all network login parameters, use the following command:
show netlogin
Switch Protection
Switch protection features enhance the robustness of switch performance. In this category are the
following features:
•
Routing Access Profiles
•
Denial of Service Protection
Routing Access Profiles
Routing access profiles are used to control the advertisement or recognition of routing protocols, such as
RIP or OSPF. Routing access profiles can be used to ‘hide’ entire networks, or to trust only specific
sources for routes or ranges of routes. The capabilities of routing access profiles are specific to the type
of routing protocol involved, but are sometimes more efficient and easier to implement than access lists.
Содержание ExtremeWare 7.2e
Страница 14: ...14 ExtremeWare 7 2 0 Software User Guide Contents...
Страница 18: ...18 ExtremeWare 7 2e Installation and User Guide Preface...
Страница 46: ...46 ExtremeWare 7 2e Installation and User Guide Summit 400 48t Switch Overview and Installation...
Страница 80: ...80 ExtremeWare 7 2e Installation and User Guide Accessing the Switch...
Страница 102: ...102 ExtremeWare 7 2e Installation and User Guide Virtual LANs VLANs...
Страница 108: ...108 ExtremeWare 7 2e Installation and User Guide Forwarding Database FDB...
Страница 180: ...180 ExtremeWare 7 2e Installation and User Guide Security...
Страница 194: ...194 ExtremeWare 7 2e Installation and User Guide Ethernet Automatic Protection Switching...
Страница 218: ...218 ExtremeWare 7 2e Installation and User Guide Spanning Tree Protocol STP...
Страница 248: ...248 ExtremeWare 7 2e Installation and User Guide Interior Gateway Protocols...
Страница 256: ...256 ExtremeWare 7 2e Installation and User Guide IP Multicast Routing...
Страница 308: ...308 ExtremeWare 7 2e Installation and User Guide Using ExtremeWare Vista on the Summit 400...
Страница 316: ...316 ExtremeWare 7 2e Installation and User Guide Technical Specifications...
Страница 324: ...324 ExtremeWare 7 2e Installation and User Guide Software Upgrade and Boot Options...