
F
IGURE
25
-
Querying the serial port settings
...................................................................................... 41
F
IGURE
26
-
System parameters using the show setup command. Most parameters here cannot be
changed
..................................................................................................................................... 41
F
IGURE
27
-
System parameters using the show sysconfig command. Most parameters here can be
changed.
.................................................................................................................................... 42
F
IGURE
28
-
Setting the system name, system location and system contact information
........................... 42
F
IGURE
29
-
Setting the system date, time and time zone
..................................................................... 43
F
IGURE
30
-
Setting the system daylight saving time
............................................................................. 44
F
IGURE
31
-
Setting up SNTP services
............................................................................................... 45
F
IGURE
32
-
Saving the configuration on a tftp server
.......................................................................... 45
F
IGURE
33
– Based on the ftp or tftp or xmodem commands – the MNS-6K based switch can
upload or download different types of files and images .Other files such as log files, hosts file
can also be saved or loaded onto a switch
.................................................................................... 47
F
IGURE
34
–
commands to save the configuration using ftp. Similar options will be specified using
tftp etc. When using the ftp command, use the host command discussed later in this section
to define the ftp server
................................................................................................................ 48
F
IGURE
35
– Contents of the config file
................................................................................................. 49
F
IGURE
36
– Creating host entries on MNS-6K
.................................................................................. 50
F
IGURE
37
–
‘
show config’
command output
................................................................................... 52
F
IGURE
38
–
displaying specific modules using the
‘show config’
command
....................................... 52
F
IGURE
39
–
displaying configuration for different modules. Note – multiple modules can be
specified on the command line
..................................................................................................... 53
F
IGURE
40
–
Erasing configuration without erasing the IP address
....................................................... 54
F
IGURE
41
– Display the serial number, factory code and other relevant setup information
...................... 54
F
IGURE
42
– Configuring IPv6
............................................................................................................ 62
F
IGURE
43
–
Changing password for a given account
............................................................................ 64
F
IGURE
44
–
Port security configuration mode
...................................................................................... 65
F
IGURE
45
– Port security configuration mode
...................................................................................... 66
F
IGURE
46
–
Port security – allowing specific MAC addresses on a specified port. (No spaces
between specified MAC addresses)
............................................................................................. 67
F
IGURE
47
– Port security - the port learns the MAC addresses. Note – a maximum of 200
MAC addresses can be learnt per port and a maximum of 500 per switch. Also, the
‘action’ on the port must be set to none before the port ‘learns’ the MAC address
information.
.............................................................................................................................. 67
F
IGURE
48
–
Enabling and disabling port security
............................................................................... 67
xii