EasyManua.ls Logo

Enterasys C5G124-24 User Manual

Enterasys C5G124-24
452 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
P/N 9034662-02
Enterasys
®
Fixed Switching
Configuration Guide
Firmware 6.61.xx and Higher

Table of Contents

Other manuals for Enterasys C5G124-24

Question and Answer IconNeed help?

Do you have a question about the Enterasys C5G124-24 and is the answer not in the manual?

Enterasys C5G124-24 Specifications

General IconGeneral
ModelC5G124-24
Ports24 x 10/100/1000Base-T
Switching Capacity48 Gbps
Forwarding Rate35.7 Mpps
Power over Ethernet (PoE)No
MAC Address Table Size16K
Jumbo Frame SupportYes
Uplink Ports4 x Gigabit Ethernet SFP
LayerLayer 2/3
VLANs Supported4, 096
Power SupplyInternal
Form FactorRack-mountable

Summary

Setting Up a Switch for the First Time

Connecting to the Switch

Step-by-step guide to connect a PC to the switch console port and set the initial IP address.

Downloading New Firmware

Procedure for downloading and installing new firmware images onto the switch using TFTP.

Setting User Accounts and Passwords

Guides on creating, managing, and disabling user accounts and passwords for enhanced security.

Configuring a Stack of New Switches

Procedure for setting up multiple new stackable switches in a stack configuration.

Downloading Firmware via the Serial Port

Procedure to download switch firmware via the serial console port using XMODEM transfer.

Configuring Switches in a Stack

Installing a New Stackable System of Up to Eight Units

Procedure for installing a new stack of up to eight units, including physical connections and CLI setup.

Adding a New Unit to an Existing Stack

Procedure for integrating a new unit into an existing stack configuration.

CLI Basics

Using the Command Line Interface

Describes how to start a CLI session, log in, and navigate the CLI.

Connecting Using the Console Port

Steps for connecting to the switch via the console port and logging in.

Connecting Using Telnet or SSH

Instructions for establishing a Telnet or SSH session to the switch's IP address.

Logging In

Details on logging in using default user accounts or administratively configured accounts.

Configuring CLI Properties

How to configure CLI properties like command prompt, banner messages, and session timeout.

System Configuration

Factory Default Settings

Lists factory default settings for basic switch and router operations.

Advanced Configuration Overview

Overview of configuring system services, switching, routing, and security features.

Licensing Advanced Features

Information on enabling advanced features using license keys and implementation differences.

SNTP Configuration

Describes SNTP for synchronizing system time, supporting unicast polling and broadcast listening.

SNTP Authentication

Explains SNTP security mechanisms to ensure responses come from authorized servers.

Configuring SNTP

Procedures for configuring general SNTP parameters and authentication.

DHCP Configuration

Explains DHCP for IPv4, implementing automatic or manual IP address assignment via servers.

DHCP Server

Details DHCP server functionality for providing basic IP configuration information to clients.

IP Address Pools

Configuration requirements for automatic (dynamic) and manual (static) IP address pools.

Configuring a DHCP Server

Ways to configure a DHCP server by associating pools with host port or routed interfaces.

Configuring DHCP IP Address Pools

Procedures for basic configuration of automatic and manual IP address pools.

Configuring Telnet

Steps to enable or disable Telnet services, inbound, outbound, or all.

Configuring SSH

Steps to enable, disable, or reinitialize the SSH server on the switch.

MAC Address Settings

Configuration options for aging learned MAC addresses and limiting multicast addresses.

User Account and Password Management

User Account Overview

Describes user account and password management features for controlling usage and reporting.

Account Lockout

Configures account lockout based on failed login attempts or periods of inactivity.

User Account Configuration

Shows how a super-user creates new user accounts and sets passwords.

Password Management Overview

Details password configuration, transmission, storage, and validation.

System Level Password Settings

How to configure system-wide password requirements like length, repetition, and aging.

System Password Settings Configuration

Procedure for configuring system-level password settings using CLI commands.

Firmware Image and File Management

Managing the Firmware Image

How to download, set firmware for startup, revert to previous image, and set TFTP parameters.

Downloading a Firmware Image

Describes two methods to download firmware: TFTP/SFTP or serial port.

Downloading from a TFTP or SFTP Server

Procedure for downloading firmware using TFTP or SFTP server connected to the network.

Setting the Boot Firmware

How to set the firmware image to be loaded at startup and reboot the system.

Reverting to a Previous Image

Steps to downgrade to a previous version of code, including backing up configuration.

Managing Switch Configuration and Files

Covers configuration persistence modes and managing files on the switch.

Displaying and Saving the Configuration and Creating a Backup

Use 'save config' to save running configuration and 'show config' to display.

Configuring System Power and PoE

Configuring Redundant Power Supplies

Describes redundant and additive power supply modes supported on C5 and G-Series switches.

Power over Ethernet Overview

Explains PoE standards (802.3af, 802.3at) and its ability to provide power via Ethernet.

Implementing PoE

Steps to configure PoE on compliant devices, ensuring PD power requirements are met.

Configuring PoE

Lists PoE settings configurable via CLI across different Enterasys device models.

Port Configuration

Port Configuration Overview

Describes basic port parameters, link flap detection, port mirroring, and queue monitoring.

Port Settings

Describes port settings that can be configured, including status, name, and auto-negotiation.

Configuring Port Link Flap Detection

Monitors link flapping to detect physical layer problems, disabling ports and generating notifications.

Transmit Queue Monitoring

Monitors transmit queues for stalled ports and takes corrective action.

Port Mirroring

Allows mirroring or redirecting traffic on a port for network analysis and connection assurance.

Configuring Port Mirroring

Use 'set port mirroring' to create, enable, or disable mirroring relationships.

Configuring VLANs

VLAN Overview

Defines VLANs as logical segments for network devices, regardless of physical location.

Using VLANs to Partition Your Network

How Virtual LANs partition network traffic into logical groups for control and isolation.

Implementing VLANs

Explains default 802.1Q VLAN operational mode and how to create additional VLANs.

Understanding How VLANs Operate

Explains how 802.1Q VLAN operation works, including frame classification and forwarding.

VLAN Assignment and Forwarding

How frames are classified into VLANs and how forwarding decisions are made.

Configuring VLANs

Presents procedures for configuring VLANs after planning implementation strategy.

Configuring Static VLANs

Describes how to create and configure a static VLAN, using unspecified parameters default values.

Configuring Dynamic VLANs

Describes how to enable GARP VLAN Registration Protocol (GVRP) for dynamic VLAN creation.

Configuring Protocol-Based VLAN Classification

How to define protocol-based frame filtering policies to assign frames to particular VLANs.

Configuring User Authentication

User Authentication Overview

Describes user authentication methods supported by Enterasys fixed switch platforms.

Implementing User Authentication

Steps to implement user authentication: determine device types, authentication types, and configure RADIUS.

Authentication Methods

Details supported authentication methods: IEEE 802.1x, MAC-Based, Port Web, and Multi-User/MultiAuth.

IEEE 802.1x Using EAP

Explains IEEE 802.1x port-based access control using EAP for authentication via RADIUS.

MAC-Based Authentication (MAC)

Authenticates devices using source MAC address, providing basic device authentication.

Port Web Authentication (PWA)

Authenticates users via web browser login, supporting CHAP or PAP verification.

Multi-User And MultiAuth Authentication

Discusses multi-user authentication (multiple devices on one port) and MultiAuth (multiple methods).

MultiAuth Authentication

Supports multiple authentication methods per user/port, applying based on precedence.

Remote Authentication Dial-In Service (RADIUS)

Provides details for configuring RADIUS and RFC 3580 attributes for authentication and authorization.

Dynamic VLAN Assignment

How RADIUS tunnel attributes are used for dynamic VLAN assignment of authenticated end systems.

Configuring Authentication

Provides details for configuration of authentication methods, MultiAuth and RADIUS.

Configuring IEEE 802.1x

Steps to configure IEEE 802.1x on an authenticator switch port.

Configuring MAC-based Authentication

Steps to configure MAC-based authentication on a switch.

Configuring Port Web Authentication (PWA)

Steps to configure PWA authentication, including IP address, enhanced mode, and port control.

Configuring MultiAuth Authentication

Details configuration of MultiAuth authentication mode, precedence, port properties, and timers.

Setting MultiAuth Authentication Precedence

Determines which authentication method is selected when multiple methods authenticate successfully.

Configuring VLAN Authorization

Allows dynamic assignment of users to VLANs via RADIUS, enabling VLAN authorization globally and per-port.

Configuring RADIUS

Details setting, clearing, and displaying RADIUS configuration for authentication and accounting.

Authentication Configuration Example

Covers authentication types used in an engineering group scenario.

Configuring MultiAuth Authentication

Sets MultiAuth mode, port modes, and user limits for authentication.

Configuring Link Aggregation

Link Aggregation Overview

Describes IEEE 802.3ad link aggregation, grouping interfaces into logical Layer 2 links.

Implementing Link Aggregation

Steps to implement link aggregation: enabling LACP, setting priority, keys, and port states.

Configuring Link Aggregation

Provides details for link aggregation configuration on N-Series, S-Series, stackable, and standalone switches.

Link Aggregation Configuration Example

Example configuration including a fixed switch stack, distribution switch, and server.

Configuring SNMP

SNMP Overview

Basic SNMP concepts, support on Enterasys switches, and configuration using CLI commands.

Implementing SNMP

Describes the process of implementing SNMP, involving users, groups, access rights, and target parameters.

Configuring SNMP

Provides information on configuring SNMP on Enterasys devices using CLI commands.

Configuration Basics

Steps to configure SNMP: define users, groups, access rights, target parameters, and notification entries.

Configuring SNMPv1/SNMPv2c

Procedure and examples for creating new SNMPv1 or SNMPv2c configurations.

Configuring SNMPv3

Shows how to complete a basic SNMPv3 configuration.

Configuring Secure SNMP Community Names

Recommended configuration to prevent unsecured SNMPv1/v2c access.

Configuring Neighbor Discovery

Neighbor Discovery Overview

Describes Layer 2 process of identifying and advertising devices to connected neighbors.

Neighbor Discovery Operation

How network devices advertise identities and capabilities using LLDP, Enterasys, and Cisco Discovery Protocols.

Configuring LLDP

Provides LLDP configuration commands and procedures.

Configuring Enterasys Discovery Protocol

Provides Enterasys Discovery Protocol configuration commands.

Configuring Cisco Discovery Protocol

Describes how Cisco DP extended trust settings work on the switch.

Configuring Syslog

System Logging Overview

Describes Syslog protocol for forwarding log messages in IP networks for system management.

Syslog Operation

How Syslog components operate on Enterasys switches, generating and forwarding messages.

Syslog Components and Their Use

Describes key Syslog components like Facility, Severity, Application, and Syslog server.

About Security Audit Logging

Provides a mechanism for generating a secure log file for security-related events.

Configuring Syslog

Provides procedures for configuring logging tasks.

Configuring Syslog Server(s)

Commands to configure one or more servers as destinations for Syslog messages.

Configuring Spanning Tree

Spanning Tree Protocol Overview

Explains STP's role in resolving network loops by establishing one primary path.

STP Operation

Details STP, RSTP, and MSTP protocols and their operation in forming a network of bridges.

Multiple Spanning Tree Operation

Provides traffic forwarding on multiple ports, allowing VLAN segregation and link utilization.

SpanGuard

Protects against DoS conditions by detecting unauthorized bridges and preventing respans.

Loop Protect

Prevents or short-circuits loop formation by requiring ports to receive BPDUs.

Spanning Tree Basics

Provides detailed understanding of Spanning Tree operations in a typical network.

MSTP Operation

Enables multiple Spanning Trees for VLAN switching, increasing bandwidth utilization.

Configuring STP and RSTP

Provides configuration procedures for Spanning Tree Protocol and Rapid Spanning Tree Protocol.

Configuring MSTP

Details MSTP requirements for multiple forwarding paths, matching configuration identifiers.

Understanding and Configuring SpanGuard

Explains SpanGuard's role in detecting unauthorized bridges and preventing DoS conditions.

Configuring SpanGuard

Commands to configure device ports for SpanGuard and enable the SpanGuard function.

Understanding and Configuring Loop Protect

Explains Loop Protect's function in preventing network loops by requiring BPDUs.

Configuring Loop Protect

Provides information on enabling/disabling Loop Protect and specifying partners.

Configuring Policy

Using Policy in Your Network

Policy as a component of Secure Networks for role-based profiles and resource provisioning.

Policy Configuration Overview

Overview of policy implementation, role definition, classification rules, and application.

Defining Policy Roles

How to create policy roles using 'set policy profile' command.

Defining Policy Rules

Explains admin rules and traffic classification rules for policy enforcement.

Applying Policy

How to apply policy profiles and rules to ports (default policy) or dynamically via authentication.

Configuring Policy

Presents configuration procedures and command descriptions for policy profiles and traffic classification rules.

Configuring Quality of Service

Quality of Service Overview

Explains QoS as a mechanism for bandwidth management and preferential packet treatment.

Implementing QoS

Steps to determine flow characteristics and configure appropriate link behavior.

Quality of Service Operation

Manages bandwidth aligning delivery requirements with port resources using packet classification.

Class of Service (CoS)

Implements QoS features using hardware resources like Inbound Rate Limiters and Flood Control.

Preferential Queue Treatment for Packet Forwarding

Describes three types of preferential queue treatments: strict priority, weighted fair, and hybrid.

Rate Limiting

Controls traffic rate entering a switch per CoS to throttle flows and provide bandwidth for others.

Port Priority and Transmit Queue Configuration

Assigns mission-critical data to higher priority queues during congestion.

Port Traffic Rate Limiting

Limits inbound traffic rate on a per port/priority basis to throttle flows.

Configuring Network Monitoring

Basic Network Monitoring Features

Covers history buffer, network diagnostics, switch connection statistics, and users.

Network Diagnostics

Provides ping and traceroute functionality to determine network availability and paths.

RMON

Remote Network Monitoring provides network fault diagnosis, planning, and performance tuning.

Configuring RMON

Provides details for configuring RMON on Fixed Switch products.

sFlow

Method for monitoring high-speed switched and routed networks using sampling technology.

Configuring sFlow

Provides overview and steps to configure sFlow, including collectors and management interface.

Configuring Multicast

Using Multicast in Your Network

Explains multicast as a one-source to many-destinations method for sending information.

Implementing Multicast

Steps to implement multicast protocols (IGMP, DVMRP, PIM-SM) using CLI commands.

Multicast Operation

How multicast uses network infrastructure efficiently by sending one copy of traffic.

Internet Group Management Protocol (IGMP)

Fundamental protocol for managing group membership in IP multicast.

Distance Vector Multicast Routing Protocol (DVMRP)

Interior gateway protocol for routing multicasts within a single autonomous system.

Protocol Independent Multicast (PIM)

Dynamically builds a distribution tree for forwarding multicast data.

Configuring IGMP

Describes IGMP configuration on Layer 2 for snooping and Layer 3 for host membership.

Configuring DVMRP

DVMRP is an advanced routing feature requiring a license key.

Configuring PIM-SM

PIM-SM is an advanced routing feature requiring a license key.

IP Configuration

Enabling the Switch for Routing

Enables IP configuration and router-specific commands after startup and general settings.

Routing Interfaces

Creates routing interfaces using the 'interface' command in router global configuration mode.

IPv4 Interface Addresses

Configures primary and optionally secondary IPv4 addresses for routing interfaces.

IP Static Routes

Configures static routes using 'ip route' command, specifying destination and next-hop IP.

Testing Network Connectivity

Uses 'ping' and 'traceroute' commands to test routing network connectivity.

IP Broadcast Settings

Manages directed broadcasts and UDP broadcast forwarding.

IPv4 Basic Routing Protocols

Configuring RIP

Describes RIP, a distance-vector routing protocol for small networks.

Using RIP in Your Network

Enables RIP process, populating routing table and sending/receiving updates.

RIP Interface Configuration

Enables RIP on individual routing interfaces and configures optional parameters.

Configuring IRDP

ICMP Router Discovery Protocol (IRDP) enables hosts to determine router addresses.

Configuring OSPFv2

OSPF Overview

Open Shortest Path First (OSPF) is a TCP/IP routing protocol distributing link state information.

Basic OSPF Topology Configuration

Overview of basic OSPF topology, areas, router types, designated router, and authentication.

Configuring the Router ID

Assigns a router ID based on loopback or VLAN IP address for unique identification.

Configuring OSPF Areas

Groups contiguous networks into areas, hiding topology from the rest of the AS.

Configuring a Stub Area

Configures an area as stub, preventing external routes and using a default route.

Configuring a Not So Stubby Area (NSSA)

Configures a hybrid area allowing injection of external routes into NSSA.

Configuring OSPF Interfaces

Enables OSPF on routing interfaces and configures IP address, area ID, and priority.

Configuring Authentication

Ensures routing information is processed only from trusted routers using simple or MD5 schemes.

OSPF Interface Configuration

Describes OSPF interface configuration tasks executed in router interface configuration mode.

OSPF Area Configuration

Describes OSPF area configuration tasks executed in router configuration mode.

Configuring VRRP

VRRP Overview

Describes Virtual Router Redundancy Protocol (VRRP) feature and its configuration.

Configuring VRRP

Provides details for VRRP configuration on fixed switch products.

Basic VRRP Configuration

Shows a basic VRRP configuration with a single virtual router.

Configuring Access Control Lists

Using Access Control Lists (ACLs) in Your Network

ACLs allow configuration of permit/deny for IPv4, IPv6, and MAC packet forwarding.

Implementing ACLs

Steps to implement an ACL: create ACL, enter rules, and optionally manage ACL entries.

ACL Configuration Overview

Describes ACL creation, rule entry, and application to ports or routing VLANs.

Creating IPv4 ACLs

Details standard (numbered 1-99) and extended (numbered 100-199) IPv4 ACL types.

Creating IPv6 and MAC ACLs

Configures IPv6 or MAC ACLs after enabling 'ipv6mode'.

Managing ACLs

Procedures for deleting, moving, replacing, inserting, and applying ACLs.

Applying ACLs

Applies ACLs to VLAN interfaces, ports, or Link Aggregation ports.

Configuring ACLs

Provides procedures and examples for configuring IPv4, IPv6, and MAC ACLs.

Configuring IPv4 ACLs

Describes how to configure IPv4 standard and extended ACLs.

Configuring IPv6 ACLs

Describes how to configure an IPv6 ACL.

Configuring MAC ACLs

Describes how to configure a MAC ACL.

Configuring and Managing IPv6

Managing IPv6

Enabling/disabling IPv6 management, configuring addresses, and monitoring network connectivity.

IPv6 Routing Configuration

Requires IPv6 routing to be enabled with a license key.

Overview

Describes coexistence of IPv6 and IPv4, and enabling IPv6 routing on VLAN interfaces.

Configuring Routing Interfaces

Configures global unicast and link-local IPv6 addresses on interfaces.

Configuring Static Routes

Configures IPv6 static routes in router global configuration mode.

Configuring Security Features

Security Mode Configuration

Determines how the switch performs cryptographic functions.

About the Security Mode

Explains Normal and FIPS 140-2 modes and their impact on cryptographic functions.

Configuring the Security Mode

Lists commands to configure the security mode of the switch.

IPsec Configuration

Provides functionality of current IPsec implementation on Fixed Switches.

IPsec Configuration

Lists commands to configure IPsec parameters and enable/disable IPsec on RADIUS servers.

RADIUS Management Authentication

Explains MS-CHAPv2 management authentication and supported RADIUS attributes.

MAC Locking

Locks MAC addresses to ports, preventing unauthorized device connections.

MAC Locking Configuration

Lists commands to configure MAC locking on the Fixed Switch platforms.

TACACS+

TACACS+ is a security protocol alternative to RADIUS for authentication, authorization, accounting.

Basic TACACS+ Configuration

Steps to configure TACACS+ servers, including IP address, port, secret, and authorization.

Service ACLs

Provides security for switch management features by allowing only known trusted devices access.

Configuring a Service Access Control List

Configures a service access control list with unique priority rules.

DHCP Snooping

Monitors DHCP messages to filter harmful messages and build a bindings database.

Dynamic ARP Inspection

Rejects invalid and malicious ARP packets to prevent man-in-the-middle attacks.

Basic Configuration

Lists commands used to configure DAI.

Related product manuals