EasyManua.ls Logo

Enterasys C5G124-24 - Page 13

Enterasys C5G124-24
452 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
xi
About Security Audit Logging ....................................................................................................................... 14-6
Security Events Logged ......................................................................................................................... 14-7
Trap Generation ..................................................................................................................................... 14-7
Format Examples ................................................................................................................................... 14-8
Configuring Syslog ....................................................................................................................................... 14-8
Syslog Command Precedence ............................................................................................................... 14-8
About Server and Application Severity Levels ....................................................................................... 14-9
Configuring Syslog Server(s) ................................................................................................................. 14-9
Example............................................................................................................................................14-9
Modifying Syslog Server Defaults ........................................................................................................ 14-10
Displaying System Logging Defaults..............................................................................................14-10
Modifying Default Settings..............................................................................................................14-10
Reviewing and Configuring Logging for Applications ........................................................................... 14-10
Displaying Current Application Severity Levels..............................................................................14-11
Enabling Console Logging and File Storage ........................................................................................ 14-11
Displaying to the Console and Saving to a File..............................................................................14-11
Configuration Examples ....................................................................................................................... 14-12
Enabling a Server and Console Logging ........................................................................................14-12
Adjusting Settings to Allow for Logging at the Debug Level...........................................................14-12
Chapter 15: Configuring Spanning Tree
Spanning Tree Protocol Overview ................................................................................................................ 15-1
Why Use Spanning Trees? .................................................................................................................... 15-2
Spanning Tree on Enterasys Platforms ................................................................................................. 15-2
STP Operation .............................................................................................................................................. 15-3
Rapid Spanning Tree Operation ............................................................................................................ 15-4
Multiple Spanning Tree Operation ......................................................................................................... 15-4
Functions and Features Supported on Enterasys Devices ..........................................................................15-6
Spanning Tree Versions ......................................................................................................................... 15-6
Maximum SID Capacities ....................................................................................................................... 15-6
Network Diameter .................................................................................................................................. 15-6
Port Forwarding ...................................................................................................................................... 15-6
Disabling Spanning Tree ........................................................................................................................ 15-7
STP Features ......................................................................................................................................... 15-7
SpanGuard .......................................................................................................................................15-7
Loop Protect .....................................................................................................................................15-7
Updated 802.1t.................................................................................................................................15-8
Multisource Detection.......................................................................................................................15-8
Spanning Tree Basics .................................................................................................................................. 15-9
Spanning Tree Bridge Protocol Data Units ............................................................................................ 15-9
Electing the Root Bridge ........................................................................................................................ 15-9
Assigning Path Costs ............................................................................................................................. 15-9
Paths to Root ....................................................................................................................................... 15-10
Identifying Designated, Alternate, and Backup Port Roles .................................................................. 15-12
Assigning Port States ........................................................................................................................... 15-13
RSTP Operation ................................................................................................................................... 15-14
MSTP Operation .................................................................................................................................. 15-14
Common and Internal Spanning Tree (CIST).................................................................................15-14
MST Region....................................................................................................................................15-15
Multiple Spanning Tree Instances (MSTI) ......................................................................................15-16
Configuring STP and RSTP ........................................................................................................................ 15-19
Reviewing and Enabling Spanning Tree .............................................................................................. 15-20
Example..........................................................................................................................................15-20
Adjusting Spanning Tree Parameters .................................................................................................. 15-20
Setting Bridge Priority Mode and Priority........................................................................................15-21

Table of Contents

Other manuals for Enterasys C5G124-24

Related product manuals