EasyManua.ls Logo

Enterasys Matrix-V V2H124-24 User Manual

Enterasys Matrix-V V2H124-24
498 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #114 background imageLoading...
Page #114 background image
Configuring the Switch
3-64
3
If a port is disabled (shut down) due to a security violation, it must be manually
re-enabled from the Port/Port Configuration page, see “Configuring Interface
Connections” on page 3-89.
Command Attributes
Port – Port number.
Name – Descriptive text.
Action – Indicates the action to be taken when a port security violation is detected:
- None: No action should be taken. (This is the default.)
- Trap: Send an SNMP trap message.
- Shutdown: Disable the port.
- Trap and Shutdown: Send an SNMP trap message and disable the port.
Security Status Enables or disables port security on the port. (Default: Disabled)
Max MAC Count The maximum number of MAC addresses that can be learned
on a port. (Range: 0 -1024)
Trunk – Trunk number if port is a member.
Web
Click Security, Port Security. Mark the checkbox in the Status column to enable
security for a port, set the maximum number of MAC addresses allowed on a port, and
click Apply.
Figure 3-40. Enabling Port Security
CLI – This example enables port security for Port 5 with the intrusion action to send
a trap and disable the port, and then sets the maximum addresses to learn on the
port to 20.
Console(config)#interface ethernet 1/5
Console(config-if)#port security action trap-and-shutdown 4-98
Console(config-if)#port security max-mac-count 20
Console(config-if)#

Table of Contents

Other manuals for Enterasys Matrix-V V2H124-24

Questions and Answers:

Enterasys Matrix-V V2H124-24 Specifications

General IconGeneral
ModelV2H124-24
Ports24
Uplink Ports4
Power SupplyInternal
Rack MountableYes
PoENo
ManageableYes
Jumbo Frame SupportYes
Humidity10% to 90% non-condensing
TypeSwitch
LayerLayer 2
MAC Address Table Size8K
Dimensions4.4 cm x 44 cm x 38.1 cm
Operating Temperature0 to 40°C
Storage Temperature-20 to 70°C

Summary

Chapter 2: Initial Configuration

Chapter 3: Configuring the Switch

Using the Web Interface

Provides access to switch configuration and statistics via an embedded HTTP Web agent using a standard Web browser.

Setting the IP Address

Explains how to establish IP address information for management access via Manual or Dynamic (DHCP/BOOTP) configuration.

Configuring SNMP

Details SNMP agent configuration, community strings, trap managers, and SNMPv3 security features for network management.

User Authentication

Covers restricting management access via user accounts and authentication settings, including local, RADIUS, TACACS+, and 802.1x port authentication.

VLAN Configuration

Explains creating VLAN groups, assigning ports, configuring VLAN interfaces, and managing VLAN features like GVRP and tagging.

Class of Service Configuration

Allows specification of data packet precedence using priority queues, weighted round-robin, and mapping IP/DSCP priorities to CoS values.

IP Interface Commands

Covers setting IP addresses, default gateways, and managing DHCP/BOOTP client requests for network management access.

DNS Commands

Explains configuring Domain Naming System services, including static host mapping, default domain names, and name server settings.

Chapter 4: Command Line Interface

Using the Command Line Interface

Describes how to access the CLI via console or Telnet, enter commands using keywords and arguments, and utilize command completion and help.

Authentication Commands

Covers switch authentication methods for users logging into the system and port-based authentication using IEEE 802.1x.

Spanning Tree Commands

Includes commands to configure Spanning Tree Algorithm globally and for selected interfaces, covering modes, priorities, and path costs.

VLAN Commands

Explains commands for creating VLAN groups, configuring VLAN interfaces, and managing VLAN features like tagging and GVRP.

Priority Commands

Allows specification of data packet precedence using priority queues, weighted round-robin, and mapping IP/DSCP priorities to CoS values.

Multicast Filtering Commands

Details using IGMP snooping and query to intelligently forward multicast traffic, configure static router ports, and display multicast service members.

Appendix A: Troubleshooting

Related product manuals