EasyManua.ls Logo

Enterasys SecureStack C2 C2G170-24 User Manual

Enterasys SecureStack C2 C2G170-24
698 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
Enterasys
®
SecureStack
C2
Stackable Switches
Configuration Guide
Firmware Version 5.02.xx.xxxx
P/N 9033991-17

Table of Contents

Other manuals for Enterasys SecureStack C2 C2G170-24

Question and Answer IconNeed help?

Do you have a question about the Enterasys SecureStack C2 C2G170-24 and is the answer not in the manual?

Enterasys SecureStack C2 C2G170-24 Specifications

General IconGeneral
BrandEnterasys
ModelSecureStack C2 C2G170-24
CategorySwitch
LanguageEnglish

Summary

About This Guide

Using This Guide

General network operations and CLI management knowledge are helpful for configuring the SecureStack device.

Structure of This Guide

The guide is organized into chapters covering various configuration tasks, from introduction to advanced features.

Related Documents

Lists Enterasys Networks documents that may help with setup, control, and management of the SecureStack device.

Conventions Used in This Guide

Explains conventions used in the text, including font types and icons.

Getting Help

Provides methods to contact Enterasys Networks for support, including web, phone, and internet mail.

Chapter 1: Introduction

SecureStack C2 CLI Overview

Overview of SecureStack C2 CLI interface capabilities for network management and configuration.

Switch Management Methods

Describes methods for managing the SecureStack C2 switch, including local and remote connections.

Factory Default Settings

Lists factory default settings for basic switch operation, including CDP, EAPOL, and IP configurations.

Using the Command Line Interface

Explains how to navigate the CLI, get help, and use basic line editing commands.

Chapter 2: Configuring Switches in a Stack

About SecureStack C2 Switch Operation in a Stack

Explains how SecureStack C2 products are stackable switches that provide a management platform for a group of up to eight units.

Installing a New Stackable System of Up to Eight Units

Procedure for installing a new stack of up to eight units out of the box, including physical connections and power-on sequence.

Installing Previously-Configured Systems in a Stack

Procedure for installing previously configured member units into a stack, including renumbering.

Adding a New Unit to an Existing Stack

Procedure for installing a new unit into an existing stack, assuming clean configuration and same firmware version.

Creating a Virtual Switch Configuration

Process for creating a virtual switch configuration before adding a physical device to a stack.

Considerations About Using Clear Config in a Stack

Important points to remember when using the clear config command in a stack environment.

Issues Related to Mixed Type Stacks

Discusses functionality differences between SecureStack C2 and C3 switches when mixed in a stack.

Stacking Configuration and Management Commands

Lists and describes commands for reviewing, configuring, and managing switches in a SecureStack C2 stack.

Chapter 3: Basic Configuration

Quick Start Setup Commands

Quick reference for CLI commands needed to begin basic C2 switch operation, including password and IP setup.

Setting User Accounts and Passwords

Guides on changing default user login and password settings, and adding new user accounts.

Setting Basic Switch Properties

Procedures for displaying and setting system IP address and other basic system properties.

Downloading a Firmware Image

Explains how to upgrade firmware via TFTP or serial port, and store dual images.

Reverting to a Previous Image

Steps to downgrade to a previous version of code, including backing up configuration.

Reviewing and Selecting a Boot Firmware Image

Instructions to display and set the image file the switch loads at startup.

Starting and Configuring Telnet

Steps to enable or disable Telnet and start a Telnet session to a remote host.

Managing Switch Configuration and Files

Covers configuration persistence modes, saving configurations, and file management commands.

Clearing and Closing the CLI

Procedures to clear the CLI screen or close the CLI session.

Resetting the Switch

Instructions to reset one or more switches and clear user-defined configuration parameters.

Using and Configuring WebView

Explains how to verify status and enable/disable WebView, the embedded web server.

Gathering Technical Support Information

Describes how to gather common technical support information for troubleshooting.

Chapter 4: Activating Licensed Features

Chapter 5: Configuring System Power and PoE

Important Notice

Important notice regarding commands applying only to PoE-equipped devices and consulting the Installation Guide.

Chapter 6: Discovery Protocol Configuration

Configuring CDP

How to review and configure the Enterasys CDP discovery protocol to discover network topology.

Configuring Cisco Discovery Protocol

How to review and configure the Cisco discovery protocol to discover network topology and recognize PDUs from Cisco phones.

Configuring Link Layer Discovery Protocol and LLDP-MED

Overview of LLDP and LLDP-MED, their benefits, and how they send and receive information.

Chapter 7: Port Configuration

Port Configuration Summary

Provides a summary of port types and connections for various SecureStack C2 models.

Reviewing Port Status

How to display operating status, duplex mode, speed, and traffic statistics for ports.

Disabling / Enabling and Naming Ports

Procedures to disable/enable ports and assign an alias to a port.

Setting Speed and Duplex Mode

How to review and set operational speed and duplex mode for ports.

Enabling / Disabling Jumbo Frame Support

How to enable and disable jumbo frame support on ports for Gigabit Ethernet.

Setting Auto-Negotiation and Advertised Ability

How to review, disable/enable auto-negotiation, and configure port advertisement.

Setting Flow Control

How to review, enable, or disable port flow control to manage transmission between devices.

Setting Port Link Traps and Link Flap Detection

How to configure link flap detection function and disable/re-enable link traps.

Configuring Broadcast Suppression

How to review and set the broadcast suppression threshold per port to limit broadcast frames.

Port Mirroring

How to configure port mirroring to redirect traffic for analysis and connection assurance.

Link Aggregation Control Protocol (LACP)

Explains LACP operation, terminology, and how it logically groups interfaces for bandwidth increase.

Configuring Protected Ports

How to use the Protected Port feature to prevent ports from forwarding traffic to each other.

Chapter 8: SNMP Configuration

SNMP Configuration Summary

SNMP is an application-layer protocol for exchanging management information between network devices.

SNMPv1 and SNMPv2c

Describes the initial and second releases of SNMP, including enhancements.

SNMPv3

Describes the most recent version of SNMP with security enhancements like message integrity, authentication, and encryption.

About SNMP Security Models and Levels

Explains authentication strategy for users and groups, and permitted security levels.

Using SNMP Contexts to Access Specific MIBs

How devices allow access to all SNMP MIBs or contexts, and how to specify context for restricted access.

Reviewing SNMP Statistics

Instructions on how to review SNMP statistics.

Configuring SNMP Users, Groups, and Communities

How to review and configure SNMP users, groups, and communities.

Configuring SNMP Access Rights

How to review and configure SNMP access rights, assigning privileges and security levels.

Configuring SNMP MIB Views

How to review and configure SNMP MIB views, which map SNMP objects to access rights.

Configuring SNMP Target Parameters

How to review and configure SNMP target parameters controlling where SNMP notifications are sent.

Configuring SNMP Target Addresses

How to review and configure SNMP target addresses that receive SNMP notification messages.

Configuring SNMP Notification Parameters

How to configure SNMP notification parameters and optional filters.

Creating a Basic SNMP Trap Configuration

Example of SNMP trap configuration showing association of parameters with criteria and mapping to a target address.

Chapter 9: Spanning Tree Configuration

Spanning Tree Configuration Summary

Summary of Spanning Tree Configuration commands and their usage.

Overview: Single, Rapid, and Multiple Spanning Tree Protocols

Explains STP, RSTP, and MSTP protocols for resolving physical loops in networks.

Spanning Tree Features

Lists functions performed by the SecureStack C2 device for Spanning Tree Protocols.

Loop Protect

Describes the Loop Protect feature for preventing or short-circuiting loop formation in networks with redundant paths.

Configuring Spanning Tree Bridge Parameters

How to display and set Spanning Tree bridge parameters like priority, hello time, and path cost.

Configuring Spanning Tree Port Parameters

How to display and set Spanning Tree port parameters.

Configuring Spanning Tree Loop Protect Parameters

How to display and set global, per port, and per SID Loop Protect parameters.

Chapter 10: 802.1Q VLAN Configuration

VLAN Configuration Summary

Summary of SecureStack C2 system capabilities to implement 802.1Q virtual LANs (VLANs).

Port String Syntax Used in the CLI

Explains the syntax for designating VLANs and port numbers in CLI commands.

Creating a Secure Management VLAN

Procedure to create a management-only VLAN for secure access to device management tasks.

Viewing VLANs

How to display configured VLANs, port allowances, and traffic transmission with VLAN tags.

Creating and Naming Static VLANs

Procedures to create a new static VLAN or enable/disable existing VLANs and assign names.

Assigning Port VLAN IDs (PVIDs) and Ingress Filtering

How to assign default VLAN IDs, configure ingress filtering, and set frame discard mode.

Configuring the VLAN Egress List

How to assign or remove ports on the egress list of a VLAN to determine transmit eligibility.

Setting the Host VLAN

How to configure a host VLAN for access by select devices, securing the host port for management tasks.

Enabling/Disabling GVRP (GARP VLAN Registration Protocol)

Describes the device operation under GARP application for dynamic VLAN creation across a switched network.

Chapter 11: Policy Classification Configuration

Policy Classification Configuration Summary

Summary of SecureStack C2 devices' support for policy profile-based provisioning of network resources.

Configuring Policy Profiles

How to review, create, change, and remove user profiles related to business-driven policies.

Configuring Classification Rules

How to review, create, assign, and unassign classification rules to policy profiles.

Assigning Ports to Policy Profiles

How to assign and unassign ports to policy profiles.

Configuring Policy Class of Service (CoS)

How to assign mission-critical data to higher priority by delaying less critical traffic during congestion.

Chapter 12: Port Priority and Rate Limiting Configuration

Port Priority Configuration Summary

Summary of commands for configuring port priority characteristics.

Configuring Port Priority

How to view or configure port priority characteristics, including default CoS transmit priority.

Configuring Priority to Transmit Queue Mapping

How to view port priority to transmit queue mapping and configure ports for frame transmission based on priority.

Configuring Quality of Service (QoS)

How to set priority mode and weight for available transmit queues on physical ports.

Configuring Port Traffic Rate Limiting

How to limit the rate of inbound traffic on a per port/priority basis.

Chapter 13: IGMP Configuration

IGMP Overview

Describes IGMP's role in IP multicast group management and how it optimizes switched network performance.

About IP Multicast Group Management

Explains IGMP's mechanism for hosts to inform their device about specific multicast group subscriptions.

About Multicasting

Explains multicasting for real-time applications and network overhead reduction.

Configuring IGMP at Layer 2

Instructions for configuring IGMP snooping from the switch CLI.

Configuring IGMP on Routing Interfaces

How to configure IGMP on routing interfaces.

Chapter 14: Logging and Network Management

Configuring System Logging

How to display and configure system logging, including Syslog server and default settings.

Monitoring Network Events and Status

How to display switch events and command history, set history buffer size, and display/disconnect user sessions.

Managing Switch Network Addresses and Routes

How to display or delete switch ARP table entries and display MAC address information.

Configuring Simple Network Time Protocol (SNTP)

How to configure SNTP to synchronize device clocks in a network.

Configuring Node Aliases

How node alias feature helps determine MAC address and location of end-stations using Layer 3 alias information.

Chapter 15: RMON Configuration

RMON Monitoring Group Functions

RMON provides network fault diagnosis, planning, and performance tuning, extending SNMP MIB capability.

Design Considerations

Constraints for RMON Packet Capture/Filter Sampling and Port Mirroring.

Statistics Group Commands

How to display, configure, and clear RMON statistics.

History Group Commands

How to display, configure, and clear RMON history properties and statistics.

Alarm Group Commands

How to display, configure, and clear RMON alarm entries and properties.

Event Group Commands

How to display and clear RMON events, and configure RMON event properties.

Filter Group Commands

How to display RMON channel and filter entries.

Packet Capture Commands

How to display RMON capture entries, configure, enable, or disable capture entries.

Chapter 16: DHCP Server Configuration

DHCP Overview

DHCP for IPv4 is a network layer protocol for automatic or manual assignment of IP addresses and configuration information.

DHCP Relay Agent

Configurable function on routing interfaces to forward DHCP client requests to a DHCP server on a different network.

DHCP Server

Provides basic IP configuration information to clients using the DHCP protocol.

Configuring General DHCP Server Parameters

How to configure DHCP server parameters, display and clear address binding, server statistics, and conflict information.

Configuring IP Address Pools

How to configure and clear DHCP address pool parameters and display address pool configuration.

Chapter 17: DHCP Snooping and Dynamic ARP Inspection

DHCP Snooping Overview

Monitors DHCP messages to filter harmful messages and build a database of authorized address bindings.

DHCP Message Processing

How the hardware identifies incoming DHCP packets and forwards client messages.

Building and Maintaining the Database

How the DHCP snooping application uses DHCP messages to build and maintain the bindings database.

Rate Limiting

Enforces a rate limit for DHCP packets received on untrusted interfaces to protect against attacks.

Basic Configuration

Basic configuration procedure for DHCP snooping.

DHCP Snooping Commands

Lists commands for configuring DHCP snooping.

Dynamic ARP Inspection Overview

Security feature that rejects invalid and malicious ARP packets by validating sender MAC and source IP addresses.

Basic Configuration

Basic configuration procedure for dynamic ARP inspection.

Dynamic ARP Inspection Commands

Lists commands for configuring dynamic ARP inspection.

Chapter 18: Preparing for Router Mode

Pre-Routing Configuration Tasks

Essential tasks to perform from the switch CLI before configuring routing.

Enabling Router Configuration Modes

Describes different modes of router operation for issuing commands.

Chapter 19: IP Configuration

Configuring Routing Interface Settings

How to enable routing interface configuration, create interfaces, review status, set addresses, and review running configuration.

Reviewing and Configuring the ARP Table

How to review and configure the routing ARP table, enable proxy ARP, and set MAC addresses.

Configuring Broadcast Settings

How to configure IP broadcast settings.

Reviewing IP Traffic and Configuring Routes

How to review IP traffic, configure routes, send router ICMP messages, and execute traceroute.

Configuring ICMP Redirects

How to disable or enable sending ICMP redirect packets to the switch CPU.

Chapter 20: IPv4 Routing Protocol Configuration

Activating Advanced Routing Features

How to activate license keys for advanced routing protocols like OSPF, DVMRP, VRRP, and PIM-SM.

Configuring RIP

How to enable and configure the Routing Information Protocol (RIP).

Configuring OSPF

How to enable and configure the Open Shortest Path First (OSPF) routing protocol.

Configuring DVMRP

How to enable and configure the Distance Vector Multicast Routing Protocol (DVMRP) on an interface.

Configuring IRDP

How to enable and configure the ICMP Router Discovery Protocol (IRDP) on an interface.

Configuring VRRP

How to enable and configure the Virtual Router Redundancy Protocol (VRRP).

Configuring PIM-SM

How to enable and configure Protocol Independent Multicast in Sparse Mode (PIM-SM).

Chapter 21: IPv6 Management

Chapter 22: IPv6 Proxy Routing

Overview

Explains IPv6 proxy routing functionality in mixed C2/C3 stacks for IPv6 unicast routing and tunneling.

Limitations

Discusses limitations of proxy routing, including mask usage and stack bandwidth.

Preparing a Mixed Stack for IPv6 Proxy Routing

Procedure for adding C3 switches to a C2 stack for management redundancy and configuring management priority.

Chapter 23: Authentication and Authorization Configuration

Overview of Authentication and Authorization Methods

Describes available methods for controlling user access, monitoring, and managing the switch.

RADIUS Filter-ID Attribute and Dynamic Policy Profile Assignment

How to use RADIUS Filter-ID to dynamically assign policy profiles or management levels to users.

Configuring RADIUS

Guides on reviewing, enabling/disabling RADIUS client, setting server parameters, and resetting settings.

Configuring 802.1X Authentication

How to review and configure 802.1X authentication for ports using EAPOL for user authorization.

Configuring MAC Authentication

How to review, disable, enable, and configure MAC authentication for source MAC addresses.

Configuring Multiple Authentication Methods

How to allow users to authenticate using multiple methods on the same port.

Configuring VLAN Authorization (RFC 3580)

How to use RADIUS tunnel attributes to place a port into a particular VLAN based on authentication results.

Configuring MAC Locking

How to lock MAC addresses to ports, preventing unauthorized devices and MAC spoofing.

Configuring Port Web Authentication (PWA)

How to review, enable, disable, and configure Port Web Authentication.

Configuring Secure Shell (SSH)

How to review, enable, disable, and configure the Secure Shell (SSH) protocol.

Configuring Access Lists

How to review and configure security access control lists (ACLs) to permit or deny access.

Related product manuals