SecureStack C2 Configuration Guide xxix
About This Guide
WelcometotheEnterasys
®
SecureStack™C2ConfigurationGuide.Thismanualexplainshowto
accessthedevice’sCommandLineInterface(CLI)andhowtouseittoconfigureSecureStackC2
switchdevices.
Using This Guide
Ageneralworkingknowledgeofbasicnetwork operationsandanunderstandingofCLI
managementapplicationsishelpfulbeforeconfiguringtheSecureStackdevice.
Thismanualdescribeshowtodothefollowing:
• AccesstheSecureStackCLI.
•UseCLIcommandstoperformnetwork managementanddeviceconfigurationoperations
•EstablishandmanageVirtualLocalAreaNetworks
(VLANs).
•Establishandmanagestaticanddynamically‐assignedpolicyclassifications.
•Establishandmanagepriorityclassification.
• ConfigureIProutingandroutingprotocols,includingRIPversions1and2,OSPF,DVMRP,
IRDP,andVRRP.
• Configuresecurityprotocols,including802.1XandRADIUS,SSHv2,MAClocking,andMAC
authentication.
• Configureaccesscontrollists(ACLs).
Structure of This Guide
Theguideisorganizedasfollows:
Chapter 1,Introduction,providesanoverviewofthetasksthatcanbeaccomplishedusingthe
CLIinterface,anoverviewoflocalmanagementrequirements,anoverviewofthedevice’sfactory
defaultsettings,andinformationaboutusingthe CommandLineInterface(CLI).
Chapter 2,ConfiguringSwitchesinaStack
,providesinformationabouthowtoconfigureand
managestackedswitches.
Chapter 3,BasicConfiguration,provideshowtosetbasicsystemproperties,howtodownloada
firmwareimage,howtoconfigureWebViewandTelnet,howtomanageconfigurationfiles,how
tosettheloginpassword,andhowtoexittheCLI.
Chapter 4
,ActivatingLicensedFeatures,describesthecommandsusedtoenablelicensed
features.
Important Notice
Depending on the firmware version used in your SecureStack device, some features described in
this document may not be supported. Refer to the Release Notes shipped with your device to
determine which features are supported.