SecureStack C2 Configuration Guide xxvii
About This Guide
WelcometotheEnterasysNetworksSecureStackC2ConfigurationGuide.Thismanualexplains
howtoaccessthedevice’sCommandLineInterface(CLI)andhowtouseittoconfigure
SecureStackC2switchdevices.
Using This Guide
AgeneralworkingknowledgeofbasicnetworkoperationsandanunderstandingofCLI
managementapplicationsishelpfulbeforeconfiguringtheSecureStackdevice.
Thismanualdescribeshowtodothefollowing:
• AccesstheSecureStackCLI.
•UseCLIcommandstoperformnetworkmanagementanddeviceconfigurationoperations
•EstablishandmanageVirtualLocalAreaNetworks
(VLANs).
•Establishandmanagestaticanddynamically‐assignedpolicyclassifications.
•Establishandmanagepriorityclassification.
• ConfigureIProutingandroutingprotocols,includingRIPversions1and2,OSPF,DVMRP,
IRDP,andVRRP.
• Configuresecurityprotocols,including802.1XandRADIUS,SSHv2,MAClocking,andMAC
authentication.
• Configureaccesscontrollists(ACLs).
Structure of This Guide
Theguideisorganizedasfollows:
Chapter 1,Introduction,providesanoverviewofthetasksthatcanbeaccomplishedusingthe
CLIinterface,anoverviewoflocalmanagementrequirements,anoverviewofthedevice’sfactory
defaultsettings,andinformationaboutusingtheCommandLineInterface(CLI).
Chapter 2,ConfiguringSwitchesina
Stack,providesinformationabouthowtoconfigureand
managestackedswitches.
Chapter 3,BasicConfiguration,provideshowtosetbasicsystemproperties,howtodownloada
firmwareimage,howtoconfigureWebViewandTelnet,howtomanageconfigurationfiles,how
tosettheloginpassword,andhowtoexittheCLI.
Chapter 4,DiscoveryProtocolConfigurationprovideshowtoconfigurediscoveryprotocols
supportedbythedevice.
Important Notice
Depending on the firmware version used in your SecureStack device, some features described in
this document may not be supported. Refer to the Release Notes shipped with your device to
determine which features are supported.