EasyManua.ls Logo

Enterasys SecureStack C2 User Manual

Enterasys SecureStack C2
607 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #3 background image
i
Notice
EnterasysNetworksreservestherighttomakechangesinspecificationsandotherinformationcontainedinthisdocumentand
itswebsitewithoutpriornotice.ThereadershouldinallcasesconsultEnterasysNetworkstodeterminewhetheranysuch
changeshavebeenmade.
Thehardware,firmware,orsoftwaredescribedinthisdocument
issubjecttochangewithoutnotice.
INNOEVENTSHALLENTERASYSNETWORKSBELIABLEFORANYINCIDENTAL,INDIRECT,SPECIAL,OR
CONSEQUENTIALDAMAGESWHATSOEVER(INCLUDINGBUTNOTLIMITEDTOLOSTPROFITS)ARISINGOUTOF
ORRELATEDTOTHISDOCUMENT,WEBSITE,ORTHEINFORMATIONCONTAINEDINTHEM,EVENIFENTERASYS
NETWORKSHAS
BEENADVISEDOF,KNEWOF,ORSHOULDHAVEKNOWNOF,THEPOSSIBILITYOFSUCH
DAMAGES.
EnterasysNetworks,Inc.
50MinutemanRoad
Andover,MA01810
©2008Enterasys Networks, Inc. All rights reserved.
PartNumber: 903399116 February 2008
ENTERASYS,ENTERASYSNETWORKS,ENTERASYSNETSIGHT,WEBVIEW,ENTERASYSSECURESTACK, and any
logosassociatedtherewith,aretrademarksorregisteredtrademarks
ofEnterasysNetworks,Inc.intheUnitedStatesandother
countries.
Allotherproductnamesmentionedinthismanualmaybetrademarksorregisteredtrademarksoftheirrespectivecompanies.
DocumentationURL:http://www.enterasys.com/support/manuals
DocumentacionURL:http://www.enterasys.com/support/manuals
DokumentationimInternet:http://www.enterasys.com/support/manuals
Version: Information in this guide refers to SecureStack C2 firmware version 5.1.xx

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Enterasys SecureStack C2 and is the answer not in the manual?

Enterasys SecureStack C2 Specifications

General IconGeneral
BrandEnterasys
ModelSecureStack C2
CategorySwitch
LanguageEnglish

Summary

Chapter 1: Introduction

SecureStack C2 CLI Overview

Provides an overview of tasks manageable via the CLI interface, including network management and switch configuration operations.

Switch Management Methods

Describes the methods available for managing the SecureStack C2 switch, including local and remote access options.

Factory Default Settings

Lists the default settings for basic switch and router operations, covering various features and protocols.

Using the Command Line Interface

Explains how to start a CLI session, navigate, and utilize CLI commands, including help and keyword lookups.

Chapter 2: Configuring Switches in a Stack

About SecureStack C2 Switch Operation in a Stack

Explains how SecureStack C2 switches operate and perform when configured in a stack, up to eight units.

Installing a New Stackable System of Up to Eight Units

Provides a procedure for installing a new stackable system of up to eight units out of the box.

Installing Previously-Configured Systems in a Stack

Details the procedure for installing previously configured member units into a stack, including renumbering.

Adding a New Unit to an Existing Stack

Outlines the procedure for adding a new unit to an existing stack configuration, assuming clean manufacturing configuration.

Creating a Virtual Switch Configuration

Describes how to create a virtual switch configuration before adding a physical device to a stack, including port configuration.

Considerations About Using Clear Config in a Stack

Discusses considerations when using the clear config command in a stack environment, including clearing unit IDs and stack parameters.

Issues Related to Mixed Type Stacks

Addresses issues related to mixing SecureStack C2 and C3 switches in a stack, focusing on feature support and common firmware versions.

Stacking Configuration and Management Commands

Lists and describes commands for reviewing, individually configuring, and managing switches within a SecureStack C2 stack.

Chapter 3: Basic Configuration

Setting User Accounts and Passwords

Explains how to change default user login and password settings, and add new user accounts and passwords.

Configuring Power over Ethernet (PoE)

Details how to review and set PoE parameters, including power availability, usage thresholds, and per-port settings.

Downloading a New Firmware Image

Describes methods for upgrading the operational firmware of the SecureStack C2 switch without physical access.

Reviewing and Selecting a Boot Firmware Image

Explains how to display and set the firmware image the switch loads at startup, including storing a backup image.

Starting and Configuring Telnet

Covers enabling or disabling Telnet and starting a Telnet session to a remote host, including simultaneous session limits.

Managing Switch Configuration and Files

Discusses configuration persistence modes, saving configurations, managing files, and TFTP parameters.

Clearing and Closing the CLI

Provides instructions on how to clear the CLI screen or close the CLI session.

Resetting the Switch

Explains how to reset the switch or specific units, and clear user-defined configuration parameters.

Using and Configuring WebView

Details how to use WebView, the embedded web server, for switch configuration and management tasks, including SSL usage.

Chapter 4: Discovery Protocol Configuration

Configuring CDP

Explains how to review and configure the Enterasys CDP discovery protocol for discovering network topology and neighboring devices.

Configuring Cisco Discovery Protocol

Describes how to review and configure the Cisco discovery protocol for discovering network topology and recognizing PDUs from Cisco phones.

Configuring Link Layer Discovery Protocol and LLDP-MED

Covers Link Layer Discovery Protocol (LLDP) and LLDP-MED, enabling network devices to advertise identities and capabilities.

Chapter 5: Port Configuration

Port Configuration Summary

Provides a summary of switch ports, including types and specifications for different SecureStack C2 models.

Port String Syntax Used in the CLI

Explains the CLI syntax for designating VLANs and port numbers.

Reviewing Port Status

Describes how to display operating status, duplex mode, speed, port type, and statistical information about switch ports.

Disabling / Enabling and Naming Ports

Covers disabling/enabling ports and assigning aliases for convenience or troubleshooting network issues.

Setting Speed and Duplex Mode

Explains how to review and set operational speed and duplex mode for ports, applicable when auto-negotiation is disabled.

Enabling / Disabling Jumbo Frame Support

Details how to enable or disable jumbo frame support on ports, allowing Gigabit Ethernet ports to transmit frames up to 10 KB.

Setting Auto-Negotiation and Advertised Ability

Covers reviewing, disabling, or enabling auto-negotiation and configuring port advertisement for speed and duplex.

Setting Flow Control

Explains how to review, enable, or disable port flow control to manage transmission between devices as specified by IEEE 802.3x.

Setting Port Link Traps and Link Flap Detection

Covers disabling/enabling link traps, displaying link trap status, and configuring link flapping detection.

Configuring Broadcast Suppression

Details how to review and set the broadcast suppression threshold per port to limit received broadcast frames.

Port Mirroring

Explains how to mirror or redirect traffic on a port for network traffic analysis and connection assurance.

Link Aggregation Control Protocol (LACP)

Describes how LACP logically groups interfaces to create greater bandwidth uplinks or link aggregations according to IEEE 802.3ad.

Configuring Protected Ports

Explains the Protected Port feature to prevent ports from forwarding traffic to other protected ports in the same VLAN.

Chapter 6: SNMP Configuration

SNMP Configuration Summary

Provides an overview of SNMP, its versions, and components for network management.

SNMPv1 and SNMPv2c

Describes the components of SNMPv1 and SNMPv2c network management, categorized into managed devices, agents, and applications.

SNMPv3

Details SNMPv3, an interoperable standards-based protocol providing secure access with message integrity, authentication, and encryption.

About SNMP Security Models and Levels

Explains SNMP security models and levels (NoAuthNoPriv, AuthNoPriv, authPriv) for authentication and encryption.

Using SNMP Contexts to Access Specific MIBs

Covers accessing SNMP MIB objects using contexts, allowing restriction of switch management access to specified MIBs.

Reviewing SNMP Statistics

Explains how to review SNMP statistics and provides details on commands for configuring SNMP.

Chapter 7: Spanning Tree Configuration

Spanning Tree Configuration Summary

Provides a summary of Spanning Tree configuration, including Single, Rapid, and Multiple Spanning Tree Protocols.

Spanning Tree Features

Lists the functions of the SecureStack C2 device in meeting Spanning Tree Protocol requirements, such as topology management and failure compensation.

Loop Protect

Details the Loop Protect feature that prevents or short-circuits loop formation in networks with redundant paths.

Configuring Spanning Tree Bridge Parameters

Explains how to display and set Spanning Tree bridge parameters like priority, hello time, and forward delay.

Chapter 8: 802.1Q VLAN Configuration

VLAN Configuration Summary

Summarizes Virtual LAN capabilities, allowing network partitioning and traffic control within logical groups.

Port String Syntax Used in the CLI

Explains the CLI syntax for designating VLANs and port numbers.

Creating a Secure Management VLAN

Describes how to create a management-only VLAN for secure device management and access control.

Viewing VLANs

Explains how to display VLANs, their creation methods, port assignments, and traffic transmission behavior.

Creating and Naming Static VLANs

Details the process of creating new static VLANs or enabling/disabling existing VLANs using CLI commands.

Assigning Port VLAN IDs (PVIDs) and Ingress Filtering

Covers assigning default VLAN IDs to untagged frames, configuring VLAN ingress filtering, and setting frame discard modes.

Configuring the VLAN Egress List

Explains how to assign or remove ports from a particular VLAN's egress list to control frame transmission eligibility.

Setting the Host VLAN

Describes how to configure a host VLAN that allows access only to designated devices for secure management tasks.

Enabling/Disabling GVRP (GARP VLAN Registration Protocol)

Details the GVRP purpose for dynamically creating VLANs across a switched network and its operation.

Chapter 9: Policy Classification Configuration

Policy Classification Configuration Summary

Summarizes SecureStack C2 device capabilities for policy profile-based provisioning of network resources.

Configuring Policy Profiles

Explains how to create, change, and remove user profiles based on business-driven policies for managing network resources.

Configuring Classification Rules

Covers reviewing, creating, assigning, and unassigning classification rules to policy profiles, mapping user profiles to frame filtering policies.

Assigning Ports to Policy Profiles

Details how to assign or unassign ports to policy profiles, ensuring only activated ports transmit frames accordingly.

Configuring Policy Class of Service (CoS)

Explains how to assign mission-critical data higher priority by delaying less critical traffic, implementing priority queueing mechanisms.

Chapter 10: Port Priority and Rate Limiting Configuration

Port Priority Configuration Summary

Summarizes the Class of Service (CoS) capabilities for assigning mission-critical data higher priority and rate limiting inbound traffic.

Configuring Port Priority

Explains how to view or configure port priority characteristics, including default CoS transmit priority and traffic class mapping.

Configuring Priority to Transmit Queue Mapping

Details how to map 802.1D (802.1p) priorities to transmit queues for prioritizing traffic on ports.

Configuring Quality of Service (QoS)

Covers setting priority mode and weight for transmit queues on physical ports, excluding LAGs.

Configuring Port Traffic Rate Limiting

Explains how to limit inbound traffic rate on a per port/priority basis, dropping frames when the programmed limit is exceeded.

Chapter 11: IGMP Configuration

IGMP Overview

Describes the Internet Group Management Protocol (IGMP) for host-to-device communication regarding multicast traffic.

Configuring IGMP at Layer 2

Explains how to configure IGMP snooping from the switch CLI to manage multicast group membership and optimize switched network performance.

Configuring IGMP on Routing Interfaces

Details how to configure IGMP on routing interfaces, applicable when the device is in router mode.

Chapter 12: Logging and Network Management

Configuring System Logging

Covers displaying and configuring system logging, including Syslog server settings, default settings, and logging buffer management.

Monitoring Network Events and Status

Explains how to display switch events and command history, set history buffer size, and display/disconnect user sessions.

Managing Switch Network Addresses and Routes

Covers displaying or deleting switch ARP table entries and displaying MAC address information.

Configuring Simple Network Time Protocol (SNTP)

Details how to configure SNTP for synchronizing device clocks across a network, including client settings and server configuration.

Configuring Node Aliases

Explains how to review, disable, and re-enable node (port) alias functionality to determine running network protocols.

Chapter 13: RMON Configuration

RMON Monitoring Group Functions

Lists RMON monitoring groups, their functions, monitored elements, and associated configuration commands for network fault diagnosis.

Statistics Group Commands

Covers displaying, configuring, and clearing RMON statistics measured by the RMON probe for each monitored interface.

History Group Commands

Details how to display, configure, and clear RMON history properties and statistics, recording periodic samples.

Alarm Group Commands

Explains how to display, configure, and clear RMON alarm entries and properties, generating events when thresholds are crossed.

Event Group Commands

Covers displaying and clearing RMON events, and configuring RMON event properties for notification.

Filter Group Commands

Details RMON channel and filter configuration, allowing packet capture based on filter matches.

Packet Capture Commands

Explains how to display, configure, enable/disable capture entries, and clear capture entries for network analysis.

Chapter 14: DHCP Server Configuration

DHCP Overview

Describes Dynamic Host Configuration Protocol (DHCP) for IPv4, including automatic/manual IP assignment and relay agent functions.

DHCP Relay Agent

Explains how the DHCP/BOOTP relay agent function can be configured on routing interfaces to forward client requests to a DHCP server.

DHCP Server

Details DHCP server functionality for providing IP configuration information to clients and mechanisms for IP address allocation.

Configuring a DHCP Server

Outlines methods to configure a DHCP server by associating address pools with host port IP or routed interfaces.

Configuring General DHCP Server Parameters

Covers configuring DHCP server parameters, displaying, and clearing address binding information, server statistics, and conflict information.

Configuring IP Address Pools

Explains how to configure and clear DHCP address pool parameters and display address pool configuration information.

Chapter 15: Preparing for Router Mode

Pre-Routing Configuration Tasks

Lists essential pre-routing tasks required before executing IP configuration and router-specific commands.

Enabling Router Configuration Modes

Describes different CLI modes for router operation, enabling subsets of commands from each mode.

Activating Licensed Features

Explains how to activate license keys to enable advanced features like advanced routing protocols such as OSPF, DVMRP, VRRP, and PIM-SM.

Chapter 16: IP Configuration

Configuring Routing Interface Settings

Details enabling routing interface configuration, creating routing interfaces, reviewing IP usability, setting IP addresses, and enabling IP routing.

Reviewing and Configuring the ARP Table

Covers reviewing and configuring the routing ARP table, enabling proxy ARP, and setting MAC addresses on interfaces.

Configuring Broadcast Settings

Explains how to configure IP broadcast settings, specifically enabling or disabling IP directed broadcasts.

Reviewing IP Traffic and Configuring Routes

Describes how to review IP traffic, configure routes, send ICMP messages, and execute traceroute.

Chapter 17: IPv4 Routing Protocol Configuration

Activating Advanced Routing Features

Explains the need for a license key to enable advanced routing protocols like OSPF, DVMRP, VRRP, and PIM-SM.

Configuring RIP

Details how to enable and configure the Routing Information Protocol (RIP) for routing information exchange.

Configuring OSPF

Provides instructions for enabling and configuring the Open Shortest Path First (OSPF) routing protocol, including interface parameters and areas.

Configuring DVMRP

Explains how to enable and configure the Distance Vector Multicast Routing Protocol (DVMRP) on an interface for routing multicast traffic.

Configuring IRDP

Describes how to enable and configure the ICMP Router Discovery Protocol (IRDP) on an interface, allowing hosts to determine router addresses.

Configuring VRRP

Details how to enable and configure the Virtual Router Redundancy Protocol (VRRP) to eliminate single points of failure in routing environments.

Configuring PIM-SM

Covers enabling and configuring Protocol Independent Multicast in Sparse Mode (PIM-SM) for dynamically learning multicast traffic forwarding.

Chapter 18: Security Configuration

Overview of Security Methods

Reviews available security methods for controlling user access, monitoring, and managing the switch, including login, HACA, SNMP, and 802.1X.

RADIUS Filter-ID Attribute and Dynamic Policy Profile Assignment

Explains how RADIUS Filter-ID attributes dynamically assign policy profiles and management levels to users upon successful authentication.

Configuring RADIUS

Details how to review, enable/disable RADIUS client/server configuration, set login options, server parameters, and accounting servers.

Configuring 802.1X Authentication

Covers reviewing and configuring 802.1X authentication for ports using EAPOL for network access control based on RADIUS server authorization.

Configuring MAC Authentication

Explains how to review, disable, enable, and configure MAC authentication for securely authenticating source MAC addresses.

Configuring Multiple Authentication Methods

Discusses enabling multiple authentication types (MAC, 802.1X, PWA) on the same port and configuring system authentication modes.

Configuring VLAN Authorization (RFC 3580)

Details how RFC 3580 Tunnel Attributes contain 802.1X authenticated users to a VLAN, assigning ports based on RADIUS results.

Configuring MAC Locking

Covers reviewing, disabling, enabling, and configuring MAC locking to restrict unauthorized devices and prevent MAC spoofing on ports.

Configuring Port Web Authentication (PWA)

Explains how to review, enable, disable, and configure Port Web Authentication for user login and network access control.

Configuring Secure Shell (SSH)

Details how to review, enable, disable, and configure the Secure Shell (SSH) protocol for secure Telnet access.

Configuring Access Lists

Covers reviewing and configuring security access control lists (ACLs) to permit or deny access to routing interfaces based on protocol and IP address restrictions.

Related product manuals