EasyManua.ls Logo

GE Multilink ML3000 - Page 11

GE Multilink ML3000
356 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
TOC TABLE OF CONTENTS
MULTILINK ML3000 ETHERNET COMMUNICATIONS SWITCH – INSTRUCTION MANUAL TOC–3
5: IP ADDRESSING IP ADDRESS AND SYSTEM INFORMATION .................................................................................5-1
O
VERVIEW ................................................................................................................................5-1
IMPORTANCE OF AN IP ADDRESS .................................................................................................5-3
DHCP
AND BOOTP .................................................................................................................5-3
BOOTP DATABASE ....................................................................................................................5-3
C
ONFIGURING DHCP/BOOTP/MANUAL/AUTO ................................................................5-3
U
SING TELNET .........................................................................................................................5-5
SETTING PARAMETERS ......................................................................................................................5-8
S
ETTING SERIAL PORT PARAMETERS ....................................................................................5-8
S
YSTEM PARAMETERS .............................................................................................................5-8
D
ATE AND TIME .......................................................................................................................5-10
N
ETWORK TIME .......................................................................................................................5-10
SYSTEM CONFIGURATION ................................................................................................................5-14
S
AVING AND LOADING – COMMAND LINE ..........................................................................5-14
C
ONFIG FILE .............................................................................................................................5-14
D
ISPLAYING CONFIGURATION ................................................................................................5-17
S
AVING CONFIGURATION .......................................................................................................5-20
S
CRIPT FILE ..............................................................................................................................5-22
S
AVING AND LOADING – ENERVISTA SOFTWARE ...............................................................5-23
H
OST NAMES ...........................................................................................................................5-25
E
RASING CONFIGURATION .....................................................................................................5-27
IPV6 ............................................................................................................................................................5-31
I
NTRODUCTION TO IPV6 .........................................................................................................5-31
W
HATS CHANGED IN IPV6? .................................................................................................5-31
IP
V6 ADDRESSING ..................................................................................................................5-32
C
ONFIGURING IPV6 ................................................................................................................5-32
L
IST OF COMMANDS IN THIS CHAPTER .................................................................................5-34
6: ACCESS
CONSIDERATIONS
SECURING ACCESS ..............................................................................................................................6-1
D
ESCRIPTION ............................................................................................................................6-1
P
ASSWORDS .............................................................................................................................6-1
P
ORT SECURITY FEATURE .......................................................................................................6-2
CONFIGURING PORT SECURITY THROUGH THE COMMAND LINE INTERFACE .........6-3
C
OMMANDS ..............................................................................................................................6-3
A
LLOWING MAC ADDRESSES ...............................................................................................6-4
S
ECURITY LOGS .......................................................................................................................6-8
A
UTHORIZED MANAGERS .......................................................................................................6-10
CONFIGURING PORT SECURITY WITH ENERVISTA SOFTWARE .......................................6-12
C
OMMANDS ..............................................................................................................................6-12
L
OGS .........................................................................................................................................6-14
A
UTHORIZED MANAGERS .......................................................................................................6-16
7: ACCESS USING RADIUS INTRODUCTION TO 802.1X ..............................................................................................................7-1
D
ESCRIPTION ............................................................................................................................7-1
802.1
X PROTOCOL .................................................................................................................7-1
CONFIGURING 802.1X THROUGH THE COMMAND LINE INTERFACE ...........................7-4
C
OMMANDS ..............................................................................................................................7-4
E
XAMPLE ...................................................................................................................................7-6
CONFIGURING 802.1X WITH ENERVISTA SECURE WEB MANAGEMENT SOFTWARE 7-9
C
OMMANDS ..............................................................................................................................7-9

Table of Contents

Related product manuals