TOC TABLE OF CONTENTS
MULTILINK ML3000 ETHERNET COMMUNICATIONS SWITCH – INSTRUCTION MANUAL TOC–3
5: IP ADDRESSING IP ADDRESS AND SYSTEM INFORMATION .................................................................................5-1
O
VERVIEW ................................................................................................................................5-1
IMPORTANCE OF AN IP ADDRESS .................................................................................................5-3
DHCP
AND BOOTP .................................................................................................................5-3
BOOTP DATABASE ....................................................................................................................5-3
C
ONFIGURING DHCP/BOOTP/MANUAL/AUTO ................................................................5-3
U
SING TELNET .........................................................................................................................5-5
SETTING PARAMETERS ......................................................................................................................5-8
S
ETTING SERIAL PORT PARAMETERS ....................................................................................5-8
S
YSTEM PARAMETERS .............................................................................................................5-8
D
ATE AND TIME .......................................................................................................................5-10
N
ETWORK TIME .......................................................................................................................5-10
SYSTEM CONFIGURATION ................................................................................................................5-14
S
AVING AND LOADING – COMMAND LINE ..........................................................................5-14
C
ONFIG FILE .............................................................................................................................5-14
D
ISPLAYING CONFIGURATION ................................................................................................5-17
S
AVING CONFIGURATION .......................................................................................................5-20
S
CRIPT FILE ..............................................................................................................................5-22
S
AVING AND LOADING – ENERVISTA SOFTWARE ...............................................................5-23
H
OST NAMES ...........................................................................................................................5-25
E
RASING CONFIGURATION .....................................................................................................5-27
IPV6 ............................................................................................................................................................5-31
I
NTRODUCTION TO IPV6 .........................................................................................................5-31
W
HAT’S CHANGED IN IPV6? .................................................................................................5-31
IP
V6 ADDRESSING ..................................................................................................................5-32
C
ONFIGURING IPV6 ................................................................................................................5-32
L
IST OF COMMANDS IN THIS CHAPTER .................................................................................5-34
6: ACCESS
CONSIDERATIONS
SECURING ACCESS ..............................................................................................................................6-1
D
ESCRIPTION ............................................................................................................................6-1
P
ASSWORDS .............................................................................................................................6-1
P
ORT SECURITY FEATURE .......................................................................................................6-2
CONFIGURING PORT SECURITY THROUGH THE COMMAND LINE INTERFACE .........6-3
C
OMMANDS ..............................................................................................................................6-3
A
LLOWING MAC ADDRESSES ...............................................................................................6-4
S
ECURITY LOGS .......................................................................................................................6-8
A
UTHORIZED MANAGERS .......................................................................................................6-10
CONFIGURING PORT SECURITY WITH ENERVISTA SOFTWARE .......................................6-12
C
OMMANDS ..............................................................................................................................6-12
L
OGS .........................................................................................................................................6-14
A
UTHORIZED MANAGERS .......................................................................................................6-16
7: ACCESS USING RADIUS INTRODUCTION TO 802.1X ..............................................................................................................7-1
D
ESCRIPTION ............................................................................................................................7-1
802.1
X PROTOCOL .................................................................................................................7-1
CONFIGURING 802.1X THROUGH THE COMMAND LINE INTERFACE ...........................7-4
C
OMMANDS ..............................................................................................................................7-4
E
XAMPLE ...................................................................................................................................7-6
CONFIGURING 802.1X WITH ENERVISTA SECURE WEB MANAGEMENT SOFTWARE 7-9
C
OMMANDS ..............................................................................................................................7-9