EasyManuals Logo

IBM RackSwitch G8000 User Manual

IBM RackSwitch G8000
362 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #17 background imageLoading...
Page #17 background image
© Copyright IBM Corp. 2011 15
Preface
The IBM N/OS 6.8 Application Guide describes how to configure and use the IBM
Networking OS 6.8 software on the RackSwitch G8000 (referred to as G8000
throughout this document). For documentation on installing the switch physically,
see the Installation Guide for your G8000.
Who Should Use This Guide
This guide is intended for network installers and system administrators engaged in
configuring and maintaining a network. The administrator should be familiar with
Ethernet concepts, IP addressing, Spanning Tree Protocol, and SNMP
configuration parameters.
What You’ll Find in This Guide
This guide will help you plan, implement, and administer IBM N/OS software. Where
possible, each section provides feature overviews, usage examples, and
configuration instructions. The following material is included:
Part 1: Getting Started
This material is intended to help those new to N/OS products with the basics of
switch management. This part includes the following chapters:
Chapter 1, “Switch Administration,” describes how to access the G8000 to
configure the switch and view switch information and statistics. This chapter
discusses a variety of manual administration interfaces, including local
management via the switch console, and remote administration via Telnet, a web
browser, or via SNMP.
Chapter 2, “Initial Setup,” describes how to use the built-in Setup utility to
perform first-time configuration of the switch.
Chapter 3, “Switch Software Management,” describes how to update the N/OS
software operating on the switch.
Part 2: Securing the Switch
Chapter 4, “Securing Administration,” describes methods for using Secure Shell
for administration connections, and configuring end-user access control.
Chapter 5, “Authentication & Authorization Protocols,” describes different secure
administration for remote administrators. This includes using Remote
Authentication Dial-in User Service (RADIUS), as well as TACACS+ and LDAP.
Chapter 6, “802.1X Port-Based Network Access Control,” describes how to
authenticate devices attached to a LAN port that has point-to-point connection
characteristics. This feature prevents access to ports that fail authentication and
authorization and provides security to ports of the G8000 that connect to blade
servers.
Chapter 7, “Access Control Lists,” describes how to use filters to permit or deny
specific types of traffic, based on a variety of source, destination, and packet
attributes.

Table of Contents

Other manuals for IBM RackSwitch G8000

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the IBM RackSwitch G8000 and is the answer not in the manual?

IBM RackSwitch G8000 Specifications

General IconGeneral
BrandIBM
ModelRackSwitch G8000
CategoryNetwork Router
LanguageEnglish

Related product manuals