Dell PowerConnect B-FCXs manuals
PowerConnect B-FCXs
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- about this document
- command syntax conventions
- contacting dell
- Hardware features
- Control features
- Power supplies
- Unpacking the device
- Installation tasks
- General precautions
- Preparing the installation site
- Installing the device
- Rack mount installation
- Connecting devices in a stack
- Powering on the system
- Attaching a PC or terminal
- Wiring map for serial cable
- PowerConnect B-FCX648s devices
- PowerConnect B-FCX648 devices
- Assigning permanent passwords
- Setting passwords
- Configuring IP addresses
- Devices running Layer 3 software
- Connecting network devices
- Connecting to workstations, servers, or routers
- Testing connectivity
- Tracing a route
- Using Virtual Cable Testing to diagnose a cable
- Digital optical monitoring
- Managing temperature settings
- Removing MAC address entries
- Hardware maintenance schedule
- Cabling a fiber optic module
- Hardware specifications
- Cooling system and fans
- Pinouts and signalling
- Cable specifications
- Power cords
- Diagnosing switch indicators
- In-band access
- USA (FCC CFR 47 Part 15 Warning)
- Japan power cord
- Regulatory compliance
- Cautions
- Danger notices
PowerConnect B-FCXs
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- about this document
- related publications
- contacting dell
- In this chapter
- Access requirements
- Logging in and logging out
- Navigating the Web Management Interface
- Monitoring the ARP cache
- Monitoring the device
- Monitoring flash information
- Monitoring memory information
- Monitoring MAC addresses
- Monitoring the system log
- Monitoring stack details
- Monitoring a stack module
- Monitoring stack neighbors
- Monitoring stack ports status
- Monitoring stack port statistics
- Monitoring stack port interfaces
- Monitoring stack resources
- Monitoring Ethernet port statistics
- Monitoring port attribute
- Monitoring port utilization
- Monitoring the management port
- Monitoring STP
- Monitoring RSTP
- Monitoring IP traffic
- Monitoring RMON (Remote Monitoring) history
- Monitoring RMON statistics
- Configuring the general settings for an IronStack
- Configuring stack priority
- Modifying priority
- Configuring stack ports
- Modifying stack ports
- Configuring a stack module
- Adding a module
- Configuring the system boot sequence
- Configuring the system clock
- Configuring the system DHCP gateway
- Configuring the system DNS
- Configuring the general system
- Configuring the system identification
- Configuring a standard ACL
- Configuring an extended ACL
- Configuring an IP access group
- Configuring the system MAC filter
- Configuring the maximum system value
- Configuring a system module
- Configuring an NTP Server
- Configuring a RADIUS server
- Configuring a TACACS/TACACS+ server
- Configuring management authentication
- Configuring management authorization
- Configuring management accounting
- Configuring an SNMP community string
- Configuring general management parameters
- Configuring a management system log
- Configuring a trap
- Configuring a trap receiver
- Configuring a management user account
- Configuring web management preference
- Configuring an Ethernet port
- Modifying port settings
- Configuring port relative utilization
- Configuring a management port
- Configuring the monitor and mirror port
- Configuring the QOS profile
- Configuring VLAN
- Configuring STP
- Configuring RSTP
- Configuring trunk
- Configuring static station
- Clearing information
- Disabling or enabling the menu view
- Reloading units in a stack
- Accessing a telnet command prompt
- Performing a trace
- Using TFTP
PowerConnect B-FCXs
Table of contents
- getting started guide
- power supplies
- items required for installation
- installation tasks
- general precautions
- lifting precautions
- installing the device
- connecting devices in a stack
- powering on the system
- assigning permanent passwords
- setting passwords
- configuring ip addresses
- regulatory notices
- standortplanung und sicherheitsrichtlinien
- Table Of Contents
- item-item yang diperlukan untuk pemasangan
- membuka kemasan perangkat b-fcx
- memasang perangkat
- menyalakan sistem
- menetapkan password permanen
- mengonfigurasikan alamat ip
- menyambungkan peralatan jaringan ke perangkat b-fcx
- pemberitahuan peraturan
- notificaciones reglamentarias
- rafa montaj
PowerConnect B-FCXs
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- about this document
- document conventions
- related publications
- Using the management port
- CLI Commands for use with the management port
- Logging on through the CLI
- On-line help
- Line editing commands
- CLI nomenclature on Stackable devices
- Using special characters in regular expressions
- Creating an alias for a CLI command
- Logging on through the Web Management Interface
- Navigating the Web Management Interface
- Logging on through Brocade Network Advisor
- Configuring basic system parameters
- parameters
- Disabling Syslog messages and traps for CLI access
- Cancelling an outbound Telnet session
- Setting the system clock
- Limiting broadcast, multicast, and unknown unicast traffic
- Configuring CLI banners
- Configuring basic port parameters
- Modifying port speed and duplex mode
- application notes
- Modifying port duplex mode
- Configuring MDI/MDIX
- Disabling or re-enabling a port
- devices
- Configuring PHY FIFO Rx and Tx depth
- Enabling and disabling support for 100BaseTX
- Changing the Gbps fiber negotiation mode
- Modifying port priority (QoS)
- Configuring port flap dampening
- configuration notes
- Port loop detection
- syslog message
- Overview
- Determining the boot image version running on the device
- cli commands
- Image file types
- Using SNMP to upgrade software
- Changing the block size for TFTP file transfers
- Rebooting
- Loading and saving configuration files
- Logging changes to the startup-config file
- Dynamic configuration loading
- Maximum file sizes for startup-config file and running-config
- Copying a file from an IPv6 TFTP server
- Using the IPv6 ncopy command
- Uploading files from an IPv6 TFTP server
- Using SNMP to save and load configuration information
- Erasing image and configuration files
- Reloading after a specific amount of time
- Testing network connectivity
- Tracing an IPv4 route
- Software license terminology
- Software-based licensing overview
- Licensed features and part numbers
- Configuration tasks
- Installing a license file
- Brocade Software Portal
- Transferring a license
- Viewing information about software licenses
- Viewing the license database
- Viewing software packages installed in the device
- IronStack overview
- Stackable models
- Building an IronStack
- Software requirements
- in a ring topology using secure-setup
- Scenario 2 - Configuring a three-member IronStack in a ring topology using the automatic setup process
- Scenario 3 - Configuring a three-member IronStack in a ring topology using the manual configuration process
- Configuring an FCX IronStack
- data port
- Verifying an IronStack configuration
- Managing your IronStack
- IronStack management MAC address
- Removing MAC address entries
- CLI command syntax
- stacking mode
- the Active Controller
- Managing IronStack partitioning
- MIB support for the IronStack
- Unconfiguring an IronStack
- Displaying IronStack information
- displaying chassis information
- displaying software version information
- Adding, removing, or replacing units in an IronStack
- Renumbering stack units
- Syslog, SNMP, and traps
- Troubleshooting an unsuccessful stack build
- Troubleshooting image copy issues
- Stack mismatches
- Configuration mismatch
- Memory allocation failure
- Troubleshooting secure-setup
- Troubleshooting unit replacement issues
- IronStack topologies
- PowerConnect B-Series FCX hitless stacking
- Supported events
- Configuration notes and feature limitations
- failover
- Standby Controller role in hitless stacking
- and stack split
- Hitless stacking default behavior
- Hitless stacking failover
- Hitless stacking switchover
- Displaying information about hitless stacking
- Virtual cable testing
- Viewing the results of the cable analysis
- Supported Fiber Optic Transceivers
- Digital optical monitoring
- Setting the alarm interval
- Viewing optical monitoring information
- Syslog messages
- IPv6 management overview
- Enabling and disabling IPv6
- IPv6 debug
- IPv6 logging
- IPv6 ping
- SNTP over IPv6
- Secure Shell, SCP, and IPv6
- IPv6 traceroute
- STP overview
- Configuring standard STP parameters
- Enabling or disabling the Spanning Tree Protocol (STP)
- Changing STP bridge and port parameters
- STP protection enhancement
- Displaying STP information
- displaying cpu utilization statistics
- Configuring STP related features
- Fast Uplink Span
- W Rapid Spanning Tree (RSTP)
- bridge port states
- convergence in a simple topology
- convergence after a link failure
- convergence at link restoration
- propagation of topology change
- W Draft 3
- configuration considerations
- Single Spanning Tree (SSTP)
- STP per VLAN group
- PVST/PVST+ compatibility
- Overview of PVST and PVST
- VLAN tags and dual mode
- Configuring PVST+ support
- Configuration examples
- PVRST compatibility
- Re-enabling ports disabled by BPDU guard
- Example console messages
- Enabling STP root guard
- Error disable recovery
- Displaying the error disable recovery state by interface
- Errdisable Syslog messages
- Configuration notes
- Reduced occurrences of MSTP reconvergence
- Configuring additional MSTP parameters
- displaying mstp statistics
- displaying mstp information for a specified instance
- displaying mstp information for cist instance 0
- About port regions
- Modifying STP bridge and port parameters
- Disabling the automatic learning of MAC addresses
- Multi-port static MAC address
- Configuring VLAN-based static MAC entries
- Flow-based MAC address learning
- How flow-based learning works
- Configuring flow-based MAC address learning
- Displaying information about flow-based MACs
- Assigning IEEE 802.1Q tagging to a port
- Defining MAC address filters
- filters
- MAC address filter override for 802.1X-enabled ports
- Locking a port to restrict addresses
- Displaying and modifying system parameter default settings
- Modifying system parameter default values
- TDynamic Buffer Allocation for an IronStack
- configuration steps
- sample configuration
- Generic buffer profiles on PowerConnect Stackable devices
- Enabling and disabling remote fault notification
- Jumbo frame support
- Topology groups
- Master VLAN and member VLANs
- Configuring a topology group
- Displaying topology group information
- Metro Ring Protocol (MRP)
- Ring initialization
- How ring breaks are detected and healed
- Master VLANs and customer VLANs
- Configuring MRP
- changing the hello and preforwarding times
- Using MRP diagnostics
- Displaying MRP information
- MRP CLI example
- commands on switch b
- Virtual Switch Redundancy Protocol (VSRP)
- Layer 2 and Layer 3 redundancy
- VSRP-Aware security features
- Configuring basic VSRP parameters
- Configuring optional VSRP parameters
- configuring authentication
- changing the backup priority
- changing the hello interval
- changing the default track priority
- Displaying VSRP information
- displaying the active interfaces for a vrid
- VSRP fast start
- VSRP and MRP signaling
- UDLD overview
- UDLD for tagged ports
- Enabling UDLD
- Changing the Keepalive retries
- displaying information for a single port
- Clearing UDLD statistics
- About active ports
- an active port
- Trunk group overview
- Trunk group connectivity to a server
- Trunk group rules
- Trunk group configuration examples
- Support for flexible trunk group membership
- Configuring a trunk group
- in Figure 78
- Example 2: Configuring a trunk group that spans two Gbps Ethernet modules in a chassis device
- with one port per module
- Additional trunking options
- Displaying trunk group configuration information
- Viewing the first and last ports in a trunk group
- Dynamic link aggregation
- IronStack LACP trunk group configuration example
- Configuration notes and limitations
- Adaptation to trunk disappearance
- Enabling dynamic link aggregation
- affects trunk groups and dynamic keys
- port priority
- Displaying and determining the status of aggregate links
- Events that affect the status of ports in an aggregate link
- Displaying LACP status information
- Clearing the negotiated aggregate links table
- VLAN overview
- Default VLAN
- Q tagging
- Spanning Tree Protocol (STP)
- VLAN and virtual routing interface groups
- Super aggregated VLANs
- Summary of VLAN configuration rules
- Routing between VLANs
- Assigning a different VLAN ID to the default VLAN
- and 4092
- Assigning trunk group ports
- Modifying a port-based VLAN
- Enable spanning tree on a VLAN
- protocol-based VLANs
- VLANs within port-based VLANs
- Configuring an IPv6 protocol VLAN
- Configuring protocol VLANs with dynamic ports
- Aging of dynamic ports
- Configuration guidelines
- Configuring an IPX network VLAN with dynamic ports
- Configuring uplink ports within a port-based VLAN
- multiple port-based VLANs
- Configuring VLAN groups and virtual routing interface groups
- Configuring a virtual routing interface group
- interface group information
- routing interfaces
- Configuring super aggregated VLANs
- Configuring aggregated VLANs
- Verifying the configuration
- Configuring 802.1Q-in-Q tagging
- Configuration rules
- Example configuration
- Configuring 802.1Q-in-Q tag profiles
- to the PVLAN
- CLI example for a general PVLAN network
- Dual-mode VLAN ports
- Displaying VLAN information
- Displaying system-wide VLAN information
- Displaying global VLAN information
- Displaying a port VLAN membership
- Displaying PVLAN information
- GVRP overview
- Application examples
- Dynamic core and dynamic edge
- Fixed core and dynamic edge
- Configuring GVRP
- Enabling GVRP
- Disabling VLAN learning
- Displaying GVRP information
- Displaying GVRP configuration information
- Displaying GVRP VLAN information
- Displaying GVRP statistics
- Displaying CPU utilization statistics
- Displaying GVRP diagnostic information
- Dynamic core and fixed edge
- Fixed core and fixed edge
- Static and dynamic hosts
- Dynamic MAC-based VLAN
- Configuration example
- Configuring MAC-based VLANs
- RADIUS server
- Aging for MAC-based VLAN
- Disabling aging for MAC-based VLAN sessions
- Configuring the maximum MAC addresses per port
- Configuring MAC-based VLAN for a dynamic host
- Configuring MAC-based VLANs using SNMP
- Displaying allowed MAC addresses
- Displaying detailed MAC-VLAN data
- Displaying MAC-VLAN information for a specific interface
- Displaying MAC addresses in a MAC-based VLAN
- Displaying MAC-based VLAN logging
- ACL overview
- Numbered and named ACLs
- How hardware-based ACLs work
- Configuring standard numbered ACLs
- Configuration example for standard numbered ACLs
- Standard named ACL syntax
- Configuration example for standard named ACLs
- Configuring extended numbered ACLs
- Configuration examples for extended numbered ACLs
- Configuring extended named ACLs
- Configuration example for extended named ACLs
- Managing ACL comment text
- Adding a comment to an entry in a named ACL
- or subnet-based VLAN
- Enabling ACL logging
- Enabling strict control of ACL filtering of fragmented packets
- Enabling ACL support for switched traffic in the router image
- a port (Layer 2 devices only)
- Applying an IPv4 ACL to a subset of ports on a virtual interface (Layer 3 devices only)
- Using ACLs to filter ARP packets
- Displaying ACL filters for ARP
- Clearing the filter count
- QoS options for IP ACLs
- Using an IP ACL to mark DSCP values (DSCP marking)
- DSCP matching
- ACL-based rate limiting
- Displaying ACL information
- Policy-based routing (PBR)
- basic example
- setting the output interface to the null interface
- trunk formation
- Classification
- QoS for stackable devices
- in an IronStack
- Changing a port priority
- Buffer allocation/threshold for QoS queues
- Marking
- Configuring the QoS mappings
- priority mappings
- forwarding queue mappings
- Scheduling
- Selecting the QoS queuing method
- Viewing QoS settings
- Traffic policies overview
- Maximum number of traffic policies supported on a device
- supported on a Layer 3 device
- Support for fixed rate limiting and adaptive rate limiting
- Configuring ACL-based adaptive rate limiting
- over the limit
- ACL statistics and rate limit counting
- Enabling ACL statistics with rate limiting traffic policies
- Clearing ACL and rate limit counters
- Viewing traffic policies
- Adding a static IP route
- Adding a static ARP entry
- Modifying and displaying layer 3 system parameter limits
- Configuring RIP
- Enabling RIP
- Enabling redistribution
- Enabling learning of default routes
- Enabling or disabling layer 2 switching
- Configuring port mirroring and monitoring
- Command syntax
- monitoring an individual trunk port
- Configuring mirroring on an Ironstack
- ACL-based inbound mirroring
- VLAN-based mirroring
- Rate limiting overview
- Rate limiting in hardware
- Configuring a port-based rate limiting policy
- Rate shaping overview
- Configuring outbound rate shaping for a port
- Displaying rate shaping configurations
- IGMP snooping overview
- Configuring queriers and non-queriers
- VLAN specific configuration
- Configuring IGMP snooping
- configuring the hardware and software resource limits
- modifying the age interval
- configuring static router ports
- enabling fast convergence
- Displaying IGMP snooping information
- Displaying querier information
- Clear IGMP snooping commands
- Using FDP
- Displaying FDP information
- Clearing FDP and CDP information
- Reading CDP packets
- Enabling interception of CDP packets on an interface
- Clearing CDP information
- Terms used in this chapter
- Benefits of LLDP
- LLDP-MED overview
- LLDP-MED class
- LLDP packets
- TLV support
- MIB support
- Configuration notes and considerations
- Enabling support for tagged LLDP packets
- Specifying the maximum number of LLDP neighbors
- Enabling LLDP SNMP notifications and syslog messages
- Changing the minimum time between LLDP transmissions
- Changing the holdtime multiplier for transmit TTL
- Configuring LLDP-MED
- for LLDP-MED topology changes
- Defining a location id
- Defining an LLDP-MED network policy
- LLDP configuration summary
- LLDP statistics
- LLDP neighbors
- LLDP neighbors detail
- LLDP configuration details
- Resetting LLDP statistics
- Overview of IP multicasting
- IPv4 multicast group addresses
- Suppression of unregistered multicast packets
- Changing IGMP V1 and V2 parameters
- Adding an interface to a multicast group
- PIM Dense
- Initiating PIM multicasts on a network
- Grafts to a multicast Tree
- Configuring PIM DM
- Failover time in a multi-path topology
- PIM Sparse
- PIM Sparse switch types
- RP paths and SPT paths
- configuring global pim sparse parameters
- and statistics
- displaying a list of multicast groups
- displaying bsr information
- displaying candidate rp information
- displaying rp information for a pim sparse group
- displaying multicast neighbor information
- displaying information about an upstream neighbor device
- displaying the pim multicast cache
- displaying pim traffic statistics
- PIM Passive
- Passive multicast route insertion
- Using ACLs to control multicast features
- Using ACLs to limit PIM RP candidate advertisement
- Disabling CPU processing for select multicast groups
- Viewing disabled multicast addresses
- another multicast router
- Default IGMP version
- a virtual routing interface
- Setting the query interval
- IGMP V3 and source specific multicast protocols
- Clearing IGMP statistics
- Configuring IGMP Proxy
- CLI commands
- Basic configuration
- IP interfaces
- IP route exchange protocols
- IP interface redundancy protocols
- When parameter changes take effect
- IP interface parameters – Layer 3 Switches
- Basic IP parameters and defaults – Layer 2 Switches
- Interface IP parameters – Layer 2 Switches
- Configuring Domain Name Server (DNS) resolver
- Configuring packet parameters
- Changing the router ID
- Configuring ARP parameters
- Configuring forwarding parameters
- Disabling ICMP messages
- Disabling ICMP Redirect Messages
- static route types
- Configuring a default network route
- Configuring IP load sharing
- Configuring IRDP
- enabling irdp globally
- Configuring RARP
- Configuring UDP broadcast and IP helper parameters
- Configuring BootP/DHCP relay parameters
- DHCP Server
- enabling dhcp server
- Displaying DHCP server information
- image update
- Configuring IP parameters – Layer 2 Switches
- the default gateway
- defining a dns entry
- Changing the TTL threshold
- Displaying IP configuration information and statistics
- displaying ip interface information
- displaying arp entries
- displaying the forwarding cache
- displaying the ip route table
- clearing ip routes
- displaying ip traffic statistics
- Displaying IP information – Layer 2 Switches
- Using MLDv1 with MLDv2
- Configuring MLD snooping
- Configuring the global MLD mode
- Configuring the global MLD version
- leave message
- Disabling MLD snooping for the VLAN
- Configuring static router ports
- Configuring fast leave for MLDv1
- Displaying MLD snooping information
- Clear MLD snooping commands
- RIP overview
- ICMP host unreachable message for undeliverable ARPs
- RIP interface parameters
- Configuring RIP parameters
- Changing the administrative distance
- Configuring redistribution
- Configuring route learning and advertising parameters
- Changing the route loop prevention method
- VRRPE backup interface
- Displaying RIP filters
- Overview of OSPF
- OSPF point-to-point links
- Designated routers in multi-access networks
- OSPF RFC 1583 and 2178 compliance
- Reduction of equivalent AS External LSAs
- Support for OSPF RFC 2328 Appendix E
- Dynamic OSPF activation and configuration
- Dynamic OSPF memory
- OSPF parameters
- Enabling OSPF on the router
- Assigning OSPF areas
- Assigning an area range (optional)
- ospf interface parameters
- Changing the timer for OSPF authentication changes
- Assigning virtual links
- Modifying virtual link parameters
- Defining redistribution filters
- table
- Modifying the default metric for redistribution
- Disabling or re-enabling load sharing
- Configuring external route summarization
- Configuring default route origination
- Modifying SPF timers
- Modifying the redistribution metric type
- LSA) pacing
- Modifying OSPF traps generated
- Specifying the types of OSPF Syslog messages to log
- Configuring an OSPF point-to-point link
- Clearing OSPF information
- Clearing OSPF neighbor information
- Clearing information for OSPF areas
- Displaying general OSPF configuration information
- Displaying OSPF area information
- Displaying OSPF interface information
- Displaying OSPF route information
- Displaying OSPF external link state information
- Displaying OSPF link state information
- Displaying OSPF virtual neighbor information
- Displaying OSPF trap status
- Overview of BGP4
- How BGP4 selects a path for a route
- BGP4 message types
- BGP4 graceful restart
- Note regarding disabling BGP4
- Memory considerations
- Basic configuration tasks
- Setting the local AS number
- Adding a BGP4 peer group
- Optional configuration tasks
- Changing the BGP4 next-hop update timer
- BGP4 load sharing
- Customizing BGP4 load sharing
- Specifying a list of networks to advertise
- Changing the default local preference
- a BGP4 route
- Enabling next-hop recursion
- Changing administrative distances
- Requiring the first AS to be the neighbor AS
- Enabling or disabling comparison of the router IDs
- Treating missing MEDs as the worst MEDs
- configuration procedures
- configuring a bgp confederation
- Aggregating routes advertised to BGP4 neighbors
- Configuring BGP4 graceful restart
- BGP null0 routing
- Configuration steps
- Show commands
- Modifying redistribution parameters
- Redistributing connected routes
- Redistributing static routes
- Redistributing IBGP routes into RIP and OSPF
- Filtering AS-paths
- Filtering communities
- defining a community filter
- Defining IP prefix lists
- Defining neighbor distribute lists
- Using a table map to set the rag value
- Configuring cooperative BGP4 route filtering
- Configuring route flap dampening
- Globally configuring route flap dampening
- a specific neighbor
- Removing route dampening from a route
- Displaying and clearing route flap dampening statistics
- Generating traps for BGP
- Displaying BGP4 information
- Displaying the active BGP4 configuration
- Displaying summary neighbor information
- Displaying BGP4 neighbor information
- Displaying peer group information
- Displaying summary route information
- Displaying the BGP4 route table
- Displaying BGP4 route-attribute entries
- IP route table
- Displaying route flap dampening statistics
- Displaying the active route map configuration
- Displaying BGP4 graceful restart neighbor information
- Using soft reconfiguration
- a BGP4 neighbor
- Closing or resetting a neighbor session
- Clearing and resetting BGP4 routes in the IP route table
- Clearing route flap dampening statistics
- Overview of VRRP
- virtual router mac address
- Overview of VRRPE
- Configuration note
- VRRP and VRRPE parameters
- Configuring basic VRRP parameters
- Configuration rules for VRRPE
- authentication type
- hello interval
- dead interval
- track priority
- Forcing a Master router to abdicate to a standby router
- Displaying VRRP and VRRPE information
- Displaying detailed information
- Displaying statistics
- Clearing VRRP or VRRPE statistics
- VRRP example
- VRRPE example
- Securing access methods
- Restricting remote access to management functions
- Using ACLs to restrict remote access
- Defining the console idle time
- specific IP addresses
- MAC address
- Defining the Telnet idle time
- for Telnet access
- Device management security
- Disabling specific access methods
- Setting passwords
- Setting passwords for management privilege levels
- Recovering from a lost password
- Displaying the SNMP community string
- Setting up local user accounts
- enabling user password masking
- configuring password history
- Configuring a local user account
- Create password option
- Changing a local user password
- Changing the SSL server certificate key size
- Generating an SSL certificate
- How TACACS+ differs from TACACS
- TACACS authentication
- TACACS/TACACS+ configuration considerations
- Enabling TACACS
- Specifying different servers for individual AAA functions
- Setting optional TACACS/TACACS+ parameters
- TACACS/TACACS
- Configuring TACACS+ authorization
- Configuring TACACS+ accounting
- TACACS/TACACS+ packets
- configuration information
- Configuring RADIUS security
- radius authorization
- RADIUS configuration considerations
- RADIUS configuration procedure
- Enabling SNMP to configure RADIUS
- Configuring a RADIUS server per port
- Mapping a RADIUS server to individual ports
- Configuring authentication-method lists for RADIUS
- Configuring RADIUS authorization
- Configuring RADIUS accounting
- RADIUS packets
- Configuring authentication-method lists
- method lists
- TCP Flags - edge port security
- Using TCP Flags in combination with other ACL features
- SSH version 2 support
- Tested SSH2 clients
- AES encryption for SSH2
- Recreating SSH keys
- Configuring DSA challenge-response authentication
- Setting optional parameters
- Setting the number of SSH authentication retries
- Setting the SSH port number
- Filtering SSH access using ACLs
- Using Secure copy with SSH2
- Example file transfers using SCP
- IETF RFC support
- How 802.1X port security works
- Communication between the devices
- Message exchange during authentication
- Authenticating multiple hosts connected to the same port
- X port security and sFlow
- Configuring 802.1X port security
- Setting RADIUS parameters
- Configuring dynamic VLAN assignment for 802.1X ports
- to 802.1X ports
- Enabling 802.1X port security
- Setting the port control
- Configuring periodic re-authentication
- Setting the quiet period
- Specifying the wait interval and number of EAP-request identity frame retransmissions from the RADIUS server
- to the authentication server
- Defining MAC address filters for EAP frames
- Configuring 802.1X accounting
- Enabling 802.1X accounting
- Displaying 802.1X statistics
- Clearing 802.1X statistics
- MAC address filters and IP ACLs
- Sample 802.1X configurations
- Point-to-point configuration
- Hub configuration
- X Authentication with dynamic VLAN assignment
- security on the same port
- Local and global resources
- Enabling the MAC port security feature
- Specifying secure MAC addresses
- violation occurs
- Clearing port security statistics
- Displaying port security settings
- Displaying port security statistics
- Displaying restricted MAC addresses on a port
- How multi-device port authentication works
- Supported RADIUS attributes
- Support for source guard protection
- Configuring multi-device port authentication
- Specifying the authentication-failure action
- Generating traps for multi-device port authentication
- MAC addresses
- Enabling source guard protection
- Clearing authenticated MAC addresses
- Disabling aging for authenticated MAC addresses
- Specifying the aging time for blocked MAC addresses
- Multi-device port authentication password override
- Displaying authenticated MAC address information
- for a specific MAC address or port
- Displaying the authenticated MAC addresses
- and authenticated MAC addresses
- FCX devices
- Example configurations
- VLAN assignment
- Examples of multi-device port authentication and 802.1X authentication configuration on the same port
- Configuration considerations
- Enabling and disabling web authentication
- Using local user databases
- Using passcodes
- Using automatic authentication
- Changing the login mode (HTTPS or HTTP)
- Configuring the re-authentication period
- authentication table
- Limiting the number of authenticated hosts
- Forcing re-authentication after an inactive period
- Deleting a web authentication VLAN
- customizing web authentication pages
- Displaying web authentication information
- Displaying a list of authenticated hosts
- Displaying a list of hosts attempting to authenticate
- Displaying a list of local user databases
- Displaying passcodes
- Protecting against Smurf attacks
- Avoiding being an intermediary in a Smurf attack
- Protecting against TCP SYN attacks
- TCP security enhancement
- because of DoS attacks
- Dynamic ARP inspection
- How DAI works
- Configuring DAI
- Displaying ARP inspection status and ports
- How DHCP snooping works
- System reboot and the binding database
- Clearing the DHCP binding database
- Displaying DHCP snooping status and ports
- DHCP relay agent information (DHCP Option 82)
- DHCP Option 82 sub-options
- Configuring DHCP option 82
- Viewing information about DHCP option 82 processing
- IP source guard
- Enabling IP source guard on a port
- Enabling IP source guard per-port-per-VLAN
- SNMP overview
- Establishing SNMP community strings
- Displaying the SNMP community strings
- Using the user-based security model
- Defining the engine id
- Defining an SNMP user account
- Defining SNMP views
- SNMP version 3 traps
- Defining the UDP port for SNMP v3 traps
- Specifying an IPv6 host as an SNMP trap receiver
- Displaying SNMP Information
- Displaying user information
- SNMP v3 Configuration examples
- Displaying Syslog messages
- Enabling real-time display of Syslog messages
- Displaying the Syslog configuration
- Disabling or re-enabling Syslog
- Specifying a Syslog server
- Changing the number of entries the local buffer can hold
- Displaying Interface names in Syslog messages
- Retaining Syslog messages after a soft reboot
- Basic management
- Viewing configuration information
- Viewing port statistics
- Viewing STP statistics
- RMON support
- History (RMON group 2)
- sFlow
- sFlow support for IPv6 packets
- Configuring and enabling sFlow
- Configuring sFlow version 5 features
- Displaying sFlow information
- Configuring a utilization list for an uplink port
- Displaying utilization percentages for an uplink
- IEEE compliance
- Internet drafts
manualsdatabase
Your AI-powered manual search engine