April 15, 2011 Page 1 of 36Configuring User AuthenticationThischapterprovidesthefollowinginformationaboutconfiguringandmonitoringuserauthen
Authentication OverviewApril 15, 2011 Page 10 of 36RFC 3580EnterasysswitchessupporttheRFC3580RADIUStunnelattributefordynamicVLANassignment
Understanding MulticastApril 16, 2009 Page 4 of 32IGMP Support on Enterasys DevicesEnterasysdevicesimplementIGMPversion2(RFC2236),whichinclud
Understanding MulticastApril 16, 2009 Page 5 of 32EachrouterperformsanIGMPforwardingchecktoseeifthereareanyhoststhatwanttojointhemu
Understanding MulticastApril 16, 2009 Page 6 of 32KeyfeaturesofDVMRParethefollowing:•usesthewell‐knownmulticastIPaddress224.0.0.4•usesIGM
Understanding MulticastApril 16, 2009 Page 7 of 32Route TableEachDVMRP‐enableddevicebuildsaDVMRProutetabletomaintainroutestoallnetworksi
Understanding MulticastApril 16, 2009 Page 8 of 32Asshowninthefollowingexample,theMroutetabledisplaystheincominginterfaceIPaddress,the
Understanding MulticastApril 16, 2009 Page 9 of 324. Determinesifthereisactivesourceinformationforthesourcenetwork,multicastgroup(S,G)pa
Understanding MulticastApril 16, 2009 Page 10 of 324. Ifthesenderwasadownstreamdependentneighborfromwhichaprunehadpreviouslybeenreceive
Understanding MulticastApril 16, 2009 Page 11 of 32PIM,ashared‐treetechnology,designatesarouterastherendezvouspoint(RP),whichistheroot
Understanding MulticastApril 16, 2009 Page 12 of 327. Aprunemessage(register‐stop)issentfromtheRPtothesource’sDR(number7infigure).Onc
Understanding MulticastApril 16, 2009 Page 13 of 32•Register‐Stop—ThesemessagesareusedbytheRPtotellthesource’sDRtostopregisteringtraf
Authentication OverviewApril 15, 2011 Page 11 of 36• Value:Indicatesthetypeoftunnel.Avalueof0x0D(decimal13)indicatesthatthe tunnelingp
Understanding MulticastApril 16, 2009 Page 14 of 32Rendezvous Point (RP) The root of a group-specific distribution tree whose branches extend to all n
Configuring MulticastApril 16, 2009 Page 15 of 32Configuring MulticastThissectionprovidesthef ollowinginformationaboutconfiguringmulticaston
Configuring MulticastApril 16, 2009 Page 16 of 32Table 3liststheLayer2IGMPconfigurationcommandsforSecureStack,D‐Series,G‐Series,andI‐Seri
Configuring MulticastApril 16, 2009 Page 17 of 32Table 4liststheLayer3IGMPconfigurationcommandsforSecureStackC2andC3devicesandG‐Series
Configuring MulticastApril 16, 2009 Page 18 of 32Basic IGMP ConfigurationsProcedure 1describesthebasicstepstoconfigureIGMPonEnterasysMatrix
Configuring MulticastApril 16, 2009 Page 19 of 32Example IGMP Configuration: Enterasys Matrix N-Seriesmatrix->set igmp enable 2, 3matrix->set ig
Configuring MulticastApril 16, 2009 Page 20 of 32Table 6listsLayer3IGMPshowcommandsforEnterasysMatrixN‐Seriesdevices.Table 7listsLayer2
Configuring MulticastApril 16, 2009 Page 21 of 32Table 10liststheDVMRPconfigurationcommandsfor SecureStackC2andC3devicesandG‐Seriesdevic
Configuring MulticastApril 16, 2009 Page 22 of 32SecureStack C2 and C3 and G-SeriesProcedure 5describesthebasicstepstoconfigureDVMRPonSecureS
Configuring MulticastApril 16, 2009 Page 23 of 32Router R2 ConfigurationFortheVLAN1interface,whichprovidesconnectiontotheRouterR1,anIPad
Authentication OverviewApril 15, 2011 Page 12 of 36•AproblemwithmovinganendsystemtoanewVLANisthattheendsystemmustbeissuedanIPaddr
Configuring MulticastApril 16, 2009 Page 24 of 32Configuring PIMPIM-SM Configuration CommandsTable 13liststhePIM‐SMsetcommandsforEnterasysMatr
Configuring MulticastApril 16, 2009 Page 25 of 32Basic PIM-SM ConfigurationsBydefault,PIM‐SMisdisabledgloballyonEnterasysMatrixN‐Series,Secu
Configuring MulticastApril 16, 2009 Page 26 of 32Procedure 7describesthebasicstepstoconfigurePIM‐SMonaSecureStackC2andC3devicesandG‐Se
Configuring MulticastApril 16, 2009 Page 27 of 32Example ConfigurationFigure 6illustratesthePIM‐SMconfigurationoffourEnterasysMatrixN‐Series
Configuring MulticastApril 16, 2009 Page 28 of 32R1>Router(config)#interface vlan 3R1>Router(config-if(Vlan 3))#ip address 172.1.2.1 255.255.255
Configuring MulticastApril 16, 2009 Page 29 of 32Router R3 ConfigurationOnthisrouter,PIM‐SMisenabledonallinterfaces.VLAN10isconfiguredas
Configuring MulticastApril 16, 2009 Page 30 of 32R4>Router(config)#interface vlan 7R4>Router(config-if(Vlan 7))#ip address 172.4.4.4 255.255.255
Refertothedevice’sCLIReferenceGuideorConfigurationGuide ,asapplicable,foradescriptionoftheoutputofeachcommand.Display the PIM-SM s
Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedinthisdocumentanditswebsitewithoutpri
September 08, 2010 Page 1 of 18Configuring Network Address Translation (NAT)Thisdocumentprovidesthe followinginformationaboutconfiguringNetwor
Authentication OverviewApril 15, 2011 Page 13 of 36authorizationisenabledgloballyandontheauthenticatinguser’sport,theVLANspecifiedbythe
Why Would I Use NAT in My Network?September 08, 2010 Page 2 of 18Why Would I Use NAT in My Network?EnterasyssupportforNATprovidesapracticalsolu
NAT OverviewSeptember 08, 2010 Page 3 of 18NAT OverviewThissectionprovidesanoverviewofNATconfiguration.NAT ConfigurationAtraditionalNATconf
NAT OverviewSeptember 08, 2010 Page 4 of 18WhenServer1respondstoClient1,itspacketarrivesattheNATrouterwithClient1’stranslatedaddressof
NAT OverviewSeptember 08, 2010 Page 5 of 18Figure 2 Basic NAPT Static Inside Address TranslationDynamic Inside Address TranslationsDynamicaddressbi
NAT OverviewSeptember 08, 2010 Page 6 of 18Figure 3 Basic NAT Dynamic Inside Address TranslationClient2 Walkthrough:ApacketarrivesattheNATroute
NAT OverviewSeptember 08, 2010 Page 7 of 18Client1 Walkthrough:ApacketarrivesattheNATrouterfromClient1withasourceaddressof10.1.1.1:125,
NAT OverviewSeptember 08, 2010 Page 8 of 18DNS, FTP and ICMP SupportNATworkswithDNSbyhavingtheDNSApplicationLayerGateway(ALG)translatean
Configuring NATSeptember 08, 2010 Page 9 of 18NAT BindingANATflowhastwodevicesassociatedwithitthatareincommunicationwitheachother:the
Configuring NATSeptember 08, 2010 Page 10 of 18Table 2listsNATresourcelimits.Overload Specifies that NAPT translation should take place for this
Configuring NATSeptember 08, 2010 Page 11 of 18Configuring Traditional NAT Static Inside Address TranslationProcedure 1describeshowtoconfiguretra
Configuring AuthenticationApril 15, 2011 Page 14 of 36Configuring AuthenticationThissectionprovidesdetailsfortheconfigurationofauthentication
NAT Configuration ExamplesSeptember 08, 2010 Page 12 of 18Displaying NAT StatisticsTable 4describeshowtodisplayNATstatistics.NAT Configuration
NAT Configuration ExamplesSeptember 08, 2010 Page 13 of 18NAT Static Configuration ExampleThisexamplestepsyouthroughaNATstaticconfigurat ionf
NAT Configuration ExamplesSeptember 08, 2010 Page 14 of 18System(su-config-intf-vlan.0.10)->exitSystem(rw-config)->EnableNAToutsideinterface:
NAT Configuration ExamplesSeptember 08, 2010 Page 15 of 18Figure 6 NAT Dynamic Configuration ExampleServer1200.1.1.50200.1.1.50:80NATROUTERDA: 200.1.
NAT Configuration ExamplesSeptember 08, 2010 Page 16 of 18ToconfigureClient3andClient4for dynamicNAPTtranslationontheNATrouter,wedefine
Terms and DefinitionsSeptember 08, 2010 Page 17 of 18Define the NAT Pools for Global AddressesDefinetheNATPoolfortheNATclients:System(rw-config
Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedinthisdocumentanditswebsitewithoutpri
October 15, 2008 Page 1 of 14Configuring Neighbor DiscoveryThisdocumentprovidesinformationaboutconfiguringandmonitoringneighbordiscoveryonE
How Do I Implement Neighbor Discovery?October 15, 2008 Page 2 of 14How Do I Implement Neighbor Discovery?LLDP,EnterasysDiscoveryProtocol,andCisco
Understanding Neighbor DiscoveryOctober 15, 2008 Page 3 of 14Figure 1 Communication between LLDP-enabled DevicesLLDP-MEDTheLLDP‐MediaEndpointDisco
Configuring AuthenticationApril 15, 2011 Page 15 of 36pwa Globally enables or disables PWA authentication.Disabled.pwa enhancemode Allows a user on an
Understanding Neighbor DiscoveryOctober 15, 2008 Page 4 of 14TherearetwoprimaryLLDP‐MEDdevicetypes(asshowninFigure 2 onpage5):•Networkco
Understanding Neighbor DiscoveryOctober 15, 2008 Page 5 of 14Figure 2 LLDP-MEDIP NetworkInfrastructure(IEEE 802 LAN)LLDP-MED Communication Device End
Understanding Neighbor DiscoveryOctober 15, 2008 Page 6 of 14LLDPDU FramesAsshowninFig ure 3,eachLLDPDUframecontainsthefollowingmandatory T
Configuring LLDPOctober 15, 2008 Page 7 of 14–VLANName—AllowsabridgetoadvertisethetextualnameofanyVLANwithwhichitisconfigured.–Proto
Configuring LLDPOctober 15, 2008 Page 8 of 14Set the time-to-live value used in LLDP frames sent by this device. The time-to-live for LLDPDU data is c
Configuring LLDPOctober 15, 2008 Page 9 of 14Refertothedevice’sCLIReferenceGuideorConfigurationGuide,asapplicable,formoreinformationabo
Configuring LLDPOctober 15, 2008 Page 10 of 14Basic LLDP ConfigurationsProcedure 1describesthebasicstepstoconfigureLLDPonEnterasysMatrixN‐S
Configuring LLDPOctober 15, 2008 Page 11 of 14Example LLDP Configuration: Time to LiveThisexamplesetsthetransmitintervalto20secondsandtheho
Configuring Enterasys Discovery ProtocolOctober 15, 2008 Page 12 of 14Configuring Enterasys Discovery ProtocolEnterasys Discovery Protocol Configurati
Configuring Cisco Discovery ProtocolOctober 15, 2008 Page 13 of 14Configuring Cisco Discovery ProtocolCisco Discovery Protocol Configuration CommandsT
Configuring AuthenticationApril 15, 2011 Page 16 of 36Configuring IEEE 802.1xConfiguringIEEE802.1xonanauthenticatorswitchportconsistsof:•Sett
Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedinthisdocumentanditswebsitewithoutpri
May 18, 2011 Page 1 of 21Configuring NetFlowThisdocumentdescribestheNetFlowfeatureanditsconfigurationonEnterasys®N‐Series,S‐Series,K‐Seri
How Can I Implement NetFlow?May 18, 2011 Page 2 of 21rescheduledforlowusagetimeblocks,ormaybeanillegitimateusageofthenetworkthatcanbe
How Can I Implement NetFlow?May 18, 2011 Page 3 of 21Figure 1 NetFlow Network Profile ExampleTocompleteaNetFlownetworkprofile,enableNetFlowon
Understanding FlowsMay 18, 2011 Page 4 of 212. Chooseuptofourcollectorsandamanagementapplication,suchasEnterasysSIEMorNetSightRelease4
Understanding FlowsMay 18, 2011 Page 5 of 21Figure 2providesagraphicdepictionofhowthesetimersinteract.Flows1and3showasinglelonglasti
Configuring NetFlow on the Enterasys S-Series, N-Series, and K-Series ModulesMay 18, 2011 Page 6 of 21• Examiningflowsbypriority•Characterizingtra
Configuring NetFlow on the Enterasys S-Series, N-Series, and K-Series ModulesMay 18, 2011 Page 7 of 21Configuring the Active Flow Export TimerTheacti
Configuring NetFlow on the Enterasys S-Series, N-Series, and K-Series ModulesMay 18, 2011 Page 8 of 21WhentransmittingNetFlowVersion5reports,the
Configuring NetFlow on the Enterasys S-Series, N-Series, and K-Series ModulesMay 18, 2011 Page 9 of 21Thedefaultbehaviorisforthetemplatetobes
Configuring AuthenticationApril 15, 2011 Page 17 of 36Configuring MAC-based AuthenticationConfiguringMAC‐basedauthenticationonaswitchconsistsof
Configuring NetFlow on the Enterasys S-Series, N-Series, and K-Series ModulesMay 18, 2011 Page 10 of 21Ifthevlanoptionisenabled,VLANsassociated
Configuring NetFlow on the X-Series RouterMay 18, 2011 Page 11 of 21Default NetFlow Settings for S-Series, N-Series, and K-Series SystemsTable 1provi
Configuring NetFlow on the X-Series RouterMay 18, 2011 Page 12 of 21TheX‐SeriesroutercurrentlysupportsdataexportVersion1andVersion5.CLIco
Configuring NetFlow on the X-Series RouterMay 18, 2011 Page 13 of 21Whenyouexecutetheclearnetflowallcommand,allNetFlowsettingsarereturned
Terms and DefinitionsMay 18, 2011 Page 14 of 21Terms and DefinitionsTable 3liststermsanddefinitionsusedinthisNetFlowconfigurationdiscussion.
NetFlow Version 9 TemplatesMay 18, 2011 Page 15 of 21NetFlow Version 9 TemplatesTheNetFlowVersion9implementationsupports15IPv4(templates256t
NetFlow Version 9 TemplatesMay 18, 2011 Page 16 of 21datarecordfieldsdefinedintheNetFlowstandard.Thecontentsofthesedatarecordfieldsare
NetFlow Version 9 TemplatesMay 18, 2011 Page 17 of 21specificdatarecordsareonlysupportedbyIPv4templates.IPv6specificdatarecordsareonlys
NetFlow Version 9 TemplatesMay 18, 2011 Page 18 of 21Table 9providesadescriptionofeachIPv4andIPv6NetFlowVersion9templatepertemplateID.D
264 Switch and IPv4 route ID template containing IPv4 base data record entries, along with the route next hop.265 Switch, IPv4 route ID, and MAC ID te
Configuring AuthenticationApril 15, 2011 Page 18 of 36Configuring Port Web Authentication (PWA)ConfiguringPWAontheswitchconsistsof:•Settingthe
NetFlow Version 9 TemplatesMay 18, 2011 Page 20 of 21281 Switch, IPv6 route ID, and MAC ID template containing IPv6 base data record entries, along wi
Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedinthisdocumentanditswebsitewithoutpri
June 3, 2011 Page 1 of 14Configuring Power over Ethernet ManagementThisdocumentprovidesinformationaboutconfiguringandmonitoringPoweroverEthe
How Do I Implement PoE?June 3, 2011 Page 2 of 14How Do I Implement PoE?YoucanconfigurePoEonyourPoE‐compliantEnterasysdevicethroughtheCLI‐ba
How Do I Implement PoE?June 3, 2011 Page 3 of 14• Automaticmode,inwhichavailablepowerisdistributedevenlytoPoE‐capablemodulesbasedonPoEp
Configuring PoEJune 3, 2011 Page 4 of 14Configuring PoETable 2liststhePoEsettingsthatyoucanconfigurethroughthe CLIoneachPoE‐compliantEn
Configuring PoEJune 3, 2011 Page 5 of 14Stackable A2, A4, B2, B3, C2, C3 and Standalone D-Series DevicesRefertothedevice’sConfigurationGuideorC
Configuring PoEJune 3, 2011 Page 6 of 14Stackable B5 and C5 DevicesProcedure 2 PoE Configuration for Stackable B5 and C5 DevicesStep Task Command(s)1.
Configuring PoEJune 3, 2011 Page 7 of 14Refertothedevice’sConfigurationGuideorCLIReferenceGuideformoreinformationabouteachcommand.G-Ser
Configuring PoEJune 3, 2011 Page 8 of 144. (Optional) Specify the method the Enterasys device uses to detect connected PDs.• auto (default) — The Ente
Configuring AuthenticationApril 15, 2011 Page 19 of 36Whenenhancedmodeisenabled,PWAwilluseaguestpasswordandguestusernametograntnetwor
Configuring PoEJune 3, 2011 Page 9 of 147. (Optional) Configure the allocation mode for system power available for PoE.• auto (default) — Available po
Configuring PoEJune 3, 2011 Page 10 of 14Refertothedevice’sCLIReferenceGuideformoreinformationabouteachcommand.Modular N-Series, S-Series,
Configuring PoEJune 3, 2011 Page 11 of 144. (Optional) Set the PoE usage threshold on a module. Valid values are 1–99 percent. set inlinepower thresho
Configuring PoEJune 3, 2011 Page 12 of 14Refertothedevice’sConfigurationGuideformoreinformationabouteachcommand.Example PoE ConfigurationA
Configuring PoEJune 3, 2011 Page 13 of 14PoE Display CommandsTable 3listsPoEshowcommandsforEnterasysdevices.Refertothedevice’sCLIReferenc
Configuring PoEJune 3, 2011 Page 14 of 14Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedint
May 18, 2009 Page 1 of 32Configuring PolicyThisdocumentdescribestheEnterasys®policyfeatureanditsconfigurationonEnterasysMatrix®N‐Series,
How Can I Implement Policy?May 18, 2009 Page 2 of 32Securitycanbeenhancedbyallowingonlyintendedusersanddevicesaccesstonetworkprotocolsa
Policy OverviewMay 18, 2009 Page 3 of 32Standard and Enhanced Policy on Enterasys PlatformsTherearetwosetsofpolicycapabilitiessupported,depend
Policy OverviewMay 18, 2009 Page 4 of 32networkaccess andresourceusagealignwiththesecurityrequirements,networkcapabilities,andlegitimate
Why Would I Use It in My Network?April 15, 2011 Page 2 of 36• ConvergenceEndPoint(CEP)•RADIUSSnoopingEnterasysswitchproductssupporttheconfigu
Configuring AuthenticationApril 15, 2011 Page 20 of 36Procedure 5describesthestepstoconfigureCEP.Setting MultiAuth Idle and Session Timeout for
Policy OverviewMay 18, 2009 Page 5 of 32Assigning a Class of Service to this RoleHowapacketistreatedasittransitsthelinkcanbeconfiguredin
Policy OverviewMay 18, 2009 Page 6 of 32UsethesetpolicymaptablecommandspecifyingasingleVLANIDorrangeofIDsandthepolicyprofile‐indext
Policy OverviewMay 18, 2009 Page 7 of 32•Appliesboththefilter‐IDandtheVLANtunnelattributesifallattributesexistIfallattributesexist,the
Policy OverviewMay 18, 2009 Page 8 of 32Policyrulesarebasedontrafficclassifications.Table 1onpage 8providesthesupportedpolicyruletraffi
Policy OverviewMay 18, 2009 Page 9 of 32Adatavalueisassociatedwithmosttrafficclassificationstoidentifythespecificnetworkelementforthat
Policy OverviewMay 18, 2009 Page 10 of 32storagedoespersistafteraresetofthedevice.Usethestorage‐typeoptiontospecifythedesiredstorage
Policy OverviewMay 18, 2009 Page 11 of 32SIP(ip),DIP(ip),Protocol,TOS/DSCP,Fragmentationindication,DestinationPORT,andSourcePort.Usetheset
Policy OverviewMay 18, 2009 Page 12 of 32Standard and Enhanced Policy ConsiderationsThissectionitemizesadditionalpolicyconsiderationsfortheSec
Policy OverviewMay 18, 2009 Page 13 of 32Table 4providesacross‐referenceofstandard()andenhanced(X)policycapabilitytotrafficclassificatio
Policy OverviewMay 18, 2009 Page 14 of 32Time-To-Live (TTL) XXXXXXXXXIP Type of Service XXX XXXIP Protocol XXX XXXEther II Packet Type XX XXXLLC DSAP/
Configuring AuthenticationApril 15, 2011 Page 21 of 36Procedure 6describessettingtheMultiAuthidleandsessiontimeoutforCEP.Configuring MultiA
Configuring PolicyMay 18, 2009 Page 15 of 32Configuring PolicyThissectionpresentsconfigurationproceduresandtablesincludingcommanddescription
Configuring PolicyMay 18, 2009 Page 16 of 32• append - (Optional) Appends any egress, forbidden, or untagged specified VLANs to the existing list. If
Configuring PolicyMay 18, 2009 Page 17 of 32Procedure 2describeshowtoconfigureclassificationrulesasanadministrativeprofileortoassignpoli
Configuring PolicyMay 18, 2009 Page 18 of 32• trap - (Optional) An enhanced policy that enables or disables sending SNMP trap messages on first rule u
Configuring PolicyMay 18, 2009 Page 19 of 32Table 5describeshowtodisplaypolicyinformationandstatistics.5. Optionally, for enhanced policy cap
Configuring PolicyMay 18, 2009 Page 20 of 32In switch command mode, display a count of the number of times the device has dropped syslog or trap rule
Policy Configuration ExampleMay 18, 2009 Page 21 of 32Policy Configuration ExampleThissectionpresentsacollege‐basedpolicyconfigurationexample.
Policy Configuration ExampleMay 18, 2009 Page 22 of 32RolesTheexampledefinesthefollowingroles:• guest‐Usedasthedefaultpolicyforallunaut
Policy Configuration ExampleMay 18, 2009 Page 23 of 32Basic EdgeProtocolsnotappropriatetotheedgeshouldbeblocked.Forthisexamplewewillbloc
Policy Configuration ExampleMay 18, 2009 Page 24 of 32Forthisconfigurationexample,CoSrelatedconfigurationwillbespecifiedasafinalCoS.For
Configuring AuthenticationApril 15, 2011 Page 22 of 36switchdevices).Youmaychangetheprecedenceforoneormoremethodsbysettingtheauthentica
Policy Configuration ExampleMay 18, 2009 Page 25 of 32ARPforwardingisrequiredonetherport0x806.Enterasys(rw)->set policy rule 1 ether 0x806 m
Policy Configuration ExampleMay 18, 2009 Page 26 of 32Studentsshouldonlybeallowedaccesstotheservicesserver(subnet10.10.50.0/24)andshould
Policy Configuration ExampleMay 18, 2009 Page 27 of 32Configuring Policy for the Edge Faculty SecureStack C3Configuring the Policy RoleThefacultyrol
Policy Configuration ExampleMay 18, 2009 Page 28 of 32•AnameofphoneN3•AdefaultportVLANof0•AdefaultCoSof4BecauseVLANscanbeappliedtoN3
Policy Configuration ExampleMay 18, 2009 Page 29 of 32Configuring Policy for the Edge Services N-Series N3Configuring the Policy RoleTheservicesrole
Policy Configuration ExampleMay 18, 2009 Page 30 of 32Enable Enhanced Policy Capabilities on the Services N3 PlatformTheservicesN3platformsupports
Terms and DefinitionsMay 18, 2009 Page 31 of 32Terms and DefinitionsTable 6liststermsanddefinitionsusedinthispolicyconfigurationdiscussion.T
Revision HistoryEnterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedinthisdocumentanditsweb
May 04, 2011 Page 1 of 15Configuring Port MirroringThisdocumentprovidesthe followinginformationaboutconfiguringandmonitoringportmirroringo
Why Would I Use Port Mirroring in My Network?May 04, 2011 Page 2 of 15•Many‐to‐manyDependingonyournetwork,portsthatyoucanconfiguretoparticip
Configuring AuthenticationApril 15, 2011 Page 23 of 36Procedure 9describessettingtheMultiAuthauthenticationportandmaximumuserproperties.Set
How Do I Implement Port Mirroring?May 04, 2011 Page 3 of 15Figure 2 Using Port Mirroring to Monitor All Incoming Traffic to a Backbone SwitchThemany
Overview of Port Mirroring Configurations on Enterasys SwitchesMay 04, 2011 Page 4 of 15Overview of Port Mirroring Configurations on Enterasys Switche
Overview of Port Mirroring Configurations on Enterasys SwitchesMay 04, 2011 Page 5 of 15RefertotheLinkAggregationsectionofyourdevice’sConfigu
Configuring Port MirrorsMay 04, 2011 Page 6 of 15VLAN MirrorsCreatingaVLANandsettingamirrorfortheVLANallowsyoutomonitoralltraffictoyo
Configuring Port MirrorsMay 04, 2011 Page 7 of 15Thereisnorestrictiononthenumberofsourceportsthatcanbeincludedinamirrortoadestinati
Configuring Port MirrorsMay 04, 2011 Page 8 of 15displaytheVTAPport.Tocreatetheportmirrorusethesetportmirroringcreatecommandspecifying
Configuring Port MirrorsMay 04, 2011 Page 9 of 15• ClearingPortMirroring(page10)Reviewing Port Mirroring Usethiscommandtodisplaythestatusof
Configuring Port MirrorsMay 04, 2011 Page 10 of 15Clearing Port MirroringUsethiscommandtoclearaportmirroringconfiguration:clear port mirroring
Example: Configuring and Monitoring Port MirroringMay 04, 2011 Page 11 of 15Usethiscommandtoclearaportmirroringconfiguration:clear port mirror
Example: Configuring and Monitoring Port MirroringMay 04, 2011 Page 12 of 15TheAddDevicescreendisplays.5. ModelthePlatinumDFEbyenteringitsI
Configuring AuthenticationApril 15, 2011 Page 24 of 36Setting MultiAuth Authentication TrapsTraps canbeenabledatthesystemandmodulelevelswhen
Example: Configuring and Monitoring Port MirroringMay 04, 2011 Page 13 of 1510. Repeatstep9forport5(fe.1.5showninFigure 3).RMONEthernetstat
Example: Configuring an IDS MirrorMay 04, 2011 Page 14 of 15Example: Configuring an IDS MirrorAsstatedintheoverviewaboutIDSMirrorsonpage5,N
Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedinthisdocumentanditswebsitewithoutpri
May 09, 2011 Page 1 of 38Configuring Quality of Service (QoS)ThischapterprovidesthefollowinginformationaboutconfiguringandmonitoringQuality
Why Would I Use It in My Network?May 09, 2011 Page 2 of 38TheS‐SeriesFlex‐Edgefeature,supportedonlyonS‐Seriesswitches,providestheuniquecap
Quality of Service OverviewMay 09, 2011 Page 3 of 38Class of Service (CoS)YouimplementQoSfeaturesinaClassofService(CoS).Therearefourhardw
Quality of Service OverviewMay 09, 2011 Page 4 of 38CoS SettingsUsetheCoSsettingsconfigurationwhenmappingthepriorityoftheingressingpacket
Quality of Service OverviewMay 09, 2011 Page 5 of 38Figure 1 Assigning and Marking Traffic with a PriorityTheICMPprotocol,usedforerrormessaging
Quality of Service OverviewMay 09, 2011 Page 6 of 38resourcereferenceconfiguredinCoSsettings,andtheactualTxQorrateli mitingportresource
Quality of Service OverviewMay 09, 2011 Page 7 of 38Port ResourcesUsetheCoSportresourceconfigurationlayertoassociateactualratelimitervalue
Configuring AuthenticationApril 15, 2011 Page 25 of 36Configuring VLAN AuthorizationVLANauthorizationallowsforthedynamicassignmentofuserstot
Quality of Service OverviewMay 09, 2011 Page 8 of 38TxQ SchedulingTxQscanbeconfiguredforTxQscheduling,alsoreferredtoasweightedfairqueuing
Quality of Service OverviewMay 09, 2011 Page 9 of 38Figure 2 Strict Priority Queuing Packet BehaviorLow Latency QueuingALowLatencyQueue(LLQ)isa
Quality of Service OverviewMay 09, 2011 Page 10 of 38accesstoitspercentageoftimeslicessolongastherearepacketsinthequeue.Thenqueue2h
Quality of Service OverviewMay 09, 2011 Page 11 of 38Figure 4 Hybrid Queuing Packet BehaviorRate LimitingRatelimitingisusedtocontroltherateof
Quality of Service OverviewMay 09, 2011 Page 12 of 38Figure 5 Rate Limiting Clipping BehaviorFlood ControlCoS‐basedfloodcontrol,isaformofrate
CoS Hardware Resource ConfigurationMay 09, 2011 Page 13 of 38Figure 6 Rate Shaping Smoothing BehaviorRateshapingretainsexcesspacketsinaqueuea
CoS Hardware Resource ConfigurationMay 09, 2011 Page 14 of 38•Namestheportgroup• Assignsportstotheportgroup• Configuresnon‐LLQqueuesforwei
CoS Hardware Resource ConfigurationMay 09, 2011 Page 15 of 38CoS Settings Configuration LayerThefinalstepistoassigntheCoSindexestotheTxQre
CoS Hardware Resource ConfigurationMay 09, 2011 Page 16 of 381.0 4 txq 41.0 5 txq 51.0 6 txq 61.0
CoS Hardware Resource ConfigurationMay 09, 2011 Page 17 of 38TheremainderofthissectiondetailsaTxQrateshapingconfigurationthat:• Configures
Configuring AuthenticationApril 15, 2011 Page 26 of 36IftheauthenticationserverreturnsaninvalidpolicyorVLANtoaswitchforanauthenticating
CoS Hardware Resource ConfigurationMay 09, 2011 Page 18 of 383 3 * 6 * * * Disabled4 4
CoS Hardware Resource ConfigurationMay 09, 2011 Page 19 of 382.0 3 txq perc none tail-drop2.0 4 txq perc none
CoS Hardware Resource ConfigurationMay 09, 2011 Page 20 of 38•MapstheIRLreferencetotheCoSsetting(802.1priority)•EnablesCoS•Providesrelated
CoS Hardware Resource ConfigurationMay 09, 2011 Page 21 of 384 4 * 8 * * * Disabled5 5
CoS Hardware Resource ConfigurationMay 09, 2011 Page 22 of 38Usetheshowcosport‐resourceirlcommandtodisplaythedatarateandunitoftherate
CoS Hardware Resource ConfigurationMay 09, 2011 Page 23 of 38----------------------------------------------------------------------System(su)->ORL
CoS Hardware Resource ConfigurationMay 09, 2011 Page 24 of 38ORL Configuration Example Show Command OutputUsetheshowcossettingscommandtodisplay
CoS Hardware Resource ConfigurationMay 09, 2011 Page 25 of 38Usetheshowcosport‐resourceorlcommandtodisplaytheratelimiterunitandratefor
CoS Hardware Resource ConfigurationMay 09, 2011 Page 26 of 38CoS Reference LayerTheCoSreferencelayerisnotapplicabletofloodcontrol.CoS Setting
CoS Hardware Resource ConfigurationMay 09, 2011 Page 27 of 38Usetheshowcosport‐configflood‐ctrlcommandtodisplaytheportgroupnameandassign
Configuring AuthenticationApril 15, 2011 Page 27 of 36Procedure 14describesauthenticationserverconfiguration.Configuring RADIUS AccountingTherea
Feature Differences by PlatformMay 09, 2011 Page 28 of 38ge.1.1 29 irl not-violated 0ge.1.1 30 irl not-violat
ORLs•AllS‐Seriesmodulessupport4outboundratelimiters•EnterasysN‐Series,StackableSwitches,D‐Series,G‐Series,andI‐Seriesdevicesdonotsup
The QoS CLI Command FlowMay 09, 2011 Page 30 of 387. Configure a CoS inbound rate limiting index entry, by mapping a port group with a rate-limit valu
QoS Policy-Based Configuration ExampleMay 09, 2011 Page 31 of 38QoS Policy-Based Configuration ExampleInourexample,anorganization’snetworkadmini
QoS Policy-Based Configuration ExampleMay 09, 2011 Page 32 of 38Figure 7 QoS Configuration ExampleAcoreprofilefortherouterandanedgeprofilef
QoS Policy-Based Configuration ExampleMay 09, 2011 Page 33 of 38UsingNetSightPolicyManager,configurethepolicyrolesandrelatedservicesasfoll
Create a Policy Service•NametheserviceVoIPEdgeService.•ApplytheservicetotheVoIPEdgePolicyRole.Create a Rate-limiterCreatearate‐limitasf
QoS Policy-Based Configuration ExampleMay 09, 2011 Page 35 of 38•ToS:B8•SpecifyIRLindex1toassociatethisCoStotheratelimitCreate a Traffic C
Terms and DefinitionsMay 09, 2011 Page 36 of 38s-series(rw)->set policy rule admin-profile vlantag 12 mask 12 port-string ge.1.10-13 admin-pid 1s-s
Terms and DefinitionsMay 09, 2011 Page 37 of 38Rate Shaping The rescheduling of bursty traffic while in the queue based upon packet buffering such tha
Configuring AuthenticationApril 15, 2011 Page 28 of 36Procedure 15describesRADIUSaccountingconfiguration.Procedure 15 RADIUS Accounting Configura
Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedinthisdocumentanditswebsitewithoutpri
June 03, 2011 Page 1 of 12Configuring RADIUS-SnoopingThischapterprovidesthefollowinginformationaboutconfiguringandmonitoringRADIUS‐Snooping
Why Would I Use RADIUS-Snooping in My Network?June 03, 2011 Page 2 of 12Why Would I Use RADIUS-Snooping in My Network?RADIUS‐SnoopingallowstheEnter
RADIUS-Snooping OverviewJune 03, 2011 Page 3 of 12RADIUS-Snooping ConfigurationMultiAuth ConfigurationMultiAuthmust beenablediftheRADIUS‐Snoopin
RADIUS-Snooping OverviewJune 03, 2011 Page 4 of 12table.Bydefault,theRADIUS‐Snoopingflowtableisempty.Entriesareaddedtotheflowtablebase
RADIUS-Snooping OverviewJune 03, 2011 Page 5 of 12Figure 1 RADIUS-Snooping OverviewFigure 1onpage 5illustratestheRADIUSrequestframeandRADIUS
Configuring RADIUS-SnoopingJune 03, 2011 Page 6 of 12Configuring RADIUS-SnoopingThissectionprovidesdetailsfortheconfigurationofRADIUS‐Snooping
Configuring RADIUS-SnoopingJune 03, 2011 Page 7 of 12Managing RADIUS-SnoopingTable 2describeshowtomanageRADIUS‐Snoopingonthedistribution‐tier
RADIUS-Snooping Configuration ExampleJune 03, 2011 Page 8 of 12RADIUS-Snooping Configuration ExampleOurRADIUS‐Snoopingconfiguration examplewillco
RADIUS-Snooping Configuration ExampleJune 03, 2011 Page 9 of 12WefirstsettheglobalMultiAuthmodetomultionthedistribution‐tierswitch.Wethe
Authentication Configuration ExampleApril 15, 2011 Page 29 of 36Authentication Configuration ExampleOurexamplecoversthefoursupportedmodularswit
Terms and DefinitionsJune 03, 2011 Page 10 of 12ThiscompletestheRADIUS‐Snoopingconfigurationexample.Terms and DefinitionsTable 4liststermsand
Revision HistoryEnterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedinthisdocumentanditsweb
Terms and DefinitionsJune 03, 2011 Page 12 of 12
March 28, 2011 Page 1 of 27Configuring SNMPThischapterprovidesthefollowinginformationaboutconfiguringandmonitoringSNMPonEnterasys®N‐Serie
How Do I Implement SNMP?March 28, 2011 Page 2 of 27•AcommonmanagementplatformsupportedbymanynetworkdevicesHow Do I Implement SNMP?Youcanimpl
SNMP OverviewMarch 28, 2011 Page 3 of 27informationforaspecificvariable.Theagent,uponreceivingaGetorGetNextmessage,willissueaGetRes
SNMP Support on Enterasys DevicesMarch 28, 2011 Page 4 of 27Community Name StringsEarlierSNMPversions(v1andv2c)relyoncommunitynamestringsfo
SNMP Support on Enterasys DevicesMarch 28, 2011 Page 5 of 27control,SNMPv3alsoprovidesahigherdegreeofreliabilityfornotifyingmanagementstat
SNMP Support on Enterasys DevicesMarch 28, 2011 Page 6 of 27engine ID A value used by both the SNMPv3 sender and receiver to propagate inform notifica
SNMP Support on Enterasys DevicesMarch 28, 2011 Page 7 of 27Security Models and LevelsAnSNMPsecuritymodelisanauthenticationstrategythatisset
Authentication OverviewApril 15, 2011 Page 3 of 36IEEE 802.1x Using EAPTheIEEE802.1xport‐basedaccesscontrolstandardallowsyoutoauthenticatea
Authentication Configuration ExampleApril 15, 2011 Page 30 of 36Figure 5 Stackable Fixed Switch Authentication Configuration Example OverviewOurconf
Configuring SNMPMarch 28, 2011 Page 8 of 27Configuring SNMPThissectionprovidesthef ollowinginformationaboutconfiguringSNMPonEnterasysdevice
Configuring SNMPMarch 28, 2011 Page 9 of 271. Determinesifthe“keys”fortrap“doors”doexist.ThekeythatSNMPislookingforisthenotification
Configuring SNMPMarch 28, 2011 Page 10 of 27Configuring SNMPv1/SNMPv2cCreating a New ConfigurationProcedure 1showshowtocreateanewSNMPv1orSNMP
Configuring SNMPMarch 28, 2011 Page 11 of 27enterasys(su)->set snmp access groupRW security-model v1 read RW write RW notify RWenter
Configuring SNMPMarch 28, 2011 Page 12 of 27•“ConfiguringtheOptionalMaskParameter”onpage16•“ConfiguringSecureSNMPCommunityNames”onpage18
Configuring SNMPMarch 28, 2011 Page 13 of 27ThefollowingexampleisanEnterasysN‐SeriesdeviceconfigurationusingthestepsinProcedure 2.Itsho
Configuring SNMPMarch 28, 2011 Page 14 of 27enterasys(su)-> set snmp targetaddr Enterasys_Networks 172.29.10.1 param enterasysn tag
Configuring SNMPMarch 28, 2011 Page 15 of 27Trap EngineIDTousetrapsinsteadofinformnotifications,youwouldchangetheprecedingconfigurationas
Configuring SNMPMarch 28, 2011 Page 16 of 27enterasys(su)->clear snmp view All 1enterasys(su)->clear snmp view All 0.0enterasys(su)->set snmp
Configuring SNMPMarch 28, 2011 Page 17 of 27 etherStatsPkts1024to1518Octets=1.3.6.1.2.1.16.1.1.1.19.<port> etherStatsOwner=1.3.6.
Authentication Configuration ExampleApril 15, 2011 Page 31 of 365. ConfiguringtheprinterclusterMACauthenticationforthemodularswitchconfigura
Configuring SNMPMarch 28, 2011 Page 18 of 27 View Name = All Subtree OID = 1.3.6.1.2.1.1.1.0.244 Subtree mask = ff:df View Type =
Configuring SNMPMarch 28, 2011 Page 19 of 27Enterasysrecommendsthatyou“secure”allSNMPcommunitynames.Youdothisbycreatingaconfigurationt
Configuring SNMPMarch 28, 2011 Page 20 of 27ExampleThefollowingexampleshowsanN‐Series deviceconfigurationusingthestepsinProcedure 4.entera
Reviewing SNMP SettingsMarch 28, 2011 Page 21 of 27Reviewing SNMP SettingsUsethefollowingshowcommandsdescribedinthissectiontoreviewSNMPset
Reviewing SNMP SettingsMarch 28, 2011 Page 22 of 27CountersUsethiscommandtodisplaySNMPtrafficcountervalues:show snmp countersExampleenterasys(
Reviewing SNMP SettingsMarch 28, 2011 Page 23 of 27EngineidUsethiscommandtodisplaySNMPengineproperties:show snmp engineid Exampleenterasys(su)-
Reviewing SNMP SettingsMarch 28, 2011 Page 24 of 27Target Parameter ProfilesUsethiscommandtodisplayingSNMPtargetparameterprofiles:show snmp ta
Reviewing SNMP SettingsMarch 28, 2011 Page 25 of 27Status xxxxx = active Notify FilterUsethiscommandtodisplaySNMPnotifyfilterinformation,i
Reviewing SNMP SettingsMarch 28, 2011 Page 26 of 27ViewsUsethiscommandtodisplaySNMPviews:show snmp view viewname Exampleenterasys(su)->show s
Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedinthisdocumentanditswebsitewithoutpri
Authentication Configuration ExampleApril 15, 2011 Page 32 of 36Configuring the Engineering Group 802.1x End-User StationsTherearethreeaspectstoc
March 14, 2011 Page 1 of 29Configuring Spanning TreesThisdocumentprovidesthe followinginformationaboutconfiguringandmonitoringSp anningTree
How Do I Implement Spanning Trees?March 14, 2011 Page 2 of 29wouldcontinuetocirculateendlesslybetweenbothswitchingdevices.WithoutSpanningTr
STP OverviewMarch 14, 2011 Page 3 of 29• IEEE802.1s(MultipleSpanningTreeProtocol)• IEEE802.1t(Updateto802.1D)Asdescribedpreviously,STPres
Functions and Features Supported on Enterasys DevicesMarch 14, 2011 Page 4 of 29MSTPcanautomaticallydetecttheversionofSpanningTreebeingused
Functions and Features Supported on Enterasys DevicesMarch 14, 2011 Page 5 of 29•FurtherprotectingyournetworkfromloopformationwithLoopProtect
Understanding How Spanning Tree OperatesMarch 14, 2011 Page 6 of 29Understanding How Spanning Tree OperatesThissectionprovidesyouwithamoredetai
Understanding How Spanning Tree OperatesMarch 14, 2011 Page 7 of 29Rootportsanddesignatedportsareleftintheforwardingstate.Redundantportsa
Understanding How Spanning Tree OperatesMarch 14, 2011 Page 8 of 29MSTPisthedefaultSpanningTreemodeonallEnterasysswitchdevices.Thefollowin
Understanding How Spanning Tree OperatesMarch 14, 2011 Page 9 of 29•FormatSelector–Oneoctetinlengthandisalways0.Itcannotbeadministrative
Understanding How Spanning Tree OperatesMarch 14, 2011 Page 10 of 29switchingdevice2istherootforMSTI2,andswitchingdevice5istheCISTregi
Authentication Configuration ExampleApril 15, 2011 Page 33 of 36ThefollowingCLIinput:•EnablesCEPgloballyontheswitch.•SetsCEPpolicytoaprev
Configuring STP and RSTPMarch 14, 2011 Page 11 of 29Figure 6 Example of Multiple Regions and MSTIsConfiguring STP and RSTPThissectionprovidesinfor
Configuring STP and RSTPMarch 14, 2011 Page 12 of 29SinceMSTPmodeisfullycompatibleand interoperablewithlegacySTPandRSTPbridges,inmostn
Configuring STP and RSTPMarch 14, 2011 Page 13 of 29configuredwithvariationsoftheSpanningTreeportconfigurationcommands.Defaultsettingsare
Configuring STP and RSTPMarch 14, 2011 Page 14 of 29Setting a Port PriorityYoucansetaSpanningTreeportpriority,avaluetobeusedtobreakati
Configuring STP and RSTPMarch 14, 2011 Page 15 of 29Adjusting the Bridge Hello TimeHellotimeistheintervalatwhichthebridgeorindividualports
Configuring STP and RSTPMarch 14, 2011 Page 16 of 29SpanningTreetopology.Byadjustingthisvalue,youcanconfiguresupportforamaximumdiameter
Configuring STP and RSTPMarch 14, 2011 Page 17 of 29Defining Point-to-Point LinksBydefault,theadministrativepoint‐to‐pointstatusissettoautoo
Configuring MSTPMarch 14, 2011 Page 18 of 29show spantree operedge [port port-string]Astatusof“true”or“Edge‐Port”indicatestheportisoperating
Configuring MSTPMarch 14, 2011 Page 19 of 29Figure 7 MSTP Simple Network ConfigurationProcedure 1showshowtoconfigureSwitches1and2forMSTP.Ad
Understanding and Configuring SpanGuardMarch 14, 2011 Page 20 of 29Understanding and Configuring SpanGuardThissectionprovidesinformationaboutthe
Terms and DefinitionsApril 15, 2011 Page 34 of 36•SetuptheRADIUSuseraccountforthepublicstationontheauthenticationserver.•EnablePWAglobal
Understanding and Configuring SpanGuardMarch 14, 2011 Page 21 of 29•thetimeoutexpires,•theportismanuallyunlocked,•theportisnolongeradminist
Understanding and Configuring Loop ProtectMarch 14, 2011 Page 22 of 29Monitoring SpanGuard Status and SettingsUsethecommandsinTable 7toreviewSp
Understanding and Configuring Loop ProtectMarch 14, 2011 Page 23 of 29Port Modes and Event TriggersPortsworkintwoLoopProtectoperationalmodes.I
Understanding and Configuring Loop ProtectMarch 14, 2011 Page 24 of 29Figure 8 Basic Loop Protect ScenarioFigure 9showsthat,withoutLoopProtect,
Understanding and Configuring Loop ProtectMarch 14, 2011 Page 25 of 29Configuring Loop ProtectThissectionprovidesinformationaboutLoopProtectcon
Understanding and Configuring Loop ProtectMarch 14, 2011 Page 26 of 29TheLoopProtectwindowisatimervalue,inseconds,thatdefinesaperiodduri
Terms and DefinitionsMarch 14, 2011 Page 27 of 29ExampleThefollowingexampleshowsaswitchingdevicewithLoopProtectenabledonportlag.0.2,SID
Terms and DefinitionsMarch 14, 2011 Page 28 of 29FID Filter Identifier. Each VLAN is associated to a FID. VLANs are mapped to SIDs using their FID ass
Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedinthisdocumentanditswebsitewithoutpri
March 15, 2011 Page 1 of 13Configuring SyslogThisdocumentprovidesthe followinginformationaboutconfiguringandmonitoringSyslogonEnterasys®N
Terms and DefinitionsApril 15, 2011 Page 35 of 36IEEE 802.1x An IEEE standard for port-based Network Access Control that provides authentication to de
How Do I Implement Syslog?March 15, 2011 Page 2 of 13acrossmultipleplatforms,youcanuseittointegratelogdatafrommanydifferenttypesofsyst
Syslog Components and Their UseMarch 15, 2011 Page 3 of 13todisplaymessagesatavarietyofdifferentseveritylevelsaboutapplication‐relatederro
Syslog Components and Their UseMarch 15, 2011 Page 4 of 13Basic Syslog ScenarioFigure 1showsabasicscenarioofhowSyslogcomponentsoperateonan
Syslog Components and Their UseMarch 15, 2011 Page 5 of 13Figure 1 Basic Syslog ScenarioDefaultapplicationsettingsintheexam pleinFigure 1have
Interpreting MessagesMarch 15, 2011 Page 6 of 13Interpreting MessagesEverysystemmessagegeneratedbytheEnterasysswitchplatformsfollowsthesa m
Configuring SyslogMarch 15, 2011 Page 7 of 13Syslog Command PrecedenceTable 3listsbasicSyslogcommandsandtheirorderofprecedenceonEnterayssw
Configuring SyslogMarch 15, 2011 Page 8 of 13ExampleThissampleoutputfromtheshowloggingservercommandshowsthattwoservershavebeenaddedto
Configuring SyslogMarch 15, 2011 Page 9 of 13ExamplesThisexampleshowshowtoconfiguretheswitchtoforwardmessagesfromfacilitycategorylocal6
Configuring SyslogMarch 15, 2011 Page 10 of 134(errors) 5(warnings) 6(notifications)7(information) 8(debugging)Modifying Severity Levels an
Configuring SyslogMarch 15, 2011 Page 11 of 13Displaying to the Current CLI SessionTodisplayloggingtothecurrentCLIconsolesessiononanN‐Serie
Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedinthisdocumentanditswebsitewithoutpri
Configuring SyslogMarch 15, 2011 Page 12 of 13Procedure 2 Adjusting Settings for an ApplicationStep Task Command(s)1. Configure Syslog server 2 and ac
Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedinthisdocumentanditswebsitewithoutpri
December 2, 2010 Page 1 of 7Configuring TACACS+ThisdocumentprovidesinformationaboutconfiguringandmonitoringTACACS+(TerminalAccessController
How Do I Implement TACACS+?December 2, 2010 Page 2 of 7How Do I Implement TACACS+?YoucanconfiguretheTACACS+clientonyourEnterasysdeviceincon
Configuring TACACS+December 2, 2010 Page 3 of 7Configuring TACACS+Default SettingsTable 1liststheTACACS+parameters(asdisplayedthroughtheshow
Configuring TACACS+December 2, 2010 Page 4 of 7Basic TACACS+ ConfigurationProcedure 1describesthebasicstepstoconfigureTACACS+onEnterasysdevi
Configuring TACACS+December 2, 2010 Page 5 of 7Refertothedevice’sCLIReferenceorConfigurationGuide,asappropriate,formoreinformationabout
TACACS+ Display CommandsTable 2listsTACACS+showcommands.Refertothedevice’sCLIReferenceorConfigurationGuide,asappropriate,formoreinfo
Configuring TACACS+December 2, 2010 Page 7 of 7Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontaine
April 16, 2009 Page 1 of 14Configuring Transparent Web Cache Balancing(TWCB)Thisdocumentprovidesthe followinginformationaboutconfiguringTransp
December 02, 2010 Page 1 of 5Flex-EdgeThisdocumentdescribestheFlex‐EdgecapabilityontheEnterasysS‐Series®platform.What is Flex-EdgeFlex‐Edge
How Can I Implement TWCB?April 16, 2009 Page 2 of 14whomwebcachingisnotde siredtoahostredirectionlist,denyingtheseusersaccesstoTWCBfu
TWCB OverviewApril 16, 2009 Page 3 of 14Figure 1 TWCB Configuration OverviewTheN‐Seriesrouterdoesnotactasacacheforwebobjects;rather,itr
TWCB OverviewApril 16, 2009 Page 4 of 14The Server FarmTheserverfarmconsistsofalogicalgroupingofcache‐servers.Eachserverfarmbelongstoa
TWCB OverviewApril 16, 2009 Page 5 of 14Thepredictorround‐robinfeatureallowsforthecreationofupto10userlists.Membersofapredictorround
TWCB OverviewApril 16, 2009 Page 6 of 14•Placetheweb‐cacheinservice.Atleastonecacheservermustbeinservicebeforeyoucanplaceaweb‐cache
Configuring TWCBApril 16, 2009 Page 7 of 14Configuring TWCBThissectionprovidesdetailsfortheconfigurationofTWCBontheN‐Seriesproducts.Table
Configuring TWCBApril 16, 2009 Page 8 of 14Configuring the Server FarmProcedure 1describeshowtoconfigureaTWCBserverfarm.Configuring the Cache
Configuring TWCBApril 16, 2009 Page 9 of 14Configuring the Web-CacheProcedure 3describeshowtoconfigureaTWCBweb‐cache.Configuring the Outbound
TWCB Configuration ExampleApril 16, 2009 Page 10 of 14Displaying TWCB StatisticsProcedure 6describeshowtodisplayTWCBstatistics.TWCB Configuratio
TWCB Configuration ExampleApril 16, 2009 Page 11 of 14Figure 3 TWCB Configuration Example OverviewConfigure the s1Server Server FarmCreatetheserver
Flex-Edge OverviewDecember 02, 2010 Page 2 of 5Flex-Edge OverviewAllS‐SeriesswitchessupporttheFlex‐Edgefeature,whichprovidesauniquemechanis
TWCB Configuration ExampleApril 16, 2009 Page 12 of 14Matrix>Router(config-twcb-cache)#exitMatrix>Router(config-twcb-wcsfarm)#Configurecachese
TWCB Configuration ExampleApril 16, 2009 Page 13 of 14Configuretheoutboundinterfacethatconnectswiththeinternet:Matrix>Router(config)#interf
Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedinthisdocumentanditswebsitewithoutpri
March 15, 2011 Page 1 of 20Configuring VLANsThisdocumentprovidesthe followinginformationaboutconfiguringandmonitoring802.1QVLANsonEnteras
Why Would I Use VLANs in My Network?March 15, 2011 Page 2 of 20Theprimarybenefitof802.1QVLANtechnologyisthatitallowsyoutolocali zeandse
How Do I Implement VLANs?March 15, 2011 Page 3 of 20How Do I Implement VLANs?Bydefault,allEnterasysswitchesrunin802.1QVLANoperationalmode.A
Understanding How VLANs OperateMarch 15, 2011 Page 4 of 20Learning Modes and Filtering DatabasesAddressinginformationtheswitchlearnsaboutaVLAN
Understanding How VLANs OperateMarch 15, 2011 Page 5 of 20Ingress PrecedenceVLANassignmentforreceived(ingress)framesisdeterminedbythefollowi
VLAN Support on Enterasys SwitchesMarch 15, 2011 Page 6 of 20Figure 2 Inside the SwitchAssumeaunicastuntaggedframeisreceivedonPort3inthee
VLAN Support on Enterasys SwitchesMarch 15, 2011 Page 7 of 20•From2through4093forstackableandstandaloneswitchesThisrangeisbasedonthefoll
Terms and DefinitionsDecember 02, 2010 Page 3 of 5Priorityqueueing,fromhighprioritytolowpriority,isgiventothefollowingfourtrafficcatego
VLAN Support on Enterasys SwitchesMarch 15, 2011 Page 8 of 20Asdescribedabove,PVIDdeterminestheVLANtowhichalluntaggedframesreceivedonass
Configuring VLANsMarch 15, 2011 Page 9 of 20Figure 3 Example of VLAN Propagation Using GVRPAdministrativelyconfiguringaVLANonan802.1Qswitchcr
Configuring VLANsMarch 15, 2011 Page 10 of 20Platform Specific Differences Enterasys X-Series Platform ConfigurationTheconfigurationofVLANsonthe
Configuring VLANsMarch 15, 2011 Page 11 of 20Default SettingsTable 1listsVLANparametersandtheirdefaultvalues.Table 1 Default VLAN ParametersPa
Configuring VLANsMarch 15, 2011 Page 12 of 20Configuring Static VLANsProcedure 1describeshowtocreateandconfigureastaticVLAN.Unspecifiedpara
Configuring VLANsMarch 15, 2011 Page 13 of 206. (cont)•If forbidden is not specified, tagged and untagged egress settings will be cleared from the des
Configuring VLANsMarch 15, 2011 Page 14 of 20Example ConfigurationThefollowingshowsanexampleS‐SeriesdeviceconfigurationusingthestepsinProc
Configuring VLANsMarch 15, 2011 Page 15 of 20Procedure 2providesanexampleofhowtocreateasecuremanagementVLAN.Thisexample,whichsetsthen
Configuring VLANsMarch 15, 2011 Page 16 of 20Configuring Protocol-Based VLAN ClassificationProtocol‐basedVLANscanbeconfiguredusingthepolicycla
Configuring VLANsMarch 15, 2011 Page 17 of 20Example ConfigurationThefollowingshowsanexampleN‐SeriesdeviceconfigurationusingthestepsinProc
Authentication OverviewApril 15, 2011 Page 4 of 36switchcancontainanyFilter‐IDattributeconfiguredontheauthenticationserver,allowingpolicy
Terms and DefinitionsDecember 02, 2010 Page 4 of 5Flex-Edge An S-Series platform capability to classify and prioritize traffic as it enters the switch
Terms and DefinitionsMarch 15, 2011 Page 18 of 20Terms and DefinitionsTable 3liststermsanddefinitionsusedinVLANconfiguration.(Applies to N-Ser
Terms and DefinitionsMarch 15, 2011 Page 19 of 20Generic Attribute Registration Protocol (GARP)GARP is a protocol used to propagate state information
Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedinthisdocumentanditswebsitewithoutpri
Revision HistoryEnterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedinthisdocumentanditsweb
December 02, 2010 Page 1 of 23Configuring Link AggregationThisdocumentdescribesthelinkaggregationfeatureanditsconfigurationonEnterasysMatr
Why Would I Use Link Aggregation in My NetworkDecember 02, 2010 Page 2 of 23Why Would I Use Link Aggregation in My NetworkTheconceptofgroupingmult
Link Aggregation OverviewDecember 02, 2010 Page 3 of 23Link Aggregation OverviewThissectionprovidesanoverviewoflinkaggregationconfiguration.LA
Link Aggregation OverviewDecember 02, 2010 Page 4 of 23Figure 1displaysaLAGformationexamplecontainingthreedeviceswithfive100Mbpsportsand
Link Aggregation OverviewDecember 02, 2010 Page 5 of 23•Becauseports1and2forboththeactorandpartneroperateinparallelwitheachother,rule
Link Aggregation OverviewDecember 02, 2010 Page 6 of 23Thisistruebecauseport4hasthelowestpriorityofthethreeportscurrentlyintheLAG,an
Link Aggregation OverviewDecember 02, 2010 Page 7 of 23ShouldanaggregatableportbeavailablewithallLAGresourcesdepletedforthissystem,thep
Link Aggregation OverviewDecember 02, 2010 Page 8 of 23Flow RegenerationFlowregenerationdetermineshowflowswillbehavewhenanewportjoinsalin
Authentication OverviewApril 15, 2011 Page 5 of 36Multi-User AuthenticationMulti‐userauthenticationprovidesfortheper‐userorper‐deviceprovision
Link Aggregation OverviewDecember 02, 2010 Page 9 of 23• DestinationIPaddressandSourceIPaddress(dip‐sip).Thisisthemostfinelytunedcriteri
Configuring Link AggregationDecember 02, 2010 Page 10 of 23Configuring Link AggregationThissectionprovidesdetailsfortheconfigurationoflinkagg
Configuring Link AggregationDecember 02, 2010 Page 11 of 23Table 5describeshowtomanagelinkaggregation.5. Optionally, modify the LAG port parame
Link Aggregation Configuration ExampleDecember 02, 2010 Page 12 of 23Table 6describeshowtodisplaylinkaggregationinformationandstatistics.Lin
Link Aggregation Configuration ExampleDecember 02, 2010 Page 13 of 23•LAG3providesanaggregateoffour1GbportsbetweentheC3stackableswitchesa
Link Aggregation Configuration ExampleDecember 02, 2010 Page 14 of 23Figure 3 Example 1 Multiple Device ConfigurationBothphysicalportandLAGadmin
Link Aggregation Configuration ExampleDecember 02, 2010 Page 15 of 23WhichdevicedeterminesportselectionfortheLAGisanoptionalconsideration.
Link Aggregation Configuration ExampleDecember 02, 2010 Page 16 of 23GiventhattheintentoftheexampleistohavethreeLAGsof4portseach,there
Link Aggregation Configuration ExampleDecember 02, 2010 Page 17 of 23NextwewanttochangethesystempriorityfortheS3sothatitwillbeincharg
Link Aggregation Configuration ExampleDecember 02, 2010 Page 18 of 23chassis.ThefirstLAGconsistsoftwo1Gbports.ThesecondLAGconsistsofeig
Authentication OverviewApril 15, 2011 Page 6 of 36Figure 1 Applying Policy to Multiple Users on a Single PortMultiAuth AuthenticationAuthenticationm
Link Aggregation Configuration ExampleDecember 02, 2010 Page 19 of 23Figure 4 Example 2 ConfigurationN3 Edge SwitchS3 Upstream SwitchLAG1End-UsersKEY
Link Aggregation Configuration ExampleDecember 02, 2010 Page 20 of 23Configuring the N3 Edge SwitchForthisexample,wewantLAGstoformwhereverthe
Terms and DefinitionsDecember 02, 2010 Page 21 of 23S3(rw)->set port lacp port ge.1.3 aadminkey 100 enableS3(rw)->set port lacp port ge.1.4 aadm
Terms and DefinitionsDecember 02, 2010 Page 22 of 23Admin Key Value assigned to aggregator ports and physical ports that are candidates for joining a
Revision HistoryEnterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedinthisdocumentanditsweb
January 29, 2009 Page 1 of 4Configuring Link Flap DetectionThisdocumentprovidesinformationaboutconfiguringthelinkflapdetectionfeatureonEnt
Configuring Link Flap DetectionJanuary 29, 2009 Page 2 of 4Configuring Link Flap DetectionBasic Link Flap Detection ConfigurationProcedure 1describes
Configuring Link Flap DetectionJanuary 29, 2009 Page 3 of 4Example Link Flap Detection ConfigurationPoEdevices(forexample,VoIPphonesorwireless
Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedinthisdocumentanditswebsitewithoutpri
September 8, 2010 Page 1 of 28Configuring Load SharingNetwork Address Translation (LSNAT)Thisdocumentprovidesthe followinginformationaboutconfi
Authentication OverviewApril 15, 2011 Page 7 of 36Figure 2 Authenticating Multiple Users With Different Methods on a Single PortInFigure 3,fullMul
Why Would I Use LSNAT in My Network?September 8, 2010 Page 2 of 28oftheserverfarmassociatedwiththeVIPaddress.Thepacketisthenforwardedto
How Can I Implement LSNAT?September 8, 2010 Page 3 of 28ServerandTCP/UDPportverificationcanensurethattheportsusedbyLSNATareoperational.
LSNAT OverviewSeptember 8, 2010 Page 4 of 28LSNAT OverviewThissectionprovidesanoverviewoftheLSNATcomponents.TheLSNATconfigurationismadeu
LSNAT OverviewSeptember 8, 2010 Page 5 of 28Figure 2 LSNAT Packet FlowThe Server FarmTheserverfarmisalogicalentitymadeupofmultiplerealser
LSNAT OverviewSeptember 8, 2010 Page 6 of 28configuredwiththedefaultweight,eachrealserveristreatedequallyasdescribedinthesimpleroundr
LSNAT OverviewSeptember 8, 2010 Page 7 of 28PingRealserverfailuredetectioncanbeconfiguredforpingonly.Inthiscase,therealserverispinged
LSNAT OverviewSeptember 8, 2010 Page 8 of 28Youcansearchforareplystringof“200OK”.Thiswouldresultinasuccessfulverificationoftheservi
LSNAT OverviewSeptember 8, 2010 Page 9 of 28addressthatreturnstrafficbackthroughtheLSNATrouter.SincetheclientIPaddressesareusuallyunkn
Configuring LSNATSeptember 8, 2010 Page 10 of 28Managing Connections and StatisticsTherearethreeaspectstomanagingconnections:•ClearingallLSNAT
Configuring LSNATSeptember 8, 2010 Page 11 of 28Table 2listsLSNATresourcelimits.LSNAT Configuration ConsiderationsThefollowingconsiderationsmu
Authentication OverviewApril 15, 2011 Page 8 of 36Figure 3 Selecting Authentication Method When Multiple Methods are ValidatedRemote Authentication D
Configuring LSNATSeptember 8, 2010 Page 12 of 28•WhendifferentVIPsaccessthesamerealserverindifferentserverfarms,thepersistencelevelmust
Configuring LSNATSeptember 8, 2010 Page 13 of 28Configuring an LSNAT Virtual ServerProcedure 3describeshowtoconfigureanLSNATvirtualserver.3.
Configuring LSNATSeptember 8, 2010 Page 14 of 284. In SLB virtual server configuration command mode, configure the virtual server IP address (VIP) or
Configuring LSNATSeptember 8, 2010 Page 15 of 28Configuring Global SettingsTable 3describeshowtoconfigureLSNATglobalsettings.Displaying LSNAT
LSNAT Configuration ExampleSeptember 8, 2010 Page 16 of 28LSNAT Configuration ExampleThissectionprovidesanenterpriseLSNATconfigurationexamplet
LSNAT Configuration ExampleSeptember 8, 2010 Page 17 of 28Enterprise Internal HTTP Server FarmTheenterpriseinternalHTTPserverfarm,realserveran
LSNAT Configuration ExampleSeptember 8, 2010 Page 18 of 28Figure 3 LSNAT Configuration Example
LSNAT Configuration ExampleSeptember 8, 2010 Page 19 of 28Configuring the myproductHTTP Server Farm and Real ServersConfigurethemyproductHTTPserver
LSNAT Configuration ExampleSeptember 8, 2010 Page 20 of 28System(rw-config-slb-real)->faildetect acv-command “HEAD / HTTP/1.1\\r\\nHost: www.myprod
LSNAT Configuration ExampleSeptember 8, 2010 Page 21 of 28myproductFTP Server Farm and Real Server CLI InputSystem(rw-config)->ip slb serverfarm my
Authentication OverviewApril 15, 2011 Page 9 of 36Requiredauthenticationcredentialsdependupontheauthenticationmethodbeingused.For802.1xand
LSNAT Configuration ExampleSeptember 8, 2010 Page 22 of 28• Configuringafaildetectcommandstring,replystring,andreadtillindexvalueforeach
LSNAT Configuration ExampleSeptember 8, 2010 Page 23 of 28Configuring the myinternalFTP Server Farm Real ServersConfigurethemyinternalFTPserverfar
LSNAT Configuration ExampleSeptember 8, 2010 Page 24 of 28Configuring the myinternalSMTP Server Farm and Real ServersConfigurethemyinternalSMTPserv
Terms and DefinitionsSeptember 8, 2010 Page 25 of 28ThiscompletestheLSNATconfigurationexample.Terms and DefinitionsTable 5liststermsanddefini
Terms and DefinitionsSeptember 8, 2010 Page 26 of 28Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncon
Terms and DefinitionsSeptember 8, 2010 Page 28 of 28
April 16, 2009 Page 1 of 32Configuring MulticastThisdocumentprovidesinformationaboutconfiguringandmonitoringmulticas tonEnterasysMatrix®N‐
How Do I Implement Multicast?April 16, 2009 Page 2 of 32How Do I Implement Multicast?YoucanimplementtheIGMP,DVMRP,andPIMmulticastprotocolson
Understanding MulticastApril 16, 2009 Page 3 of 32IGMPusesthreekeycomponentstocontrolmulticastmembership:• Source—AserverthatsendsanIP
Komentáře k této Příručce