Enterasys N Standalone (NSA) Series Specifikace

Procházejte online nebo si stáhněte Specifikace pro Síťové přepínače Enterasys N Standalone (NSA) Series. Enterasys N Standalone (NSA) Series Specifications Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 402
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 0
April 15, 2011 Page 1 of 36
Configuring User Authentication
Thischapterprovidesthefollowinginformationaboutconfiguringandmonitoringuser
authenticationonEnterasys
®
NSeries,SSeries
®
,andKSeriesmodularswitches,ASeries,
BSeries,CSeriesstackablefixedswitches,andDSeries,GSeries,and ISeriesstandalonefixed
switches.
What is User Authentication?
Authenticationistheabilityofanetworkaccessserver,withadatabaseofvalidusersanddevices,
toacquireandverifytheappropriatecredentialsofauserordevice(supplicant)attemptingto
gainaccesstothenetwork.EnterasysauthenticationusestheRADIUSprotocoltocontrolaccessto
switchportsfroman
authenticationserverandtomanagethemessageexchangebetweenthe
authenticatingdeviceandtheserver.BothMultiAuthandMultiuserauthenticationare
supported.MultiAuthistheabilitytoconfiguremultipleauthenticationmodesforauserand
applytheauthenticationmodewiththehighestprecedence.Multiuseristheabilityto
appropriatelyauthenticatemultiplesupplicantsonasinglelinkandprovisionnetworkresources,
baseduponanappropriatepolicyforeachsupplicant.TheEnterasysswitchproductssupportthe
followingfiveauthenticationmethods:
IEEE802.1x
•MACbasedAuthenti cation(MAC)
•PortWebAuthentication(PWA)
Note: Through out this document:
Use of the term “modular switch” indicates that the information is valid for the N-Series, S-Series,
and K-Series platforms.
Use of the term “stackable fixed switch” indicates that the information is valid for the A-Series,
B-Series, and C-Series platforms.
Use of the term “standalone fixed switch” indicates that the information is valid for the D-Series,
G-Series, and I-Series platforms.
For information about... Refer to page...
What is User Authentication? 1
Why Would I Use It in My Network? 2
How Can I Implement User Authentication? 2
Authentication Overview 2
Configuring Authentication 14
Authentication Configuration Example 29
Terms and Definitions 34
Zobrazit stránku 0
1 2 3 4 5 6 ... 401 402

Shrnutí obsahu

Strany 1 - What is User Authentication?

April 15, 2011 Page 1 of 36Configuring User AuthenticationThischapterprovidesthefollowinginformationaboutconfiguringandmonitoringuserauthen

Strany 2

Authentication OverviewApril 15, 2011 Page 10 of 36RFC 3580EnterasysswitchessupporttheRFC3580RADIUStunnelattributefordynamicVLANassignment

Strany 3 - Port Web Authentication (PWA)

Understanding MulticastApril 16, 2009 Page 4 of 32IGMP Support on Enterasys DevicesEnterasysdevicesimplementIGMPversion2(RFC2236),whichinclud

Strany 4 - Convergence End Point (CEP)

Understanding MulticastApril 16, 2009 Page 5 of 32EachrouterperformsanIGMPforwardingchecktoseeifthereareanyhoststhatwanttojointhemu

Strany 5 - Multi-User Authentication

Understanding MulticastApril 16, 2009 Page 6 of 32KeyfeaturesofDVMRParethefollowing:•usesthewell‐knownmulticastIPaddress224.0.0.4•usesIGM

Strany 6 - Port ge.1.5

Understanding MulticastApril 16, 2009 Page 7 of 32Route TableEachDVMRP‐enableddevicebuildsaDVMRProutetabletomaintainroutestoallnetworksi

Strany 7 - MAU LogicMAU Logic

Understanding MulticastApril 16, 2009 Page 8 of 32Asshowninthefollowingexample,theMroutetabledisplaystheincominginterfaceIPaddress,the

Strany 8 - MAU Logic

Understanding MulticastApril 16, 2009 Page 9 of 324. Determinesifthereisactivesourceinformationforthesourcenetwork,multicastgroup(S,G)pa

Strany 9 - The RADIUS Filter-ID

Understanding MulticastApril 16, 2009 Page 10 of 324. Ifthesenderwasadownstreamdependentneighborfromwhichaprunehadpreviouslybeenreceive

Strany 10 - RFC 3580

Understanding MulticastApril 16, 2009 Page 11 of 32PIM,ashared‐treetechnology,designatesarouterastherendezvouspoint(RP),whichistheroot

Strany 11 - April 15, 2011 Page 11 of 36

Understanding MulticastApril 16, 2009 Page 12 of 327. Aprunemessage(register‐stop)issentfromtheRPtothesource’sDR(number7infigure).Onc

Strany 12 - Policy Maptable Response

Understanding MulticastApril 16, 2009 Page 13 of 32•Register‐Stop—ThesemessagesareusedbytheRPtotellthesource’sDRtostopregisteringtraf

Strany 13 - April 15, 2011 Page 13 of 36

Authentication OverviewApril 15, 2011 Page 11 of 36• Value:Indicatesthetypeoftunnel.Avalueof0x0D(decimal13)indicatesthatthe tunnelingp

Strany 14 - Configuring Authentication

Understanding MulticastApril 16, 2009 Page 14 of 32Rendezvous Point (RP) The root of a group-specific distribution tree whose branches extend to all n

Strany 15 - April 15, 2011 Page 15 of 36

Configuring MulticastApril 16, 2009 Page 15 of 32Configuring MulticastThissectionprovidesthef ollowinginformationaboutconfiguringmulticaston

Strany 16 - Configuring IEEE 802.1x

Configuring MulticastApril 16, 2009 Page 16 of 32Table 3liststheLayer2IGMPconfigurationcommandsforSecureStack,D‐Series,G‐Series,andI‐Seri

Strany 17 - April 15, 2011 Page 17 of 36

Configuring MulticastApril 16, 2009 Page 17 of 32Table 4liststheLayer3IGMPconfigurationcommandsforSecureStackC2andC3devicesandG‐Series

Strany 18 - April 15, 2011 Page 18 of 36

Configuring MulticastApril 16, 2009 Page 18 of 32Basic IGMP ConfigurationsProcedure 1describesthebasicstepstoconfigureIGMPonEnterasysMatrix

Strany 19 - April 15, 2011 Page 19 of 36

Configuring MulticastApril 16, 2009 Page 19 of 32Example IGMP Configuration: Enterasys Matrix N-Seriesmatrix->set igmp enable 2, 3matrix->set ig

Strany 20 - April 15, 2011 Page 20 of 36

Configuring MulticastApril 16, 2009 Page 20 of 32Table 6listsLayer3IGMPshowcommandsforEnterasysMatrixN‐Seriesdevices.Table 7listsLayer2

Strany 21 - April 15, 2011 Page 21 of 36

Configuring MulticastApril 16, 2009 Page 21 of 32Table 10liststheDVMRPconfigurationcommandsfor SecureStackC2andC3devicesandG‐Seriesdevic

Strany 22 - April 15, 2011 Page 22 of 36

Configuring MulticastApril 16, 2009 Page 22 of 32SecureStack C2 and C3 and G-SeriesProcedure 5describesthebasicstepstoconfigureDVMRPonSecureS

Strany 23 - April 15, 2011 Page 23 of 36

Configuring MulticastApril 16, 2009 Page 23 of 32Router R2 ConfigurationFortheVLAN1interface,whichprovidesconnectiontotheRouterR1,anIPad

Strany 24 - April 15, 2011 Page 24 of 36

Authentication OverviewApril 15, 2011 Page 12 of 36•AproblemwithmovinganendsystemtoanewVLANisthattheendsystemmustbeissuedanIPaddr

Strany 25 - April 15, 2011 Page 25 of 36

Configuring MulticastApril 16, 2009 Page 24 of 32Configuring PIMPIM-SM Configuration CommandsTable 13liststhePIM‐SMsetcommandsforEnterasysMatr

Strany 26 - Configuring RADIUS

Configuring MulticastApril 16, 2009 Page 25 of 32Basic PIM-SM ConfigurationsBydefault,PIM‐SMisdisabledgloballyonEnterasysMatrixN‐Series,Secu

Strany 27 - Configuring RADIUS Accounting

Configuring MulticastApril 16, 2009 Page 26 of 32Procedure 7describesthebasicstepstoconfigurePIM‐SMonaSecureStackC2andC3devicesandG‐Se

Strany 28 - April 15, 2011 Page 28 of 36

Configuring MulticastApril 16, 2009 Page 27 of 32Example ConfigurationFigure 6illustratesthePIM‐SMconfigurationoffourEnterasysMatrixN‐Series

Strany 29 - April 15, 2011 Page 29 of 36

Configuring MulticastApril 16, 2009 Page 28 of 32R1>Router(config)#interface vlan 3R1>Router(config-if(Vlan 3))#ip address 172.1.2.1 255.255.255

Strany 30 - April 15, 2011 Page 30 of 36

Configuring MulticastApril 16, 2009 Page 29 of 32Router R3 ConfigurationOnthisrouter,PIM‐SMisenabledonallinterfaces.VLAN10isconfiguredas

Strany 31 - Enabling RADIUS On the Switch

Configuring MulticastApril 16, 2009 Page 30 of 32R4>Router(config)#interface vlan 7R4>Router(config-if(Vlan 7))#ip address 172.4.4.4 255.255.255

Strany 32 - April 15, 2011 Page 32 of 36

Refertothedevice’sCLIReferenceGuideorConfigurationGuide ,asapplicable,foradescriptionoftheoutputofeachcommand.Display the PIM-SM s

Strany 33 - April 15, 2011 Page 33 of 36

Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedinthisdocumentanditswebsitewithoutpri

Strany 34

September 08, 2010 Page 1 of 18Configuring Network Address Translation (NAT)Thisdocumentprovidesthe followinginformationaboutconfiguringNetwor

Strany 35 - April 15, 2011 Page 35 of 36

Authentication OverviewApril 15, 2011 Page 13 of 36authorizationisenabledgloballyandontheauthenticatinguser’sport,theVLANspecifiedbythe

Strany 36

Why Would I Use NAT in My Network?September 08, 2010 Page 2 of 18Why Would I Use NAT in My Network?EnterasyssupportforNATprovidesapracticalsolu

Strany 37 - Flex-Edge

NAT OverviewSeptember 08, 2010 Page 3 of 18NAT OverviewThissectionprovidesanoverviewofNATconfiguration.NAT ConfigurationAtraditionalNATconf

Strany 38 - Flex-Edge Overview

NAT OverviewSeptember 08, 2010 Page 4 of 18WhenServer1respondstoClient1,itspacketarrivesattheNATrouterwithClient1’stranslatedaddressof

Strany 39

NAT OverviewSeptember 08, 2010 Page 5 of 18Figure 2 Basic NAPT Static Inside Address TranslationDynamic Inside Address TranslationsDynamicaddressbi

Strany 40 - December 02, 2010 Page 4 of 5

NAT OverviewSeptember 08, 2010 Page 6 of 18Figure 3 Basic NAT Dynamic Inside Address TranslationClient2 Walkthrough:ApacketarrivesattheNATroute

Strany 41

NAT OverviewSeptember 08, 2010 Page 7 of 18Client1 Walkthrough:ApacketarrivesattheNATrouterfromClient1withasourceaddressof10.1.1.1:125,

Strany 42 - Configuring Link Aggregation

NAT OverviewSeptember 08, 2010 Page 8 of 18DNS, FTP and ICMP SupportNATworkswithDNSbyhavingtheDNSApplicationLayerGateway(ALG)translatean

Strany 43

Configuring NATSeptember 08, 2010 Page 9 of 18NAT BindingANATflowhastwodevicesassociatedwithitthatareincommunicationwitheachother:the

Strany 44 - Link Aggregation Overview

Configuring NATSeptember 08, 2010 Page 10 of 18Table 2listsNATresourcelimits.Overload Specifies that NAPT translation should take place for this

Strany 45

Configuring NATSeptember 08, 2010 Page 11 of 18Configuring Traditional NAT Static Inside Address TranslationProcedure 1describeshowtoconfiguretra

Strany 46 - Attached Ports

Configuring AuthenticationApril 15, 2011 Page 14 of 36Configuring AuthenticationThissectionprovidesdetailsfortheconfigurationofauthentication

Strany 47

NAT Configuration ExamplesSeptember 08, 2010 Page 12 of 18Displaying NAT StatisticsTable 4describeshowtodisplayNATstatistics.NAT Configuration

Strany 48 - LAG Port Parameters

NAT Configuration ExamplesSeptember 08, 2010 Page 13 of 18NAT Static Configuration ExampleThisexamplestepsyouthroughaNATstaticconfigurat ionf

Strany 49 - The Out-Port Algorithm

NAT Configuration ExamplesSeptember 08, 2010 Page 14 of 18System(su-config-intf-vlan.0.10)->exitSystem(rw-config)->EnableNAToutsideinterface:

Strany 50 - Static Port Assignment

NAT Configuration ExamplesSeptember 08, 2010 Page 15 of 18Figure 6 NAT Dynamic Configuration ExampleServer1200.1.1.50200.1.1.50:80NATROUTERDA: 200.1.

Strany 51

NAT Configuration ExamplesSeptember 08, 2010 Page 16 of 18ToconfigureClient3andClient4for dynamicNAPTtranslationontheNATrouter,wedefine

Strany 52

Terms and DefinitionsSeptember 08, 2010 Page 17 of 18Define the NAT Pools for Global AddressesDefinetheNATPoolfortheNATclients:System(rw-config

Strany 53

Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedinthisdocumentanditswebsitewithoutpri

Strany 54

October 15, 2008 Page 1 of 14Configuring Neighbor DiscoveryThisdocumentprovidesinformationaboutconfiguringandmonitoringneighbordiscoveryonE

Strany 55

How Do I Implement Neighbor Discovery?October 15, 2008 Page 2 of 14How Do I Implement Neighbor Discovery?LLDP,EnterasysDiscoveryProtocol,andCisco

Strany 56

Understanding Neighbor DiscoveryOctober 15, 2008 Page 3 of 14Figure 1 Communication between LLDP-enabled DevicesLLDP-MEDTheLLDP‐MediaEndpointDisco

Strany 57

Configuring AuthenticationApril 15, 2011 Page 15 of 36pwa Globally enables or disables PWA authentication.Disabled.pwa enhancemode Allows a user on an

Strany 58 - Configuring the Server

Understanding Neighbor DiscoveryOctober 15, 2008 Page 4 of 14TherearetwoprimaryLLDP‐MEDdevicetypes(asshowninFigure 2 onpage5):•Networkco

Strany 59

Understanding Neighbor DiscoveryOctober 15, 2008 Page 5 of 14Figure 2 LLDP-MEDIP NetworkInfrastructure(IEEE 802 LAN)LLDP-MED Communication Device End

Strany 60 - End-Users

Understanding Neighbor DiscoveryOctober 15, 2008 Page 6 of 14LLDPDU FramesAsshowninFig ure 3,eachLLDPDUframecontainsthefollowingmandatory T

Strany 61

Configuring LLDPOctober 15, 2008 Page 7 of 14–VLANName—AllowsabridgetoadvertisethetextualnameofanyVLANwithwhichitisconfigured.–Proto

Strany 62

Configuring LLDPOctober 15, 2008 Page 8 of 14Set the time-to-live value used in LLDP frames sent by this device. The time-to-live for LLDPDU data is c

Strany 63

Configuring LLDPOctober 15, 2008 Page 9 of 14Refertothedevice’sCLIReferenceGuideorConfigurationGuide,asapplicable,formoreinformationabo

Strany 64

Configuring LLDPOctober 15, 2008 Page 10 of 14Basic LLDP ConfigurationsProcedure 1describesthebasicstepstoconfigureLLDPonEnterasysMatrixN‐S

Strany 65 - What is Link Flap Detection?

Configuring LLDPOctober 15, 2008 Page 11 of 14Example LLDP Configuration: Time to LiveThisexamplesetsthetransmitintervalto20secondsandtheho

Strany 66 - January 29, 2009 Page 2 of 4

Configuring Enterasys Discovery ProtocolOctober 15, 2008 Page 12 of 14Configuring Enterasys Discovery ProtocolEnterasys Discovery Protocol Configurati

Strany 67 - January 29, 2009 Page 3 of 4

Configuring Cisco Discovery ProtocolOctober 15, 2008 Page 13 of 14Configuring Cisco Discovery ProtocolCisco Discovery Protocol Configuration CommandsT

Strany 68

Configuring AuthenticationApril 15, 2011 Page 16 of 36Configuring IEEE 802.1xConfiguringIEEE802.1xonanauthenticatorswitchportconsistsof:•Sett

Strany 69 - Configuring Load Sharing

Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedinthisdocumentanditswebsitewithoutpri

Strany 70 - ServerFarm

May 18, 2011 Page 1 of 21Configuring NetFlowThisdocumentdescribestheNetFlowfeatureanditsconfigurationonEnterasys®N‐Series,S‐Series,K‐Seri

Strany 71 - How Can I Implement LSNAT?

How Can I Implement NetFlow?May 18, 2011 Page 2 of 21rescheduledforlowusagetimeblocks,ormaybeanillegitimateusageofthenetworkthatcanbe

Strany 72 - LSNAT Overview

How Can I Implement NetFlow?May 18, 2011 Page 3 of 21Figure 1 NetFlow Network Profile ExampleTocompleteaNetFlownetworkprofile,enableNetFlowon

Strany 73

Understanding FlowsMay 18, 2011 Page 4 of 212. Chooseuptofourcollectorsandamanagementapplication,suchasEnterasysSIEMorNetSightRelease4

Strany 74 - The Real Server

Understanding FlowsMay 18, 2011 Page 5 of 21Figure 2providesagraphicdepictionofhowthesetimersinteract.Flows1and3showasinglelonglasti

Strany 75

Configuring NetFlow on the Enterasys S-Series, N-Series, and K-Series ModulesMay 18, 2011 Page 6 of 21• Examiningflowsbypriority•Characterizingtra

Strany 76 - The Virtual Server

Configuring NetFlow on the Enterasys S-Series, N-Series, and K-Series ModulesMay 18, 2011 Page 7 of 21Configuring the Active Flow Export TimerTheacti

Strany 77 - Real Server Port

Configuring NetFlow on the Enterasys S-Series, N-Series, and K-Series ModulesMay 18, 2011 Page 8 of 21WhentransmittingNetFlowVersion5reports,the

Strany 78 - Configuring LSNAT

Configuring NetFlow on the Enterasys S-Series, N-Series, and K-Series ModulesMay 18, 2011 Page 9 of 21Thedefaultbehaviorisforthetemplatetobes

Strany 79

Configuring AuthenticationApril 15, 2011 Page 17 of 36Configuring MAC-based AuthenticationConfiguringMAC‐basedauthenticationonaswitchconsistsof

Strany 80

Configuring NetFlow on the Enterasys S-Series, N-Series, and K-Series ModulesMay 18, 2011 Page 10 of 21Ifthevlanoptionisenabled,VLANsassociated

Strany 81

Configuring NetFlow on the X-Series RouterMay 18, 2011 Page 11 of 21Default NetFlow Settings for S-Series, N-Series, and K-Series SystemsTable 1provi

Strany 82

Configuring NetFlow on the X-Series RouterMay 18, 2011 Page 12 of 21TheX‐SeriesroutercurrentlysupportsdataexportVersion1andVersion5.CLIco

Strany 83 - Configuring Global Settings

Configuring NetFlow on the X-Series RouterMay 18, 2011 Page 13 of 21Whenyouexecutetheclearnetflowallcommand,allNetFlowsettingsarereturned

Strany 84 - LSNAT Configuration Example

Terms and DefinitionsMay 18, 2011 Page 14 of 21Terms and DefinitionsTable 3liststermsanddefinitionsusedinthisNetFlowconfigurationdiscussion.

Strany 85

NetFlow Version 9 TemplatesMay 18, 2011 Page 15 of 21NetFlow Version 9 TemplatesTheNetFlowVersion9implementationsupports15IPv4(templates256t

Strany 86

NetFlow Version 9 TemplatesMay 18, 2011 Page 16 of 21datarecordfieldsdefinedintheNetFlowstandard.Thecontentsofthesedatarecordfieldsare

Strany 87

NetFlow Version 9 TemplatesMay 18, 2011 Page 17 of 21specificdatarecordsareonlysupportedbyIPv4templates.IPv6specificdatarecordsareonlys

Strany 88

NetFlow Version 9 TemplatesMay 18, 2011 Page 18 of 21Table 9providesadescriptionofeachIPv4andIPv6NetFlowVersion9templatepertemplateID.D

Strany 89

264 Switch and IPv4 route ID template containing IPv4 base data record entries, along with the route next hop.265 Switch, IPv4 route ID, and MAC ID te

Strany 90

Configuring AuthenticationApril 15, 2011 Page 18 of 36Configuring Port Web Authentication (PWA)ConfiguringPWAontheswitchconsistsof:•Settingthe

Strany 91

NetFlow Version 9 TemplatesMay 18, 2011 Page 20 of 21281 Switch, IPv6 route ID, and MAC ID template containing IPv6 base data record entries, along wi

Strany 92

Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedinthisdocumentanditswebsitewithoutpri

Strany 93

June 3, 2011 Page 1 of 14Configuring Power over Ethernet ManagementThisdocumentprovidesinformationaboutconfiguringandmonitoringPoweroverEthe

Strany 94

How Do I Implement PoE?June 3, 2011 Page 2 of 14How Do I Implement PoE?YoucanconfigurePoEonyourPoE‐compliantEnterasysdevicethroughtheCLI‐ba

Strany 95

How Do I Implement PoE?June 3, 2011 Page 3 of 14• Automaticmode,inwhichavailablepowerisdistributedevenlytoPoE‐capablemodulesbasedonPoEp

Strany 96

Configuring PoEJune 3, 2011 Page 4 of 14Configuring PoETable 2liststhePoEsettingsthatyoucanconfigurethroughthe CLIoneachPoE‐compliantEn

Strany 97

Configuring PoEJune 3, 2011 Page 5 of 14Stackable A2, A4, B2, B3, C2, C3 and Standalone D-Series DevicesRefertothedevice’sConfigurationGuideorC

Strany 98 - How Do I Implement Multicast?

Configuring PoEJune 3, 2011 Page 6 of 14Stackable B5 and C5 DevicesProcedure 2 PoE Configuration for Stackable B5 and C5 DevicesStep Task Command(s)1.

Strany 99 - April 16, 2009 Page 3 of 32

Configuring PoEJune 3, 2011 Page 7 of 14Refertothedevice’sConfigurationGuideorCLIReferenceGuideformoreinformationabouteachcommand.G-Ser

Strany 100 - & IGMP Leave

Configuring PoEJune 3, 2011 Page 8 of 144. (Optional) Specify the method the Enterasys device uses to detect connected PDs.• auto (default) — The Ente

Strany 101 - Overview

Configuring AuthenticationApril 15, 2011 Page 19 of 36Whenenhancedmodeisenabled,PWAwilluseaguestpasswordandguestusernametograntnetwor

Strany 102 - Probe Messages

Configuring PoEJune 3, 2011 Page 9 of 147. (Optional) Configure the allocation mode for system power available for PoE.• auto (default) — Available po

Strany 103 - Route Table

Configuring PoEJune 3, 2011 Page 10 of 14Refertothedevice’sCLIReferenceGuideformoreinformationabouteachcommand.Modular N-Series, S-Series,

Strany 104 - Prune Messages

Configuring PoEJune 3, 2011 Page 11 of 144. (Optional) Set the PoE usage threshold on a module. Valid values are 1–99 percent. set inlinepower thresho

Strany 105 - Graft Messages

Configuring PoEJune 3, 2011 Page 12 of 14Refertothedevice’sConfigurationGuideformoreinformationabouteachcommand.Example PoE ConfigurationA

Strany 106

Configuring PoEJune 3, 2011 Page 13 of 14PoE Display CommandsTable 3listsPoEshowcommandsforEnterasysdevices.Refertothedevice’sCLIReferenc

Strany 107 - Receiver

Configuring PoEJune 3, 2011 Page 14 of 14Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedint

Strany 108 - Message Types

May 18, 2009 Page 1 of 32Configuring PolicyThisdocumentdescribestheEnterasys®policyfeatureanditsconfigurationonEnterasysMatrix®N‐Series,

Strany 109 - PIM Terms and Definitions

How Can I Implement Policy?May 18, 2009 Page 2 of 32Securitycanbeenhancedbyallowingonlyintendedusersanddevicesaccesstonetworkprotocolsa

Strany 110 - April 16, 2009 Page 14 of 32

Policy OverviewMay 18, 2009 Page 3 of 32Standard and Enhanced Policy on Enterasys PlatformsTherearetwosetsofpolicycapabilitiessupported,depend

Strany 111 - Configuring Multicast

Policy OverviewMay 18, 2009 Page 4 of 32networkaccess andresourceusagealignwiththesecurityrequirements,networkcapabilities,andlegitimate

Strany 112 - Series Devices)

Why Would I Use It in My Network?April 15, 2011 Page 2 of 36• ConvergenceEndPoint(CEP)•RADIUSSnoopingEnterasysswitchproductssupporttheconfigu

Strany 113

Configuring AuthenticationApril 15, 2011 Page 20 of 36Procedure 5describesthestepstoconfigureCEP.Setting MultiAuth Idle and Session Timeout for

Strany 114 - Basic IGMP Configurations

Policy OverviewMay 18, 2009 Page 5 of 32Assigning a Class of Service to this RoleHowapacketistreatedasittransitsthelinkcanbeconfiguredin

Strany 115 - IGMP Display Commands

Policy OverviewMay 18, 2009 Page 6 of 32UsethesetpolicymaptablecommandspecifyingasingleVLANIDorrangeofIDsandthepolicyprofile‐indext

Strany 116 - Configuring DVMRP

Policy OverviewMay 18, 2009 Page 7 of 32•Appliesboththefilter‐IDandtheVLANtunnelattributesifallattributesexistIfallattributesexist,the

Strany 117 - Basic DVMRP Configurations

Policy OverviewMay 18, 2009 Page 8 of 32Policyrulesarebasedontrafficclassifications.Table 1onpage 8providesthesupportedpolicyruletraffi

Strany 118 - Router R1 Router R2

Policy OverviewMay 18, 2009 Page 9 of 32Adatavalueisassociatedwithmosttrafficclassificationstoidentifythespecificnetworkelementforthat

Strany 119 - Displaying DVMRP Information

Policy OverviewMay 18, 2009 Page 10 of 32storagedoespersistafteraresetofthedevice.Usethestorage‐typeoptiontospecifythedesiredstorage

Strany 120 - Configuring PIM

Policy OverviewMay 18, 2009 Page 11 of 32SIP(ip),DIP(ip),Protocol,TOS/DSCP,Fragmentationindication,DestinationPORT,andSourcePort.Usetheset

Strany 121 - Basic PIM-SM Configurations

Policy OverviewMay 18, 2009 Page 12 of 32Standard and Enhanced Policy ConsiderationsThissectionitemizesadditionalpolicyconsiderationsfortheSec

Strany 122 - April 16, 2009 Page 26 of 32

Policy OverviewMay 18, 2009 Page 13 of 32Table 4providesacross‐referenceofstandard()andenhanced(X)policycapabilitytotrafficclassificatio

Strany 123 - Example Configuration

Policy OverviewMay 18, 2009 Page 14 of 32Time-To-Live (TTL) XXXXXXXXXIP Type of Service XXX XXXIP Protocol XXX XXXEther II Packet Type XX XXXLLC DSAP/

Strany 124 - Router R2 Configuration

Configuring AuthenticationApril 15, 2011 Page 21 of 36Procedure 6describessettingtheMultiAuthidleandsessiontimeoutforCEP.Configuring MultiA

Strany 125 - Router R4 Configuration

Configuring PolicyMay 18, 2009 Page 15 of 32Configuring PolicyThissectionpresentsconfigurationproceduresandtablesincludingcommanddescription

Strany 126 - PIM-SM Display Commands

Configuring PolicyMay 18, 2009 Page 16 of 32• append - (Optional) Appends any egress, forbidden, or untagged specified VLANs to the existing list. If

Strany 127 - Task Command

Configuring PolicyMay 18, 2009 Page 17 of 32Procedure 2describeshowtoconfigureclassificationrulesasanadministrativeprofileortoassignpoli

Strany 128 - Revision History

Configuring PolicyMay 18, 2009 Page 18 of 32• trap - (Optional) An enhanced policy that enables or disables sending SNMP trap messages on first rule u

Strany 129

Configuring PolicyMay 18, 2009 Page 19 of 32Table 5describeshowtodisplaypolicyinformationandstatistics.5. Optionally, for enhanced policy cap

Strany 130 - How Can I Implement NAT?

Configuring PolicyMay 18, 2009 Page 20 of 32In switch command mode, display a count of the number of times the device has dropped syslog or trap rule

Strany 131 - NAT Overview

Policy Configuration ExampleMay 18, 2009 Page 21 of 32Policy Configuration ExampleThissectionpresentsacollege‐basedpolicyconfigurationexample.

Strany 132

Policy Configuration ExampleMay 18, 2009 Page 22 of 32RolesTheexampledefinesthefollowingroles:• guest‐Usedasthedefaultpolicyforallunaut

Strany 133 - Client1 Walkthrough:

Policy Configuration ExampleMay 18, 2009 Page 23 of 32Basic EdgeProtocolsnotappropriatetotheedgeshouldbeblocked.Forthisexamplewewillbloc

Strany 134 - Client2 Walkthrough:

Policy Configuration ExampleMay 18, 2009 Page 24 of 32Forthisconfigurationexample,CoSrelatedconfigurationwillbespecifiedasafinalCoS.For

Strany 135

Configuring AuthenticationApril 15, 2011 Page 22 of 36switchdevices).Youmaychangetheprecedenceforoneormoremethodsbysettingtheauthentica

Strany 136 - NAT Router Limits

Policy Configuration ExampleMay 18, 2009 Page 25 of 32ARPforwardingisrequiredonetherport0x806.Enterasys(rw)->set policy rule 1 ether 0x806 m

Strany 137 - Configuring NAT

Policy Configuration ExampleMay 18, 2009 Page 26 of 32Studentsshouldonlybeallowedaccesstotheservicesserver(subnet10.10.50.0/24)andshould

Strany 138 - Table 2 NAT Resource Limits

Policy Configuration ExampleMay 18, 2009 Page 27 of 32Configuring Policy for the Edge Faculty SecureStack C3Configuring the Policy RoleThefacultyrol

Strany 139

Policy Configuration ExampleMay 18, 2009 Page 28 of 32•AnameofphoneN3•AdefaultportVLANof0•AdefaultCoSof4BecauseVLANscanbeappliedtoN3

Strany 140 - NAT Configuration Examples

Policy Configuration ExampleMay 18, 2009 Page 29 of 32Configuring Policy for the Edge Services N-Series N3Configuring the Policy RoleTheservicesrole

Strany 141 - System(rw)->configure

Policy Configuration ExampleMay 18, 2009 Page 30 of 32Enable Enhanced Policy Capabilities on the Services N3 PlatformTheservicesN3platformsupports

Strany 142

Terms and DefinitionsMay 18, 2009 Page 31 of 32Terms and DefinitionsTable 6liststermsanddefinitionsusedinthispolicyconfigurationdiscussion.T

Strany 143

Revision HistoryEnterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedinthisdocumentanditsweb

Strany 144

May 04, 2011 Page 1 of 15Configuring Port MirroringThisdocumentprovidesthe followinginformationaboutconfiguringandmonitoringportmirroringo

Strany 145 - Terms and Definitions

Why Would I Use Port Mirroring in My Network?May 04, 2011 Page 2 of 15•Many‐to‐manyDependingonyournetwork,portsthatyoucanconfiguretoparticip

Strany 146

Configuring AuthenticationApril 15, 2011 Page 23 of 36Procedure 9describessettingtheMultiAuthauthenticationportandmaximumuserproperties.Set

Strany 147 - What is Neighbor Discovery?

How Do I Implement Port Mirroring?May 04, 2011 Page 3 of 15Figure 2 Using Port Mirroring to Monitor All Incoming Traffic to a Backbone SwitchThemany

Strany 148 - October 15, 2008 Page 2 of 14

Overview of Port Mirroring Configurations on Enterasys SwitchesMay 04, 2011 Page 4 of 15Overview of Port Mirroring Configurations on Enterasys Switche

Strany 149 - LLDP-MED

Overview of Port Mirroring Configurations on Enterasys SwitchesMay 04, 2011 Page 5 of 15RefertotheLinkAggregationsectionofyourdevice’sConfigu

Strany 150 - October 15, 2008 Page 4 of 14

Configuring Port MirrorsMay 04, 2011 Page 6 of 15VLAN MirrorsCreatingaVLANandsettingamirrorfortheVLANallowsyoutomonitoralltraffictoyo

Strany 151 - Infrastructure

Configuring Port MirrorsMay 04, 2011 Page 7 of 15Thereisnorestrictiononthenumberofsourceportsthatcanbeincludedinamirrortoadestinati

Strany 152 - LLDPDU Frames

Configuring Port MirrorsMay 04, 2011 Page 8 of 15displaytheVTAPport.Tocreatetheportmirrorusethesetportmirroringcreatecommandspecifying

Strany 153 - Configuring LLDP

Configuring Port MirrorsMay 04, 2011 Page 9 of 15• ClearingPortMirroring(page10)Reviewing Port Mirroring Usethiscommandtodisplaythestatusof

Strany 154 - October 15, 2008 Page 8 of 14

Configuring Port MirrorsMay 04, 2011 Page 10 of 15Clearing Port MirroringUsethiscommandtoclearaportmirroringconfiguration:clear port mirroring

Strany 155 - October 15, 2008 Page 9 of 14

Example: Configuring and Monitoring Port MirroringMay 04, 2011 Page 11 of 15Usethiscommandtoclearaportmirroringconfiguration:clear port mirror

Strany 156 - Basic LLDP Configurations

Example: Configuring and Monitoring Port MirroringMay 04, 2011 Page 12 of 15TheAddDevicescreendisplays.5. ModelthePlatinumDFEbyenteringitsI

Strany 157 - LLDP Display Commands

Configuring AuthenticationApril 15, 2011 Page 24 of 36Setting MultiAuth Authentication TrapsTraps canbeenabledatthesystemandmodulelevelswhen

Strany 158

Example: Configuring and Monitoring Port MirroringMay 04, 2011 Page 13 of 1510. Repeatstep9forport5(fe.1.5showninFigure 3).RMONEthernetstat

Strany 159

Example: Configuring an IDS MirrorMay 04, 2011 Page 14 of 15Example: Configuring an IDS MirrorAsstatedintheoverviewaboutIDSMirrorsonpage5,N

Strany 160

Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedinthisdocumentanditswebsitewithoutpri

Strany 161 - Configuring NetFlow

May 09, 2011 Page 1 of 38Configuring Quality of Service (QoS)ThischapterprovidesthefollowinginformationaboutconfiguringandmonitoringQuality

Strany 162 - How Can I Implement NetFlow?

Why Would I Use It in My Network?May 09, 2011 Page 2 of 38TheS‐SeriesFlex‐Edgefeature,supportedonlyonS‐Seriesswitches,providestheuniquecap

Strany 163 - LAN Cloud

Quality of Service OverviewMay 09, 2011 Page 3 of 38Class of Service (CoS)YouimplementQoSfeaturesinaClassofService(CoS).Therearefourhardw

Strany 164 - Understanding Flows

Quality of Service OverviewMay 09, 2011 Page 4 of 38CoS SettingsUsetheCoSsettingsconfigurationwhenmappingthepriorityoftheingressingpacket

Strany 165 - Flow Expiration

Quality of Service OverviewMay 09, 2011 Page 5 of 38Figure 1 Assigning and Marking Traffic with a PriorityTheICMPprotocol,usedforerrormessaging

Strany 166 - K-Series Modules

Quality of Service OverviewMay 09, 2011 Page 6 of 38resourcereferenceconfiguredinCoSsettings,andtheactualTxQorrateli mitingportresource

Strany 167 - May 18, 2011 Page 7 of 21

Quality of Service OverviewMay 09, 2011 Page 7 of 38Port ResourcesUsetheCoSportresourceconfigurationlayertoassociateactualratelimitervalue

Strany 168 - May 18, 2011 Page 8 of 21

Configuring AuthenticationApril 15, 2011 Page 25 of 36Configuring VLAN AuthorizationVLANauthorizationallowsforthedynamicassignmentofuserstot

Strany 169 - Configuring the NetFlow Cache

Quality of Service OverviewMay 09, 2011 Page 8 of 38TxQ SchedulingTxQscanbeconfiguredforTxQscheduling,alsoreferredtoasweightedfairqueuing

Strany 170 - May 18, 2011 Page 10 of 21

Quality of Service OverviewMay 09, 2011 Page 9 of 38Figure 2 Strict Priority Queuing Packet BehaviorLow Latency QueuingALowLatencyQueue(LLQ)isa

Strany 171 - May 18, 2011 Page 11 of 21

Quality of Service OverviewMay 09, 2011 Page 10 of 38accesstoitspercentageoftimeslicessolongastherearepacketsinthequeue.Thenqueue2h

Strany 172 - Disabling NetFlow

Quality of Service OverviewMay 09, 2011 Page 11 of 38Figure 4 Hybrid Queuing Packet BehaviorRate LimitingRatelimitingisusedtocontroltherateof

Strany 173 - May 18, 2011 Page 13 of 21

Quality of Service OverviewMay 09, 2011 Page 12 of 38Figure 5 Rate Limiting Clipping BehaviorFlood ControlCoS‐basedfloodcontrol,isaformofrate

Strany 174

CoS Hardware Resource ConfigurationMay 09, 2011 Page 13 of 38Figure 6 Rate Shaping Smoothing BehaviorRateshapingretainsexcesspacketsinaqueuea

Strany 175 - NetFlow Version 9 Templates

CoS Hardware Resource ConfigurationMay 09, 2011 Page 14 of 38•Namestheportgroup• Assignsportstotheportgroup• Configuresnon‐LLQqueuesforwei

Strany 176 - May 18, 2011 Page 16 of 21

CoS Hardware Resource ConfigurationMay 09, 2011 Page 15 of 38CoS Settings Configuration LayerThefinalstepistoassigntheCoSindexestotheTxQre

Strany 177 - May 18, 2011 Page 17 of 21

CoS Hardware Resource ConfigurationMay 09, 2011 Page 16 of 381.0 4 txq 41.0 5 txq 51.0 6 txq 61.0

Strany 178 - May 18, 2011 Page 18 of 21

CoS Hardware Resource ConfigurationMay 09, 2011 Page 17 of 38TheremainderofthissectiondetailsaTxQrateshapingconfigurationthat:• Configures

Strany 179

Configuring AuthenticationApril 15, 2011 Page 26 of 36IftheauthenticationserverreturnsaninvalidpolicyorVLANtoaswitchforanauthenticating

Strany 180 - May 18, 2011 Page 20 of 21

CoS Hardware Resource ConfigurationMay 09, 2011 Page 18 of 383 3 * 6 * * * Disabled4 4

Strany 181

CoS Hardware Resource ConfigurationMay 09, 2011 Page 19 of 382.0 3 txq perc none tail-drop2.0 4 txq perc none

Strany 182 - What is PoE?

CoS Hardware Resource ConfigurationMay 09, 2011 Page 20 of 38•MapstheIRLreferencetotheCoSsetting(802.1priority)•EnablesCoS•Providesrelated

Strany 183 - How Do I Implement PoE?

CoS Hardware Resource ConfigurationMay 09, 2011 Page 21 of 384 4 * 8 * * * Disabled5 5

Strany 184 - June 3, 2011 Page 3 of 14

CoS Hardware Resource ConfigurationMay 09, 2011 Page 22 of 38Usetheshowcosport‐resourceirlcommandtodisplaythedatarateandunitoftherate

Strany 185 - Configuring PoE

CoS Hardware Resource ConfigurationMay 09, 2011 Page 23 of 38----------------------------------------------------------------------System(su)->ORL

Strany 186 - June 3, 2011 Page 5 of 14

CoS Hardware Resource ConfigurationMay 09, 2011 Page 24 of 38ORL Configuration Example Show Command OutputUsetheshowcossettingscommandtodisplay

Strany 187 - Stackable B5 and C5 Devices

CoS Hardware Resource ConfigurationMay 09, 2011 Page 25 of 38Usetheshowcosport‐resourceorlcommandtodisplaytheratelimiterunitandratefor

Strany 188 - G-Series Devices

CoS Hardware Resource ConfigurationMay 09, 2011 Page 26 of 38CoS Reference LayerTheCoSreferencelayerisnotapplicabletofloodcontrol.CoS Setting

Strany 189 - June 3, 2011 Page 8 of 14

CoS Hardware Resource ConfigurationMay 09, 2011 Page 27 of 38Usetheshowcosport‐configflood‐ctrlcommandtodisplaytheportgroupnameandassign

Strany 190 - June 3, 2011 Page 9 of 14

Configuring AuthenticationApril 15, 2011 Page 27 of 36Procedure 14describesauthenticationserverconfiguration.Configuring RADIUS AccountingTherea

Strany 191 - June 3, 2011 Page 10 of 14

Feature Differences by PlatformMay 09, 2011 Page 28 of 38ge.1.1 29 irl not-violated 0ge.1.1 30 irl not-violat

Strany 192 - June 3, 2011 Page 11 of 14

ORLs•AllS‐Seriesmodulessupport4outboundratelimiters•EnterasysN‐Series,StackableSwitches,D‐Series,G‐Series,andI‐Seriesdevicesdonotsup

Strany 193 - Example PoE Configuration

The QoS CLI Command FlowMay 09, 2011 Page 30 of 387. Configure a CoS inbound rate limiting index entry, by mapping a port group with a rate-limit valu

Strany 194 - PoE Display Commands

QoS Policy-Based Configuration ExampleMay 09, 2011 Page 31 of 38QoS Policy-Based Configuration ExampleInourexample,anorganization’snetworkadmini

Strany 195

QoS Policy-Based Configuration ExampleMay 09, 2011 Page 32 of 38Figure 7 QoS Configuration ExampleAcoreprofilefortherouterandanedgeprofilef

Strany 196 - Configuring Policy

QoS Policy-Based Configuration ExampleMay 09, 2011 Page 33 of 38UsingNetSightPolicyManager,configurethepolicyrolesandrelatedservicesasfoll

Strany 197 - Policy Overview

Create a Policy Service•NametheserviceVoIPEdgeService.•ApplytheservicetotheVoIPEdgePolicyRole.Create a Rate-limiterCreatearate‐limitasf

Strany 198 - May 18, 2009 Page 3 of 32

QoS Policy-Based Configuration ExampleMay 09, 2011 Page 35 of 38•ToS:B8•SpecifyIRLindex1toassociatethisCoStotheratelimitCreate a Traffic C

Strany 199 - Policy Roles

Terms and DefinitionsMay 09, 2011 Page 36 of 38s-series(rw)->set policy rule admin-profile vlantag 12 mask 12 port-string ge.1.10-13 admin-pid 1s-s

Strany 200 - VLAN-to-Policy Mapping

Terms and DefinitionsMay 09, 2011 Page 37 of 38Rate Shaping The rescheduling of bursty traffic while in the queue based upon packet buffering such tha

Strany 201 - Enhanced Policy

Configuring AuthenticationApril 15, 2011 Page 28 of 36Procedure 15describesRADIUSaccountingconfiguration.Procedure 15 RADIUS Accounting Configura

Strany 202 - Classification Rules

Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedinthisdocumentanditswebsitewithoutpri

Strany 203 - May 18, 2009 Page 8 of 32

June 03, 2011 Page 1 of 12Configuring RADIUS-SnoopingThischapterprovidesthefollowinginformationaboutconfiguringandmonitoringRADIUS‐Snooping

Strany 204 - Specifying Storage Type

Why Would I Use RADIUS-Snooping in My Network?June 03, 2011 Page 2 of 12Why Would I Use RADIUS-Snooping in My Network?RADIUS‐SnoopingallowstheEnter

Strany 205 - Policy Syslog Rule Usage

RADIUS-Snooping OverviewJune 03, 2011 Page 3 of 12RADIUS-Snooping ConfigurationMultiAuth ConfigurationMultiAuthmust beenablediftheRADIUS‐Snoopin

Strany 206 - May 18, 2009 Page 11 of 32

RADIUS-Snooping OverviewJune 03, 2011 Page 4 of 12table.Bydefault,theRADIUS‐Snoopingflowtableisempty.Entriesareaddedtotheflowtablebase

Strany 207 - May 18, 2009 Page 12 of 32

RADIUS-Snooping OverviewJune 03, 2011 Page 5 of 12Figure 1 RADIUS-Snooping OverviewFigure 1onpage 5illustratestheRADIUSrequestframeandRADIUS

Strany 208 - May 18, 2009 Page 13 of 32

Configuring RADIUS-SnoopingJune 03, 2011 Page 6 of 12Configuring RADIUS-SnoopingThissectionprovidesdetailsfortheconfigurationofRADIUS‐Snooping

Strany 209 - May 18, 2009 Page 14 of 32

Configuring RADIUS-SnoopingJune 03, 2011 Page 7 of 12Managing RADIUS-SnoopingTable 2describeshowtomanageRADIUS‐Snoopingonthedistribution‐tier

Strany 210

RADIUS-Snooping Configuration ExampleJune 03, 2011 Page 8 of 12RADIUS-Snooping Configuration ExampleOurRADIUS‐Snoopingconfiguration examplewillco

Strany 211 - May 18, 2009 Page 16 of 32

RADIUS-Snooping Configuration ExampleJune 03, 2011 Page 9 of 12WefirstsettheglobalMultiAuthmodetomultionthedistribution‐tierswitch.Wethe

Strany 212 - May 18, 2009 Page 17 of 32

Authentication Configuration ExampleApril 15, 2011 Page 29 of 36Authentication Configuration ExampleOurexamplecoversthefoursupportedmodularswit

Strany 213 - May 18, 2009 Page 18 of 32

Terms and DefinitionsJune 03, 2011 Page 10 of 12ThiscompletestheRADIUS‐Snoopingconfigurationexample.Terms and DefinitionsTable 4liststermsand

Strany 214 - May 18, 2009 Page 19 of 32

Revision HistoryEnterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedinthisdocumentanditsweb

Strany 215 - May 18, 2009 Page 20 of 32

Terms and DefinitionsJune 03, 2011 Page 12 of 12

Strany 216 - May 18, 2009 Page 21 of 32

March 28, 2011 Page 1 of 27Configuring SNMPThischapterprovidesthefollowinginformationaboutconfiguringandmonitoringSNMPonEnterasys®N‐Serie

Strany 217 - Policy Domains

How Do I Implement SNMP?March 28, 2011 Page 2 of 27•AcommonmanagementplatformsupportedbymanynetworkdevicesHow Do I Implement SNMP?Youcanimpl

Strany 218 - Platform Configuration

SNMP OverviewMarch 28, 2011 Page 3 of 27informationforaspecificvariable.Theagent,uponreceivingaGetorGetNextmessage,willissueaGetRes

Strany 219 - Configuring the Policy Role

SNMP Support on Enterasys DevicesMarch 28, 2011 Page 4 of 27Community Name StringsEarlierSNMPversions(v1andv2c)relyoncommunitynamestringsfo

Strany 220

SNMP Support on Enterasys DevicesMarch 28, 2011 Page 5 of 27control,SNMPv3alsoprovidesahigherdegreeofreliabilityfornotifyingmanagementstat

Strany 221

SNMP Support on Enterasys DevicesMarch 28, 2011 Page 6 of 27engine ID A value used by both the SNMPv3 sender and receiver to propagate inform notifica

Strany 222

SNMP Support on Enterasys DevicesMarch 28, 2011 Page 7 of 27Security Models and LevelsAnSNMPsecuritymodelisanauthenticationstrategythatisset

Strany 223 - May 18, 2009 Page 28 of 32

Authentication OverviewApril 15, 2011 Page 3 of 36IEEE 802.1x Using EAPTheIEEE802.1xport‐basedaccesscontrolstandardallowsyoutoauthenticatea

Strany 224

Authentication Configuration ExampleApril 15, 2011 Page 30 of 36Figure 5 Stackable Fixed Switch Authentication Configuration Example OverviewOurconf

Strany 225

Configuring SNMPMarch 28, 2011 Page 8 of 27Configuring SNMPThissectionprovidesthef ollowinginformationaboutconfiguringSNMPonEnterasysdevice

Strany 226

Configuring SNMPMarch 28, 2011 Page 9 of 271. Determinesifthe“keys”fortrap“doors”doexist.ThekeythatSNMPislookingforisthenotification

Strany 227

Configuring SNMPMarch 28, 2011 Page 10 of 27Configuring SNMPv1/SNMPv2cCreating a New ConfigurationProcedure 1showshowtocreateanewSNMPv1orSNMP

Strany 228 - Configuring Port Mirroring

Configuring SNMPMarch 28, 2011 Page 11 of 27enterasys(su)->set snmp access groupRW security-model v1 read RW write RW notify RWenter

Strany 229 - May 04, 2011 Page 2 of 15

Configuring SNMPMarch 28, 2011 Page 12 of 27•“ConfiguringtheOptionalMaskParameter”onpage16•“ConfiguringSecureSNMPCommunityNames”onpage18

Strany 230 - May 04, 2011 Page 3 of 15

Configuring SNMPMarch 28, 2011 Page 13 of 27ThefollowingexampleisanEnterasysN‐SeriesdeviceconfigurationusingthestepsinProcedure 2.Itsho

Strany 231 - LAG Mirrors

Configuring SNMPMarch 28, 2011 Page 14 of 27enterasys(su)-> set snmp targetaddr Enterasys_Networks 172.29.10.1 param enterasysn tag

Strany 232 - IDS Mirrors

Configuring SNMPMarch 28, 2011 Page 15 of 27Trap EngineIDTousetrapsinsteadofinformnotifications,youwouldchangetheprecedingconfigurationas

Strany 233 - Configuring Port Mirrors

Configuring SNMPMarch 28, 2011 Page 16 of 27enterasys(su)->clear snmp view All 1enterasys(su)->clear snmp view All 0.0enterasys(su)->set snmp

Strany 234 - Reviewing Port Mirroring

Configuring SNMPMarch 28, 2011 Page 17 of 27 etherStatsPkts1024to1518Octets=1.3.6.1.2.1.16.1.1.1.19.<port> etherStatsOwner=1.3.6.

Strany 235 - X-Series

Authentication Configuration ExampleApril 15, 2011 Page 31 of 365. ConfiguringtheprinterclusterMACauthenticationforthemodularswitchconfigura

Strany 236 - Setting Port Mirroring

Configuring SNMPMarch 28, 2011 Page 18 of 27 View Name = All Subtree OID = 1.3.6.1.2.1.1.1.0.244 Subtree mask = ff:df View Type =

Strany 237 - Clearing Port Mirroring

Configuring SNMPMarch 28, 2011 Page 19 of 27Enterasysrecommendsthatyou“secure”allSNMPcommunitynames.Youdothisbycreatingaconfigurationt

Strany 238 - May 04, 2011 Page 11 of 15

Configuring SNMPMarch 28, 2011 Page 20 of 27ExampleThefollowingexampleshowsanN‐Series deviceconfigurationusingthestepsinProcedure 4.entera

Strany 239 - May 04, 2011 Page 12 of 15

Reviewing SNMP SettingsMarch 28, 2011 Page 21 of 27Reviewing SNMP SettingsUsethefollowingshowcommandsdescribedinthissectiontoreviewSNMPset

Strany 240 - May 04, 2011 Page 13 of 15

Reviewing SNMP SettingsMarch 28, 2011 Page 22 of 27CountersUsethiscommandtodisplaySNMPtrafficcountervalues:show snmp countersExampleenterasys(

Strany 241 - May 04, 2011 Page 14 of 15

Reviewing SNMP SettingsMarch 28, 2011 Page 23 of 27EngineidUsethiscommandtodisplaySNMPengineproperties:show snmp engineid Exampleenterasys(su)-

Strany 242

Reviewing SNMP SettingsMarch 28, 2011 Page 24 of 27Target Parameter ProfilesUsethiscommandtodisplayingSNMPtargetparameterprofiles:show snmp ta

Strany 243 - What Is Quality of Service?

Reviewing SNMP SettingsMarch 28, 2011 Page 25 of 27Status xxxxx = active Notify FilterUsethiscommandtodisplaySNMPnotifyfilterinformation,i

Strany 244 - Quality of Service Overview

Reviewing SNMP SettingsMarch 28, 2011 Page 26 of 27ViewsUsethiscommandtodisplaySNMPviews:show snmp view viewname Exampleenterasys(su)->show s

Strany 245 - Class of Service (CoS)

Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedinthisdocumentanditswebsitewithoutpri

Strany 246 - CoS Settings

Authentication Configuration ExampleApril 15, 2011 Page 32 of 36Configuring the Engineering Group 802.1x End-User StationsTherearethreeaspectstoc

Strany 247 - CoS Reference

March 14, 2011 Page 1 of 29Configuring Spanning TreesThisdocumentprovidesthe followinginformationaboutconfiguringandmonitoringSp anningTree

Strany 248 - Port Group and Type

How Do I Implement Spanning Trees?March 14, 2011 Page 2 of 29wouldcontinuetocirculateendlesslybetweenbothswitchingdevices.WithoutSpanningTr

Strany 249 - Port Configuration

STP OverviewMarch 14, 2011 Page 3 of 29• IEEE802.1s(MultipleSpanningTreeProtocol)• IEEE802.1t(Updateto802.1D)Asdescribedpreviously,STPres

Strany 250 - Strict Priority Queuing

Functions and Features Supported on Enterasys DevicesMarch 14, 2011 Page 4 of 29MSTPcanautomaticallydetecttheversionofSpanningTreebeingused

Strany 251 - Weighted Fair Queuing

Functions and Features Supported on Enterasys DevicesMarch 14, 2011 Page 5 of 29•FurtherprotectingyournetworkfromloopformationwithLoopProtect

Strany 252 - Hybrid Queuing

Understanding How Spanning Tree OperatesMarch 14, 2011 Page 6 of 29Understanding How Spanning Tree OperatesThissectionprovidesyouwithamoredetai

Strany 253 - Rate Limiting

Understanding How Spanning Tree OperatesMarch 14, 2011 Page 7 of 29Rootportsanddesignatedportsareleftintheforwardingstate.Redundantportsa

Strany 254 - Rate Shaping

Understanding How Spanning Tree OperatesMarch 14, 2011 Page 8 of 29MSTPisthedefaultSpanningTreemodeonallEnterasysswitchdevices.Thefollowin

Strany 255 - TxQ Scheduling Configuration

Understanding How Spanning Tree OperatesMarch 14, 2011 Page 9 of 29•FormatSelector–Oneoctetinlengthandisalways0.Itcannotbeadministrative

Strany 256 - CoS Port Configuration Layer

Understanding How Spanning Tree OperatesMarch 14, 2011 Page 10 of 29switchingdevice2istherootforMSTI2,andswitchingdevice5istheCISTregi

Strany 257 - Enable CoS State

Authentication Configuration ExampleApril 15, 2011 Page 33 of 36ThefollowingCLIinput:•EnablesCEPgloballyontheswitch.•SetsCEPpolicytoaprev

Strany 258 - May 09, 2011 Page 16 of 38

Configuring STP and RSTPMarch 14, 2011 Page 11 of 29Figure 6 Example of Multiple Regions and MSTIsConfiguring STP and RSTPThissectionprovidesinfor

Strany 259 - CoS TxQ Port Resource Layer

Configuring STP and RSTPMarch 14, 2011 Page 12 of 29SinceMSTPmodeisfullycompatibleand interoperablewithlegacySTPandRSTPbridges,inmostn

Strany 260 - May 09, 2011 Page 18 of 38

Configuring STP and RSTPMarch 14, 2011 Page 13 of 29configuredwithvariationsoftheSpanningTreeportconfigurationcommands.Defaultsettingsare

Strany 261 - IRL Configuration

Configuring STP and RSTPMarch 14, 2011 Page 14 of 29Setting a Port PriorityYoucansetaSpanningTreeportpriority,avaluetobeusedtobreakati

Strany 262 - May 09, 2011 Page 20 of 38

Configuring STP and RSTPMarch 14, 2011 Page 15 of 29Adjusting the Bridge Hello TimeHellotimeistheintervalatwhichthebridgeorindividualports

Strany 263 - May 09, 2011 Page 21 of 38

Configuring STP and RSTPMarch 14, 2011 Page 16 of 29SpanningTreetopology.Byadjustingthisvalue,youcanconfiguresupportforamaximumdiameter

Strany 264 - May 09, 2011 Page 22 of 38

Configuring STP and RSTPMarch 14, 2011 Page 17 of 29Defining Point-to-Point LinksBydefault,theadministrativepoint‐to‐pointstatusissettoautoo

Strany 265 - ORL Configuration

Configuring MSTPMarch 14, 2011 Page 18 of 29show spantree operedge [port port-string]Astatusof“true”or“Edge‐Port”indicatestheportisoperating

Strany 266 - May 09, 2011 Page 24 of 38

Configuring MSTPMarch 14, 2011 Page 19 of 29Figure 7 MSTP Simple Network ConfigurationProcedure 1showshowtoconfigureSwitches1and2forMSTP.Ad

Strany 267 - Flood Control Configuration

Understanding and Configuring SpanGuardMarch 14, 2011 Page 20 of 29Understanding and Configuring SpanGuardThissectionprovidesinformationaboutthe

Strany 268 - CoS Settings Layer

Terms and DefinitionsApril 15, 2011 Page 34 of 36•SetuptheRADIUSuseraccountforthepublicstationontheauthenticationserver.•EnablePWAglobal

Strany 269 - Displaying CoS Violations

Understanding and Configuring SpanGuardMarch 14, 2011 Page 21 of 29•thetimeoutexpires,•theportismanuallyunlocked,•theportisnolongeradminist

Strany 270 - CoS Port Type

Understanding and Configuring Loop ProtectMarch 14, 2011 Page 22 of 29Monitoring SpanGuard Status and SettingsUsethecommandsinTable 7toreviewSp

Strany 271 - The QoS CLI Command Flow

Understanding and Configuring Loop ProtectMarch 14, 2011 Page 23 of 29Port Modes and Event TriggersPortsworkintwoLoopProtectoperationalmodes.I

Strany 272 - May 09, 2011 Page 30 of 38

Understanding and Configuring Loop ProtectMarch 14, 2011 Page 24 of 29Figure 8 Basic Loop Protect ScenarioFigure 9showsthat,withoutLoopProtect,

Strany 273 - May 09, 2011 Page 31 of 38

Understanding and Configuring Loop ProtectMarch 14, 2011 Page 25 of 29Configuring Loop ProtectThissectionprovidesinformationaboutLoopProtectcon

Strany 274 - May 09, 2011 Page 32 of 38

Understanding and Configuring Loop ProtectMarch 14, 2011 Page 26 of 29TheLoopProtectwindowisatimervalue,inseconds,thatdefinesaperiodduri

Strany 275 - Create a Rule

Terms and DefinitionsMarch 14, 2011 Page 27 of 29ExampleThefollowingexampleshowsaswitchingdevicewithLoopProtectenabledonportlag.0.2,SID

Strany 276

Terms and DefinitionsMarch 14, 2011 Page 28 of 29FID Filter Identifier. Each VLAN is associated to a FID. VLANs are mapped to SIDs using their FID ass

Strany 277 - Switch 1

Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedinthisdocumentanditswebsitewithoutpri

Strany 278

March 15, 2011 Page 1 of 13Configuring SyslogThisdocumentprovidesthe followinginformationaboutconfiguringandmonitoringSyslogonEnterasys®N

Strany 279 - May 09, 2011 Page 37 of 38

Terms and DefinitionsApril 15, 2011 Page 35 of 36IEEE 802.1x An IEEE standard for port-based Network Access Control that provides authentication to de

Strany 280

How Do I Implement Syslog?March 15, 2011 Page 2 of 13acrossmultipleplatforms,youcanuseittointegratelogdatafrommanydifferenttypesofsyst

Strany 281 - Configuring RADIUS-Snooping

Syslog Components and Their UseMarch 15, 2011 Page 3 of 13todisplaymessagesatavarietyofdifferentseveritylevelsaboutapplication‐relatederro

Strany 282 - RADIUS-Snooping Overview

Syslog Components and Their UseMarch 15, 2011 Page 4 of 13Basic Syslog ScenarioFigure 1showsabasicscenarioofhowSyslogcomponentsoperateonan

Strany 283 - RADIUS-Snooping Configuration

Syslog Components and Their UseMarch 15, 2011 Page 5 of 13Figure 1 Basic Syslog ScenarioDefaultapplicationsettingsintheexam pleinFigure 1have

Strany 284 - RADIUS Session Attributes

Interpreting MessagesMarch 15, 2011 Page 6 of 13Interpreting MessagesEverysystemmessagegeneratedbytheEnterasysswitchplatformsfollowsthesa m

Strany 285 - June 03, 2011 Page 5 of 12

Configuring SyslogMarch 15, 2011 Page 7 of 13Syslog Command PrecedenceTable 3listsbasicSyslogcommandsandtheirorderofprecedenceonEnterayssw

Strany 286

Configuring SyslogMarch 15, 2011 Page 8 of 13ExampleThissampleoutputfromtheshowloggingservercommandshowsthattwoservershavebeenaddedto

Strany 287 - Managing RADIUS-Snooping

Configuring SyslogMarch 15, 2011 Page 9 of 13ExamplesThisexampleshowshowtoconfiguretheswitchtoforwardmessagesfromfacilitycategorylocal6

Strany 288 - June 03, 2011 Page 8 of 12

Configuring SyslogMarch 15, 2011 Page 10 of 134(errors) 5(warnings) 6(notifications)7(information) 8(debugging)Modifying Severity Levels an

Strany 289 - June 03, 2011 Page 9 of 12

Configuring SyslogMarch 15, 2011 Page 11 of 13Displaying to the Current CLI SessionTodisplayloggingtothecurrentCLIconsolesessiononanN‐Serie

Strany 290

Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedinthisdocumentanditswebsitewithoutpri

Strany 291

Configuring SyslogMarch 15, 2011 Page 12 of 13Procedure 2 Adjusting Settings for an ApplicationStep Task Command(s)1. Configure Syslog server 2 and ac

Strany 292 - June 03, 2011 Page 12 of 12

Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedinthisdocumentanditswebsitewithoutpri

Strany 293 - Configuring SNMP

December 2, 2010 Page 1 of 7Configuring TACACS+ThisdocumentprovidesinformationaboutconfiguringandmonitoringTACACS+(TerminalAccessController

Strany 294 - SNMP Overview

How Do I Implement TACACS+?December 2, 2010 Page 2 of 7How Do I Implement TACACS+?YoucanconfiguretheTACACS+clientonyourEnterasysdeviceincon

Strany 295 - Access to MIB Objects

Configuring TACACS+December 2, 2010 Page 3 of 7Configuring TACACS+Default SettingsTable 1liststheTACACS+parameters(asdisplayedthroughtheshow

Strany 296 - Versions Supported

Configuring TACACS+December 2, 2010 Page 4 of 7Basic TACACS+ ConfigurationProcedure 1describesthebasicstepstoconfigureTACACS+onEnterasysdevi

Strany 297

Configuring TACACS+December 2, 2010 Page 5 of 7Refertothedevice’sCLIReferenceorConfigurationGuide,asappropriate,formoreinformationabout

Strany 298 - March 28, 2011 Page 6 of 27

TACACS+ Display CommandsTable 2listsTACACS+showcommands.Refertothedevice’sCLIReferenceorConfigurationGuide,asappropriate,formoreinfo

Strany 299 - Access Control

Configuring TACACS+December 2, 2010 Page 7 of 7Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontaine

Strany 300

April 16, 2009 Page 1 of 14Configuring Transparent Web Cache Balancing(TWCB)Thisdocumentprovidesthe followinginformationaboutconfiguringTransp

Strany 301 - SNMP Defaults

December 02, 2010 Page 1 of 5Flex-EdgeThisdocumentdescribestheFlex‐EdgecapabilityontheEnterasysS‐Series®platform.What is Flex-EdgeFlex‐Edge

Strany 302 - Configuring SNMPv1/SNMPv2c

How Can I Implement TWCB?April 16, 2009 Page 2 of 14whomwebcachingisnotde siredtoahostredirectionlist,denyingtheseusersaccesstoTWCBfu

Strany 303 - Configuring SNMPv3

TWCB OverviewApril 16, 2009 Page 3 of 14Figure 1 TWCB Configuration OverviewTheN‐Seriesrouterdoesnotactasacacheforwebobjects;rather,itr

Strany 304 - March 28, 2011 Page 12 of 27

TWCB OverviewApril 16, 2009 Page 4 of 14The Server FarmTheserverfarmconsistsofalogicalgroupingofcache‐servers.Eachserverfarmbelongstoa

Strany 305 - March 28, 2011 Page 13 of 27

TWCB OverviewApril 16, 2009 Page 5 of 14Thepredictorround‐robinfeatureallowsforthecreationofupto10userlists.Membersofapredictorround

Strany 306 - Inform EngineIDs

TWCB OverviewApril 16, 2009 Page 6 of 14•Placetheweb‐cacheinservice.Atleastonecacheservermustbeinservicebeforeyoucanplaceaweb‐cache

Strany 307 - Configuring an SNMP View

Configuring TWCBApril 16, 2009 Page 7 of 14Configuring TWCBThissectionprovidesdetailsfortheconfigurationofTWCBontheN‐Seriesproducts.Table

Strany 308 - March 28, 2011 Page 16 of 27

Configuring TWCBApril 16, 2009 Page 8 of 14Configuring the Server FarmProcedure 1describeshowtoconfigureaTWCBserverfarm.Configuring the Cache

Strany 309 - March 28, 2011 Page 17 of 27

Configuring TWCBApril 16, 2009 Page 9 of 14Configuring the Web-CacheProcedure 3describeshowtoconfigureaTWCBweb‐cache.Configuring the Outbound

Strany 310 - March 28, 2011 Page 18 of 27

TWCB Configuration ExampleApril 16, 2009 Page 10 of 14Displaying TWCB StatisticsProcedure 6describeshowtodisplayTWCBstatistics.TWCB Configuratio

Strany 311 - March 28, 2011 Page 19 of 27

TWCB Configuration ExampleApril 16, 2009 Page 11 of 14Figure 3 TWCB Configuration Example OverviewConfigure the s1Server Server FarmCreatetheserver

Strany 312 - March 28, 2011 Page 20 of 27

Flex-Edge OverviewDecember 02, 2010 Page 2 of 5Flex-Edge OverviewAllS‐SeriesswitchessupporttheFlex‐Edgefeature,whichprovidesauniquemechanis

Strany 313 - Community

TWCB Configuration ExampleApril 16, 2009 Page 12 of 14Matrix>Router(config-twcb-cache)#exitMatrix>Router(config-twcb-wcsfarm)#Configurecachese

Strany 314 - Counters

TWCB Configuration ExampleApril 16, 2009 Page 13 of 14Configuretheoutboundinterfacethatconnectswiththeinternet:Matrix>Router(config)#interf

Strany 315 - Group Access Rights

Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedinthisdocumentanditswebsitewithoutpri

Strany 316 - Target Address Profiles

March 15, 2011 Page 1 of 20Configuring VLANsThisdocumentprovidesthe followinginformationaboutconfiguringandmonitoring802.1QVLANsonEnteras

Strany 317 - Notify Profile

Why Would I Use VLANs in My Network?March 15, 2011 Page 2 of 20Theprimarybenefitof802.1QVLANtechnologyisthatitallowsyoutolocali zeandse

Strany 318 - March 28, 2011 Page 26 of 27

How Do I Implement VLANs?March 15, 2011 Page 3 of 20How Do I Implement VLANs?Bydefault,allEnterasysswitchesrunin802.1QVLANoperationalmode.A

Strany 319

Understanding How VLANs OperateMarch 15, 2011 Page 4 of 20Learning Modes and Filtering DatabasesAddressinginformationtheswitchlearnsaboutaVLAN

Strany 320 - Configuring Spanning Trees

Understanding How VLANs OperateMarch 15, 2011 Page 5 of 20Ingress PrecedenceVLANassignmentforreceived(ingress)framesisdeterminedbythefollowi

Strany 321 - STP Overview

VLAN Support on Enterasys SwitchesMarch 15, 2011 Page 6 of 20Figure 2 Inside the SwitchAssumeaunicastuntaggedframeisreceivedonPort3inthee

Strany 322 - Multiple Spanning Trees

VLAN Support on Enterasys SwitchesMarch 15, 2011 Page 7 of 20•From2through4093forstackableandstandaloneswitchesThisrangeisbasedonthefoll

Strany 323 - STP Features

Terms and DefinitionsDecember 02, 2010 Page 3 of 5Priorityqueueing,fromhighprioritytolowpriority,isgiventothefollowingfourtrafficcatego

Strany 324 - Updated 802.1t

VLAN Support on Enterasys SwitchesMarch 15, 2011 Page 8 of 20Asdescribedabove,PVIDdeterminestheVLANtowhichalluntaggedframesreceivedonass

Strany 325 - Assigning Path Costs

Configuring VLANsMarch 15, 2011 Page 9 of 20Figure 3 Example of VLAN Propagation Using GVRPAdministrativelyconfiguringaVLANonan802.1Qswitchcr

Strany 326 - MSTP Operation

Configuring VLANsMarch 15, 2011 Page 10 of 20Platform Specific Differences Enterasys X-Series Platform ConfigurationTheconfigurationofVLANsonthe

Strany 327 - Device 1 Device 2

Configuring VLANsMarch 15, 2011 Page 11 of 20Default SettingsTable 1listsVLANparametersandtheirdefaultvalues.Table 1 Default VLAN ParametersPa

Strany 328 - March 14, 2011 Page 9 of 29

Configuring VLANsMarch 15, 2011 Page 12 of 20Configuring Static VLANsProcedure 1describeshowtocreateandconfigureastaticVLAN.Unspecifiedpara

Strany 329 - March 14, 2011 Page 10 of 29

Configuring VLANsMarch 15, 2011 Page 13 of 206. (cont)•If forbidden is not specified, tagged and untagged egress settings will be cleared from the des

Strany 330 - Configuring STP and RSTP

Configuring VLANsMarch 15, 2011 Page 14 of 20Example ConfigurationThefollowingshowsanexampleS‐SeriesdeviceconfigurationusingthestepsinProc

Strany 331 - March 14, 2011 Page 12 of 29

Configuring VLANsMarch 15, 2011 Page 15 of 20Procedure 2providesanexampleofhowtocreateasecuremanagementVLAN.Thisexample,whichsetsthen

Strany 332 - March 14, 2011 Page 13 of 29

Configuring VLANsMarch 15, 2011 Page 16 of 20Configuring Protocol-Based VLAN ClassificationProtocol‐basedVLANscanbeconfiguredusingthepolicycla

Strany 333 - Assigning Port Costs

Configuring VLANsMarch 15, 2011 Page 17 of 20Example ConfigurationThefollowingshowsanexampleN‐SeriesdeviceconfigurationusingthestepsinProc

Strany 334 - Defining the Maximum Age Time

Authentication OverviewApril 15, 2011 Page 4 of 36switchcancontainanyFilter‐IDattributeconfiguredontheauthenticationserver,allowingpolicy

Strany 335 - Adjusting RSTP Parameters

Terms and DefinitionsDecember 02, 2010 Page 4 of 5Flex-Edge An S-Series platform capability to classify and prioritize traffic as it enters the switch

Strany 336 - Defining Edge Port Status

Terms and DefinitionsMarch 15, 2011 Page 18 of 20Terms and DefinitionsTable 3liststermsanddefinitionsusedinVLANconfiguration.(Applies to N-Ser

Strany 337 - Configuring MSTP

Terms and DefinitionsMarch 15, 2011 Page 19 of 20Generic Attribute Registration Protocol (GARP)GARP is a protocol used to propagate state information

Strany 338 - Monitoring MSTP

Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedinthisdocumentanditswebsitewithoutpri

Strany 339 - How Does It Operate?

Revision HistoryEnterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedinthisdocumentanditsweb

Strany 340 - Configuring SpanGuard

December 02, 2010 Page 1 of 23Configuring Link AggregationThisdocumentdescribesthelinkaggregationfeatureanditsconfigurationonEnterasysMatr

Strany 341 - What Is Loop Protect?

Why Would I Use Link Aggregation in My NetworkDecember 02, 2010 Page 2 of 23Why Would I Use Link Aggregation in My NetworkTheconceptofgroupingmult

Strany 342 - Port Modes and Event Triggers

Link Aggregation OverviewDecember 02, 2010 Page 3 of 23Link Aggregation OverviewThissectionprovidesanoverviewoflinkaggregationconfiguration.LA

Strany 343 - March 14, 2011 Page 24 of 29

Link Aggregation OverviewDecember 02, 2010 Page 4 of 23Figure 1displaysaLAGformationexamplecontainingthreedeviceswithfive100Mbpsportsand

Strany 344 - Configuring Loop Protect

Link Aggregation OverviewDecember 02, 2010 Page 5 of 23•Becauseports1and2forboththeactorandpartneroperateinparallelwitheachother,rule

Strany 345 - March 14, 2011 Page 26 of 29

Link Aggregation OverviewDecember 02, 2010 Page 6 of 23Thisistruebecauseport4hasthelowestpriorityofthethreeportscurrentlyintheLAG,an

Strany 346

Link Aggregation OverviewDecember 02, 2010 Page 7 of 23ShouldanaggregatableportbeavailablewithallLAGresourcesdepletedforthissystem,thep

Strany 347 - March 14, 2011 Page 28 of 29

Link Aggregation OverviewDecember 02, 2010 Page 8 of 23Flow RegenerationFlowregenerationdetermineshowflowswillbehavewhenanewportjoinsalin

Strany 348

Authentication OverviewApril 15, 2011 Page 5 of 36Multi-User AuthenticationMulti‐userauthenticationprovidesfortheper‐userorper‐deviceprovision

Strany 349 - Configuring Syslog

Link Aggregation OverviewDecember 02, 2010 Page 9 of 23• DestinationIPaddressandSourceIPaddress(dip‐sip).Thisisthemostfinelytunedcriteri

Strany 350 - Syslog Overview

Configuring Link AggregationDecember 02, 2010 Page 10 of 23Configuring Link AggregationThissectionprovidesdetailsfortheconfigurationoflinkagg

Strany 351 - March 15, 2011 Page 3 of 13

Configuring Link AggregationDecember 02, 2010 Page 11 of 23Table 5describeshowtomanagelinkaggregation.5. Optionally, modify the LAG port parame

Strany 352 - Basic Syslog Scenario

Link Aggregation Configuration ExampleDecember 02, 2010 Page 12 of 23Table 6describeshowtodisplaylinkaggregationinformationandstatistics.Lin

Strany 353 - March 15, 2011 Page 5 of 13

Link Aggregation Configuration ExampleDecember 02, 2010 Page 13 of 23•LAG3providesanaggregateoffour1GbportsbetweentheC3stackableswitchesa

Strany 354 - Interpreting Messages

Link Aggregation Configuration ExampleDecember 02, 2010 Page 14 of 23Figure 3 Example 1 Multiple Device ConfigurationBothphysicalportandLAGadmin

Strany 355 - Configuring Syslog Server(s)

Link Aggregation Configuration ExampleDecember 02, 2010 Page 15 of 23WhichdevicedeterminesportselectionfortheLAGisanoptionalconsideration.

Strany 356 - Modifying Default Settings

Link Aggregation Configuration ExampleDecember 02, 2010 Page 16 of 23GiventhattheintentoftheexampleistohavethreeLAGsof4portseach,there

Strany 357 - Examples

Link Aggregation Configuration ExampleDecember 02, 2010 Page 17 of 23NextwewanttochangethesystempriorityfortheS3sothatitwillbeincharg

Strany 358 - March 15, 2011 Page 10 of 13

Link Aggregation Configuration ExampleDecember 02, 2010 Page 18 of 23chassis.ThefirstLAGconsistsoftwo1Gbports.ThesecondLAGconsistsofeig

Strany 359 - Configuration Examples

Authentication OverviewApril 15, 2011 Page 6 of 36Figure 1 Applying Policy to Multiple Users on a Single PortMultiAuth AuthenticationAuthenticationm

Strany 360 - March 15, 2011 Page 12 of 13

Link Aggregation Configuration ExampleDecember 02, 2010 Page 19 of 23Figure 4 Example 2 ConfigurationN3 Edge SwitchS3 Upstream SwitchLAG1End-UsersKEY

Strany 361

Link Aggregation Configuration ExampleDecember 02, 2010 Page 20 of 23Configuring the N3 Edge SwitchForthisexample,wewantLAGstoformwhereverthe

Strany 362 - Configuring TACACS+

Terms and DefinitionsDecember 02, 2010 Page 21 of 23S3(rw)->set port lacp port ge.1.3 aadminkey 100 enableS3(rw)->set port lacp port ge.1.4 aadm

Strany 363 - Understanding TACACS+

Terms and DefinitionsDecember 02, 2010 Page 22 of 23Admin Key Value assigned to aggregator ports and physical ports that are candidates for joining a

Strany 364

Revision HistoryEnterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedinthisdocumentanditsweb

Strany 365 - Basic TACACS+ Configuration

January 29, 2009 Page 1 of 4Configuring Link Flap DetectionThisdocumentprovidesinformationaboutconfiguringthelinkflapdetectionfeatureonEnt

Strany 366 - Example TACACS+ Configuration

Configuring Link Flap DetectionJanuary 29, 2009 Page 2 of 4Configuring Link Flap DetectionBasic Link Flap Detection ConfigurationProcedure 1describes

Strany 367 - TACACS+ Display Commands

Configuring Link Flap DetectionJanuary 29, 2009 Page 3 of 4Example Link Flap Detection ConfigurationPoEdevices(forexample,VoIPphonesorwireless

Strany 368

Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncontainedinthisdocumentanditswebsitewithoutpri

Strany 369 - April 16, 2009 Page 1 of 14

September 8, 2010 Page 1 of 28Configuring Load SharingNetwork Address Translation (LSNAT)Thisdocumentprovidesthe followinginformationaboutconfi

Strany 370 - TWCB Overview

Authentication OverviewApril 15, 2011 Page 7 of 36Figure 2 Authenticating Multiple Users With Different Methods on a Single PortInFigure 3,fullMul

Strany 371 - April 16, 2009 Page 3 of 14

Why Would I Use LSNAT in My Network?September 8, 2010 Page 2 of 28oftheserverfarmassociatedwiththeVIPaddress.Thepacketisthenforwardedto

Strany 372 - The Server Farm

How Can I Implement LSNAT?September 8, 2010 Page 3 of 28ServerandTCP/UDPportverificationcanensurethattheportsusedbyLSNATareoperational.

Strany 373 - The Web-Cache

LSNAT OverviewSeptember 8, 2010 Page 4 of 28LSNAT OverviewThissectionprovidesanoverviewoftheLSNATcomponents.TheLSNATconfigurationismadeu

Strany 374 - The Switch and Router

LSNAT OverviewSeptember 8, 2010 Page 5 of 28Figure 2 LSNAT Packet FlowThe Server FarmTheserverfarmisalogicalentitymadeupofmultiplerealser

Strany 375 - Configuring TWCB

LSNAT OverviewSeptember 8, 2010 Page 6 of 28configuredwiththedefaultweight,eachrealserveristreatedequallyasdescribedinthesimpleroundr

Strany 376 - Configuring the Cache Server

LSNAT OverviewSeptember 8, 2010 Page 7 of 28PingRealserverfailuredetectioncanbeconfiguredforpingonly.Inthiscase,therealserverispinged

Strany 377 - Configuring the Web-Cache

LSNAT OverviewSeptember 8, 2010 Page 8 of 28Youcansearchforareplystringof“200OK”.Thiswouldresultinasuccessfulverificationoftheservi

Strany 378 - TWCB Configuration Example

LSNAT OverviewSeptember 8, 2010 Page 9 of 28addressthatreturnstrafficbackthroughtheLSNATrouter.SincetheclientIPaddressesareusuallyunkn

Strany 379 - Createtheserverfarm:

Configuring LSNATSeptember 8, 2010 Page 10 of 28Managing Connections and StatisticsTherearethreeaspectstomanagingconnections:•ClearingallLSNAT

Strany 380 - April 16, 2009 Page 12 of 14

Configuring LSNATSeptember 8, 2010 Page 11 of 28Table 2listsLSNATresourcelimits.LSNAT Configuration ConsiderationsThefollowingconsiderationsmu

Strany 381 - April 16, 2009 Page 13 of 14

Authentication OverviewApril 15, 2011 Page 8 of 36Figure 3 Selecting Authentication Method When Multiple Methods are ValidatedRemote Authentication D

Strany 382

Configuring LSNATSeptember 8, 2010 Page 12 of 28•WhendifferentVIPsaccessthesamerealserverindifferentserverfarms,thepersistencelevelmust

Strany 383 - Configuring VLANs

Configuring LSNATSeptember 8, 2010 Page 13 of 28Configuring an LSNAT Virtual ServerProcedure 3describeshowtoconfigureanLSNATvirtualserver.3.

Strany 384 - Building One Building Two

Configuring LSNATSeptember 8, 2010 Page 14 of 284. In SLB virtual server configuration command mode, configure the virtual server IP address (VIP) or

Strany 385 - How Do I Implement VLANs?

Configuring LSNATSeptember 8, 2010 Page 15 of 28Configuring Global SettingsTable 3describeshowtoconfigureLSNATglobalsettings.Displaying LSNAT

Strany 386 - Tagged Frames

LSNAT Configuration ExampleSeptember 8, 2010 Page 16 of 28LSNAT Configuration ExampleThissectionprovidesanenterpriseLSNATconfigurationexamplet

Strany 387 - Forwarding Decisions

LSNAT Configuration ExampleSeptember 8, 2010 Page 17 of 28Enterprise Internal HTTP Server FarmTheenterpriseinternalHTTPserverfarm,realserveran

Strany 388 - March 15, 2011 Page 6 of 20

LSNAT Configuration ExampleSeptember 8, 2010 Page 18 of 28Figure 3 LSNAT Configuration Example

Strany 389 - VLAN Types

LSNAT Configuration ExampleSeptember 8, 2010 Page 19 of 28Configuring the myproductHTTP Server Farm and Real ServersConfigurethemyproductHTTPserver

Strany 390 - How It Works

LSNAT Configuration ExampleSeptember 8, 2010 Page 20 of 28System(rw-config-slb-real)->faildetect acv-command “HEAD / HTTP/1.1\\r\\nHost: www.myprod

Strany 391

LSNAT Configuration ExampleSeptember 8, 2010 Page 21 of 28myproductFTP Server Farm and Real Server CLI InputSystem(rw-config)->ip slb serverfarm my

Strany 392 - Protected Ports

Authentication OverviewApril 15, 2011 Page 9 of 36Requiredauthenticationcredentialsdependupontheauthenticationmethodbeingused.For802.1xand

Strany 393 - Default Settings

LSNAT Configuration ExampleSeptember 8, 2010 Page 22 of 28• Configuringafaildetectcommandstring,replystring,andreadtillindexvalueforeach

Strany 394 - Configuring Static VLANs

LSNAT Configuration ExampleSeptember 8, 2010 Page 23 of 28Configuring the myinternalFTP Server Farm Real ServersConfigurethemyinternalFTPserverfar

Strany 395 - March 15, 2011 Page 13 of 20

LSNAT Configuration ExampleSeptember 8, 2010 Page 24 of 28Configuring the myinternalSMTP Server Farm and Real ServersConfigurethemyinternalSMTPserv

Strany 396

Terms and DefinitionsSeptember 8, 2010 Page 25 of 28ThiscompletestheLSNATconfigurationexample.Terms and DefinitionsTable 5liststermsanddefini

Strany 397 - Configuring Dynamic VLANs

Terms and DefinitionsSeptember 8, 2010 Page 26 of 28Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformati oncon

Strany 399 - Monitoring VLANs

Terms and DefinitionsSeptember 8, 2010 Page 28 of 28

Strany 400

April 16, 2009 Page 1 of 32Configuring MulticastThisdocumentprovidesinformationaboutconfiguringandmonitoringmulticas tonEnterasysMatrix®N‐

Strany 401 - March 15, 2011 Page 19 of 20

How Do I Implement Multicast?April 16, 2009 Page 2 of 32How Do I Implement Multicast?YoucanimplementtheIGMP,DVMRP,andPIMmulticastprotocolson

Strany 402

Understanding MulticastApril 16, 2009 Page 3 of 32IGMPusesthreekeycomponentstocontrolmulticastmembership:• Source—AserverthatsendsanIP

Komentáře k této Příručce

Žádné komentáře