Examples 12-21

Extensible Authentication Protocol 3-15

F

FID. See Filtering Database ID Fields

command 1-6display 1-5event message 1-5input 1-5selection 1-5types 1-5

Filtering Database 12-5Filtering Database ID 12-5

Filtering Network Traffic According to a Layer 4 Classification Rule 12-32

Flash Download Configuration screen 4-30screen fields

Download File Name 4-33Download Method 4-32Download Server IP 4-33Download Status 4-33Last Image File Name 4-33Last Image Server IP 4-33Reboot After Download 4-33TFTP Gateway IP Addr 4-33

Forwarding list 12-5customizing 12-8Fragmentation 4-7

Frames

tagged 12-5,12-10 untagged 12-5,12-10

G

Gateway IP address setting the 4-10

General Configuration screen 4-4COM port

configuring 4-13Default Gateway

setting the 4-10IP Address

setting the 4-8

screen fields Agg Mode 4-7Application 4-6Clear NVRAM 4-7Com 4-6

Default Gateway 4-5Device Date 4-5Device UpTime 4-6IP Address 4-5

IP Fragmentation 4-7MAC Address 4-5Module Name 4-5Module Time 4-6Operational Mode 4-6Screen Lockout Time 4-6Screen Refresh Time 4-6Subnet Mask 4-5Telnet 4-7

TFTP Gateway IP Addr 4-5WebView 4-7

Getting help 1-7

GVRP

enabling or disabling on port 7-21purpose of A-1

H

Hierarchy

802.1Q switching mode 3-2

Host Access Control Authentication (HACA) how to use 3-12

Host data port 12-12, 12-14HSIM/VHSIM Configuration screen 5-13Hybrid 7-20

I

IGMP

detecting multicast routers when using B-3features and functions supported B-2overview of B-1

IGMP/VLAN Configuration screen 9-3screen fields

IGMP State 9-7IGMP Version 9-4

Index-4

Page 382
Image 382
Enterasys Networks 2H252, 2E253, 2H253, 2H258 manual Index-4