TOC TABLE OF CONTENTS
MULTILINK ML1200 MANAGED FIELD SWITCH – INSTRUCTION MANUAL TOC–III
SECURITY LOGS .....................................................................................................................6-8
AUTHORIZED MANAGERS .....................................................................................................6-10
CONFIGURING PORT SECURITY WITH ENERVISTA SOFTWARE .....................................6-12
COMMANDS ............................................................................................................................6-12
LOGS .......................................................................................................................................6-15
AUTHORIZED MANAGERS .....................................................................................................6-16
7: ACCESS USING RADIUS INTRODUCTION TO 802.1X ............................................................................................................7-1
DESCRIPTION ..........................................................................................................................7-1
802.1X PROTOCOL ...............................................................................................................7-1
CONFIGURING 802.1X THROUGH THE COMMAND LINE INTERFACE .........................7-4
COMMANDS ............................................................................................................................7-4
EXAMPLE ................................................................................................................................. 7-6
CONFIGURING 802.1X WITH ENERVISTA SECURE
WEB MANAGEMENT SOFTWARE ............................................................7-9
COMMANDS ............................................................................................................................7-9
8: ACCESS USING
TACACS+
INTRODUCTION TO TACACS+ ....................................................................................................... 8-1
OVERVIEW .............................................................................................................................. 8-1
TACACS+ FLOW ..................................................................................................................8-2
TACACS+ PACKET ...............................................................................................................8-2
CONFIGURING TACACS+ THROUGH THE COMMAND LINE INTERFACE .................... 8-4
COMMANDS ............................................................................................................................8-4
EXAMPLE ................................................................................................................................. 8-4
CONFIGURING TACACS+ WITH ENERVISTA SECURE
WEB MANAGEMENT SOFTWARE ............................................................8-6
9: PORT MIRRORING AND
SETUP
PORT MIRRORING ..............................................................................................................................9-1
DESCRIPTION ..........................................................................................................................9-1
PORT MIRRORING USING THE COMMAND LINE INTERFACE .......................................... 9-2
COMMANDS ............................................................................................................................9-2
PORT SETUP .........................................................................................................................................9-3
COMMANDS ............................................................................................................................9-3
FLOW CONTROL ....................................................................................................................9-5
BACK PRESSURE ....................................................................................................................9-5
BROADCAST STORMS ............................................................................................................9-7
LINK LOSS ALERT ..................................................................................................................9-9
PORT MIRRORING USING ENERVISTA SECURE
WEB MANAGEMENT SOFTWARE ............................................................9-11
COMMANDS ............................................................................................................................9-11
PORT SETUP ........................................................................................................................... 9-12
BROADCAST STORMS ............................................................................................................9-15
10: VLAN VLAN DESCRIPTION ..........................................................................................................................10-1
OVERVIEW .............................................................................................................................. 10-1
TAG VLAN VS. PORT VLAN ...............................................................................................10-3
CONFIGURING PORT VLANS THROUGH THE COMMAND LINE INTERFACE .............10-5
DESCRIPTION ..........................................................................................................................10-5
COMMANDS ............................................................................................................................10-5
CONFIGURING PORT VLANS WITH ENERVISTA SECURE