Specifications

Structure of This Guide
xxii SecureStack B2 Configuration Guide
STRUCTURE OF THIS GUIDE
The guide is organized as follows:
Chapter 1, Introduction, provides an overview of the tasks that can be accomplished using the CLI
interface, an overview of local management requirements, and information about obtaining
technical support.
Chapter 2, Startup and General Configuration, provides an overview of the device’s factory
default settings and describes how to start the CLI interface, how to set basic system properties, how
to download a firmware image, how to configure WebView and Telnet, how to manage
configuration files, how to set the login password, and how to exit the CLI.
Chapter 3, Port Configuration, describes how to review and configure console port settings, and
how to enable or disable switch ports and configure switch port settings, including port speed,
duplex mode, auto-negotiation, flow control, port mirroring, link aggegation and broadcast
suppression.
Chapter 4, SNMP Configuration, describes how to configure SNMP users and user groups, access
rights, target addresses, and notification parameters.
Chapter 5, Spanning Tree Configuration, describes how to review and set Spanning Tree bridge
parameters for the device, including bridge priority, hello time, maximum aging time and forward
delay; and how to review and set Spanning Tree port parameters, including port priority and path
costs.
Chapter 6, 802.1Q VLAN Configuration, describes how to create static VLANs, select the mode
of operation for each port, establish VLAN forwarding (egress) lists, route frames according to
VLAN ID, display the current ports and port types associated with a VLAN and protocol, create a
secure management VLAN, and configure ports on the device as GVRP-aware ports.
Chapter 7, Differentiated Services Configuration, describes how to review and configure
Diffserv settings.
Chapter 8, Port Priority and Rate Limiting Configuration, describes how to set the transmit
priority of each port.
Chapter 9, IGMP Configuration, describes how to configure Internet Group Management
Protocol (IGMP) settings for multicast filtering.
Chapter 10, Logging and Network Management, describes how to manage general switch
settings and how to monitor network events and status.
Chapter 11, Security Configuration, describes how to configure 802.1X authentication using
EAPOL, how to configure a RADIUS server, Secure Shell server and MAC locking.