User`s guide
Table Of Contents
- Title
 - Notice
 - Contents
 - Figures
 - Tables
 - About This Guide
 - Introduction
 - Local Management Requirements
 - Accessing Local Management
- 3.1 Navigating Local Management Screens
 - 3.2 Password Screen
 - 3.3 Main Menu Screen
 - 3.4 Module Selection Screen
 - 3.5 Module Menu Screen
 - 3.6 Overview of Security Methods
 - 3.7 Security Menu Screen
 - 3.8 Passwords Screen
 - 3.9 Radius Configuration Screen
 - 3.10 Name Services Configuration Screen
 - 3.11 System Authentication Configuration Screen
 - 3.12 EAP (Port) Configuration Screen
 - 3.13 EAP Statistics Menu Screen
 - 3.14 MAC Port Configuration Screen
 - 3.15 MAC Supplicant Configuration Screen
 
 - Chassis Menu Screens
- 4.1 Chassis Menu Screen
 - 4.2 Chassis Configuration Screen
 - 4.3 SNMP Configuration Menu Screen
 - 4.4 SNMP Community Names Configuration Screen
 - 4.5 SNMP Traps Configuration Screen
 - 4.6 Chassis Environmental Information Screen
 - 4.7 Redirect Configuration Menu Screen (Chassis)
 - 4.8 Port Redirect Configuration Screen
 - 4.9 VLAN Redirect Configuration Screen
 
 - Module Configuration Menu Screens
- 5.1 Module Configuration Menu Screen
 - 5.2 General Configuration Screen
- 5.2.1 Setting the IP Address
 - 5.2.2 Setting the Subnet Mask
 - 5.2.3 Setting the Default Gateway
 - 5.2.4 Setting the TFTP Gateway IP Address
 - 5.2.5 Setting the Module Name
 - 5.2.6 Setting the Module Date
 - 5.2.7 Setting the Module Time
 - 5.2.8 Entering a New Screen Refresh Time
 - 5.2.9 Setting the Screen Lockout Time
 - 5.2.10 Configuring the COM Port
 - 5.2.11 Clearing NVRAM
 - 5.2.12 Enabling/Disabling IP Fragmentation
 
 - 5.3 SNMP Configuration Menu Screen
 - 5.4 SNMP Community Names Configuration Screen
 - 5.5 SNMP Traps Configuration Screen
 - 5.6 Access Control List Screen
 - 5.7 System Resources Information Screen
 - 5.8 FLASH Download Configuration Screen
 
 - Port Configuration Menu Screens
- 6.1 Port Configuration Menu Screen
 - 6.2 Ethernet Interface Configuration Screen
 - 6.3 Ethernet Port Configuration Screen
 - 6.4 HSIM/VHSIM Configuration Screen
 - 6.5 Redirect Configuration Menu Screen
 - 6.6 Port Redirect Configuration Screen
 - 6.7 VLAN Redirect Configuration Screen
 - 6.8 Link Aggregation Screen (802.3ad Main Menu Screen)
 - 6.9 Broadcast Suppression Configuration Screen
 
 - 802.1 Configuration Menu Screens
 - 802.1Q VLAN Configuration Menu Screens
- 8.1 Summary of VLAN Local Management
 - 8.2 802.1Q VLAN Configuration Menu Screen
 - 8.3 Static VLAN Configuration Screen
 - 8.4 Static VLAN Egress Configuration Screen
 - 8.5 Current VLAN Configuration Screen
 - 8.6 Current VLAN Egress Configuration Screen
 - 8.7 VLAN Port Configuration Screen
 - 8.8 VLAN Classification Configuration Screen
 - 8.9 Protocol Port Configuration Screen
 
 - 802.1p Configuration Menu Screens
- 9.1 802.1p Configuration Menu Screen
 - 9.2 Port Priority Configuration Screen
 - 9.3 Traffic Class Information Screen
 - 9.4 Traffic Class Configuration Screen
 - 9.5 Transmit Queues Configuration Screen
 - 9.6 Priority Classification Configuration Screen
 - 9.7 Protocol Port Configuration Screen
 - 9.8 Rate Limiting Configuration Screen
 
 - Layer 3 Extensions Menu Screens
 - Module Statistics Menu Screens
 - Network Tools Screens
 - VLAN Operation and Network Applications
- 13.1 Defining VLANs
 - 13.2 Types of VLANs
 - 13.3 Benefits and Restrictions
 - 13.4 VLAN Terms
 - 13.5 VLAN Operation
 - 13.6 Configuration Process
 - 13.7 VLAN Switch Operation
 - 13.8 VLAN Configuration
 - 13.9 Summary of VLAN Local Management
 - 13.10 Quick VLAN Walkthrough
 - 13.11 Examples
 - 13.12 Example 1, Single Switch Operation
 - 13.13 Example 2, VLANs Across Multiple Switches
 - 13.14 Example 3, Filtering Traffic According to a Layer 4 Classification Rule
 - 13.15 Example 4, Securing Sensitive Information According to Subnet
 - 13.16 Example 5, Using Dynamic Egress to Control Traffic
 - 13.17 Example 6, Locking a MAC Address to a Port Using Classification Rules
 
 - Generic Attribute Registration Protocol (GARP)
 - About IGMP
 - Index
 

8. AUDIT RIGHTS. You hereby acknowledge that the intellectual property rights associated with the Program are of 
critical value to Enterasys and, accordingly, You hereby agree to maintain complete books, records and accounts showing 
(i) license fees due and paid, and (ii) the use, copying and deployment of the Program. You also grant to Enterasys and 
its authorized representatives, upon reasonable notice, the right to audit and examine during Your normal business 
hours, Your books, records, accounts and hardware devices upon which the Program may be deployed to verify 
compliance with this Agreement, including the verification of the license fees due and paid Enterasys and the use, copying 
and deployment of the Program. Enterasys' right of examination shall be exercised reasonably, in good faith and in a 
manner calculated to not unreasonably interfere with Your business. In the event such audit discovers non-compliance 
with this Agreement, including copies of the Program made, used or deployed in breach of this Agreement, You shall 
promptly pay to Enterasys the appropriate license fees.  Enterasys reserves the right, to be exercised in its sole discretion 
and without prior notice, to terminate this license, effective immediately, for failure to comply with this Agreement. Upon 
any such termination, You shall immediately cease all use of the Program and shall return to Enterasys the Program and 
all copies of the Program.
9. OWNERSHIP. This is a license agreement and not an agreement for sale. You acknowledge and agree that the 
Program constitutes trade secrets and/or copyrighted material of Enterasys and/or its suppliers. You agree to implement 
reasonable security measures to protect such trade secrets and copyrighted material. All right, title and interest in and to 
the Program shall remain with Enterasys and/or its suppliers. All rights not specifically granted to You shall be reserved 
to Enterasys.
10. ENFORCEMENT. You acknowledge and agree that any breach of Sections 2, 4, or 9 of this Agreement by You 
may cause Enterasys irreparable damage for which recovery of money damages would be inadequate, and that Enterasys 
may be entitled to seek timely injunctive relief to protect Enterasys’ rights under this Agreement in addition to any and 
all remedies available at law. 
11. ASSIGNMENT. You may not assign, transfer or sublicense this Agreement or any of Your rights or obligations 
under this Agreement, except in connection with the sale or other transfer of the hardware in which the Program is 
embedded. Enterasys may assign this Agreement in its sole discretion.
12. WAIVER. A waiver by Enterasys of a breach of any of the terms and conditions of this Agreement must be in 
writing and will not be construed as a waiver of any subsequent breach of such term or condition. Enterasys’ failure to 
enforce a term upon Your breach of such term shall not be construed as a waiver of Your breach or prevent enforcement 
on any other occasion.
13. SEVERABILITY. In the event any provision of this Agreement is found to be invalid, illegal or unenforceable, the 
validity, legality and enforceability of any of the remaining provisions shall not in any way be affected or impaired 
thereby, and that provision shall be reformed, construed and enforced to the maximum extent permissible. Any such 
invalidity, illegality or unenforceability in any jurisdiction shall not invalidate or render illegal or unenforceable such 
provision in any other jurisdiction.
14. TERMINATION. Enterasys may terminate this Agreement immediately upon Your breach of any of the terms and 
conditions of this Agreement. Upon any such termination, You shall immediately cease all use of the Program and shall 
return to Enterasys the Program and all copies of the Program.










