11.08.2013 Views

User Reference Manual.book

User Reference Manual.book

User Reference Manual.book

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Contents<br />

24-7 Networks and VRRP ......................................................................................... 22<br />

Identifying the Primary and Backup Control Modules in a Dual CM Environment. 22<br />

Removing the Primary Control Module .................................................................... 22<br />

Removing the Backup Control Module ..................................................................... 23<br />

Installing a Control Module....................................................................................... 24<br />

Switching Fabric Module (XP-8600 only)............................................................................... 25<br />

Removing the Switching Fabric Module .......................................................................... 25<br />

Installing a Switching Fabric Module............................................................................... 26<br />

GBICs (ER16 only).................................................................................................................. 27<br />

Removing a GBIC from the Line Card............................................................................. 27<br />

Installing a GBIC into the Line Card................................................................................ 28<br />

Chapter 4: Using the CLI....................................................................................29<br />

Command Modes ..................................................................................................................... 29<br />

<strong>User</strong> Mode.................................................................................................................. 29<br />

Enable Mode .............................................................................................................. 30<br />

Configure Mode......................................................................................................... 30<br />

Boot PROM Mode ..................................................................................................... 30<br />

Native and Common CLI Modes............................................................................... 31<br />

Configuring CLI Access Security ............................................................................................ 32<br />

Passwords.......................................................................................................................... 32<br />

Creating a Password................................................................................................... 32<br />

Password Policy Management .......................................................................................... 35<br />

Single-<strong>User</strong> Mode ...................................................................................................... 35<br />

Multi-<strong>User</strong> Mode ....................................................................................................... 36<br />

Establishing Telnet Sessions ....................................................................................................37<br />

Secure Shell (SSH) Server .......................................................................................................38<br />

Configuring Secure Shell.................................................................................................. 38<br />

SSH Protocol Versions...................................................................................................... 39<br />

Server Keys................................................................................................................ 41<br />

Encryption Algorithms (Ciphers) .............................................................................. 42<br />

Message Authentication Codes (MACs) ................................................................... 43<br />

Additional Options..................................................................................................... 44<br />

Setting CLI Parameters ............................................................................................................ 45<br />

Getting Help with CLI Commands .......................................................................................... 46<br />

Line Editing Commands ................................................................................................... 48<br />

Port Names ............................................................................................................................... 49<br />

Chapter 5: Logging..............................................................................................53<br />

Introduction .............................................................................................................................. 53<br />

Facility Support................................................................................................................. 53<br />

Reading Messages............................................................................................................. 56<br />

Logging Methods ..................................................................................................................... 57<br />

Console Logging............................................................................................................... 58<br />

Syslog Logging ................................................................................................................. 59<br />

Remote Syslog Server................................................................................................ 59<br />

Local Flash................................................................................................................. 60<br />

Audit Trail................................................................................................................................ 61<br />

Audit Messages ................................................................................................................. 61<br />

viii Enterasys X-Pedition <strong>User</strong> <strong>Reference</strong> <strong>Manual</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!