beautypg.com

GarrettCom Magnum MNS-6K User Manual

Page 13

background image

F

IGURE

25

-

Querying the serial port settings ......................................................................................41

F

IGURE

26

-

System parameters using the show setup command. Most parameters here cannot be

changed ..................................................................................................................................... 41

F

IGURE

27

-

System parameters using the show sysconfig command. Most parameters here can be

changed. .................................................................................................................................... 42

F

IGURE

28

-

Setting the system name, system location and system contact information...........................42

F

IGURE

29

-

Setting the system date, time and time zone .....................................................................43

F

IGURE

30

-

Setting the system daylight saving time.............................................................................44

F

IGURE

31

-

Setting up SNTP services ...............................................................................................45

F

IGURE

32

-

Saving the configuration on a tftp server ..........................................................................45

F

IGURE

33 – Based on the ftp or tftp or xmodem commands – the MNS-6K based switch can

upload or download different types of files and images .Other files such as log files, hosts file
can also be saved or loaded onto a switch
.................................................................................... 47

F

IGURE

34commands to save the configuration using ftp. Similar options will be specified using

tftp etc. When using the ftp command, use the host command discussed later in this section
to define the ftp server
................................................................................................................ 48

F

IGURE

35 – Contents of the config file................................................................................................. 49

F

IGURE

36 – Creating host entries on MNS-6K.................................................................................. 50

F

IGURE

37

show config’

command output................................................................................... 52

F

IGURE

38displaying specific modules using the

‘show config’

command....................................... 52

F

IGURE

39displaying configuration for different modules. Note – multiple modules can be

specified on the command line..................................................................................................... 53

F

IGURE

40

Erasing configuration without erasing the IP address ....................................................... 54

F

IGURE

41

– Display the serial number, factory code and other relevant setup information...................... 54

F

IGURE

42

– Configuring IPv6............................................................................................................ 62

F

IGURE

43Changing password for a given account ............................................................................ 64

F

IGURE

44Port security configuration mode ...................................................................................... 65

F

IGURE

45 – Port security configuration mode ...................................................................................... 66

F

IGURE

46Port security – allowing specific MAC addresses on a specified port. (No spaces

between specified MAC addresses) ............................................................................................. 67

F

IGURE

47 – Port security - the port learns the MAC addresses. Note – a maximum of 200

MAC addresses can be learnt per port and a maximum of 500 per switch. Also, the
‘action’ on the port must be set to none before the port ‘learns’ the MAC address
information.
.............................................................................................................................. 67

F

IGURE

48 Enabling and disabling port security ............................................................................... 67

xii