What You'll Find in This Guide
Part 1: Getting Started
Part 2: Securing the Switch
Part 3: Switch Basics
© Copyright Lenovo 2016
This guide will help you plan, implement, and administer Enterprise NOS software.
Where possible, each section provides feature overviews, usage examples, and
configuration instructions. The following material is included:
This material is intended to help those new to ENOS products with the basics of
switch management. This part includes the following chapters:
Chapter
1, "Switch Administration," describes how to access the G8264 to
configure the switch and view switch information and statistics. This chapter
discusses a variety of manual administration interfaces, including local
management via the switch console, and remote administration via Telnet, a
web browser, or via SNMP.
Chapter
2, "Initial Setup," describes how to use the built‐in Setup utility to
perform first‐time configuration of the switch.
Chapter
3, "Switch Software Management," describes how to update the ENOS
software operating on the switch.
Chapter
4, "Securing Administration," describes methods for using Secure Shell
for administration connections, and configuring end‐user access control.
Chapter
5, "Authentication & Authorization Protocols," describes different
secure administration for remote administrators. This includes using Remote
Authentication Dial‐in User Service (RADIUS), as well as TACACS+ and LDAP.
Chapter
6, "802.1X Port‐Based Network Access Control," describes how to
authenticate devices attached to a LAN port that has point‐to‐point connection
characteristics. This feature prevents access to ports that fail authentication and
authorization and provides security to ports of the G8264 that connect to blade
servers.
Chapter
7, "Access Control Lists," describes how to use filters to permit or deny
specific types of traffic, based on a variety of source, destination, and packet
attributes.
Chapter
8, "Secure Input/Output Module," describes which protocols can be
enabled. This feature allows secured traffic and secured authentication
management.
Chapter
9, "VLANs," describes how to configure Virtual Local Area Networks
(VLANs) for creating separate network segments, including how to use VLAN
tagging for devices that use multiple VLANs. This chapter also describes
Protocol‐based VLANs, and Private VLANs.
Chapter
10, "Ports and Link Aggregation," describes how to group multiple
physical ports together to aggregate the bandwidth between large‐scale network
devices.
25
Preface