User Manual

Contents
viii Enterasys X-Pedition User Reference Manual
24-7 Networks and VRRP ......................................................................................... 20
Identifying the Primary and Backup Control Modules in a Dual CM Environment. 20
Removing the Primary Control Module .................................................................... 20
Removing the Backup Control Module..................................................................... 21
Installing a Control Module....................................................................................... 22
Switching Fabric Module (XP-8600 only)............................................................................... 23
Removing the Switching Fabric Module .......................................................................... 23
Installing a Switching Fabric Module............................................................................... 24
GBICs (ER16 only).................................................................................................................. 25
Removing a GBIC from the Line Card............................................................................. 25
Installing a GBIC into the Line Card................................................................................ 26
Chapter 4: Using the CLI....................................................................................27
Command Modes ..................................................................................................................... 27
User Mode.................................................................................................................. 27
Enable Mode.............................................................................................................. 28
Configure Mode......................................................................................................... 28
Boot PROM Mode..................................................................................................... 28
Native and Common CLI Modes............................................................................... 29
Configuring CLI Access Security ............................................................................................ 30
Passwords.......................................................................................................................... 30
Creating a Password................................................................................................... 30
Password Policy Management .......................................................................................... 33
Single-User Mode...................................................................................................... 33
Multi-User Mode ....................................................................................................... 34
Establishing Telnet Sessions....................................................................................................35
Secure Shell (ssh) Server.......................................................................................................... 36
Configuring Secure Shell.................................................................................................. 36
SSH Protocol Versions...................................................................................................... 37
Server Keys................................................................................................................ 39
Encryption Algorithms (Ciphers) .............................................................................. 40
Message Authentication Codes (MACs) ................................................................... 41
Additional Options..................................................................................................... 42
Setting CLI Parameters ............................................................................................................ 43
Getting Help with CLI Commands .......................................................................................... 44
Line Editing Commands ................................................................................................... 46
Port Names............................................................................................................................... 47
Chapter 5: Logging..............................................................................................51
Introduction.............................................................................................................................. 51
Facility Support................................................................................................................. 51
Reading Messages............................................................................................................. 54
Logging Methods ..................................................................................................................... 55
Console Logging............................................................................................................... 56
Syslog Logging ................................................................................................................. 57
Remote Syslog Server................................................................................................ 57
Local Flash................................................................................................................. 58
Audit Trail................................................................................................................................ 59
Audit Messages................................................................................................................. 59