Using This Guide
A general working knowledge of basic network operations and an understanding of CLI management applications is helpful before configuring the Extreme Networks S- K- or 7100-Series device.
This manual describes how to do the following:
- Access the Extreme Networks S- K- and 7100-Series CLI.
- Use CLI commands to perform network management and device configuration operations.
- Establish and manage Virtual Local Area Networks (VLANs).
- Manage static and dynamically-assigned user policies.
- Establish and manage priority classification.
- Configure IP routing and routing protocols, including RIP version 2, OSPF, DVMRP, and VRRP.
- Configure security protocols, including 802.1X and RADIUS, SSHv2, MAC locking, MAC authentication, multiple authentication, DoS attack prevention, and flow setup throttling.
- Configure policy-based routing.
- Configure access control lists (ACLs).