MES1000, MES2000 Ethernet Switches 179
Table 5.206 —VLAN interface configuration mode commands
Unauthorized user access
is denied by default.
Allow access to the current VLAN for the unauthorized users.
Deny access to the current VLAN for the unauthorized users.
VLAN is not configured as
the guest VLAN
Define the guest VLAN.
Allow unauthorized users of this interface to access the guest
VLAN. If the guest VLAN is defined and allowed, the port will
automatically join the guest VLAN, when it is unauthorized,
and leave the the guest VLAN, when it passes authorization. To
use these functions, the port should be a static member of the
guest VLAN.
Restore the default value.
Privileged EXEC mode commands
Command line request in Privileged EXEC mode appears as follows:
console#
Table 5.207 —Privileged EXEC mode commands
show dot1x advanced
[gigabitethernet gi_port |
fastethernet fa_port]
gi_port: (1..3/0/1..28);
fa_port: (1..3/0/1..24)
Show additional information on 802.1x protocol settings (this
command is available to privileged users only).
EXEC mode commands
Command line request in EXEC mode appears as follows:
console#
Table 5.208 —Privileged EXEC mode commands
Show 802.1x BPDU port security processing when 802.1x
disabled globally.
5.27.3 DHCP protocol management and Option 82
DHCP (Dynamic Host Configuration Protocol) is a network protocol that allows the client to request
IP address and other parameters required for the proper network operations.
DHCP is used by hackers for attacks on the device from the client side, forcing DHCP server to report
all available addresses, and from the server side by spoofing. The switch software ensures device
protection from attacks via DHCP with DHCP snooping.
The device will be able to discover DHCP servers in the network and will ensure their utilization only
via trusted interfaces, and also it can control client access to DHCP servers using the match table.
DHCP Option 82 allows to inform DHCP server about the DHCP Relay Agent and its port, that were
involved in transmission of the particular request. It is used for establishing matches between IP addresses
and switch ports, and ensuring protection from attacks via DHCP. Option 82 contains additional