EasyManua.ls Logo

Enterasys C5G124-24 - Page 20

Enterasys C5G124-24
452 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
xviii
Disabling and Enabling Ports ................................................................................................................. 26-9
MAC Locking Defaults ............................................................................................................................ 26-9
MAC Locking Configuration ................................................................................................................. 26-10
TACACS+ ................................................................................................................................................... 26-11
TACACS+ Client Functionality ............................................................................................................. 26-12
Session Authorization and Accounting...........................................................................................26-12
Command Authorization and Accounting .......................................................................................26-12
Configuring the Source Address.....................................................................................................26-13
Default Settings .................................................................................................................................... 26-13
Basic TACACS+ Configuration ............................................................................................................ 26-14
Example TACACS+ Configuration ....................................................................................................... 26-15
TACACS+ Display Commands ............................................................................................................ 26-15
Service ACLs .............................................................................................................................................. 26-16
Restricting Management Access to the Console Port .......................................................................... 26-17
Configuring a Service Access Control List ........................................................................................... 26-17
DHCP Snooping ........................................................................................................................................ 26-18
DHCP Message Processing ................................................................................................................. 26-18
Building and Maintaining the Database ................................................................................................ 26-19
Rate Limiting ........................................................................................................................................ 26-19
Basic Configuration .............................................................................................................................. 26-19
Configuration Notes........................................................................................................................26-20
Default Parameter Values ..............................................................................................................26-20
Managing DHCP Snooping .................................................................................................................. 26-21
Dynamic ARP Inspection ........................................................................................................................... 26-22
Functional Description .......................................................................................................................... 26-22
Static Mappings..............................................................................................................................26-22
Optional ARP Packet Validation .....................................................................................................26-22
Logging Invalid Packets..................................................................................................................26-23
Packet Forwarding..........................................................................................................................26-23
Rate Limiting...................................................................................................................................26-23
Eligible Interfaces ...........................................................................................................................26-23
Interaction with Other Functions.....................................................................................................26-23
Basic Configuration .............................................................................................................................. 26-24
Default Parameter Values ..............................................................................................................26-24
Managing Dynamic ARP Inspection ..................................................................................................... 26-24
Example Configuration ......................................................................................................................... 26-25
Non-Routing Example ....................................................................................................................26-25
Routing Example ............................................................................................................................26-26
Figures
3-1 CLI Startup Screen............................................................................................................................. 3-2
3-2 Sample CLI Defaults Description........................................................................................................ 3-4
3-3 Performing a Keyword Lookup ........................................................................................................... 3-4
3-4 Performing a Partial Keyword Lookup................................................................................................ 3-4
3-5 Scrolling Screen Output...................................................................................................................... 3-5
3-6 Abbreviating a Command................................................................................................................... 3-5
9-1 VLAN Business Scenario ................................................................................................................... 9-2
9-2 Inside the Switch ................................................................................................................................ 9-5
9-3 Example of VLAN Propagation Using GVRP ..................................................................................... 9-8
10-1 Applying Policy to Multiple Users on a Single Port........................................................................... 10-5
10-2 Authenticating Multiple Users With Different Methods on a Single Port........................................... 10-6
10-3 Selecting Authentication Method When Multiple Methods are Validated ......................................... 10-7
10-4 Stackable Fixed Switch Authentication Configuration Example Overview ..................................... 10-25
11-1 LAG Formation ................................................................................................................................. 11-4
11-2 LAGs Moved to Attached State ........................................................................................................ 11-6

Table of Contents

Other manuals for Enterasys C5G124-24

Related product manuals