xviii
Disabling and Enabling Ports ................................................................................................................. 26-9
MAC Locking Defaults ............................................................................................................................ 26-9
MAC Locking Configuration ................................................................................................................. 26-10
TACACS+ ................................................................................................................................................... 26-11
TACACS+ Client Functionality ............................................................................................................. 26-12
Session Authorization and Accounting...........................................................................................26-12
Command Authorization and Accounting .......................................................................................26-12
Configuring the Source Address.....................................................................................................26-13
Default Settings .................................................................................................................................... 26-13
Basic TACACS+ Configuration ............................................................................................................ 26-14
Example TACACS+ Configuration ....................................................................................................... 26-15
TACACS+ Display Commands ............................................................................................................ 26-15
Service ACLs .............................................................................................................................................. 26-16
Restricting Management Access to the Console Port .......................................................................... 26-17
Configuring a Service Access Control List ........................................................................................... 26-17
DHCP Snooping ........................................................................................................................................ 26-18
DHCP Message Processing ................................................................................................................. 26-18
Building and Maintaining the Database ................................................................................................ 26-19
Rate Limiting ........................................................................................................................................ 26-19
Basic Configuration .............................................................................................................................. 26-19
Configuration Notes........................................................................................................................26-20
Default Parameter Values ..............................................................................................................26-20
Managing DHCP Snooping .................................................................................................................. 26-21
Dynamic ARP Inspection ........................................................................................................................... 26-22
Functional Description .......................................................................................................................... 26-22
Static Mappings..............................................................................................................................26-22
Optional ARP Packet Validation .....................................................................................................26-22
Logging Invalid Packets..................................................................................................................26-23
Packet Forwarding..........................................................................................................................26-23
Rate Limiting...................................................................................................................................26-23
Eligible Interfaces ...........................................................................................................................26-23
Interaction with Other Functions.....................................................................................................26-23
Basic Configuration .............................................................................................................................. 26-24
Default Parameter Values ..............................................................................................................26-24
Managing Dynamic ARP Inspection ..................................................................................................... 26-24
Example Configuration ......................................................................................................................... 26-25
Non-Routing Example ....................................................................................................................26-25
Routing Example ............................................................................................................................26-26
Figures
3-1 CLI Startup Screen............................................................................................................................. 3-2
3-2 Sample CLI Defaults Description........................................................................................................ 3-4
3-3 Performing a Keyword Lookup ........................................................................................................... 3-4
3-4 Performing a Partial Keyword Lookup................................................................................................ 3-4
3-5 Scrolling Screen Output...................................................................................................................... 3-5
3-6 Abbreviating a Command................................................................................................................... 3-5
9-1 VLAN Business Scenario ................................................................................................................... 9-2
9-2 Inside the Switch ................................................................................................................................ 9-5
9-3 Example of VLAN Propagation Using GVRP ..................................................................................... 9-8
10-1 Applying Policy to Multiple Users on a Single Port........................................................................... 10-5
10-2 Authenticating Multiple Users With Different Methods on a Single Port........................................... 10-6
10-3 Selecting Authentication Method When Multiple Methods are Validated ......................................... 10-7
10-4 Stackable Fixed Switch Authentication Configuration Example Overview ..................................... 10-25
11-1 LAG Formation ................................................................................................................................. 11-4
11-2 LAGs Moved to Attached State ........................................................................................................ 11-6