EasyManua.ls Logo

HP 1910 - Page 10

HP 1910
578 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
viii
DHCP snooping support for Option 82 ············································································································ 331
Recommended configuration procedure···················································································································· 332
Enabling DHCP snooping ··········································································································································· 332
Configuring DHCP snooping functions on an interface ··························································································· 333
Displaying DHCP snooping entries ···························································································································· 334
DHCP snooping configuration example ···················································································································· 335
Network requirements ········································································································································· 335
Configuring Switch B ·········································································································································· 335
Managing services ·················································································································································· 338
Overview ······································································································································································· 338
Managing services ······················································································································································· 339
Using diagnostic tools ············································································································································· 341
Ping ················································································································································································ 341
Traceroute ····································································································································································· 341
Ping operation ······························································································································································ 342
IPv4 ping operation ············································································································································· 342
IPv6 ping operation ············································································································································· 343
Traceroute operation ··················································································································································· 344
IPv4 traceroute operation ··································································································································· 344
IPv6 traceroute operation ··································································································································· 345
Configuring 802.1X ··············································································································································· 347
Overview ······································································································································································· 347
802.1X architecture ············································································································································ 347
Access control methods ······································································································································ 347
Controlled/uncontrolled port and port authorization status ··········································································· 348
802.1X-related protocols ···································································································································· 348
Packet formats ······················································································································································ 349
EAP over RADIUS ················································································································································ 350
Initiating 802.1X authentication ························································································································ 350
802.1X authentication procedures ···················································································································· 351
802.1X timers ······················································································································································ 355
Using 802.1X authentication with other features ···························································································· 356
Configuration prerequisites ········································································································································· 358
Recommended configuration procedure···················································································································· 358
Configuring 802.1X globally ····································································································································· 358
Configuring 802.1X on a port ··································································································································· 360
Configuration guidelines ···································································································································· 360
Configuration procedure ···································································································································· 360
Configuring an 802.1X guest VLAN ················································································································· 362
Configuring an Auth-Fail VLAN ························································································································· 362
Configuration examples ·············································································································································· 363
MAC-based 802.1X configuration example ···································································································· 363
802.1X with ACL assignment configuration example ····················································································· 369
Configuring AAA ···················································································································································· 378
Overview ······································································································································································· 378
Recommended AAA configuration procedure ·········································································································· 379
Configuring an ISP domain ········································································································································· 380
Configuring authentication methods for the ISP domain ························································································· 381
Configuring authorization methods for the ISP domain ··························································································· 382
Configuring accounting methods for the ISP domain ······························································································· 384
AAA configuration example ······································································································································· 385
Network requirements ········································································································································· 385

Table of Contents

Other manuals for HP 1910

Related product manuals