EasyManua.ls Logo

LevelOne GEL-1061 - Page 19

LevelOne GEL-1061
500 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Figures
– 19 –
Figure 135: Configuring Port Settings for a Voice VLAN 222
Figure 136: Configuring the Authentication Sequence 226
Figure 137: Authentication Server Operation 226
Figure 138: Configuring Remote Authentication Server (RADIUS) 229
Figure 139: Configuring Remote Authentication Server (TACACS+) 230
Figure 140: Configuring AAA Server Groups 230
Figure 141: Showing AAA Server Groups 231
Figure 142: Configuring Global Settings for AAA Accounting 233
Figure 143: Configuring AAA Accounting Methods 234
Figure 144: Showing AAA Accounting Methods 235
Figure 145: Configuring AAA Accounting Service for 802.1X Service 235
Figure 146: Configuring AAA Accounting Service for Command Service 236
Figure 147: Configuring AAA Accounting Service for Exec Service 236
Figure 148: Displaying a Summary of Applied AAA Accounting Methods 237
Figure 149: Displaying Statistics for AAA Accounting Sessions 237
Figure 150: Configuring AAA Authorization Methods 239
Figure 151: Showing AAA Authorization Methods 239
Figure 152: Configuring AAA Authorization Methods for Exec Service 240
Figure 153: Displaying the Applied AAA Authorization Method 240
Figure 154: Configuring User Accounts 242
Figure 155: Showing User Accounts 243
Figure 156: Configuring Global Settings for Network Access 246
Figure 157: Configuring Interface Settings for Network Access 247
Figure 158: Configuring a MAC Address Filter for Network Access 248
Figure 159: Showing the MAC Address Filter Table for Network Access 249
Figure 160: Showing Addresses Authenticated for Network Access 250
Figure 161: Configuring HTTPS 252
Figure 162: Downloading the Secure-Site Certificate 254
Figure 163: Configuring the SSH Server 257
Figure 164: Generating the SSH Host Key Pair 258
Figure 165: Showing the SSH Host Key Pair 259
Figure 166: Copying the SSH User’s Public Key 260
Figure 167: Showing the SSH User’s Public Key 261
Figure 168: Showing TCAM Utilization 264
Figure 169: Creating an ACL 265

Table of Contents