Contents
OmniSwitch AOS Release 7 Network Configuration Guide June 2013 xxiii
Authenticated Switch Access .................................................................................29-5
RADIUS Servers ...........................................................................................................29-7
RADIUS Server Attributes .....................................................................................29-7
Configuring the RADIUS Client ..........................................................................29-11
TACACS+ Server .......................................................................................................29-12
TACACS+ Client Limitations ..............................................................................29-12
Configuring the TACACS+ Client .......................................................................29-13
LDAP Servers .............................................................................................................29-14
Setting Up the LDAP Authentication Server .......................................................29-14
LDAP Server Details ............................................................................................29-15
Directory Server Schema for LDAP Authentication ............................................29-20
Configuring the LDAP Authentication Client .....................................................29-25
Verifying the Authentication Server Configuration ....................................................29-27
Chapter 30 Configuring Port Mapping .....................................................................................30-1
In This Chapter ..............................................................................................................30-1
Port Mapping Specifications .........................................................................................30-2
Port Mapping Defaults ..................................................................................................30-2
Quick Steps for Configuring Port Mapping ..................................................................30-2
Creating/Deleting a Port Mapping Session ...................................................................30-3
Creating a Port Mapping Session ...........................................................................30-3
Deleting a Port Mapping Session ...........................................................................30-3
Enabling/Disabling a Port Mapping Session .................................................................30-4
Enabling a Port Mapping Session ..........................................................................30-4
Disabling a Port Mapping Session .........................................................................30-4
Disabling the Flooding of Unknown Unicast Traffic .............................................30-4
Configuring a Port Mapping Direction .........................................................................30-4
Configuring Unidirectional Port Mapping .............................................................30-4
Restoring Bidirectional Port Mapping ...................................................................30-4
Sample Port Mapping Configuration ............................................................................30-5
Example Port Mapping Overview ..........................................................................30-5
Example Port Mapping Configuration Steps .........................................................30-6
Verifying the Port Mapping Configuration ...................................................................30-6
Chapter 31 Configuring Learned Port Security ......................................................................31-1
In This Chapter ..............................................................................................................31-1
Learned Port Security Specifications ............................................................................31-2
Learned Port Security Defaults ....................................................................................31-2
Sample Learned Port Security Configuration ...............................................................31-3
Learned Port Security Overview ...................................................................................31-5
LPS Learning Window ...........................................................................................31-5
MAC Address Types ..............................................................................................31-6
How LPS Authorizes Source MAC Addresses ......................................................31-6