EasyManua.ls Logo

Orion A10E - Page 12

Orion A10E
376 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Orion Networks
A10E/A28E/A28F Configuration Guide
Contents
Orion Networks
x
6.1.8 Checking configurations ................................................................................................................ 152
6.1.9 Maintenance ................................................................................................................................. 152
6.2 Secure MAC address .................................................................................................................. 152
6.2.1 Introduction .................................................................................................................................. 152
6.2.2 Preparing for configurations ......................................................................................................... 154
6.2.3 Default configurations of secure MAC address ............................................................................. 154
6.2.4 Configuring basic functions of secure MAC address ..................................................................... 154
6.2.5 Configuring static secure MAC address......................................................................................... 155
6.2.6 Configuring dynamic secure MAC address ................................................................................... 156
6.2.7 Configuring Sticky secure MAC address ........................................................................................ 156
6.2.8 Checking configurations ................................................................................................................ 157
6.2.9 Maintenance ................................................................................................................................. 157
6.2.10 Example for configuring secure MAC address ............................................................................ 157
6.3 Dynamic ARP inspection ............................................................................................................ 159
6.3.1 Introduction .................................................................................................................................. 159
6.3.2 Preparing for configurations ......................................................................................................... 161
6.3.3 Default configurations of dynamic ARP inspection ....................................................................... 161
6.3.4 Configuring trusted interfaces of dynamic ARP inspection .......................................................... 161
6.3.5 Configuring static binding of dynamic ARP inspection ................................................................. 162
6.3.6 Configuring dynamic binding of dynamic ARP inspection ............................................................ 162
6.3.7 Configuring protection VLAN of dynamic ARP inspection ............................................................ 162
6.3.8 Configuring rate limiting on ARP packets on the interface ........................................................... 162
6.3.9 Configuring global ARP packet rate limiting auto-recovery time .................................................. 163
6.3.10 Checking configurations .............................................................................................................. 163
6.3.11 Example for configuring dynamic ARP inspection ...................................................................... 163
6.4 RADIUS ..................................................................................................................................... 166
6.4.1 Introduction .................................................................................................................................. 166
6.4.2 Preparing for configurations ......................................................................................................... 166
6.4.3 Default configurations of RADIUS ................................................................................................. 167
6.4.4 Configuring RADIUS authentication .............................................................................................. 167
6.4.5 Configuring RADIUS accounting .................................................................................................... 168
6.4.6 Checking configurations ................................................................................................................ 168
6.4.7 Example for configuring RADIUS ................................................................................................... 169
6.5 TACACS+ ................................................................................................................................... 170
6.5.1 Introduction .................................................................................................................................. 170
6.5.2 Preparing for configurations ......................................................................................................... 170
6.5.3 Default configurations of TACACS+ ............................................................................................... 171
6.5.4 Configuring TACACS+ authentication ............................................................................................ 171
6.5.5 Configuring TACACS+ accounting .................................................................................................. 172
6.5.6 Configuring TACACS+ authorization .............................................................................................. 172
6.5.7 Checking configurations ................................................................................................................ 173
6.5.8 Maintenance ................................................................................................................................. 173
6.5.9 Example for configuring TACACS+ ................................................................................................. 173
6.6 Storm control ............................................................................................................................ 174
6.6.1 Preparing for configurations ......................................................................................................... 175
6.6.2 Default configurations of storm control ........................................................................................ 175
6.6.3 Configuring storm control ............................................................................................................. 175
6.6.4 Configuring DLF packet forwarding ............................................................................................... 176
6.6.5 Checking configurations ................................................................................................................ 176
6.6.6 Example for configuring storm control ......................................................................................... 176

Table of Contents