RUGGEDCOM ROS
User Guide

Table of Contents
xi
5.6.2.3Deleting a Security-to-Group Map ......................................................................... 205
5.6.3Managing SNMP Groups ................................................................................................. 205
5.6.3.1Viewing a List of SNMP Groups ............................................................................. 206
5.6.3.2Adding an SNMP Group ....................................................................................... 206
5.6.3.3Deleting an SNMP Group ..................................................................................... 208
5.7Managing Network Discovery .................................................................................................... 209
5.7.1Network Discovery Concepts ........................................................................................... 209
5.7.1.1Link Layer Discovery Protocol (LLDP) ..................................................................... 209
5.7.1.2 RUGGEDCOM Discovery Protocol (RCDP) ............................................................... 210
5.7.2Configuring LLDP Globally ............................................................................................... 210
5.7.3Configuring LLDP for an Ethernet Port ............................................................................. 212
5.7.4Enabling/Disabling RCDP ................................................................................................. 213
5.7.5Viewing Global Statistics and Advertised System Information ............................................. 214
5.7.6Viewing Statistics for LLDP Neighbors .............................................................................. 215
5.7.7Viewing Statistics for LLDP Ports ...................................................................................... 216
5.8Managing Multicast Filtering ...................................................................................................... 217
5.8.1Managing IGMP ............................................................................................................. 217
5.8.1.1IGMP Concepts .................................................................................................... 217
5.8.1.2Viewing a List of Multicast Group Memberships ..................................................... 221
5.8.1.3Viewing Forwarding Information for Multicast Groups ............................................ 222
5.8.1.4Configuring IGMP ................................................................................................ 223
5.8.2Managing GMRP ............................................................................................................ 224
5.8.2.1GMRP Concepts ................................................................................................... 225
5.8.2.2Viewing a Summary of Multicast Groups ............................................................... 227
5.8.2.3Configuring GMRP Globally .................................................................................. 227
5.8.2.4Configuring GMRP for Specific Ethernet Ports ........................................................ 228
5.8.2.5Viewing a List of Static Multicast Groups ............................................................... 230
5.8.2.6Adding a Static Multicast Group ........................................................................... 230
5.8.2.7Deleting a Static Multicast Group .......................................................................... 231
5.9Managing Port Security ............................................................................................................. 232
5.9.1Port Security Concepts .................................................................................................... 233
5.9.1.1Static MAC Address-Based Authentication .............................................................. 233
5.9.1.2IEEE 802.1x Authentication .................................................................................. 233
5.9.1.3IEEE 802.1X Authentication with MAC Address-Based Authentication ....................... 234
5.9.1.4Assigning VLANS with Tunnel Attributes ................................................................ 235
5.9.2Viewing a List of Authorized MAC Addresses .................................................................... 235
5.9.3Configuring Port Security ................................................................................................ 236
5.9.4Configuring IEEE 802.1X ................................................................................................. 238
5.10Managing Link Aggregation ..................................................................................................... 240
5.10.1Link Aggregation Concepts ........................................................................................... 241