Avaya P334T-ML User Manual
Page 6

Table of Contents
iv
Avaya P334T-ML User’s Guide
Syslog Configuration CLI Commands ...................................71
Monitoring CPU Utilization ........................................................................... 73
Overview ........................................................................................................... 75
Ethernet.............................................................................................................. 76
Auto-Negotiation .......................................................................76
Full-Duplex/Half-Duplex ........................................................76
Speed ...........................................................................................77
Flow Control ...............................................................................77
Priority ........................................................................................77
MAC Address ............................................................................78
CAM Table ..................................................................................78
Ethernet Configuration CLI Commands ...........................................79
Ethernet Implementation in the Avaya P334T-ML ..........................80
VLAN Overview ...................................................................................81
VLAN Tagging ......................................................................................82
Multi VLAN Binding ............................................................................82
Automatic VLAN Learning .................................................................84
Ingress VLAN Security ........................................................................84
VLAN CLI Commands ........................................................................84
VLAN Implementation in the Avaya P334T-ML .............................85
Port Based Network Access Control (PBNAC)............................................ 86
How “Port Based” Authentication Works ........................................86
PBNAC Implementation in the P330 Family ....................................86
Configuring the P330 for PBNAC ......................................................87
PBNAC CLI Commands ......................................................................88
Overview ................................................................................................90
Spanning Tree Protocol ........................................................................90
Spanning Tree per Port ........................................................................90
Rapid Spanning Tree Protocol (RSTP) ...............................................91
Spanning Tree Implementation in the P330 Family .........................92
Spanning Tree Protocol CLI Commands ...........................................93
MAC Security Implementation in P330 .............................................95
MAC Security CLI Commands ...........................................................96