beautypg.com

CANOGA PERKINS 9175 Configuration Guide User Manual

Page 12

background image

CanogaOS Configuration Guide

viii

36.1

Configuration DHCP Relay ...................................................................... 36-1

36.1.1

Overview ..................................................................................... 36-1

36.1.2

References.................................................................................. 36-1

36.1.3

Terminology ................................................................................ 36-1

36.1.4

Topology ..................................................................................... 36-1

36.1.5

Configurations............................................................................. 36-2

36.1.6

Validation Commands ................................................................. 36-2

36.2

Configuration DHCP Snooping ................................................................ 36-3

36.2.1

Overview ..................................................................................... 36-3

36.2.2

Topology ..................................................................................... 36-4

36.2.3

Configurations............................................................................. 36-4

36.2.4

Validation Commands ................................................................. 36-5

37

Configuring ARP Inspection........................................................................... 37-1

37.1

Overview ................................................................................................. 37-1

37.2

Terminology............................................................................................. 37-1

37.3

Topology.................................................................................................. 37-1

37.4

Configurations ......................................................................................... 37-2

37.5

Validation Commands ............................................................................. 37-3

38

Configuring IP Source Guard......................................................................... 38-1

38.1

Overview ................................................................................................. 38-1

38.2

Terminology............................................................................................. 38-1

38.3

Topology.................................................................................................. 38-2

38.4

Configurations ......................................................................................... 38-2

38.5

Validation Commands ............................................................................. 38-2

39

Configuring IEEE 802.1x ............................................................................... 39-1

39.1

Overview ................................................................................................. 39-1

39.2

References .............................................................................................. 39-1

39.3

Terminology............................................................................................. 39-1

39.4

Authentication Initiation and Message Exchange .................................... 39-2

39.5

Ports in Authorized and Unauthorized state ............................................ 39-3

39.6

802.1x Configuration ............................................................................... 39-4

40

Configuring Radius Authentication................................................................. 40-1

40.1

Overview ................................................................................................. 40-1

40.2

Topology.................................................................................................. 40-1

40.3

Configuration Steps ................................................................................. 40-1

40.4

Checking Configuration ........................................................................... 40-2

40.5

Display Results........................................................................................ 40-3

41

Configuring Secure Shell ............................................................................... 41-1

41.1

Overview ................................................................................................. 41-1

41.2

References .............................................................................................. 41-1

41.3

Terminology............................................................................................. 41-1

41.4

Configuring the SSH Server .................................................................... 41-1

41.5

Configuring RSA Key............................................................................... 41-2

42

Configuring STM............................................................................................ 42-1

42.1

Terminology............................................................................................. 42-1

42.2

Validation Commands ............................................................................. 42-1