CANOGA PERKINS 9175 Configuration Guide User Manual
Page 12
CanogaOS Configuration Guide
viii
36.1
Configuration DHCP Relay ...................................................................... 36-1
36.1.1
Overview ..................................................................................... 36-1
36.1.2
References.................................................................................. 36-1
36.1.3
Terminology ................................................................................ 36-1
36.1.4
Topology ..................................................................................... 36-1
36.1.5
Configurations............................................................................. 36-2
36.1.6
Validation Commands ................................................................. 36-2
36.2
Configuration DHCP Snooping ................................................................ 36-3
36.2.1
Overview ..................................................................................... 36-3
36.2.2
Topology ..................................................................................... 36-4
36.2.3
Configurations............................................................................. 36-4
36.2.4
Validation Commands ................................................................. 36-5
37
Configuring ARP Inspection........................................................................... 37-1
37.1
Overview ................................................................................................. 37-1
37.2
Terminology............................................................................................. 37-1
37.3
Topology.................................................................................................. 37-1
37.4
Configurations ......................................................................................... 37-2
37.5
Validation Commands ............................................................................. 37-3
38
Configuring IP Source Guard......................................................................... 38-1
38.1
Overview ................................................................................................. 38-1
38.2
Terminology............................................................................................. 38-1
38.3
Topology.................................................................................................. 38-2
38.4
Configurations ......................................................................................... 38-2
38.5
Validation Commands ............................................................................. 38-2
39
Configuring IEEE 802.1x ............................................................................... 39-1
39.1
Overview ................................................................................................. 39-1
39.2
References .............................................................................................. 39-1
39.3
Terminology............................................................................................. 39-1
39.4
Authentication Initiation and Message Exchange .................................... 39-2
39.5
Ports in Authorized and Unauthorized state ............................................ 39-3
39.6
802.1x Configuration ............................................................................... 39-4
40
Configuring Radius Authentication................................................................. 40-1
40.1
Overview ................................................................................................. 40-1
40.2
Topology.................................................................................................. 40-1
40.3
Configuration Steps ................................................................................. 40-1
40.4
Checking Configuration ........................................................................... 40-2
40.5
Display Results........................................................................................ 40-3
41
Configuring Secure Shell ............................................................................... 41-1
41.1
Overview ................................................................................................. 41-1
41.2
References .............................................................................................. 41-1
41.3
Terminology............................................................................................. 41-1
41.4
Configuring the SSH Server .................................................................... 41-1
41.5
Configuring RSA Key............................................................................... 41-2
42
Configuring STM............................................................................................ 42-1
42.1
Terminology............................................................................................. 42-1
42.2
Validation Commands ............................................................................. 42-1