CANOGA PERKINS CanogaOS Configuration Guide User Manual
Page 15
CanogaOS Configuration Guide
Proprietary & Confidential Canoga Perkins Metro Ethernet Switches
Page 15 of 350
35.2.2 Configurations................................................................................................. 300
35.2.3 Validation
Commands..................................................................................... 301
36
Configuring ARP Inspection................................................................................................ 303
36.1.1 Terminology .................................................................................................... 303
36.1.2 Topology ......................................................................................................... 303
36.1.3 Configurations................................................................................................. 304
36.1.4 Validation
Commands..................................................................................... 305
37
Configuring IP Source Guard............................................................................................... 307
37.1.1 Terminology .................................................................................................... 307
37.1.2 Topology ......................................................................................................... 308
37.1.3 Configurations................................................................................................. 308
37.1.4 Validation
Commands..................................................................................... 309
38
Configuring IEEE 802.1x..................................................................................................... 310
38.1.1 References ....................................................................................................... 310
38.1.2 Terminology .................................................................................................... 310
38.1.3
Authentication Initiation and Message Exchange........................................... 311
38.1.4
Ports in Authorized and Unauthorized state.................................................... 312
38.1.5 802.1x
Configuration ...................................................................................... 313
39
Configuring Radius Authentication ..................................................................................... 317
39.1.1 Overview ......................................................................................................... 317
39.1.2 Usage
example ................................................................................................ 317
Networking Topology.................................................................................................................... 317
Configuration Steps....................................................................................................................... 317
For Linux Box ...................................................................................................................... 317
For Canoga Switch............................................................................................................... 318
Checking Configuration ................................................................................................................ 319
Display Results.............................................................................................................................. 320
Telnet output......................................................................................................................... 320
39.1.3 Notice .............................................................................................................. 320
40
Configuring Secure Shell ..................................................................................................... 321
40.1
Secure Shell Configuration ........................................................................................... 321
40.1.1 References ....................................................................................................... 321
40.1.2 Terminology .................................................................................................... 321
40.1.3
Configuring the SSH Server............................................................................ 321
40.1.4 Validation
Commands..................................................................................... 322