beautypg.com
vi
Dynamic IP address assignment configuration example ················································································· 267
DHCP relay agent configuration example ················································································································· 272
DHCP snooping configuration example ···················································································································· 274
Service management ·············································································································································· 278
Overview ······································································································································································· 278
Configuring service management ······························································································································ 279
Diagnostic tools ······················································································································································· 281
Overview ······································································································································································· 281
Ping ······································································································································································· 281
Trace route ··························································································································································· 281
Ping operation ······························································································································································ 282
Trace route operation ·················································································································································· 283
MAC authentication configuration ························································································································· 285
MAC authentication overview ···································································································································· 285
Configuring MAC authentication ······························································································································· 285
Configuration prerequisites ································································································································ 285
Recommended configuration procedure ··········································································································· 285
Configuring MAC authentication globally ················································································································ 286
Configuring MAC authentication on a port ·············································································································· 287
Local MAC authentication configuration example ··································································································· 288
ACL assignment configuration example ···················································································································· 291
802.1X configuration ············································································································································· 301
802.1X overview ························································································································································· 301
802.1X architecture ············································································································································ 301
Access control methods ······································································································································ 301
Configuring 802.1X ···················································································································································· 302
Configuration prerequisites ································································································································ 302
Recommended configuration procedure ··········································································································· 302
Configuring 802.1X globally ····································································································································· 302
Configuring 802.1X on a port ··································································································································· 304
802.1X configuration example ·································································································································· 305
ACL assignment configuration example ···················································································································· 312
Configuration guidelines ············································································································································· 320
Port security ····························································································································································· 321
Port security overview ·················································································································································· 321
Configuring port security ············································································································································· 321
Configuration prerequisites ································································································································ 321
Recommended configuration procedure ··········································································································· 321
Configuring global settings for port security ············································································································· 322
Configuring basic port security control ······················································································································ 324
Configuring secure MAC addresses ·························································································································· 326
Configuring advanced port security control ·············································································································· 327
Configuring permitted OUI ········································································································································· 328
Basic port security mode configuration example ······································································································ 329
Advanced port security mode configuration example ····························································································· 333
AAA configuration ·················································································································································· 339
AAA overview ······························································································································································ 339
Configuring AAA ························································································································································· 340
Configuration prerequisites ································································································································ 340
Recommended configuration procedure ··········································································································· 340
Configuring an ISP domain ································································································································ 340