Access Management Configuration
299
Troubleshooting DHCP
Relay Configuration
Perform the following procedure if a user cannot apply for an IP address dynamically:
1
Use the
display dhcp-server
groupNo
command to check if the IP address of the
corresponding DHCP Server has been configured.
2
Use the
display vlan
and
display ip interface vlan-interface
commands to
check if the VLAN and the corresponding interface IP address have been configured.
3
Ping the configured DHCP Server to ensure that the link is connected.
4
Ping the IP address of the VLAN interface of the Switch to which the DHCP user is
connected from the DHCP Server to make sure that the DHCP Server can correctly
find the route of the network segment the user is on. If the ping execution fails, check
if the default gateway of the DHCP Server has been configured as the address of the
VLAN interface that it locates on.
If there is no problem found in the last two steps, use the
display dhcp-server
groupNo
command to view which packet has been received. If you only see the
Discover packet and there is no response packet, the DHCP Server has not sent the
message to the Switch. In this case, check if the DHCP Server has been configured
properly. If the numbers of request and response packets are normal, enable the
debugging dhcp-relay
in User View and then use the
terminal debugging
command to output the debugging information to the console. In this way, you can
view the detailed information of all DHCP packets on the console as they apply for
the IP address, and so locate the problem.
Access Management
Configuration
This section contains Access Management configuration information.
Access Management
Overview
In networking, the ports in a Switch which access different users belong to the same
VLAN and they cannot communicate with each other, for the purposes of security,
simplicity, and saving VLAN resources. Different ports have different IP addresses and
only the users with an IP address which is allowed to pass the port can access the
external network through the port. You can achieve this configuration using the
functions binding Switch port with IP address and port layer-2 isolating.
Configuring Access
Management
Access management configuration includes:
■
Enabling/Disabling Access Management
■
Configuring the Access Management IP Address Pool Based on the Port
■
Configuring Layer 2 Isolation Between Ports
■
Configuring Port Isolation on a Per-port Basis
■
Enabling/Disabling Access Management Trap
Enabling/Disabling Access Management
You can use the following command to enable the access management function.
Only after the access management function is enabled will the access management
features (IP and port binding and Layer 2 port isolation) take effect.
Perform the following configuration in System View.
Table 293
Enabling/Disabling the Access Management Function
Operation
Command
Enable access management function
am enable
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...