C
ONTENTS
v
Generating the User Public Key Pair . . . . . . . . . . . . . . . . . 3-83
Configuring Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-86
Configuring 802.1X Port Authentication . . . . . . . . . . . . . . . . . 3-88
Displaying 802.1X Global Settings . . . . . . . . . . . . . . . . . . . 3-90
Configuring 802.1X Global Settings . . . . . . . . . . . . . . . . . 3-91
Configuring Port Settings for 802.1X . . . . . . . . . . . . . . . . 3-92
Displaying 802.1X Statistics . . . . . . . . . . . . . . . . . . . . . . . . 3-95
Access Control Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-97
Configuring Access Control Lists . . . . . . . . . . . . . . . . . . . . . . . 3-97
Setting the ACL Name and Type . . . . . . . . . . . . . . . . . . . . 3-98
Configuring a Standard IP ACL . . . . . . . . . . . . . . . . . . . . . 3-99
Configuring an Extended IP ACL . . . . . . . . . . . . . . . . . . 3-100
Configuring a MAC ACL . . . . . . . . . . . . . . . . . . . . . . . . . 3-103
Binding a Port to an Access Control List . . . . . . . . . . . . . . . . 3-105
Filtering Management Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-106
Port Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-108
Displaying Connection Status . . . . . . . . . . . . . . . . . . . . . . . . . 3-108
Configuring Interface Connections . . . . . . . . . . . . . . . . . . . . . 3-111
Creating Trunk Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-113
Statically Configuring a Trunk . . . . . . . . . . . . . . . . . . . . . 3-115
Enabling LACP on Selected Ports . . . . . . . . . . . . . . . . . . 3-117
Configuring LACP Parameters . . . . . . . . . . . . . . . . . . . . . 3-119
Displaying LACP Port Counters . . . . . . . . . . . . . . . . . . . 3-122
Displaying LACP Settings and Status for the Local Side 3-124
Displaying LACP Settings and Status for the Remote
Side . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-127
Setting Broadcast Storm Thresholds . . . . . . . . . . . . . . . . . . . . 3-129
Configuring Port Mirroring . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-131
Configuring Rate Limits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-132
Rate Limit Configuration . . . . . . . . . . . . . . . . . . . . . . . . . 3-132
Showing Port Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-134
Address Table Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-140
Setting Static Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-140
Displaying the Address Table . . . . . . . . . . . . . . . . . . . . . . . . . . 3-142
Changing the Aging Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-144
Spanning Tree Algorithm Configuration . . . . . . . . . . . . . . . . . . . . . . 3-144
Displaying Global Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-146
Содержание 6128L2
Страница 2: ......
Страница 21: ...CONTENTS xvii Glossary Index ...
Страница 22: ...CONTENTS xviii ...
Страница 26: ...TABLES xxii ...
Страница 40: ...INTRODUCTION 1 10 ...
Страница 54: ...INITIAL CONFIGURATION 2 14 ...
Страница 193: ...PORT CONFIGURATION 3 139 Figure 3 61 Displaying Etherlike and RMON Statistics ...
Страница 257: ...QUALITY OF SERVICE 3 203 Figure 3 90 Configuring Policy Maps ...
Страница 313: ...COMMAND GROUPS 4 13 PE Privileged Exec VC VLAN Database Configuration ...
Страница 592: ...TROUBLESHOOTING B 4 ...
Страница 605: ......