Stephen Technologies Co.,Limited
www.stephen-tele.com
Chapter 12 RADIUS Protocol Configuration.......................................... 73
12.1 RADIUS Protocol Overview ............................................................................. 73
12.2 Implementing RADIUS on Ethernet Switch...................................................... 74
12.3 Configuring RADIUS Protocol.......................................................................... 74
12.3.1 Enable/disable radius client service ......................................................... 74
12.3.2 Setting radius client ip address ................................................................ 75
12.3.3 Setting a Real-time Accounting Interval.................................................. 76
12.3.4 Setting IP Address of RADIUS Server.................................................... 77
12.3.5 Setting Port of RADIUS Server............................................................... 78
12.3.6 Setting RADIUS Packet Encryption Key ................................................ 80
Chapter 13 SNMP Configuration.............................................................. 82
13.1 SNMP Overview................................................................................................ 82
13.2 SNMP Versions and Supported MIB................................................................. 82
13.3 Configure SNMP ............................................................................................... 84
13.3.1 Setting Community Name........................................................................ 84
13.3.2 Setting the Destination Address of Trap.................................................. 85
13.3.3 Setting Trap Parameters........................................................................... 86
Chapter 14 IGMP Snooping Configuration............................................. 88
14.1 IGMP Snooping Overview ................................................................................ 88
14.1.1 IGMP Snooping Principle........................................................................ 88
14.1.2 Implement IGMP Snooping..................................................................... 90
14.2 IGMP Snooping Configuration.......................................................................... 92
14.2.1 Enabling/Disabling IGMP Snooping ....................................................... 92
14.2.2 Configuring Aging Time of Multicast Group Member ........................... 93
14..3 IGMP Snooping Configuration Example.......................................................... 94
14.3.1 Enable IGMP Snooping ........................................................................... 94