Manual

Contents
10
GVRP and Network Security ....................................................................................................................587
GVRP-inactive Intermediate Switches......................................................................................................587
Generic Attribute Registration Protocol (GARP) Overview.......................................................................587
Configuring GVRP ..........................................................................................................................................592
Enabling or Disabling GVRP on a Port ...........................................................................................................594
Displaying the GVRP Port Configuration ........................................................................................................596
Displaying GVRP Counters.............................................................................................................................597
Displaying the GVRP Database......................................................................................................................602
Displaying the GIP Connected Ports Ring ......................................................................................................604
Displaying the GVRP State Machine ..............................................................................................................606
Chapter 25: Multiple VLANs ........................................................................................................................611
Multiple VLAN Mode Overview .......................................................................................................................612
802.1Q- Compliant Multiple VLAN Mode..................................................................................................612
Non-802.1Q Compliant Multiple VLAN Mode ...........................................................................................614
Selecting a VLAN Mode..................................................................................................................................616
Displaying VLAN Information ..........................................................................................................................617
Chapter 26: Protected Ports VLANs ...........................................................................................................619
Protected Ports VLAN Overview .....................................................................................................................620
Protected Ports VLAN Guidelines ............................................................................................................621
Creating a Protected Ports VLAN ...................................................................................................................623
Modifying a Protected Ports VLAN .................................................................................................................626
Displaying a Protected Ports VLAN ................................................................................................................630
Deleting a Protected Ports VLAN....................................................................................................................632
Section VI: Port Security ........................................................................................635
Chapter 27: Port Security ............................................................................................................................637
MAC Address Security Overview....................................................................................................................638
Automatic..................................................................................................................................................638
Limited ......................................................................................................................................................638
Secured ....................................................................................................................................................639
Locked ......................................................................................................................................................639
Security Violations and Intrusion Actions .................................................................................................639
MAC Address Security Guidelines ...........................................................................................................640
Configuring MAC Address Port Security .........................................................................................................641
Displaying Port Security Levels ......................................................................................................................644
Chapter 28: 802.1x Port-based Network Access Control .........................................................................647
IEEE 802.1x Port-based Network Access Control Overview ..........................................................................648
Authentication Process.............................................................................................................................649
Port Roles.................................................................................................................................................650
RADIUS Accounting .................................................................................................................................652
General Steps...........................................................................................................................................653
Port-based Network Access Control Guidelines.......................................................................................654
Setting Port Roles ...........................................................................................................................................657
Enabling or Disabling 802.1x Port-based Network Access Control ................................................................659
Configuring Authenticator Port Parameters ....................................................................................................660
Configuring Supplicant Port Parameters.........................................................................................................664
Displaying the Port Access Parameters..........................................................................................................667
Configuring RADIUS Accounting ....................................................................................................................669
Chapter 29: MAC Address Table ................................................................................................................671
MAC Address Overview..................................................................................................................................672
Displaying the MAC Address Tables ..............................................................................................................674