Connectivity Guide

Layer 2
802.1X Veries device credentials before sending or receiving packets using the Extensible Authentication Protocol (EAP),
see 802.1X Commands.
Link Aggregation
Control Protocol
(LACP)
Exchanges information between two systems and automatically establishes a link aggregation group (LAG)
between the systems, see LACP Commands.
Link Layer Discovery
Protocol (LLDP)
Enables a local area network (LAN) device to advertise its conguration and receive conguration information from
adjacent LLDP-enabled infrastructure devices, see LLDP Commands.
Media Access
Control (MAC)
Congures limits, redundancy, balancing, and failure detection settings for devices on your network using tables,
see MAC Commands.
Multiple Spanning-
Tree (MST)
Maps MST instances and maps many virtual local area networks (VLANs) to a single spanning-tree instance,
reducing the number of required instances, see MST Commands.
Rapid Per-VLAN
Spanning-Tree Plus
(RPVST+)
Combination of rapid spanning-tree and per-VLAN spanning-tree plus for faster convergence and interoperability,
see RPVST+ Commands.
Rapid Spanning-Tree
Protocol (RSTP)
Faster convergence and interoperability with devices congured with the Spanning-Tree and Multiple Spanning-
Tree Protocols (STPs and MSTPs), see RSTP Commands.
Virtual LANs
(VLANs)
Improved security to isolate groups of users into dierent VLANs and the ability to create a single VLAN across
multiple devices, see VLAN Commands.
Port Monitoring
(Local/Remote)
Port monitoring of ingress or egress trac, or both ingress and egress trac, on specied port(s). Monitoring
methods include port-mirroring, remote port monitoring, and encapsulated remote-port monitoring (see Local/
Remote Commands).
802.1X
The IEEE 802.1X standard denes a client and server-based access control that prevents unauthorized clients from connecting to a LAN
through publicly accessible ports. Authentication is only required in OS10 for inbound trac. Outbound trac transmits regardless of the
authentication state.
802.1X employs the extensible authentication protocol (EAP) to provide device credentials to an authentication server, typically remote
authentication dial-in service (RADIUS), using an intermediary network access device. The network access device mediates all
communication between the end-user device and the authentication server so the network remains secure.
The network access device uses EAP-over-Ethernet, also known as EAPOL — EAP over LAN, to communicate with the end user device
and EAP-over-RADIUS to communicate with the server.
5
Layer 2 253