Reference Guide

Layer 2
802.1X Veries device credentials prior to sending or receiving packets using the extensible authentication protocol (see
802.1X Commands).
Link Aggregation
Control Protocol
(LACP)
Exchanges information between two systems and automatically establishes a LAG between the systems (see
LACP Commands).
Link Layer Discovery
Protocol (LLDP)
Enables a LAN device to advertise its conguration and receive conguration information from adjacent LLDP-
enabled infrastructure devices (see LLDP Commands).
Media Access
Control (MAC)
Congures limits, redundancy, balancing, and failure detection settings for devices on your network using tables
(see MAC Commands).
Multiple Spanning-
Tree (MST)
Mapping of MST instances and allows you to map many VLANs to a single spanning-tree instance, reducing the
total number of required instances (see MST Commands).
Rapid Per-VLAN
Spanning-Tree Plus
(RPVST+)
Combination of rapid spanning-tree and per-VLAN spanning-tree plus for faster convergence and interoperability
(see RPVST+ Commands).
Rapid Spanning-Tree
Protocol (RSTP)
Faster convergence and interoperability with devices congured with the spanning-tree and multiple spanning-tree
protocols (see RSTP Commands).
Virtual LANs
(VLANs)
Improved security to isolate groups of users into dierent VLANs and the ability to create a single VLAN across
multiple devices (see VLAN Commands).
Port Monitoring
(Local/Remote)
Port monitoring of ingress or egress trac, or both ingress and egress trac, on specied port(s). Monitoring
methods include port-mirroring, remote port monitoring, and encapsulated remote-port monitoring (see Local/
Remote Commands).
802.1X
The IEEE 802.1X standard denes a client and server-based access control that prevents unauthorized clients from connecting to a LAN
through publicly accessible ports. Authentications is only required in OS10 for inbound trac. Outbound trac is transmitted regardless of
the authentication state.
802.1X employs extensible authentication protocol (EAP) to provide device credentials to an authentication server, typically RADIUS, using
an intermediary network access device. The network access device mediates all communication between the end user device and the
authentication server so the network remains secure.
The network access device uses EAP-over-Ethernet (also known as EAPOL — EAP over LAN) to communicate with the end user device
and EAP-over-RADIUS to communicate with the server.
4
144 Layer 2