Connectivity Guide
Layer 2
802.1X Veries device credentials before sending or receiving packets using the Extensible Authentication Protocol (EAP),
see 802.1X Commands.
Link Aggregation
Control Protocol
(LACP)
Exchanges information between two systems and automatically establishes a link aggregation group (LAG)
between the systems, see LACP Commands.
Link Layer Discovery
Protocol (LLDP)
Enables a local area network (LAN) device to advertise its conguration and receive conguration information from
adjacent LLDP-enabled infrastructure devices, see LLDP Commands.
Media Access
Control (MAC)
Congures limits, redundancy, balancing, and failure detection settings for devices on your network using tables,
see MAC Commands.
Multiple Spanning-
Tree (MST)
Maps MST instances and maps many virtual local area networks (VLANs) to a single spanning-tree instance,
reducing the number of required instances, see MST Commands.
Rapid Per-VLAN
Spanning-Tree Plus
(RPVST+)
Combination of rapid spanning-tree and per-VLAN spanning-tree plus for faster convergence and interoperability,
see RPVST+ Commands.
Rapid Spanning-Tree
Protocol (RSTP)
Faster convergence and interoperability with devices congured with the Spanning-Tree and Multiple Spanning-
Tree Protocols (STPs and MSTPs), see RSTP Commands.
Virtual LANs
(VLANs)
Improved security to isolate groups of users into dierent VLANs and the ability to create a single VLAN across
multiple devices, see VLAN Commands.
Port Monitoring
(Local/Remote)
Port monitoring of ingress or egress trac, or both ingress and egress trac, on specied port(s). Monitoring
methods include port-mirroring, remote port monitoring, and encapsulated remote-port monitoring (see Local/
Remote Commands).
802.1X
The IEEE 802.1X standard denes a client and server-based access control that prevents unauthorized clients from connecting to a LAN
through publicly accessible ports. Authentication is only required in OS10 for inbound trac. Outbound trac transmits regardless of the
authentication state.
802.1X employs the extensible authentication protocol (EAP) to provide device credentials to an authentication server, typically remote
authentication dial-in service (RADIUS), using an intermediary network access device. The network access device mediates all
communication between the end-user device and the authentication server so the network remains secure.
The network access device uses EAP-over-Ethernet, also known as EAPOL — EAP over LAN, to communicate with the end user device
and EAP-over-RADIUS to communicate with the server.
5
Layer 2 253