Reference Guide
Layer 2
802.1X Veries device credentials prior to sending or receiving packets using the extensible authentication protocol (see 
802.1X Commands).
Link Aggregation 
Control Protocol 
(LACP)
Exchanges information between two systems and automatically establishes a LAG between the systems (see 
LACP Commands).
Link Layer Discovery 
Protocol (LLDP)
Enables a LAN device to advertise its conguration and receive conguration information from adjacent LLDP-
enabled infrastructure devices (see LLDP Commands).
Media Access 
Control (MAC)
Congures limits, redundancy, balancing, and failure detection settings for devices on your network using tables 
(see MAC Commands).
Multiple Spanning-
Tree (MST)
Mapping of MST instances and allows you to map many VLANs to a single spanning-tree instance, reducing the 
total number of required instances (see MST Commands).
Rapid Per-VLAN 
Spanning-Tree Plus 
(RPVST+)
Combination of rapid spanning-tree and per-VLAN spanning-tree plus for faster convergence and interoperability 
(see RPVST+ Commands).
Rapid Spanning-Tree 
Protocol (RSTP)
Faster convergence and interoperability with devices congured with the spanning-tree and multiple spanning-tree 
protocols (see RSTP Commands).
Virtual LANs 
(VLANs)
Improved security to isolate groups of users into dierent VLANs and the ability to create a single VLAN across 
multiple devices (see VLAN Commands).
Port Monitoring 
(Local/Remote)
Port monitoring of ingress or egress trac, or both ingress and egress trac, on specied port(s). Monitoring 
methods include port-mirroring, remote port monitoring, and encapsulated remote-port monitoring (see Local/
Remote Commands).
802.1X
The IEEE 802.1X standard denes a client and server-based access control that prevents unauthorized clients from connecting to a LAN 
through publicly accessible ports. Authentications is only required in OS10 for inbound trac. Outbound trac is transmitted regardless of 
the authentication state.
802.1X employs extensible authentication protocol (EAP) to provide device credentials to an authentication server, typically RADIUS, using 
an intermediary network access device. The network access device mediates all communication between the end user device and the 
authentication server so the network remains secure.
The network access device uses EAP-over-Ethernet (also known as EAPOL — EAP over LAN) to communicate with the end user device 
and EAP-over-RADIUS to communicate with the server.
3
86 Layer 2










