Handbook
N8406-023 1Gb Intelligent L3 Switch Application Guide 3
Contents
Accessing the switch
Introduction ............................................................................................................................................................. 7
Additional references .............................................................................................................................................. 7
Typographical conventions ..................................................................................................................................... 7
Management Network ............................................................................................................................................ 8
Connecting through the console port ................................................................................................................ 8
Connecting through Telnet ................................................................................................................................ 8
Connecting through Secure Shell ..................................................................................................................... 9
Using the command line interfaces ........................................................................................................................ 9
Configuring an IP interface ................................................................................................................................ 9
Using the Browser-based Interface ...................................................................................................................... 11
Using Simple Network Management Protocol ...................................................................................................... 11
SNMP v1.0 ...................................................................................................................................................... 11
SNMP v3.0 ...................................................................................................................................................... 12
Default configuration ....................................................................................................................................... 12
User configuration ........................................................................................................................................... 12
View based configurations .............................................................................................................................. 13
Configuring SNMP trap hosts.......................................................................................................................... 14
Secure access to the switch ................................................................................................................................. 16
Setting allowable source IP address ranges ................................................................................................... 16
RADIUS authentication and authorization ....................................................................................................... 16
TACACS+ authentication ................................................................................................................................ 20
Secure Shell and Secure Copy ....................................................................................................................... 25
User access control .............................................................................................................................................. 29
Setting up user IDs .......................................................................................................................................... 29
Ports and trunking
Introduction ........................................................................................................................................................... 30
Ports on the switch ............................................................................................................................................... 30
Port trunk groups .................................................................................................................................................. 30
Statistical load distribution ............................................................................................................................... 31
Built-in fault tolerance ...................................................................................................................................... 31
Before you configure trunks .................................................................................................................................. 31
Trunk group configuration rules ............................................................................................................................ 31
Port trunking example ........................................................................................................................................... 32
Configuring trunk groups (AOS CLI example) ................................................................................................. 33
Configuring trunk groups (BBI example) ......................................................................................................... 34
Configurable Trunk Hash algorithm ...................................................................................................................... 36
Link Aggregation Control Protocol ........................................................................................................................ 37
Configuring LACP ........................................................................................................................................... 38
Port-based Network Access and traffic control
Port-based Network Access control ..................................................................................................................... 39
Extensible authentication protocol over LAN .................................................................................................. 39
802.1x authentication process ........................................................................................................................ 39
EAPoL Message Exchange ............................................................................................................................ 40
802.1x port states ............................................................................................................................................ 41
Supported RADIUS attributes ......................................................................................................................... 41
EAPoL configuration guidelines ...................................................................................................................... 42
Port-based traffic control ...................................................................................................................................... 42
VLANs
Introduction ........................................................................................................................................................... 44
Overview ............................................................................................................................................................... 44
VLANs and port VLAN ID numbers ...................................................................................................................... 44
VLAN numbers ................................................................................................................................................ 44
PVID numbers ................................................................................................................................................. 44
Viewing and configuring PVIDs ....................................................................................................................... 45
VLAN tagging ....................................................................................................................................................... 45
VLANs and IP interfaces ...................................................................................................................................... 48
VLAN topologies and design considerations ........................................................................................................ 48
VLAN configuration rules ................................................................................................................................ 48










