Handbook

Error! Use the Home tab to apply 見出し 1 to the text that you want to appear here. 3
Contents
Accessing the switch
Introduction .................................................................................................................................................................. 7
Additional references ................................................................................................................................................. 7
Typographical conventions ....................................................................................................................................... 7
Management Network ............................................................................................................................................... 8
Connecting through the serial port .................................................................................................................... 8
Connecting through Telnet.................................................................................................................................. 8
Connecting through Secure Shell ....................................................................................................................... 9
Using the command line interfaces ......................................................................................................................... 9
Configuring an IP interface .................................................................................................................................. 9
Using the Browser-based Interface ........................................................................................................................ 10
Using Simple Network Management Protocol ..................................................................................................... 10
SNMP v1.0 .............................................................................................................................................................. 11
SNMP v3.0 .............................................................................................................................................................. 11
Default configuration .......................................................................................................................................... 11
User configuration ................................................................................................................................................ 11
View based configurations ................................................................................................................................ 13
Configuring SNMP trap hosts ............................................................................................................................. 14
Secure access to the switch .................................................................................................................................... 17
Setting allowable source IP address ranges ................................................................................................... 17
RADIUS authentication and authorization ...................................................................................................... 17
TACACS+ authentication ................................................................................................................................... 21
Secure Shell and Secure Copy ......................................................................................................................... 26
User access control ................................................................................................................................................... 30
Setting up user IDs ................................................................................................................................................ 30
Ports and trunking
Introduction ................................................................................................................................................................ 31
Ports on the switch..................................................................................................................................................... 31
Port trunk groups ........................................................................................................................................................ 31
Statistical load distribution.................................................................................................................................. 31
Built-in fault tolerance ......................................................................................................................................... 32
Before you configure trunks ..................................................................................................................................... 32
Trunk group configuration rules .............................................................................................................................. 32
Port trunking example............................................................................................................................................... 33
Configuring trunk groups (AOS CLI example) ................................................................................................ 34
Configuring trunk groups (BBI example) .......................................................................................................... 35
Configurable Trunk Hash algorithm ........................................................................................................................ 37
Link Aggregation Control Protocol ........................................................................................................................ 38
Configuring LACP ................................................................................................................................................ 39
Port-based Network Access and traffic control
Port-based Network Access control ...................................................................................................................... 40
Extensible authentication protocol over LAN (EAPoL) ................................................................................. 40
802.1x authentication process .......................................................................................................................... 40
EAPoL Message Exchange ................................................................................................................................ 41
802.1x port states ................................................................................................................................................. 42
Supported RADIUS attributes ............................................................................................................................. 42
EAPoL configuration guidelines......................................................................................................................... 43
Port-based traffic control ......................................................................................................................................... 43
VLANs
Introduction ................................................................................................................................................................ 45
Overview ..................................................................................................................................................................... 45
VLANs and port VLAN ID numbers ......................................................................................................................... 45
VLAN numbers ...................................................................................................................................................... 45
PVID numbers ....................................................................................................................................................... 45
Viewing and configuring PVIDs ......................................................................................................................... 46