User Manual
Table Of Contents
- M4200 and M4300 Series ProSAFE Managed Switches
- Contents
- 1. Getting Started
- 2. Configure System Information
- Initial Setup
- Configure the Initial IPv4 Management VLAN
- Configure the Initial IPv6 Management VLAN
- Configure the Initial Service Port Settings
- View or Define System Information
- View the Fan Status
- View the Temperature Sensor Information
- View the Device Status
- View the System CPU Status
- Configure the CPU Thresholds
- View and Clear Switch Statistics
- View USB Device Information
- View Slot Information
- Configure a Loopback Interface
- Configure Management Interfaces
- Management VLAN Overview
- Time
- Configure DNS Settings
- Configure the Switch Database Management Template Preference
- Configure Green Ethernet Settings
- Configure DHCP Server Settings
- DHCP L2 Relay
- Manage the DHCPv6 Server
- Configure PoE
- Configure SNMP
- Configure LLDP
- Configure LLDP Global Settings
- Configure the LLDP Interface
- View LLDP Statistics
- View LLDP Local Device Information
- View LLDP Remote Device Information
- View LLDP Remote Device Inventory
- Configure LLDP-MED Global Settings
- Configure LLDP-MED Interface
- View LLDP-MED Local Device Information
- View LLDP-MED Remote Device Information
- View LLDP-MED Remote Device Inventory
- Configure Link Dependency
- Configure ISDP
- Timer Schedule
- Initial Setup
- 3. Stacking
- M4300 Series Switch Stacking Overview
- Firmware Synchronization and Upgrade
- Stack Configuration Maintenance
- Stack Master Election
- Stack Factory Defaults Reset Behavior
- Stack NSF
- Configure a Stack
- Run Stack Port Diagnostics
- Configure Stack Firmware Synchronization
- View NSF Summary Data
- View NSF Checkpoint Statistics
- 4. Configure Switching Information
- Configure VLANs
- Configure Basic VLAN Settings
- Reset the VLAN Configuration to Default Setting
- Configure an Internal VLAN
- Configure VLAN Trunking
- Configure VLAN Membership
- View VLAN Status
- Configure Port PVID Settings
- Configure a MAC-Based VLAN
- Configure Protocol-Based VLAN Groups
- Configure Protocol-Based VLAN Group Membership
- Configure an IP Subnet-Based VLAN
- Configure a Port DVLAN
- Configure a Voice VLAN
- Configure GARP Switch Settings
- Configure GARP Port
- Auto-VoIP
- iSCSI Overview
- Spanning Tree Protocol
- Multicast
- View the MFDB Table
- View the MFDB Statistics
- IGMP Snooping
- Configure IGMP Snooping
- Configure IGMP Snooping for Interfaces
- Configure IGMP Snooping for VLANs
- Configure a Multicast Router
- Configure a Multicast Router VLAN
- IGMP Snooping Querier Overview
- Configure IGMP Snooping Querier
- Configure IGMP Snooping Querier for VLANs
- Configure MLD Snooping
- Configure a MLD Snooping Interface
- Configure MLD VLAN Settings
- Enable or Disable a Multicast Router on an Interface
- Configure Multicast Router VLAN Settings
- Configure MLD Snooping Querier
- Configure MLD Snooping Querier VLAN Settings
- Configure MVR
- MAC Address Table
- Port Settings
- Link Aggregation Groups
- Multiple Registration Protocol Overview
- Loop Protection
- Configure VLANs
- 5. Routing
- 6. OSPF and OSPFv3
- Configure OSPF
- Configure Basic OSPF Settings
- Configure the OSPF Default Route Advertise Settings
- Configure OSPF Settings
- Configure the OSPF Common Area ID
- Configure the OSPF Stub Area
- Configure the OSPF NSSA Area
- Configure the OSPF Area Range
- Configure the OSPF Interface
- View and Clear OSPF Statistics for an Interface
- View and the OSPF Neighbor Table and Clear OSPF Neighbors
- View the OSPF Link State Database
- Configure the OSPF Virtual Link
- Configure the OSPF Route Redistribution
- View the NSF OSPF Summary
- Configure OSPFv3
- Configure Basic OSPFv3 Settings
- Configure OSPFv3 Default Route Advertise Settings
- Configure the Advanced OSPFv3 Settings
- Configure the OSPFv3 Common Area
- Configure an OSPFv3 Stub Area
- Configure the OSPFv3 NSSA Area
- Configure the OSPFv3 Area Range
- Configure the OSPFv3 Interface
- View and Clear OSPFv3 Interface Statistics
- View the OSPFv3 Neighbor Table and Clear OSPFv3 Neighbors
- View the OSPFv3 Link State Database
- Configure the OSPFv3 Virtual Link
- Configure OSPFv3 Route Redistribution
- View the NSF OSPFv3 Summary
- Configure OSPF
- 7. Multicast Routing
- Multicast Overview
- Configure Multicast IGMP Settings
- Configure PIM Settings
- Configure the Multicast PIM Global Settings
- Configure PIM SSM Settings
- Configure PIM Interface
- View the PIM Neighbor
- View the PIM Candidate Rendezvous Point
- View the PIM Neighbor
- Configure the PIM Candidate Rendezvous Point
- Configure the PIM Bootstrap Router Candidate
- Configure the PIM Static Rendezvous Point
- Configure Multicast Static Routes
- Configure the Multicast Admin Boundary
- Configure IPv6 Multicast Settings
- View the IPv6 Multicast Mroute Table
- Configure the IPv6 PIM Global Settings
- Configure IPv6 PIM SSM
- Configure the IPv6 PIM Interface
- View the IPv6 PIM Neighbor
- Configure the IPv6 PIM Candidate Rendezvous Point
- Configure the IPv6 PIM Bootstrap Router Candidate Settings
- Configure the IPv6 PIM Static Rendezvous Point
- Configure IPv6 MLD Global Settings
- Configure the IPv6 MLD Routing Interface
- View IPv6 MLD Routing Interface Statistics
- View the IPv6 MLD Groups
- View and Clear IPv6 MLD Traffic
- Configure the IPv6 MLD Proxy Interface
- View IPv6 MLD Proxy Interface Statistics
- View the IPv6 MLD Proxy Membership
- Configure IPv6 Multicast Static Routes
- 8. Configure Quality of Service
- 9. Manage Device Security
- Manage User Accounts and Passwords
- Manage the RADIUS Server Settings
- Manage the TACACS Settings
- Configure Authentication Lists
- View Login Sessions
- Manage HHTP, HTTPS, and SSH Access
- Configure Telnet Access
- Configure Console Port Access
- Configure Denial of Service Settings
- Configure Access Control Settings
- Manage Port Authentication
- Control Traffic With MAC Filtering
- Configure Port Security and Private Groups
- Protect Ports
- Set Up Private VLANs
- Manage the Storm Control Settings
- Configure DHCP Snooping
- Configure IP Source Guard Interfaces
- Configure Dynamic ARP Inspection
- Set Up Captive Portals
- Set Up and Manage Access Control Lists
- Use the ACL Wizard to Create a Simple ACL
- Configure an ACL Based on Destination MAC Address
- Use the ACL Wizard to Complete the Destination MAC ACL
- Configure a Basic MAC ACL
- Configure MAC ACL Rules
- Configure MAC Binding
- View and Delete MAC ACL Bindings in the MAC Binding Table
- Configure an IP ACL
- Configure Rules for an IP ACL
- Configure Rules for an Extended IP ACL
- Configure an IPv6 ACL
- Configure IPv6 Rules
- Configure IP ACL Interface Bindings
- View and Delete IP ACL Bindings in the IP ACL Binding Table
- Configure VLAN ACL Bindings
- 10. Monitor the System
- 11. Maintenance and Troubleshooting
- A. Default Settings
- B. Configuration Examples
- C. Acronyms and Abbreviations
Configuration Examples
689
M4200 and M4300 Series ProSAFE Managed Switches Web Management User Manual
between the authenticator (the system that passes an authentication request to the
authentication server) and the supplicant (the system that requests authentication), as well
as between the authenticator and the authentication server.
The switch support a guest VLAN, which allows unauthenticated users limited access to the
network resources.
Note: You can use QoS features to provide rate limiting on the guest VLAN
to limit the network resources the guest VLAN provides.
Another 802.1X feature is the ability to configure a port to Enable/Disable EAPoL packet
forwarding support. You can disable or enable the forwarding of EAPoL when 802.1X is
disabled on the device.
The ports of an 802.1X authenticator switch provide the means in which it can offer services
to other systems reachable through the LAN. Port-based network access control allows the
operation of a switch’s ports to be controlled to ensure that access to its services is only
permitted by systems that are authorized to do so.
Port access control provides a means of preventing unauthorized access by supplicants to
the services offered by a system. Control over the access to a switch and the LAN to which it
is connected can be desirable when you restrict access to publicly accessible bridge ports or
to restrict access to departmental LANs.
Access control is achieved by enforcing authentication of supplicants that are attached to an
authenticator's controlled ports. The result of the authentication process determines whether
the supplicant is authorized to access services on that controlled port.
A Port Access Entity (PAE) is able to adopt one of two distinct roles within an access control
interaction:
1. Authenticator: A Port that enforces authentication before allowing access to services
available through that Port.
2. Supplicant: A Port that attempts to access services offered by the Authenticator.
Additionally, there exists a third role:
3. Authentication server: Performs the authentication function necessary to check the
credentials of the Supplicant on behalf of the Authenticator.
All three roles are required for you to complete an authentication exchange.
The switch support the Authenticator role only, in which the PAE is responsible for
communicating with the Supplicant. The Authenticator PAE is also responsible for submitting
the information received from the Supplicant to the Authentication Server in order for the
credentials to be checked, which will determine the authorization state of the Port. The
Authenticator PAE controls the authorized/unauthorized state of the controlled Port
depending on the outcome of the RADIUS-based authentication process.