CANOGA PERKINS CanogaOS Configuration Guide User Manual

Page 15

Advertising
background image

CanogaOS Configuration Guide

Proprietary & Confidential Canoga Perkins Metro Ethernet Switches

Page 15 of 350

35.2.2 Configurations................................................................................................. 300
35.2.3 Validation

Commands..................................................................................... 301

36

Configuring ARP Inspection................................................................................................ 303

36.1.1 Terminology .................................................................................................... 303
36.1.2 Topology ......................................................................................................... 303
36.1.3 Configurations................................................................................................. 304
36.1.4 Validation

Commands..................................................................................... 305

37

Configuring IP Source Guard............................................................................................... 307

37.1.1 Terminology .................................................................................................... 307
37.1.2 Topology ......................................................................................................... 308
37.1.3 Configurations................................................................................................. 308
37.1.4 Validation

Commands..................................................................................... 309

38

Configuring IEEE 802.1x..................................................................................................... 310

38.1.1 References ....................................................................................................... 310
38.1.2 Terminology .................................................................................................... 310
38.1.3

Authentication Initiation and Message Exchange........................................... 311

38.1.4

Ports in Authorized and Unauthorized state.................................................... 312

38.1.5 802.1x

Configuration ...................................................................................... 313

39

Configuring Radius Authentication ..................................................................................... 317

39.1.1 Overview ......................................................................................................... 317
39.1.2 Usage

example ................................................................................................ 317

Networking Topology.................................................................................................................... 317

Configuration Steps....................................................................................................................... 317

For Linux Box ...................................................................................................................... 317

For Canoga Switch............................................................................................................... 318

Checking Configuration ................................................................................................................ 319

Display Results.............................................................................................................................. 320

Telnet output......................................................................................................................... 320

39.1.3 Notice .............................................................................................................. 320

40

Configuring Secure Shell ..................................................................................................... 321

40.1

Secure Shell Configuration ........................................................................................... 321

40.1.1 References ....................................................................................................... 321
40.1.2 Terminology .................................................................................................... 321
40.1.3

Configuring the SSH Server............................................................................ 321

40.1.4 Validation

Commands..................................................................................... 322

Advertising