HP 1910 User Manual page 10

Hp 1910 gigabit ethernet switch series
Hide thumbs Also See for 1910:
Table of Contents

Advertisement

DHCP snooping support for Option 82 ············································································································ 331
Recommended configuration procedure···················································································································· 332
Enabling DHCP snooping ··········································································································································· 332
Configuring DHCP snooping functions on an interface ··························································································· 333
Displaying DHCP snooping entries ···························································································································· 334
DHCP snooping configuration example ···················································································································· 335
Network requirements ········································································································································· 335
Configuring Switch B ·········································································································································· 335
Managing services ·················································································································································· 338
Overview ······································································································································································· 338
Managing services ······················································································································································· 339
Using diagnostic tools ············································································································································· 341
Ping ················································································································································································ 341
Traceroute ····································································································································································· 341
Ping operation ······························································································································································ 342
IPv4 ping operation ············································································································································· 342
IPv6 ping operation ············································································································································· 343
Traceroute operation ··················································································································································· 344
IPv4 traceroute operation ··································································································································· 344
IPv6 traceroute operation ··································································································································· 345
Configuring 802.1X ··············································································································································· 347
Overview ······································································································································································· 347
802.1X architecture ············································································································································ 347
Access control methods ······································································································································ 347
Controlled/uncontrolled port and port authorization status ··········································································· 348
802.1X-related protocols ···································································································································· 348
Packet formats ······················································································································································ 349
EAP over RADIUS ················································································································································ 350
Initiating 802.1X authentication ························································································································ 350
802.1X authentication procedures ···················································································································· 351
802.1X timers ······················································································································································ 355
Using 802.1X authentication with other features ···························································································· 356
Configuration prerequisites ········································································································································· 358
Recommended configuration procedure···················································································································· 358
Configuring 802.1X globally ····································································································································· 358
Configuring 802.1X on a port ··································································································································· 360
Configuration guidelines ···································································································································· 360
Configuration procedure ···································································································································· 360
Configuring an 802.1X guest VLAN ················································································································· 362
Configuring an Auth-Fail VLAN ························································································································· 362
Configuration examples ·············································································································································· 363
MAC-based 802.1X configuration example ···································································································· 363
802.1X with ACL assignment configuration example ····················································································· 369
Configuring AAA ···················································································································································· 378
Overview ······································································································································································· 378
Recommended AAA configuration procedure ·········································································································· 379
Configuring an ISP domain ········································································································································· 380
Configuring authentication methods for the ISP domain ························································································· 381
Configuring authorization methods for the ISP domain ··························································································· 382
Configuring accounting methods for the ISP domain ······························································································· 384
AAA configuration example ······································································································································· 385
Network requirements ········································································································································· 385
viii
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents