Juniper JUNOS OS 10.3 - SOFTWARE Manual page 71

For ex series ethernet switches
Hide thumbs Also See for JUNOS OS 10.3 - SOFTWARE:
Table of Contents

Advertisement

Part 16
Chapter 75
Chapter 76
Part 17
Chapter 81
Chapter 82
Chapter 83
Part 19
Chapter 93
Chapter 94
Copyright © 2010, Juniper Networks, Inc.
Figure 41: Basic VRRP on EX Series Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . 1672
Figure 42: VRRP on Virtual Chassis Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . 1673
IGMP Snooping and Multicast
Understanding IGMP Snooping and Multicast . . . . . . . . . . . . . . . . . . . . . . . 2315
Figure 43: IGMP Traffic Flow with IGMP Snooping Enabled . . . . . . . . . . . . . . . . 2316
Examples: IGMP Snooping and Multicast Configuration . . . . . . . . . . . . . 2323
Access Control
802.1X and MAC RADIUS Authentication Overview . . . . . . . . . . . . . . . . . 2523
Figure 48: Authentication Process Flow for an EX Series Switch . . . . . . . . . . . . 2534
Figure 49: VoIP Multiple Supplicant Topology . . . . . . . . . . . . . . . . . . . . . . . . . . 2542
Examples: Access Control Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . 2545
Figure 55: Topology for MAC RADIUS Authentication Configuration . . . . . . . . . 2565
Figure 57: Topology for Firewall Filter and RADIUS Server Attributes
Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2576
Figure 60: Multiple Supplicants on an 802.1X-Enabled Interface Connecting to
a File Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2600
Configuring Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2607
Port Security
Port Security Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2825
Figure 62: DHCP Server Connected Directly to Switch . . . . . . . . . . . . . . . . . . . . 2832
Figure 63: DHCP Server Connected Directly to Switch 2, with Switch 2 Connected
to Switch 1 Through a Trusted Trunk Port . . . . . . . . . . . . . . . . . . . . . . . . . . 2832
Figure 67: Switch Relays DHCP Requests to Server . . . . . . . . . . . . . . . . . . . . . . 2843
Examples: Port Security Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2849
List of Figures
lxxi

Advertisement

Table of Contents
loading

Table of Contents