Part 15
Chapter 71
Part 17
Chapter 81
Chapter 82
Part 18
Chapter 87
Chapter 88
Chapter 89
Copyright © 2010, Juniper Networks, Inc.
Figure 42: MVRP Configured on Two Access Switches and One Distribution
Switch for Automatic VLAN Administration . . . . . . . . . . . . . . . . . . . . . . . . . 1582
Spanning-Tree Protocols
Examples of Spanning-Tree Protocols Configuration . . . . . . . . . . . . . . . . . 1761
IGMP Snooping and Multicast
Understanding IGMP Snooping and Multicast . . . . . . . . . . . . . . . . . . . . . . 2535
Figure 50: IGMP Traffic Flow with IGMP Snooping Enabled . . . . . . . . . . . . . . . 2536
Examples: IGMP Snooping and Multicast Configuration . . . . . . . . . . . . . 2543
Access Control
802.1X and MAC RADIUS Authentication Overview . . . . . . . . . . . . . . . . . 2745
Figure 55: Authentication Process Flow for an EX Series Switch . . . . . . . . . . . . 2754
Figure 56: VoIP Multiple Supplicant Topology . . . . . . . . . . . . . . . . . . . . . . . . . . 2762
Examples: Access Control Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . 2765
Figure 62: Topology for MAC RADIUS Authentication Configuration . . . . . . . . . 2785
Figure 64: Topology for Firewall Filter and RADIUS Server Attributes
Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2796
Figure 67: Multiple Supplicants on an 802.1X-Enabled Interface Connecting to
a File Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2819
Configuring Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2827
List of Figures
lxxvii