Chapter 14 Role-Based Port Templates; Using Role-Based Port Templates - Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

CHAPTER 14
Role-based Port Templates

Using Role-Based Port Templates

Copyright © 2010, Juniper Networks, Inc.
Using Role-Based Port Templates on page 619
Use port templates to apply a predefined configuration to interfaces in EX Series switches.
Port templates apply recommended settings for security and class-of-service parameters.
When applying a port template to an interface, you can specify values for parameters
such as VLAN, Voice VLAN, and IP Address.
The port roles and the corresponding configuration are:
Desktop plus Phone Port—Interface family is set to
set to
access
, port security parameters (MAC limit =3; dynamic ARP Inspection, DHCP
snooping enabled) are set, and recommended CoS parameters are specified for
forwarding classes, schedulers, and classifiers.
Desktop Port—Interface family is set to
RSTP is enabled with the edge option, and port security parameters (MAC limit =1;
dynamic ARP Inspection and DHCP snooping enabled) are set.
Layer 2 Uplink Port—Interface family is set to
, port security is set to
trunk
for schedulers and classifiers.
Routed Uplink Port—Port family is set to
set for schedulers and classifiers.
Wireless Access Point—Interface family is set to
to
access
, and RSTP is enabled with the edge option.
When you apply port templates on EX Series switches, NSM creates the required
configuration in the following configuration groups and applies them at the top level
configuration node:
juniper-port-template-desktop
juniper-port-template-desktop-phone
juniper-port-template-layer2-uplink
juniper-port-template-layer3-uplink
ethernet-switching
ethernet-switching
ethernet-switching
, and recommended CoS parameters are set
dhcp-trusted
inet
, and recommended CoS parameters are
ethernet-switching
, port mode is
, port mode is set to
access
, port mode is set to
, port mode is set
619
,

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents