
CanogaOS Configuration Guide
Proprietary & Confidential Canoga Perkins Metro Ethernet Switches Page 15 of 350
35.2.2 Configurations................................................................................................. 300
35.2.3 Validation Commands..................................................................................... 301
36 Configuring ARP Inspection................................................................................................ 303
36.1.1 Terminology .................................................................................................... 303
36.1.2 Topology ......................................................................................................... 303
36.1.3 Configurations................................................................................................. 304
36.1.4 Validation Commands..................................................................................... 305
37 Configuring IP Source Guard............................................................................................... 307
37.1.1 Terminology .................................................................................................... 307
37.1.2 Topology ......................................................................................................... 308
37.1.3 Configurations................................................................................................. 308
37.1.4 Validation Commands..................................................................................... 309
38 Configuring IEEE 802.1x..................................................................................................... 310
38.1.1 References ....................................................................................................... 310
38.1.2 Terminology .................................................................................................... 310
38.1.3 Authentication Initiation and Message Exchange........................................... 311
38.1.4 Ports in Authorized and Unauthorized state.................................................... 312
38.1.5 802.1x Configuration ...................................................................................... 313
39 Configuring Radius Authentication ..................................................................................... 317
39.1.1 Overview ......................................................................................................... 317
39.1.2 Usage example ................................................................................................ 317
Networking Topology.................................................................................................................... 317
Configuration Steps....................................................................................................................... 317
For Linux Box...................................................................................................................... 317
For Canoga Switch...............................................................................................................318
Checking Configuration ................................................................................................................ 319
Display Results.............................................................................................................................. 320
Telnet output......................................................................................................................... 320
39.1.3 Notice .............................................................................................................. 320
40 Configuring Secure Shell ..................................................................................................... 321
40.1 Secure Shell Configuration ........................................................................................... 321
40.1.1 References ....................................................................................................... 321
40.1.2 Terminology .................................................................................................... 321
40.1.3 Configuring the SSH Server............................................................................ 321
40.1.4 Validation Commands..................................................................................... 322
Kommentare zu diesen Handbüchern