Dell MX5108n OS10 Enterprise Edition User Guide for PowerEdge MX IO Modules Re - Page 159
Layer 2, 802.1X, Link Layer Discovery
View all Dell MX5108n manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 159 highlights
5 Layer 2 802.1X Verifies device credentials prior to sending or receiving packets using the extensible authentication protocol (see 802.1X Commands). Link Aggregation Control Protocol (LACP) Exchanges information between two systems and automatically establishes a LAG between the systems (see LACP Commands). Link Layer Discovery Enables a LAN device to advertise its configuration and receive configuration information from adjacent LLDP- Protocol (LLDP) enabled infrastructure devices (see LLDP Commands). Media Access Control (MAC) Configures limits, redundancy, balancing, and failure detection settings for devices on your network using tables (see MAC Commands). Multiple Spanning- Mapping of MST instances and allows you to map many VLANs to a single spanning-tree instance, reducing the Tree (MST) total number of required instances (see MST Commands). Rapid Per-VLAN Spanning-Tree Plus (RPVST+) Combination of rapid spanning-tree and per-VLAN spanning-tree plus for faster convergence and interoperability (see RPVST+ Commands). Rapid Spanning-Tree Faster convergence and interoperability with devices configured with the spanning-tree and multiple spanning-tree Protocol (RSTP) protocols (see RSTP Commands). Virtual LANs (VLANs) Improved security to isolate groups of users into different VLANs and the ability to create a single VLAN across multiple devices (see VLAN Commands). Port Monitoring (Local/Remote) Port monitoring of ingress or egress traffic, or both ingress and egress traffic, on specified port(s). Monitoring methods include port-mirroring, remote port monitoring, and encapsulated remote-port monitoring (see Local/ Remote Commands). 802.1X The IEEE 802.1X standard defines a client and server-based access control that prevents unauthorized clients from connecting to a LAN through publicly accessible ports. Authentications is only required in OS10 for inbound traffic. Outbound traffic is transmitted regardless of the authentication state. 802.1X employs extensible authentication protocol (EAP) to provide device credentials to an authentication server, typically RADIUS, using an intermediary network access device. The network access device mediates all communication between the end user device and the authentication server so the network remains secure. The network access device uses EAP-over-Ethernet (also known as EAPOL - EAP over LAN) to communicate with the end user device and EAP-over-RADIUS to communicate with the server. Layer 2 159