Introduction to Link Aggregation.................................................................................................... 13-1
Introduction to LACP ..................................................................................................................... 13-1
Consistency Considerations for the Ports in Aggregation............................................................. 13-1
Link Aggregation Classification............................................................................................................. 13-2
Manual Aggregation Group ........................................................................................................... 13-2
Static LACP Aggregation Group.................................................................................................... 13-3
Dynamic LACP Aggregation Group............................................................................................... 13-4
Aggregation Group Categories ............................................................................................................. 13-5
Link Aggregation Configuration............................................................................................................. 13-6
Configuring a Manual Aggregation Group..................................................................................... 13-6
Configuring a Static LACP Aggregation Group ............................................................................. 13-7
Configuring a Dynamic LACP Aggregation Group ........................................................................ 13-8
Configuring a Description for an Aggregation Group .................................................................... 13-9
Displaying and Maintaining Link Aggregation Configuration ................................................................ 13-9
Link Aggregation Configuration Example............................................................................................ 13-10
Ethernet Port Aggregation Configuration Example ..................................................................... 13-10
14
Port Isolation Configuration ................................................................................................................. 14-1
Port Isolation Overview ......................................................................................................................... 14-1
Port Isolation Configuration................................................................................................................... 14-1
Displaying and Maintaining Port Isolation Configuration ...................................................................... 14-2
Port Isolation Configuration Example.................................................................................................... 14-2
15
Port Security Configuration .................................................................................................................. 15-1
Port Security Overview.......................................................................................................................... 15-1
Introduction.................................................................................................................................... 15-1
Port Security Modes ...................................................................................................................... 15-1
Port Security Features................................................................................................................... 15-6
Port Security Configuration Task List.................................................................................................... 15-7
Enabling Port Security ................................................................................................................... 15-7
Setting the Maximum Number of Secure MAC Addresses Allowed on a Port.............................. 15-8
Setting the Port Security Mode...................................................................................................... 15-9
Configuring Port Security Features ............................................................................................. 15-10
Configuring Guest VLAN for a Port in macAddressOrUserLoginSecure mode .......................... 15-11
Ignoring the Authorization Information from the RADIUS Server................................................ 15-12
Configuring Secure MAC Addresses........................................................................................... 15-12
Displaying and Maintaining Port Security Configuration..................................................................... 15-14
Port Security Configuration Examples ................................................................................................ 15-14
Port Security Mode autoLearn Configuration Example ............................................................... 15-14
Port Security Mode macAddressWithRadius Configuration Example......................................... 15-15
Port Security Mode userLoginWithOUI Configuration Example.................................................. 15-17
Port Security Mode macAddressElseUserLoginSecureExt Configuration Example ................... 15-19
Port Security Mode macAddressAndUserLoginSecureExt Configuration Example.................... 15-21
Guest VLAN Configuration Example ........................................................................................... 15-23
16
Port Binding Configuration................................................................................................................... 16-1
Port Binding Overview........................................................................................................................... 16-1
Introduction.................................................................................................................................... 16-1
Configuring Port Binding ............................................................................................................... 16-1
Displaying and Maintaining Port Binding Configuration........................................................................ 16-2
v