Specifications
Contents
Matrix DFE-Gold Series Configuration Guide ix
11
IP CONFIGURATION
11.1 Process Overview: Internet Protocol (IP) Configuration................................ 11-1
11.2 IP Configuration Command Set .................................................................... 11-2
11.2.1 Configuring Routing Interface Settings ......................................... 11-2
11.2.2 Managing Router Configuration Files ......................................... 11-12
11.2.3 Performing a Basic Router Configuration ................................... 11-17
11.2.4 Reviewing and Configuring the ARP Table................................. 11-19
11.2.5 Configuring Broadcast Settings .................................................. 11-29
11.2.6 Reviewing IP Traffic and Configuring Routes ............................. 11-35
11.2.7 Configuring PIM .......................................................................... 11-47
11.2.8 Configuring Load Sharing Network Address Translation
(LSNAT) ...................................................................................... 11-66
11.2.9 Configuring Dynamic Host Configuration Protocol (DHCP) ...... 11-109
12
ROUTING PROTOCOL CONFIGURATION
12.1 Process Overview: Routing Protocol Configuration ...................................... 12-1
12.2 Routing Protocol Configuration Command Set ............................................. 12-2
12.2.1 Activating Advanced Routing Features......................................... 12-2
12.2.2 Configuring RIP............................................................................. 12-2
12.2.3 Configuring OSPF....................................................................... 12-31
12.2.4 Configuring DVMRP.................................................................... 12-76
12.2.5 Configuring IRDP ........................................................................ 12-81
12.2.6 Configuring VRRP....................................................................... 12-90
13
SECURITY CONFIGURATION
13.1 Overview of Security Methods ...................................................................... 13-1
13.1.1 RADIUS Filter-ID Attribute and Dynamic
Policy Profile Assignment ............................................................. 13-3
13.2 Process Overview: Security Configuration.................................................... 13-4
13.3 Security Configuration Command Set........................................................... 13-5
13.3.1 Setting the Authentication Login Method ...................................... 13-5
13.3.2 Configuring RADIUS ..................................................................... 13-8
13.3.3 Configuring RFC 3580 ................................................................ 13-20
13.3.4 Configuring TACACS+................................................................ 13-24
13.3.5 Configuring 802.1X Authentication ............................................. 13-31
13.3.6 Configuring Port Web Authentication (PWA) .............................. 13-43
13.3.7 Configuring MAC Authentication................................................. 13-70
13.3.8 Configuring Convergence End Points (CEP) Phone Detection .. 13-93
13.3.9 Configuring MAC Locking ......................................................... 13-110
13.3.10 Configuring Multiple Authentication .......................................... 13-125
13.3.11 Configuring Secure Shell (SSH) ............................................... 13-143