MAC-Based VLAN Technology White Paper

Size: px
Start display at page:

Download "MAC-Based VLAN Technology White Paper"

Transcription

1 MAC-Based VLAN Technology White Paper Keywords: MAC-based VLAN, 802.1X, MAC address authentication Abstract: As a way of grouping VLAN members, MAC address-based VLAN (MAC-based VLAN) decides the VLAN for forwarding an untagged frame based on the source MAC address of the frame. This document describes how MAC-based VLAN works and the technical characteristics of MAC-based VLAN. Acronyms: Acronym Full spelling Description MAC-based VLAN MAC address-based VLAN MAC address-based VLAN decides the VLAN for forwarding an untagged frame based on the source MAC address of the frame X 802.1X As a port-based network access control protocol, 802.1X is used to perform port-level authentication and control of devices connected to the 802.1X-enabled LAN ports. With the 802.1X protocol employed, a userside device can access the LAN only after it passes the authentication. Those devices that fail to pass the authentication are denied access to the LAN. Hangzhou H3C Technologies Co., Ltd. 1/6

2 Table of Contents Overview 3 Background 3 Benefits 3 MAC-Based VLAN Implementation 3 Application Scenarios 5 Static MAC-Based VLAN Configuration Example 5 Network Diagram 5 Application Scenario 5 Dynamic MAC-Based VLAN Configuration Example 6 Network Diagram 6 Application Scenario 6 References 6 Hangzhou H3C Technologies Co., Ltd. 2/6

3 Overview Background A most common way of grouping VLAN members is by port, hence the name port-based VLAN. Typically, the device adds the same VLAN tag to untagged packets that are received through the same port. Later on, these packets can be forwarded in the same VLAN. Port-based VLAN is easy to configure, and applies to networks where the locations of terminal devices are relatively fixed. As mobile office and wireless network access gain more popularity, the ports that terminal devices use to access the networks are very often non-fixed. A device may access a network through Port A this time, but through Port B the next time. If Port A and Port B belong to different VLANs, the device will be assigned to a different VLAN the next time it accesses the network. As a result, it will not be able to use the resources in the old VLAN. On the other hand, if Port A and Port B belong to the same VLAN, after terminal devices access the network through Port B, they will have access to the same resources as those accessing the network through Port A do, which brings security issues. To provide user access and ensure data security in the mean time, the MAC-based VLAN technology is developed. MAC-based VLANs group VLAN members by MAC address. With MAC-based VLAN configured, the device adds a VLAN tag to an untagged frame according to its source MAC address. MAC-based VLANs are mostly used in conjunction with security technologies such as 802.1X to provide secure, flexible network access for terminal devices. Benefits MAC-based VLAN delivers the following benefits: Precise access control: By bundling terminals with VLANs, MAC-based VLAN enables traffic sent by a particular terminal device to be forwarded in a particular VLAN. Flexible access control: With MAC-based VLAN configured, the device assigns a terminal to the same VLAN when the terminal accesses the network through different ports at different times; the device assigns different VLANs to different terminals that access the network through the same port. MAC-Based VLAN Implementation The procedure of grouping VLAN members by MAC address is as follows: When receiving an untagged frame, the device looks up the list of MAC-to-VLAN mappings for a match by using the source MAC address of the frame as a keyword. If a match is found, the system forwards the frame in the corresponding VLAN. Two methods of creating MAC-to-VLAN mappings are available: static and dynamic. Hangzhou H3C Technologies Co., Ltd. 3/6

4 Static configuration At the CLI, you can associate MAC addresses with VLANs by running a certain command, and the system will generate the corresponding MAC-to-VLAN mappings. When manually associating MAC addresses with a VLAN by running a command, if you specify an all-one mask in the command, the system associates a single MAC address with a VLAN; if you specify a mask with the higher-order bits being consecutive 1s and the lower-order bits being 0s, the system associates a group of MAC addresses with a VLAN. The latter method is typically used to assign all devices of a particular vendor to the same VLAN. Static configuration of MAC-to-VLAN mappings is easy to implement, because it involves only the access devices. However, in static configuration mode, you need to configure each individual port that may be used by terminals to access the network to permit the MAC-based VLANs of terminals. The configuration workload is very heavy. Dynamic configuration In this mode, you need to configure both MAC-based VLANs and MAC-based access authentication (MAC address authentication or MAC-based 802.1X authentication). When a user goes online, the authentication server issues VLAN information during authentication packet exchange, and based on the VLAN information, the device automatically generates a MAC-to VLAN mapping entry and adds the MAC-based VLAN to the permitted untagged VLAN list of the accessing port. When the user goes offline, the system automatically removes the corresponding MAC-to-VLAN mapping entry and removes the MAC-based VLAN from the untagged VLAN list of the accessing port. This mode makes the MAC-based VLAN configuration on large-scale networks much easier. It can automatically identify MAC addresses, create MAC-to-VLAN mappings, and instruct accessing ports to permit configured MAC-based VLANs. However, it requires the cooperation of MAC-based remote AAA authentication. You need to deploy an AAA authentication server that can issue VLAN information in the network. Hangzhou H3C Technologies Co., Ltd. 4/6

5 Application Scenarios Static MAC-Based VLAN Configuration Example Network Diagram Figure 1 Network diagram for static MAC-based VLAN configuration Application Scenario To ensure communication security and isolate broadcast packets, a company assigns different VLANs to different departments. The office of the sales department is in Room 1002, and all the assets of the department belong to VLAN 2; the office of the technical support department is in Room 1003, and all the assets of the department belong to VLAN 3. Because the locations of some employees are mobile, the company opens a temporary office in the meeting room, where the employees can access the company network wirelessly. But it is required that each employee can only access the VLAN assigned to their own department. For example, Host A can only access VLAN 2 and Host D can only access VLAN 3 from the meeting room. In Room 1002 and Room 1003, because the employees are rather immobile, port-based VLANs are configured to group them. In the meeting room, because the employees are highly mobile and the accessing ports are non-fixed, MAC-based VLANs are configured to associate the employees MAC addresses with the VLANs assigned to their departments. In this way, the employees are automatically assigned to their department VLANs every time they access the network, regardless of the accessing ports. In addition, the network configuration needs not to be altered. Hangzhou H3C Technologies Co., Ltd. 5/6

6 Dynamic MAC-Based VLAN Configuration Example Network Diagram Figure 2 Network diagram for dynamic MAC-based VLAN configuration MAC-Based VLAN Technology White Paper Application Scenario Users access the network via wireless access points AP 1 through AP n. By configuring both MACbased VLANs and MAC-based 802.1X authentication, you can easily achieve the following purposes: User access authentication, which prevents illegal users from accessing the network resources. One VLAN per user, which isolates broadcast packets of different users and protects user information. References MAC-Based VLAN Configuration Examples Copyright 2009 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by any means without prior written consent of Hangzhou H3C Technologies Co., Ltd. The information in this document is subject to change without notice. Hangzhou H3C Technologies Co., Ltd. 6/6

Isolate-User-VLAN Technology White Paper

Isolate-User-VLAN Technology White Paper Isolate-User-VLAN Technology White Paper Keywords: Isolate-user-VLANs, secondary VLANs Abstract: Isolate-user-VLAN adopts a two-tier VLAN structure: an upper level isolate-user-vlan and multiple lower-level

More information

H3C S12500 VLAN Configuration examples

H3C S12500 VLAN Configuration examples H3C S12500 VLAN Configuration examples Copyright 2014 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by any means without

More information

PPPoE Technology White Paper

PPPoE Technology White Paper PPPoE Technology White Paper Keywords: PPP, Ethernet, PPPoE Abstract: Point-to-Point Protocol over Ethernet (PPPoE) provides access to the Internet for hosts on an Ethernet through a remote access device

More information

SecBlade Firewall Cards ARP Attack Protection Configuration Examples

SecBlade Firewall Cards ARP Attack Protection Configuration Examples SecBlade Firewall Cards ARP Attack Protection Configuration Examples Keywords: ARP Abstract: ARP provides no security mechanism and can be easily utilized by attackers to launch attacks. The device provides

More information

Table of Contents X Configuration 1-1

Table of Contents X Configuration 1-1 Table of Contents 1 802.1X Configuration 1-1 802.1X Overview 1-1 Architecture of 802.1X 1-2 Authentication Modes of 802.1X 1-2 Basic Concepts of 802.1X 1-3 EAP over LAN 1-4 EAP over RADIUS 1-5 802.1X Authentication

More information

SecBlade Firewall Cards NAT Configuration Examples

SecBlade Firewall Cards NAT Configuration Examples SecBlade Firewall Cards NAT Configuration Examples Keywords: NAT, PAT, private IP address, public IP address, IP address pool Abstract: This document describes the characteristics, applications scenarios,

More information

Stateful Failover Technology White Paper

Stateful Failover Technology White Paper Stateful Failover Technology White Paper Keywords: Stateful failover, master/backup mode, load balancing mode, data synchronization, link switching Abstract: A firewall device is usually the access point

More information

Table of Contents X Configuration 1-1

Table of Contents X Configuration 1-1 Table of Contents 1 802.1X Configuration 1-1 802.1X Overview 1-1 Architecture of 802.1X 1-1 Authentication Modes of 802.1X 1-2 Basic Concepts of 802.1X 1-2 EAP over LAN 1-3 EAP over RADIUS 1-5 802.1X Authentication

More information

NCT240 IP DSLAM with IAC4500 VLAN Tagging Implementation

NCT240 IP DSLAM with IAC4500 VLAN Tagging Implementation NCT240 IP DSLAM with IAC4500 VLAN Tagging Implementation The NetComm NCT240 24 Port IP DSLAMs support 802.1Q VLAN Tagging. This white paper is written to help IP DSLAM system integrator to set up and configure

More information

H3C S12500 sflow Configuration Examples

H3C S12500 sflow Configuration Examples H3C S12500 sflow Configuration Examples Copyright 2013 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by any means without

More information

Service Managed Gateway TM. Limiting Network Access to Approved Users and Devices

Service Managed Gateway TM. Limiting Network Access to Approved Users and Devices Service Managed Gateway TM Limiting Network Access to Approved Users and Devices Issue 1.1 Date 14 August 2007 Table of Contents 1 About this document...3 1.1 Scope...3 1.2 Readership...3 1.3 More information...3

More information

Wireless Client Isolation. Overview. Bridge Mode Client Isolation. Configuration

Wireless Client Isolation. Overview. Bridge Mode Client Isolation. Configuration Wireless Client Isolation Overview Wireless Client Isolation is a security feature that prevents wireless clients from communicating with one another. This feature is useful for guest and BYOD SSIDs adding

More information

Controlled/uncontrolled port and port authorization status

Controlled/uncontrolled port and port authorization status Contents 802.1X fundamentals 1 802.1X architecture 1 Controlled/uncontrolled port and port authorization status 1 802.1X-related protocols 2 Packet formats 2 EAP over RADIUS 4 Initiating 802.1X authentication

More information

SecBlade Firewall Cards Stateful Failover Configuration Examples

SecBlade Firewall Cards Stateful Failover Configuration Examples SecBlade Firewall Cards Stateful Failover Configuration Examples Keywords: Stateful failover, active/standby mode, active/active mode, data synchronization, traffic switchover Abstract: A network that

More information

SecBlade Firewall Cards Attack Protection Configuration Example

SecBlade Firewall Cards Attack Protection Configuration Example SecBlade Firewall Cards Attack Protection Configuration Example Keywords: Attack protection, scanning, blacklist Abstract: This document describes the attack protection functions of the SecBlade firewall

More information

Table of Contents 1 VLAN Configuration 1-1

Table of Contents 1 VLAN Configuration 1-1 Table of Contents 1 VLAN Configuration 1-1 Overview 1-1 Introduction to VLAN 1-1 VLAN Fundamentals 1-2 Types of VLAN 1-3 Introduction to Port-Based VLAN 1-3 Configuring a VLAN 1-4 Configuration Task List

More information

SYN Flood Attack Protection Technology White Paper

SYN Flood Attack Protection Technology White Paper Flood Attack Protection Technology White Paper Flood Attack Protection Technology White Paper Keywords: flood, Cookie, Safe Reset Abstract: This document describes the technologies and measures provided

More information

AD SSO Technical White Paper

AD SSO Technical White Paper Issue V1.0 Date 2017-02-28 Huawei Technologies Co., Ltd. 2017. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

HUAWEI Secospace USG Series User Management and Control White Paper

HUAWEI Secospace USG Series User Management and Control White Paper Doc. code HUAWEI Secospace USG Series User Management and Control White Paper Issue 1.0 Date 2014-03-27 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2012. All rights reserved.

More information

RRPP Technology White Paper

RRPP Technology White Paper RR Technology White aper Keywords: RR, RR domain, RR ring, control VLAN, protected VLAN, master node, transit node, edge node, assistant-edge node, ring group. Abstract: The Rapid Ring rotection rotocol

More information

H3C S12500 Unauthorized DHCP Server Detection Configuration Examples

H3C S12500 Unauthorized DHCP Server Detection Configuration Examples H3C S12500 Unauthorized DHCP Server Detection Configuration Examples Copyright 2013 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any

More information

Example: Configuring Layer 2 Protocol Tunneling on EX Series Switches

Example: Configuring Layer 2 Protocol Tunneling on EX Series Switches Example: Configuring Layer 2 Protocol Tunneling on EX Series Switches Requirements Layer 2 protocol tunneling (L2PT) allows you to send Layer 2 protocol data units (PDUs) across a service provider network

More information

Figure Untagged and 802.1Q-Tagged Ethernet frames

Figure Untagged and 802.1Q-Tagged Ethernet frames 38. 802.1Q VLAN Virtual LANs (VLANs) are logical, independent workgroups within a network. These workgroups communicate as if they had a physical connection to the network. However, VLANs are not limited

More information

Attack Prevention Technology White Paper

Attack Prevention Technology White Paper Attack Prevention Technology White Paper Keywords: Attack prevention, denial of service Abstract: This document introduces the common network attacks and the corresponding prevention measures, and describes

More information

Table of Contents 1 PPP Configuration Commands PPPoE Configuration Commands 2-1

Table of Contents 1 PPP Configuration Commands PPPoE Configuration Commands 2-1 Table of Contents 1 PPP Configuration Commands 1-1 PPP Configuration Commands 1-1 ip address ppp-negotiate 1-1 link-protocol ppp 1-2 mtu 1-2 ppp account-statistics enable 1-3 ppp authentication-mode 1-3

More information

Privilege Level Switching Authentication Technology White Paper

Privilege Level Switching Authentication Technology White Paper Privilege Level Switching Authentication Technology White Paper Keywords: Privilege level switching authentication, RADIUS, HWTACACS Abstract: This document briefly describes the background and implementation

More information

VLANs Level 3 Unit 9 Computer Networks

VLANs Level 3 Unit 9 Computer Networks VLANs Some Requirements of LANs Need to split up broadcast domains to make good use of bandwidth People in different departments may need to be grouped together for access to servers Security: restrict

More information

MSTP Technology White Paper

MSTP Technology White Paper MSTP Technology White Paper Key words: STP, RSTP, MSTP, rapid transition, multiple instances, redundancy loop, redundancy link, load sharing Abstract: This article introduces basic MSTP terms, MSTP algorithm

More information

802.1x Configuration. Page 1 of 11

802.1x Configuration. Page 1 of 11 802.1x Configuration Page 1 of 11 Contents Chapter1 Configuring 802.1X...3 1.1 Brief Introduction to 802.1X Configuration... 3 1.1.1 Architecture of 802.1X...3 1.1.2 Rule of 802.1x... 5 1.1.3 Configuring

More information

Web and MAC Authentication

Web and MAC Authentication 3 Web and MAC Authentication Contents Overview..................................................... 3-2 Client Options.............................................. 3-3 General Features............................................

More information

VLANs. LAN Switching and Wireless Chapter 3. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

VLANs. LAN Switching and Wireless Chapter 3. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 VLANs LAN Switching and Wireless Chapter 3 Version 4.0 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Explain the role of VLANs in a converged network. Explain the role of trunking

More information

H3C WA Series WLAN Access Points. Layer 2 WAN Command Reference. Hangzhou H3C Technologies Co., Ltd.

H3C WA Series WLAN Access Points. Layer 2 WAN Command Reference. Hangzhou H3C Technologies Co., Ltd. H3C WA Series WLAN Access Points Layer 2 WAN Command Reference Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Document Version: 6W100-20100910 Copyright 2010, Hangzhou H3C Technologies Co., Ltd.

More information

Configuring NAC Out-of-Band Integration

Configuring NAC Out-of-Band Integration Prerequisites for NAC Out Of Band, page 1 Restrictions for NAC Out of Band, page 2 Information About NAC Out-of-Band Integration, page 2 (GUI), page 3 (CLI), page 5 Prerequisites for NAC Out Of Band CCA

More information

Vendor: Cisco. Exam Code: Exam Name: Implementing Cisco Secure Access Solutions. Version: Demo

Vendor: Cisco. Exam Code: Exam Name: Implementing Cisco Secure Access Solutions. Version: Demo Vendor: Cisco Exam Code: 300-208 Exam Name: Implementing Cisco Secure Access Solutions Version: Demo QUESTION 1 By default, how many days does Cisco ISE wait before it purges the expired guest accounts?

More information

Cisco Unified Wireless Network Solution Overview

Cisco Unified Wireless Network Solution Overview 1 CHAPTER Unified Wireless Network Solution Overview This chapter summarizes the benefits and characteristics of the Unified Wireless Network for the enterprise.the Unified Wireless Network solution offers

More information

How to configure the IAC4500 Internet Access Controller for Billing by Volume Application with NCT480 IP DSLAM using port location mapping

How to configure the IAC4500 Internet Access Controller for Billing by Volume Application with NCT480 IP DSLAM using port location mapping How to configure the IAC4500 Internet Access Controller for Billing by Volume Application with NCT480 IP DSLAM using port location mapping Introduction The following paper provides instructions on how

More information

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the

More information

Multicast VLAN, page 1 Passive Clients, page 2 Dynamic Anchoring for Clients with Static IP Addresses, page 5

Multicast VLAN, page 1 Passive Clients, page 2 Dynamic Anchoring for Clients with Static IP Addresses, page 5 Multicast VLAN, page 1 Passive Clients, page 2 Dynamic Anchoring for Clients with Static IP Addresses, page 5 Multicast VLAN Information About Multicast Optimization Prior to the 7.0.116.0 release, multicast

More information

Table of Contents 1 Port Mirroring Configuration 1-1

Table of Contents 1 Port Mirroring Configuration 1-1 Table of Contents 1 Port Mirroring Configuration 1-1 Introduction to Port Mirroring 1-1 Classification of Port Mirroring 1-1 Implementing Port Mirroring 1-2 Other Functions Supported by Port Mirroring

More information

Table of Contents. 4 System Guard Configuration 4-1 System Guard Overview 4-1 Guard Against IP Attacks 4-1 Guard Against TCN Attacks 4-1

Table of Contents. 4 System Guard Configuration 4-1 System Guard Overview 4-1 Guard Against IP Attacks 4-1 Guard Against TCN Attacks 4-1 Table of Contents 1 802.1x Configuration 1-1 Introduction to 802.1x 1-1 Architecture of 802.1x Authentication 1-1 The Mechanism of an 802.1x Authentication System 1-3 Encapsulation of EAPoL Messages 1-3

More information

Configuring Link Aggregation

Configuring Link Aggregation Information About Link Aggregation, page 1 Restrictions for Link Aggregation, page 1 (GUI), page 3 (CLI), page 4 Verifying Link Aggregation Settings (CLI), page 4 Configuring Neighbor Devices to Support

More information

Table of Contents 1 QinQ Configuration BPDU Tunneling Configuration 2-1

Table of Contents 1 QinQ Configuration BPDU Tunneling Configuration 2-1 Table of Contents 1 QinQ Configuration 1-1 Introduction to QinQ 1-1 Understanding QinQ 1-1 Implementations of QinQ 1-2 Modification of TPID Value of QinQ Frames 1-3 Configuring Basic QinQ 1-4 Configuring

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring Private VLANs on a QFX Switch Using Extended Functionality Modified: 2016-08-01 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000

More information

Configuring Client Profiling

Configuring Client Profiling Prerequisites for, page 1 Restrictions for, page 2 Information About Client Profiling, page 2, page 3 Configuring Custom HTTP Port for Profiling, page 4 Prerequisites for By default, client profiling will

More information

FortiNAC. HiPath. Enterasys. Siemens. Extreme. Wireless Integration. Version: 8.x. Date: 8/28/2018. Rev: B

FortiNAC. HiPath. Enterasys. Siemens. Extreme. Wireless Integration. Version: 8.x. Date: 8/28/2018. Rev: B FortiNAC HiPath Enterasys Siemens Extreme Wireless Integration Version: 8.x Date: 8/28/2018 Rev: B FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET

More information

DHCP Technology White Paper

DHCP Technology White Paper DHCP Technology White Paper Keywords: DHCP, DHCP server, DHCP relay agent, DHCP client, BOOTP client. Abstract: This document describes DHCP basic concepts and applications, as well as the main functions

More information

Basic Wireless Settings on the CVR100W VPN Router

Basic Wireless Settings on the CVR100W VPN Router Basic Wireless Settings on the CVR100W VPN Router Objective A Wireless Local Area Network (WLAN) utilizes radio communication to connect wireless devices to a LAN. An example is a Wi-Fi hotspot at a cafe.

More information

Example: Configuring DHCP Snooping and DAI to Protect the Switch from ARP Spoofing Attacks

Example: Configuring DHCP Snooping and DAI to Protect the Switch from ARP Spoofing Attacks Example: Configuring DHCP Snooping and DAI to Protect the Switch from ARP Spoofing Attacks In an ARP spoofing attack, the attacker associates its own MAC address with the IP address of a network device

More information

Table of Contents 1 AAA Overview AAA Configuration 2-1

Table of Contents 1 AAA Overview AAA Configuration 2-1 Table of Contents 1 AAA Overview 1-1 Introduction to AAA 1-1 Authentication 1-1 Authorization 1-1 Accounting 1-2 Introduction to ISP Domain 1-2 Introduction to AAA Services 1-2 Introduction to RADIUS 1-2

More information

Operation Manual 802.1x. Table of Contents

Operation Manual 802.1x. Table of Contents Table of Contents Table of Contents... 1-1 1.1 802.1x Overview... 1-1 1.1.1 Architecture of 802.1x... 1-1 1.1.2 Operation of 802.1x... 1-3 1.1.3 EAP Encapsulation over LANs... 1-4 1.1.4 EAP Encapsulation

More information

DWS-4000 Series DWL-3600AP DWL-6600AP

DWS-4000 Series DWL-3600AP DWL-6600AP Unified Wired & Wireless Access System Configuration Guide Product Model: Release 1.0 DWS-4000 Series DWL-8600AP DWL-6600AP DWL-3600AP Page 1 Table of Contents 1. Scenario 1 - Basic L2 Edge Setup: 1 Unified

More information

H3C SecPath UTM Series. Configuration Examples. Hangzhou H3C Technologies Co., Ltd. Manual Version: 5W

H3C SecPath UTM Series. Configuration Examples. Hangzhou H3C Technologies Co., Ltd.  Manual Version: 5W H3C SecPath UTM Series Configuration Examples Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Manual Version: 5W101-20100520 Copyright 2009-2010, Hangzhou H3C Technologies Co., Ltd. and its licensors

More information

Configuring Cisco IP Phone Support

Configuring Cisco IP Phone Support CHAPTER 16 This chapter describes how to configure support for Cisco IP phones on the Catalyst 6500 series switches. For complete syntax and usage information for the commands used in this chapter, refer

More information

BreezeACCESS VL Security

BreezeACCESS VL Security BreezeACCESS VL Security Technical Paper Alvarion Ltd. All rights reserved. The material contained herein is proprietary. No part of this publication may be reproduced in any form without the express written

More information

Operation Manual Security. Table of Contents

Operation Manual Security. Table of Contents Table of Contents Table of Contents Chapter 1 802.1x Configuration... 1-1 1.1 802.1x Overview... 1-1 1.1.1 802.1x Standard Overview... 1-1 1.1.2 802.1x System Architecture... 1-1 1.1.3 802.1x Authentication

More information

H3C S7500E-X OSPF Configuration Examples

H3C S7500E-X OSPF Configuration Examples H3C S7500E-X OSPF Configuration Examples Copyright 2015 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by any means without

More information

Table of Contents 1 QinQ Configuration 1-1

Table of Contents 1 QinQ Configuration 1-1 Table of Contents 1 QinQ Configuration 1-1 Introduction to QinQ 1-1 Background 1-1 QinQ Mechanism and Benefits 1-1 QinQ Frame Structure 1-2 Implementations of QinQ 1-3 Modification of the TPID Value in

More information

Ref Data Over Coax Gateway Application Notes. Vlan Support

Ref Data Over Coax Gateway Application Notes. Vlan Support Ref.769301 Data Over Coax Gateway Application Notes Vlan Support Content Index About this Application Note...3 Functional Description of Router...3 System Interfaces description...3 Operation Modes...3

More information

SecPath Series Firewalls Virtual Firewall Configuration Examples

SecPath Series Firewalls Virtual Firewall Configuration Examples SecPath Series Firewalls Virtual Firewall Configuration Examples Keywords: VPN instance, VRF, private address, public address, address pool Abstract: This document describes the virtual firewall implementation

More information

H3C S9800 Switch Series

H3C S9800 Switch Series H3C S9800 Switch Series OpenFlow Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: Release 213x Document version: 6W101-20151130 Copyright 2015, Hangzhou H3C

More information

Exam HP2-Z32 Implementing HP MSM Wireless Networks Version: 7.1 [ Total Questions: 115 ]

Exam HP2-Z32 Implementing HP MSM Wireless Networks Version: 7.1 [ Total Questions: 115 ] s@lm@n HP Exam HP2-Z32 Implementing HP MSM Wireless Networks Version: 7.1 [ Total Questions: 115 ] HP HP2-Z32 : Practice Test Question No : 1 What is a proper use for an ingress VLAN in an HP MSM VSC?

More information

Configuring Port-Based and Client-Based Access Control (802.1X)

Configuring Port-Based and Client-Based Access Control (802.1X) 9 Configuring Port-Based and Client-Based Access Control (802.1X) Contents Overview..................................................... 9-3 Why Use Port-Based or Client-Based Access Control?............

More information

Configuring VRRP. Finding Feature Information. The Virtual Router Redundancy Protocol (VRRP) is an election protocol that dynamically assigns

Configuring VRRP. Finding Feature Information. The Virtual Router Redundancy Protocol (VRRP) is an election protocol that dynamically assigns The Virtual Router Redundancy Protocol (VRRP) is an election protocol that dynamically assigns responsibility for one or more virtual routers to the VRRP routers on a LAN, allowing several routers on a

More information

Configuring VLANs CHAPTER

Configuring VLANs CHAPTER CHAPTER 13 This chapter describes how to configure your access point/bridge to operate with the VLANs set up on your wired LAN. These sections describe how to configure your access point/bridge to support

More information

CHAPTER 1: VLANS. Routing & Switching

CHAPTER 1: VLANS. Routing & Switching CHAPTER 1: VLANS Routing & Switching CHAPTER 1 1.1 VLAN Segmentation 1.2 VLAN Implementation 1.3 VLAN Security and Design 1.4 Summary CHAPTER 1 : OBJECTIVES Explain the purpose of VLANs in a switched network.

More information

H3C S9500 QoS Technology White Paper

H3C S9500 QoS Technology White Paper H3C Key words: QoS, quality of service Abstract: The Ethernet technology is widely applied currently. At present, Ethernet is the leading technology in various independent local area networks (LANs), and

More information

H3C Firewall and UTM Devices Log Management with IMC Firewall Manager Configuration Examples (Comware V5)

H3C Firewall and UTM Devices Log Management with IMC Firewall Manager Configuration Examples (Comware V5) H3C Firewall and UTM Devices Log Management with IMC Firewall Manager Configuration Examples (Comware V5) Copyright 2015 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual

More information

Configuring VLANs CHAPTER

Configuring VLANs CHAPTER CHAPTER 8 This chapter describes how to configure your access point to operate with the VLANs set up on your wired LAN. These sections describe how to configure your access point to support VLANs: Understanding

More information

Agile Controller-Campus V100R002C10. Permission Control Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.

Agile Controller-Campus V100R002C10. Permission Control Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD. V100R002C10 Permission Control Technical White Paper Issue 01 Date 2016-04-15 HUAWEI TECHNOLOGIES CO., LTD. 2016. All rights reserved. No part of this document may be reproduced or transmitted in any form

More information

HUAWEI AR Series SEP Technical White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 1.0. Date

HUAWEI AR Series SEP Technical White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 1.0. Date HUAWEI AR Series SEP Technical White Paper Issue 1.0 Date 2015-01-19 HUAWEI TECHNOLOGIES CO., LTD. 2015. All rights reserved. No part of this document may be reproduced or transmitted in any form or by

More information

Configuring AP Groups

Configuring AP Groups Prerequisites for, page 1 Restrictions for Configuring Access Point Groups, page 2 Information About Access Point Groups, page 2 Configuring Access Point Groups, page 3 Creating Access Point Groups (GUI),

More information

AN-135. Introduction. VLAN Overview IEEE 802.1Q VLAN Q Tag Based and Port Based VLAN Function and Setting in KSZ8995M/MA

AN-135. Introduction. VLAN Overview IEEE 802.1Q VLAN Q Tag Based and Port Based VLAN Function and Setting in KSZ8995M/MA AN-135 802.1Q Tag Based and Port Based VLAN Function and Setting in KSZ8995M/MA Introduction This document will discuss IEEE802.1Q tag-based VLAN and port-based VLAN setup for the KSZ8995M/MA devices.

More information

Private and Public addresses. Real IPs. Lecture (09) Internetwork Layer (3) Agenda. By: Dr. Ahmed ElShafee

Private and Public addresses. Real IPs. Lecture (09) Internetwork Layer (3) Agenda. By: Dr. Ahmed ElShafee Agenda Lecture (09) Internetwork Layer (3) Private and public addresses Network Address Translation Virtual Private Network (VPN) Virtual LANs By: Dr. Ahmed ElShafee ١ ٢ Private and public addresses Private

More information

TECHNICAL NOTE UWW & CLEARPASS HOW-TO: CONFIGURE UNIFIED WIRELESS WITH CLEARPASS. Version 2

TECHNICAL NOTE UWW & CLEARPASS HOW-TO: CONFIGURE UNIFIED WIRELESS WITH CLEARPASS. Version 2 HOW-TO: CONFIGURE UNIFIED WIRELESS WITH CLEARPASS Version 2 CONTENTS Introduction... 7 Background information... 7 Requirements... 7 Network diagram... 7 VLANs... 8 Switch configuration... 8 Initial setup...

More information

Wireless Integration Overview

Wireless Integration Overview Version: 4.1.1 Date: 12/28/2010 Copyright Notice Copyright 2010 by Bradford Networks, Inc. All rights reserved worldwide. Use, duplication, or disclosure by the United States government is subject to the

More information

Managing NCS User Accounts

Managing NCS User Accounts 7 CHAPTER The Administration enables you to schedule tasks, administer accounts, and configure local and external authentication and authorization. Also, set logging options, configure mail servers, and

More information

SecBlade Firewall Cards Log Management and SecCenter Configuration Example

SecBlade Firewall Cards Log Management and SecCenter Configuration Example SecBlade Firewall Cards Log Management and SecCenter Configuration Example Keywords: Syslog Abstract: This document describes the log management function of SecBlade firewall cards, and presents configuration

More information

User Guide. 450Mbps/300Mbps Wireless N Access Point TL-WA901ND/TL-WA801ND REV

User Guide. 450Mbps/300Mbps Wireless N Access Point TL-WA901ND/TL-WA801ND REV User Guide 450Mbps/300Mbps Wireless N Access Point TL-WA901ND/TL-WA801ND REV4.0.0 1910011930 Contents About This Guide...1 Chapter 1. Get to Know About Your Access Point.................... 2 1. 1. Product

More information

H3C SR G Core Routers

H3C SR G Core Routers H3C SR8800 10G Core Routers Layer 2 LAN Switching Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: SR8800-CMW520-R3347 Document version: 6W103-20120224 Copyright

More information

BEST PRACTICE - NAC AUF ARUBA SWITCHES. Rollenbasierte Konzepte mit Aruba OS Switches in Verbindung mit ClearPass Vorstellung Mobile First Features

BEST PRACTICE - NAC AUF ARUBA SWITCHES. Rollenbasierte Konzepte mit Aruba OS Switches in Verbindung mit ClearPass Vorstellung Mobile First Features BEST PRACTICE - NAC AUF ARUBA SWITCHES Rollenbasierte Konzepte mit Aruba OS Switches in Verbindung mit ClearPass Vorstellung Mobile First Features Agenda 1 Overview 2 802.1X Authentication 3 MAC Authentication

More information

FortiNAC ADTRAN vwlan Wireless Controllers Integration

FortiNAC ADTRAN vwlan Wireless Controllers Integration FortiNAC ADTRAN vwlan Wireless Controllers Integration Version 8.x Date: 8/28/2018 Rev: C FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET KNOWLEDGE

More information

WLC 7.0 and Later: VLAN Select and Multicast Optimization Features Deployment Guide

WLC 7.0 and Later: VLAN Select and Multicast Optimization Features Deployment Guide WLC 7.0 and Later: VLAN Select and Multicast Optimization Features Deployment Guide Document ID: 112932 Contents Introduction Prerequisites Requirements Platforms Supported Conventions VLAN Select Feature

More information

WFS709TP Case Scenario: Wireless deployment for a Corporate and Public network

WFS709TP Case Scenario: Wireless deployment for a Corporate and Public network WFS709TP Case Scenario: Wireless deployment for a Corporate and Public network This document describes the activities undertaken to deploy a Wireless solution using the Wireless Controller WFS709TP and

More information

BYOD: BRING YOUR OWN DEVICE.

BYOD: BRING YOUR OWN DEVICE. white paper BYOD: BRING YOUR OWN DEVICE. On-BOaRDING and Securing DEVICES IN YOUR Corporate NetWORk PrepaRING YOUR NetWORk to MEEt DEVICE DEMaND The proliferation of smartphones and tablets brings increased

More information

H3C S5130-EI Switch Series

H3C S5130-EI Switch Series H3C S5130-EI Switch Series OpenFlow Command Reference New H3C Technologies Co., Ltd. http://www.h3c.com Software version: Release 311x Document version: 6W102-20180323 Copyright 2016-2018, New H3C Technologies

More information

CRS328 as a Layer 2 Switch UK MUM 2018

CRS328 as a Layer 2 Switch UK MUM 2018 CRS328 as a Layer 2 Switch UK MUM 2018 Oct 2018 Jono Thompson BirchenallHowden Ltd Jono Thompson Networking background started as a Cisco Engineer Started using ROS June 2010 MikroTik Consultant Since

More information

Table of Contents 1 Ethernet Interface Configuration Commands 1-1

Table of Contents 1 Ethernet Interface Configuration Commands 1-1 Table of Contents 1 Ethernet Interface Configuration Commands 1-1 broadcast-suppression 1-1 description 1-2 display brief interface 1-3 display interface 1-4 display loopback-detection 1-8 duplex 1-9 flow-control

More information

IPv6 ND Configuration Example

IPv6 ND Configuration Example IPv6 ND Configuration Example Keywords: IPv6 ND Abstract: This document describes the application environment and typical configuration of IPv6 ND. Acronyms: Acronym Full spelling ARP FIB Address Resolution

More information

Colubris Networks Configuration Guide

Colubris Networks Configuration Guide Colubris Networks Configuration Guide Release 5.1 (October 2006) 43-10-0000-02 Copyright 2006 Colubris Networks, Inc. All rights reserved, including those to reproduce this document or parts thereof in

More information

Exam Questions HP2-Z33

Exam Questions HP2-Z33 HP Exam Questions HP2-Z33 HP Unified Wired-Wireless Networks and BYOD 1.An administrator changes the setting for VLAN 200 on an HP 830 switch from tagged to untagged. How will this change affect the traffic

More information

Configuring RRPP. Overview. Basic RRPP concepts. RRPP domain

Configuring RRPP. Overview. Basic RRPP concepts. RRPP domain Contents Configuring RRPP 1 Overview 1 Basic RRPP concepts 1 RRPPDUs 3 RRPP timers 4 How RRPP works 4 Typical RRPP networking 6 Protocols and standards 9 RRPP configuration task list 9 Creating an RRPP

More information

Client QoS Association Settings on the WAP371

Client QoS Association Settings on the WAP371 Article ID: 5091 Client QoS Association Settings on the WAP371 Objective Client Quality of Service (QoS) Association is used to control the wireless clients connected to the network, and allows you to

More information

Transient Traffic Interruption on Ports Due to Source MAC Address Attacks Troubleshooting. Table of Contents

Transient Traffic Interruption on Ports Due to Source MAC Address Attacks Troubleshooting. Table of Contents Table of Contents Chapter 1 Transient Traffic Interruption on Ports Due to Source MAC Address Attacks Troubleshooting... 1-1 1.1 Symptom... 1-1 1.2 Related Information... 1-1 1.3 Diagnosis... 1-2 1.4 Troubleshooting...

More information

Lecture (04) Using VLANs to segment LANs. Dr. Ahmed M. ElShafee. Dr. Ahmed ElShafee, ACU Spring 2014, Practical Applications in Computer Networks 4.

Lecture (04) Using VLANs to segment LANs. Dr. Ahmed M. ElShafee. Dr. Ahmed ElShafee, ACU Spring 2014, Practical Applications in Computer Networks 4. Lecture (04) Using VLANs to segment LANs Dr. Ahmed M. ElShafee ١ 4.0 ٢ Topology ٣ item Configuration item Configuration Gateway Gateway PC1 DNS Port status Band width Duplex On PC2 DNS Port status Band

More information

Exam HP2-Z33 HP Unified Wired-Wireless Networks and BYOD Version: 6.2 [ Total Questions: 65 ]

Exam HP2-Z33 HP Unified Wired-Wireless Networks and BYOD Version: 6.2 [ Total Questions: 65 ] s@lm@n HP Exam HP2-Z33 HP Unified Wired-Wireless Networks and BYOD Version: 6.2 [ Total Questions: 65 ] Question No : 1 An administrator changes the setting for VLAN 200 on an HP 830 switch from tagged

More information

WiNG 5.x How-To Guide

WiNG 5.x How-To Guide WiNG 5.x How-To Guide Tunneling Remote Traffic using L2TPv3 Part No. TME-08-2012-01 Rev. A MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola

More information

Interoperability guide Phoenix Contact WLAN clients with Cisco Wireless LAN Controllers (WLC) Published:

Interoperability guide Phoenix Contact WLAN clients with Cisco Wireless LAN Controllers (WLC) Published: Interoperability guide Phoenix Contact WLAN clients with Cisco Wireless LAN Controllers (WLC) Published: 2018-10-16 Contents Introduction... 1 Objectives:... 1 Requirements:... 1 Procedure... 2 Default

More information

Table of Contents Chapter 1 EPON System Configuration Chapter 2 OLT Configuration Chapter 3 ONU Configuration

Table of Contents Chapter 1 EPON System Configuration Chapter 2 OLT Configuration Chapter 3 ONU Configuration Table of Contents Table of Contents Chapter 1 EPON System Configuration... 1-1 1.1 Introduction to EPON System... 1-1 1.2 EPON System Configuration Tasks... 1-2 1.3 Configuring the Interval to Sample System

More information

RADIUS Configuration Note WINS : Wireless Interoperability & Network Solutions

RADIUS Configuration Note WINS : Wireless Interoperability & Network Solutions RADIUS Configuration Note WINS : Wireless Interoperability & Network Solutions MERUNETWORKS.COM February 2013 1. OVERVIEW... 3 2. AUTHENTICATION AND ACCOUNTING... 4 3. 802.1X, CAPTIVE PORTAL AND MAC-FILTERING...

More information

Portal configuration commands

Portal configuration commands Contents Portal configuration commands 1 display portal acl 1 display portal connection statistics 5 display portal free-rule 7 display portal interface 9 display portal-roaming 11 display portal server

More information