0% found this document useful (0 votes)
55 views4 pages

Sensitivity: Internal & Restricted

This document provides instructions for configuring a large campus technical solution. It discusses enabling various protocols like VLACP, STP, and QoS in the distribution layer. It also describes configuring VLANs, MLTS, and other settings at the edge, as well as creating provisioning values, directory services, access policies and authenticators for identity engines. The document finishes with a section on configuring key health indicators for monitoring the network.

Uploaded by

sushil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views4 pages

Sensitivity: Internal & Restricted

This document provides instructions for configuring a large campus technical solution. It discusses enabling various protocols like VLACP, STP, and QoS in the distribution layer. It also describes configuring VLANs, MLTS, and other settings at the edge, as well as creating provisioning values, directory services, access policies and authenticators for identity engines. The document finishes with a section on configuring key health indicators for monitoring the network.

Uploaded by

sushil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

The Large Campus Technical Solution Guide

October
2010
5
avaya.com
3.3.4
Enable VLACP and SLPP in the Distribution
.......................................................................125
3.3.5
Enable Discard
Untagged Frames
..........................................................................................127
3.3.6
Quality of Service
..................................................................................................................127
3.3.7
Layer 3 Configuration in the Distribution
.............................................................................128
3.3.7.1
RSMLT
.......................................................................................................................................
128
3.3.7.2
VRRP
..........................................................................................................................................
129
3.3.7.3
DHCP Relay
................................................................................................................................
130
3.3.7.4
OSPF
...........................................................................................................................................
131
3.3.7.5
PIM
-SM
......................................................................................................................................
132
3.4
E
DGE
C
ONFIGURATION
...............................................................................................................132
3.4.1
Create VLANs at the Edge
....................................................................................................132
3.4.2
Create the MLT on the Edge

Sensitivity: Internal & Restricted


.................................................................................................
133
3.4.3
Create Management IP Address for Edge
..............................................................................133
3.4.4
VLACP at the Edge
...............................................................................................................133
3.4.5
Enable STP Fast Start / BPDU Filtering at the Edg
e .............................................................134
3.4.6
Enable Rate Limiting
.............................................................................................................134
3.4.7
Quality of Service
..................................................................................................................135
3.4.8
Enable Security Features
.......................................................................................................135
3.4.9
Enable Multicast Features
......................................................................................................136
3.4.10
Enable EAPOL Features
...................................................................................................137
3.4.10.1
802.1X SHSA (Single Host Single Authentication)
....................................................................
137
3.4.10.2
802.1X MHMA (Multiple Host Multiple Authentication
...........................................................
137
3.4.10.3
8021.X Non-EAP MAC Authentication
......................................................................................
138
3.4.10.4
802.1X Non-EAP IP Phone Authentication
................................................................................
138
3.4.10.5
802.1X MHMA
- ADAC
............................................................................................................
139
3.5
I
D

Sensitivity: Internal & Restricted


E
NGINE
C
ONFIGURATION
........................................................................................................140
3.5.1
Create Provisioning Values
...................................................................................................140
3.5.1.1
Dynamic VLAN Assignment
......................................................................................................
140
3.5.1.2
Device Template Attribute for MAC Authentication
..................................................................
141
3.5.2
Create Directory Service
........................................................................................................142
3.5.2.1
Create Active Directory
..............................................................................................................
142
3.5.2.2
Internal User
................................................................................................................................
143
3.5.2.3
Internal Device
............................................................................................................................
144
3.5.3
Create Access Policy
.............................................................................................................145
3.5.3.1
RADIUS Authentication
.............................................................................................................
145
3.5.3.2
MAC Authentication
...................................................................................................................
145
3.5.4
Create Authenticator
..............................................................................................................146
3.5.4.1
Radius Access and MAC Authentication
....................................................................................
146
3.6
K

Sensitivity: Internal & Restricted


EY
H
EALTH
I
NDICATORS
C
ONFIGURATION
..............................................................................148
3.6.1
Displaying KHI information
..................................................................................................148
3.6.2
Configuring global KHI
.........................................................................................................148
3.6.3
Configure Management KHI
.................................................................................................
148
3.6.4
Configure Chassis KHI
..........................................................................................................149
3.6.5
Configure Performance KHI
.......................................................

Sensitivity: Internal & Restricted

You might also like