User manual
VRRP Virtual Router Settings....................................................................................................................................................... 148
VRRP Authentication Settings ...................................................................................................................................................... 151
IP Multicast Routing Protocol.........................................................................................................................................153
IGMP Interface Settings ................................................................................................................................................................ 154
DVMRP Interface Configuration................................................................................................................................................... 156
PIM-DM Interface Configuration .................................................................................................................................................. 158
QoS ......................................................................................................................................................................................161
Port Bandwidth................................................................................................................................................................163
QoS Scheduling Mechanism ...........................................................................................................................................164
802.1p Default Priority....................................................................................................................................................165
802.1p User Priority ........................................................................................................................................................167
ACL......................................................................................................................................................................................168
Access Profile Table........................................................................................................................................................168
CPU Interface Filtering ...................................................................................................................................................183
CPU Interface Filtering Profile Table............................................................................................................................................ 183
Security ................................................................................................................................................................................199
Traffic Control.................................................................................................................................................................199
Port Security....................................................................................................................................................................201
Port Lock Entries.............................................................................................................................................................203
Configure 802.1x Authenticator Parameter ................................................................................................................................... 208
Authentic RADIUS Server ..............................................................................................................................................211
Trusted Host ....................................................................................................................................................................212
Access Authentication Control........................................................................................................................................213
Authentication Policy & Parameter Settings.................................................................................................................................. 214
Application Authentication Settings .............................................................................................................................................. 215
Authentication Server Group ......................................................................................................................................................... 216
Authentication Server Host............................................................................................................................................................ 217
Login Method Lists........................................................................................................................................................................ 219
Enable Method Lists...................................................................................................................................................................... 221
Configure Local Enable Password................................................................................................................................................. 223
Enable Admin................................................................................................................................................................................ 224
Traffic Segmentation.......................................................................................................................................................225
Secure Socket Layer (SSL) .............................................................................................................................................226
Download Certificate..................................................................................................................................................................... 227
Ciphersuite..................................................................................................................................................................................... 227
SSH .................................................................................................................................................................................229
SSH Server Configuration ............................................................................................................................................................. 230
SSH Authentication Mode and Algorithm Settings ....................................................................................................................... 231
SSH User Authentication............................................................................................................................................................... 234
IP-MAC Binding .............................................................................................................................................................235