ECS3510-28T_Management Guide-R05

Table Of Contents
F
IGURES
– 54 –
Figure 176: Showing the MAC Address Filter Table for Network Access 335
Figure 177: Showing Addresses Authenticated for Network Access 337
Figure 178: Configuring HTTPS 339
Figure 179: Downloading the Secure-Site Certificate 340
Figure 180: Configuring the SSH Server 344
Figure 181: Generating the SSH Host Key Pair 346
Figure 182: Showing the SSH Host Key Pair 346
Figure 183: Copying the SSH User’s Public Key 347
Figure 184: Showing the SSH User’s Public Key 348
Figure 185: Setting the Name of a Time Range 351
Figure 186: Showing a List of Time Ranges 351
Figure 187: Add a Rule to a Time Range 352
Figure 188: Showing the Rules Configured for a Time Range 352
Figure 189: Showing TCAM Utilization 353
Figure 190: Creating an ACL 354
Figure 191: Showing a List of ACLs 355
Figure 192: Configuring a Standard IPv4 ACL 356
Figure 193: Configuring an Extended IPv4 ACL 359
Figure 194: Configuring a Standard IPv6 ACL 360
Figure 195: Configuring an Extended IPv6 ACL 362
Figure 196: Configuring a MAC ACL 364
Figure 197: Configuring a ARP ACL 366
Figure 198: Binding a Port to an ACL 368
Figure 199: Configuring ACL Mirroring 369
Figure 200: Showing the VLANs to Mirror 369
Figure 201: Showing ACL Statistics 371
Figure 202: Configuring Global Settings for ARP Inspection 374
Figure 203: Configuring VLAN Settings for ARP Inspection 375
Figure 204: Configuring Interface Settings for ARP Inspection 377
Figure 205: Displaying Statistics for ARP Inspection 378
Figure 206: Displaying the ARP Inspection Log 379
Figure 207: Creating an IP Address Filter for Management Access 380
Figure 208: Showing IP Addresses Authorized for Management Access 381
Figure 209: Configuring Port Security 383
Figure 210: Configuring Port Security 384
Figure 211: Configuring Global Settings for 802.1X Port Authentication 386