ECS4110-28P_Management Guide

Table Of Contents
F
IGURES
– 56 –
Figure 176: Showing Addresses Authenticated for Network Access 340
Figure 177: Configuring HTTPS 342
Figure 178: Downloading the Secure-Site Certificate 344
Figure 179: Configuring the SSH Server 348
Figure 180: Generating the SSH Host Key Pair 349
Figure 181: Showing the SSH Host Key Pair 350
Figure 182: Copying the SSH User’s Public Key 351
Figure 183: Showing the SSH User’s Public Key 352
Figure 184: Setting the Name of a Time Range 354
Figure 185: Showing a List of Time Ranges 355
Figure 186: Add a Rule to a Time Range 355
Figure 187: Showing the Rules Configured for a Time Range 356
Figure 188: Showing TCAM Utilization 357
Figure 189: Creating an ACL 358
Figure 190: Showing a List of ACLs 359
Figure 191: Configuring a Standard IPv4 ACL 360
Figure 192: Configuring an Extended IPv4 ACL 363
Figure 193: Configuring a Standard IPv6 ACL 364
Figure 194: Configuring an Extended IPv6 ACL 366
Figure 195: Configuring a MAC ACL 369
Figure 196: Configuring a ARP ACL 371
Figure 197: Binding a Port to an ACL 372
Figure 198: Configuring ACL Mirroring 373
Figure 199: Showing the VLANs to Mirror 374
Figure 200: Showing ACL Statistics 375
Figure 201: Configuring Global Settings for ARP Inspection 378
Figure 202: Configuring VLAN Settings for ARP Inspection 379
Figure 203: Configuring Interface Settings for ARP Inspection 381
Figure 204: Displaying Statistics for ARP Inspection 382
Figure 205: Displaying the ARP Inspection Log 383
Figure 206: Creating an IP Address Filter for Management Access 384
Figure 207: Showing IP Addresses Authorized for Management Access 385
Figure 208: Configuring Port Security 387
Figure 209: Configuring Port Authentication 388
Figure 210: Configuring Global Settings for 802.1X Port Authentication 390
Figure 211: Configuring Interface Settings for 802.1X Port Authenticator 394