GS-5220-Series (V4) User Manual

Table Of Contents
Users Manual of GS-5220 PoE Series Managed Switch
8
4.5.5.2 QoS Control Entry Configuration ............................................................................................................. 294
4.5.5.3 QCL Status .............................................................................................................................................. 297
4.5.5.4 Voice VLAN Configuration ....................................................................................................................... 299
4.5.5.5 Voice VLAN OUI Table ............................................................................................................................ 301
4.6 Security ..................................................................................................................................................... 302
4.6.1 Access Security ................................................................................................................................................. 302
4.6.1.1 Access Management ............................................................................................................................... 302
4.6.1.2 Access Management Statistics ................................................................................................................ 303
4.6.1.3 SSH ......................................................................................................................................................... 304
4.6.1.4 HTTPs ..................................................................................................................................................... 305
4.6.2 AAA ................................................................................................................................................................... 307
4.6.2.1 Authentication Configuration .................................................................................................................... 312
4.6.2.2 RADIUS ................................................................................................................................................... 315
4.6.2.3 TACACS+ ................................................................................................................................................ 317
4.6.2.4 RADIUS Overview ................................................................................................................................... 319
4.6.2.5 RADIUS Details ....................................................................................................................................... 321
4.6.3 Port Authentication ............................................................................................................................................ 328
4.6.3.1 Network Access Server Configuration ..................................................................................................... 328
4.6.3.2 Network Access Overview ....................................................................................................................... 332
4.6.3.3 Network Access Statistics ........................................................................................................................ 333
4.6.4 Port Security ...................................................................................................................................................... 338
4.6.4.1 Port Limit Control ..................................................................................................................................... 338
4.6.4.2 Port Security Status ................................................................................................................................. 341
4.6.4.3 Port Security Detail .................................................................................................................................. 344
4.6.5 Access Control Lists .......................................................................................................................................... 345
4.6.5.1 Access Control List Status ....................................................................................................................... 345
4.6.5.2 Access Control List Configuration ............................................................................................................ 347
4.6.5.3 ACE Configuration ................................................................................................................................... 349
4.6.5.4 ACL Ports Configuration .......................................................................................................................... 359
4.6.5.5 ACL Rate Limiters .................................................................................................................................... 361
4.6.6 DHCP Snooping ................................................................................................................................................ 362
4.6.6.1 DHCP Snooping Configuration ................................................................................................................ 362
4.6.6.2 Snooping Table ........................................................................................................................................ 364
4.6.7 IP Source Guard ................................................................................................................................................ 365
4.6.7.1 IP Source Guard Configuration................................................................................................................ 365
4.6.7.2 Static IP Source Guard Table .................................................................................................................. 366
4.6.7.3 Dynamic IP Source Guard Table ............................................................................................................. 367
4.6.8 ARP Inspection .................................................................................................................................................. 368
4.6.8.1 ARP Inspection ........................................................................................................................................ 368
4.6.8.2 ARP Inspection Static Table..................................................................................................................... 370