User's Manual

Table Of Contents
Users Manual of IGS-5225-8T2S2X & 8P2S2X series
8
4.5.1 Access Security ................................................................................................................................................. 271
4.5.1.1 Access Management ............................................................................................................................... 271
4.5.1.2 Access Management Statistics ................................................................................................................ 272
4.5.1.3 SSH ......................................................................................................................................................... 273
4.5.1.4 HTTPs ..................................................................................................................................................... 273
4.5.2 AAA ................................................................................................................................................................... 276
4.5.2.1 Authentication Configuration .................................................................................................................... 280
4.5.2.2 RADIUS ................................................................................................................................................... 283
4.5.2.3 TACACS+ ................................................................................................................................................ 285
4.5.2.4 RADIUS Overview ................................................................................................................................... 286
4.5.2.5 RADIUS Details ....................................................................................................................................... 288
4.5.3 Port Authentication ............................................................................................................................................ 295
4.5.3.1 Network Access Server Configuration ..................................................................................................... 295
4.5.3.2 Network Access Overview ....................................................................................................................... 298
4.5.3.3 Network Access Statistics ........................................................................................................................ 300
4.5.4 Port Security ...................................................................................................................................................... 305
4.5.4.1 Port Limit Control ..................................................................................................................................... 305
4.5.4.2 Port Security Status ................................................................................................................................. 308
4.5.4.3 Port Security Detail .................................................................................................................................. 310
4.5.5 Access Control Lists .......................................................................................................................................... 312
4.5.5.1 Access Control List Status ....................................................................................................................... 312
4.5.5.2 Access Control List Configuration ............................................................................................................ 313
4.5.5.3 ACE Configuration ................................................................................................................................... 315
4.5.5.4 ACL Ports Configuration .......................................................................................................................... 325
4.5.5.5 ACL Rate Limiters .................................................................................................................................... 327
4.5.6 DHCP Snooping ................................................................................................................................................ 329
4.5.6.1 DHCP Snooping Configuration ................................................................................................................ 329
4.5.6.2 Snooping Table ........................................................................................................................................ 331
4.5.7 IP Source Guard ................................................................................................................................................ 332
4.5.7.1 IP Source Guard Configuration ................................................................................................................ 332
4.5.7.2 Static IP Source Guard Table .................................................................................................................. 333
4.5.7.3 Dynamic IP Source Guard Table ............................................................................................................. 334
4.5.8 ARP Inspection .................................................................................................................................................. 335
4.5.8.1 ARP Inspection ........................................................................................................................................ 335
4.5.8.2 ARP Inspection Static Table ..................................................................................................................... 336
4.5.8.3 Dynamic ARP Inspection Table ................................................................................................................ 337
4.6 Power over Ethernet (IGS-5225-8P2S2X) ............................................................................................... 339
4.6.1 PoE .................................................................................................................................................................... 339
4.6.1.1 Power over Ethernet Powered Device ..................................................................................................... 340
4.6.1.2 System Configuration .............................................................................................................................. 340