User's Manual

Table Of Contents
Users Manual of IGS-6325 series
8
4.5.1.4 HTTPs ..................................................................................................................................................... 301
4.5.2 AAA ................................................................................................................................................................... 303
4.5.2.1 Authentication Configuration .................................................................................................................... 308
4.5.2.2 RADIUS ................................................................................................................................................... 310
4.5.2.3 TACACS+ ................................................................................................................................................ 312
4.5.2.4 RADIUS Overview ................................................................................................................................... 314
4.5.2.5 RADIUS Details ....................................................................................................................................... 316
4.5.3 Port Authentication ............................................................................................................................................ 323
4.5.3.1 Network Access Server Configuration ..................................................................................................... 323
4.5.3.2 Network Access Overview ....................................................................................................................... 327
4.5.3.3 Network Access Statistics ........................................................................................................................ 328
4.5.4 Port Security ...................................................................................................................................................... 333
4.5.4.1 Port Limit Control ..................................................................................................................................... 333
4.5.4.2 Port Security Status ................................................................................................................................. 336
4.5.4.3 Port Security Detail .................................................................................................................................. 339
4.5.5 Access Control Lists .......................................................................................................................................... 340
4.5.5.1 Access Control List Status ....................................................................................................................... 340
4.5.5.2 Access Control List Configuration ............................................................................................................ 342
4.5.5.3 ACE Configuration ................................................................................................................................... 344
4.5.5.4 ACL Ports Configuration .......................................................................................................................... 354
4.5.5.5 ACL Rate Limiters .................................................................................................................................... 356
4.5.6 DHCP Snooping ................................................................................................................................................ 357
4.5.6.1 DHCP Snooping Configuration ................................................................................................................ 357
4.5.6.2 Snooping Table ........................................................................................................................................ 359
4.5.7 IP Source Guard ................................................................................................................................................ 360
4.5.7.1 IP Source Guard Configuration ................................................................................................................ 360
4.5.7.2 Static IP Source Guard Table .................................................................................................................. 361
4.5.7.3 Dynamic IP Source Guard Table ............................................................................................................. 362
4.5.8 ARP Inspection .................................................................................................................................................. 363
4.5.8.1 ARP Inspection ........................................................................................................................................ 363
4.5.8.2 ARP Inspection Static Table ..................................................................................................................... 364
4.5.8.3 Dynamic ARP Inspection Table ................................................................................................................ 365
4.6 Ring .................................................................................................................................................................. 367
4.6.1 Ring ................................................................................................................................................................... 367
4.6.1.1 MEP Configuration .................................................................................................................................. 368
4.6.1.2 Detailed MEP Configuration .................................................................................................................... 370
4.6.1.3 Ethernet Ring Protocol Switch ................................................................................................................. 374
4.6.1.4 Ethernet Ring Protocol Switch Configuration ........................................................................................... 375
4.6.1.5 Ethernet Ring Protocol Switch ................................................................................................................. 378
4.6.1.6 Ring Wizard Example .............................................................................................................................. 379
4.7 Maintenance .................................................................................................................................................... 382