User's Manual

Table Of Contents
Users Manual of IGS-5225-16T4S/IGSW-24040T
8
4.5.1 Access Security ................................................................................................................................................. 305
4.5.1.1 Access Management ............................................................................................................................... 305
4.5.1.2 Access Management Statistics ................................................................................................................ 306
4.5.1.3 SSH ......................................................................................................................................................... 307
4.5.1.4 HTTPs ..................................................................................................................................................... 308
4.5.2 AAA ................................................................................................................................................................... 310
4.5.2.1 Authentication Configuration .................................................................................................................... 315
4.5.2.2 RADIUS ................................................................................................................................................... 317
4.5.2.3 TACACS+ ................................................................................................................................................ 319
4.5.2.4 RADIUS Overview ................................................................................................................................... 321
4.5.2.5 RADIUS Details ....................................................................................................................................... 322
4.5.3 Port Authentication ............................................................................................................................................ 329
4.5.3.1 Network Access Server Configuration ..................................................................................................... 329
4.5.3.2 Network Access Overview ....................................................................................................................... 333
4.5.3.3 Network Access Statistics ........................................................................................................................ 334
4.5.4 Port Security ...................................................................................................................................................... 340
4.5.4.1 Port Limit Control ..................................................................................................................................... 340
4.5.4.2 Port Security Status ................................................................................................................................. 344
4.5.4.3 Port Security Detail .................................................................................................................................. 346
4.5.5 Access Control Lists .......................................................................................................................................... 348
4.5.5.1 Access Control List Status ....................................................................................................................... 348
4.5.5.2 Access Control List Configuration ............................................................................................................ 349
4.5.5.3 ACE Configuration ................................................................................................................................... 351
4.5.5.4 ACL Ports Configuration .......................................................................................................................... 362
4.5.5.5 ACL Rate Limiters .................................................................................................................................... 364
4.5.6 DHCP Snooping ................................................................................................................................................ 366
4.5.6.1 DHCP Snooping Configuration ................................................................................................................ 367
4.5.6.2 Dynamic DHCP Snooping Table .............................................................................................................. 368
4.5.7 IP Source Guard ................................................................................................................................................ 369
4.5.7.1 IP Source Guard Configuration ................................................................................................................ 369
4.5.7.2 Static IP Source Guard Table .................................................................................................................. 370
4.5.7.3 Dynamic IP Source Guard Table ............................................................................................................. 371
4.5.8 ARP Inspection .................................................................................................................................................. 372
4.5.8.1 ARP Inspection ........................................................................................................................................ 372
4.5.8.2 ARP Inspection Static Table ..................................................................................................................... 373
4.5.8.3 Dynamic ARP Inspection Table ................................................................................................................ 374
4.6 Ring .................................................................................................................................................................. 376
4.6.1 Ring ................................................................................................................................................................... 376
4.6.1.1 MEP Configuration .................................................................................................................................. 377
4.6.1.2 Detailed MEP Configuration .................................................................................................................... 379
4.6.1.3 Ethernet Ring Protocol Switch ................................................................................................................. 382