User's Manual

Table Of Contents
Users Manual of MGSD-10080F
8
4.5.2.1 Authentication Configuration .............................................................................................................................. 303
4.5.2.2 RADIUS ............................................................................................................................................................. 305
4.5.2.3 TACACS+ .......................................................................................................................................................... 307
4.5.2.4 RADIUS Overview ............................................................................................................................................. 309
4.5.2.5 RADIUS Details ................................................................................................................................................. 310
4.5.3 Port Authentication .................................................................................................................................................. 317
4.5.3.1 Network Access Server Configuration ............................................................................................................... 317
4.5.3.2 Network Access Overview ................................................................................................................................. 321
4.5.3.3 Network Access Statistics .................................................................................................................................. 322
4.5.4 Port Security ............................................................................................................................................................. 327
4.5.4.1 Port Limit Control ............................................................................................................................................... 327
4.5.4.2 Port Security Status ........................................................................................................................................... 330
4.5.4.3 Port Security Detail ............................................................................................................................................ 332
4.5.5 Access Control Lists ................................................................................................................................................ 333
4.5.5.1 Access Control List Status ................................................................................................................................. 333
4.5.5.2 Access Control List Configuration ...................................................................................................................... 335
4.5.5.3 ACE Configuration ............................................................................................................................................. 337
4.5.5.4 ACL Ports Configuration .................................................................................................................................... 347
4.5.5.5 ACL Rate Limiters .............................................................................................................................................. 349
4.5.6 DHCP Snooping ........................................................................................................................................................ 350
4.5.6.1 DHCP Snooping Configuration .......................................................................................................................... 351
4.5.6.2 Snooping Table .................................................................................................................................................. 352
4.5.7 IP Source Guard ....................................................................................................................................................... 353
4.5.7.1 IP Source Guard Configuration .......................................................................................................................... 353
4.5.7.2 Static IP Source Guard Table ............................................................................................................................. 354
4.5.7.3 Dynamic IP Source Guard Table ........................................................................................................................ 355
4.5.8 ARP Inspection ......................................................................................................................................................... 356
4.5.8.1 ARP Inspection .................................................................................................................................................. 356
4.5.8.2 ARP Inspection Static Table ............................................................................................................................... 357
4.5.8.3 Dynamic ARP Inspection Table .......................................................................................................................... 358
4.6 Ring .................................................................................................................................................................. 360
4.6.1 ERPS Ring ................................................................................................................................................................ 360
4.6.1.1 MEP Configuration ............................................................................................................................................. 361
4.6.1.2 Detailed MEP Configuration .............................................................................................................................. 363
4.6.1.3 Ethernet Ring Protocol Switch ........................................................................................................................... 368
4.6.1.4 Ethernet Ring Protocol Switch Configuration ..................................................................................................... 370
4.6.1.5 Ethernet Ring Protocol Switch ........................................................................................................................... 373
4.6.1.6 Ring Wizard Example ........................................................................................................................................ 374
4.7 Maintenance .................................................................................................................................................... 377
4.7.1 Switch Maintenance ................................................................................................................................................. 377
4.7.1.1 Web Firmware Upgrade ..................................................................................................................................... 377