User Manual

Table Of Contents
Users Manual of WGS-5225-8UP2SV
8
4.4.5 QCL ................................................................................................................................................................... 280
4.4.5.1 QoS Control List ...................................................................................................................................... 280
4.4.5.2 QoS Control Entry Configuration ............................................................................................................. 282
4.4.5.3 QCL Status .............................................................................................................................................. 284
4.4.5.4 Voice VLAN Configuration ....................................................................................................................... 286
4.4.5.5 Voice VLAN OUI Table ............................................................................................................................ 288
4.5 Security ..................................................................................................................................................... 289
4.5.1 Access Security ............................................................................................................................................... 289
4.5.1.1 Access Management ............................................................................................................................... 289
4.5.1.2 Access Management Statistics ................................................................................................................ 290
4.5.1.3 SSH ......................................................................................................................................................... 291
4.5.1.4 HTTPs ..................................................................................................................................................... 292
4.5.2 AAA ................................................................................................................................................................... 294
4.5.2.1 Authentication Configuration .................................................................................................................... 298
4.5.2.2 RADIUS ................................................................................................................................................... 301
4.5.2.3 TACACS+ ................................................................................................................................................ 303
4.5.2.4 RADIUS Overview ................................................................................................................................... 304
4.5.2.5 RADIUS Details ....................................................................................................................................... 307
4.5.3 Port Authentication ......................................................................................................................................... 314
4.5.3.1 Network Access Server Configuration ..................................................................................................... 314
4.5.3.2 Network Access Overview ....................................................................................................................... 318
4.5.3.3 Network Access Statistics ........................................................................................................................ 319
4.5.4 Port Security .................................................................................................................................................... 324
4.5.4.1 Port Limit Control ..................................................................................................................................... 324
4.5.4.2 Port Security Status ................................................................................................................................. 327
4.5.4.3 Port Security Detail .................................................................................................................................. 329
4.5.5 Access Control Lists ....................................................................................................................................... 330
4.5.5.1 Access Control List Status ....................................................................................................................... 330
4.5.5.2 Access Control List Configuration ............................................................................................................ 332
4.5.5.3 ACE Configuration ................................................................................................................................... 334
4.5.5.4 ACL Ports Configuration .......................................................................................................................... 344
4.5.5.5 ACL Rate Limiters .................................................................................................................................... 346
4.5.6 DHCP Snooping ............................................................................................................................................... 347
4.5.6.1 DHCP Snooping Configuration ................................................................................................................ 347
4.5.6.2 Snooping Table ........................................................................................................................................ 348
4.5.7 IP Source Guard .............................................................................................................................................. 350
4.5.7.1 IP Source Guard Configuration................................................................................................................ 350
4.5.7.2 Static IP Source Guard Table .................................................................................................................. 351
4.5.7.3 Dynamic IP Source Guard Table ............................................................................................................. 352
4.5.8 ARP Inspection ................................................................................................................................................ 353