vi
11-1
SNOOPING .............................................................................................................................................. 160
11-1.1 Configuration ............................................................................................................................... 160
11-1.2 Snooping Table ............................................................................................................................ 162
11-1.3 Detailed Statistics ........................................................................................................................ 164
11-2 RELAY ..................................................................................................................................................... 166
11-2.1 Configuration ............................................................................................................................... 166
11-2.2 Statistics ....................................................................................................................................... 168
11-3 SERVER ................................................................................................................................................... 170
11-4 SERVER STATUS........................................................................................................................................ 172
CHAPTER 12 SECURITY ................................................................................................................... 173
12-1 MANAGEMENT ........................................................................................................................................ 173
12-1.1 Account ......................................................................................................................................... 173
12-1.2 Privilege Levels ............................................................................................................................ 175
12-1.3 Auth Method ................................................................................................................................ 177
12-1.4 Access Management .................................................................................................................... 180
12-2 IEEE 802.1X ........................................................................................................................................... 182
12-2.1 Configuration ............................................................................................................................... 182
12-2.2 Status ............................................................................................................................................ 188
12-3 IP SOURCE GUARD .................................................................................................................................. 190
12-3.1 Configuration ............................................................................................................................... 190
12-3.2 Static Table ................................................................................................................................... 192
12-3.3 Dynamic Table ............................................................................................................................. 193
12-4 ARP INSPECTION..................................................................................................................................... 195
12-4.1 Port Configuration....................................................................................................................... 195
12-4.2 VLAN Configuration .................................................................................................................... 197
12-4.3 Static Table ................................................................................................................................... 198
12-4.4 Dynamic Table ............................................................................................................................. 200
12-5 PORT SECURITY ....................................................................................................................................... 202
12-5.1 Configuration ............................................................................................................................... 202
12-5.2 Status ............................................................................................................................................ 205
12-6 RADIUS ................................................................................................................................................. 207
12-6.1 Configuration ............................................................................................................................... 207
12-6.2 Status ............................................................................................................................................ 210
12-7 TACACS+ .............................................................................................................................................. 215
12-7.1 Configuration ............................................................................................................................... 215
CHAPTER 13 ACCESS CONTROL .................................................................................................... 217
13-1 ACCESS CONTROL LIST ............................................................................................................................. 217
13-2 ACCESS CONTROL STATUS ........................................................................................................................ 223
CHAPTER 14 SNMP ......................................................................................................................... 225
14-1 CONFIGURATION ..................................................................................................................................... 225
14-2 SNMPV3 ............................................................................................................................................... 227
14-2.1 Communities ................................................................................................................................ 227
14-2.2 Users ............................................................................................................................................. 229
14-2.3 Groups .......................................................................................................................................... 231
14-2.4 Views ............................................................................................................................................ 233
14-2.5 Access ........................................................................................................................................... 235
14-3 RMON CONFIGURATION ......................................................................................................................... 237
14-3.1 Statistics ....................................................................................................................................... 237
14-3.2 History .......................................................................................................................................... 239
14-3.3 Alarm ............................................................................................................................................ 241
13-3.4 Event ............................................................................................................................................. 244
14-4 RMON STATUS ....................................................................................................................................... 246