vi
11-3.4 MVR SFM Information ................................................................................................................. 170
CHAPTER 12 DHCP .......................................................................................................................... 173
12-1 SNOOPING .............................................................................................................................................. 173
12-1.1 Configuration ............................................................................................................................... 173
12-1.2 Snooping Table ............................................................................................................................ 175
12-1.3 Detailed Statistics ........................................................................................................................ 177
12-2 RELAY ..................................................................................................................................................... 180
12-2.1 Configuration ............................................................................................................................... 180
12-2.2 Statistics ....................................................................................................................................... 182
12-3 SERVER ................................................................................................................................................... 184
CHAPTER 13 SECURITY ................................................................................................................... 186
13-1 MANAGEMENT ........................................................................................................................................ 186
13-1.1 Account ......................................................................................................................................... 186
13-1.2 Privilege Levels ............................................................................................................................ 189
13-1.3 Auth Method ................................................................................................................................ 191
13-1.4 Access Management .................................................................................................................... 194
13-2 SNMP ................................................................................................................................................... 196
13-2.1 Configuration ............................................................................................................................... 196
13-2.2 SNMPv3 ........................................................................................................................................ 198
13-2.3 Trap Event Severity ...................................................................................................................... 209
13-3 RMON CONFIGURATION ......................................................................................................................... 211
13-3.1 Statistics ....................................................................................................................................... 211
13-3.2 History .......................................................................................................................................... 216
13-3.3 Alarm ............................................................................................................................................ 221
13-3.4 Event ............................................................................................................................................. 228
13-3 IEEE 802.1X ........................................................................................................................................... 232
13-3.1 Configuration ............................................................................................................................... 232
13-3.2 Status ............................................................................................................................................ 238
13-4 IP SOURCE GUARD .................................................................................................................................. 240
13-4.1 Configuration ............................................................................................................................... 241
13-4.2 Static Table ................................................................................................................................... 243
13-4.3 Dynamic Table ............................................................................................................................. 245
13-5 ARP INSPECTION..................................................................................................................................... 247
13-5.1 Configuration ............................................................................................................................... 247
13-5.2 VLAN Configuration .................................................................................................................... 249
13-5.3 Static Table ................................................................................................................................... 251
13-5.4 Dynamic Table ............................................................................................................................. 253
13-6 PORT SECURITY ....................................................................................................................................... 255
13-6.1 Configuration ............................................................................................................................... 255
13-6.2 Status ............................................................................................................................................ 258
13-7 RADIUS ................................................................................................................................................. 260
13-7.1 Configuration ............................................................................................................................... 260
13-7.2 Status ............................................................................................................................................ 263
13-8 TACACS+ .............................................................................................................................................. 270
13-8.1 Configuration ............................................................................................................................... 270
CHAPTER 14 ACCESS CONTROL .................................................................................................... 273
14-1 ACCESS CONTROL LIST ............................................................................................................................. 273
CHAPTER 15 EVENT NOTIFICATION ............................................................................................. 281
15-1 SNMP TRAP ........................................................................................................................................... 281
CHAPTER 16 DIAGNOSTICS ........................................................................................................... 283