2.5 DHCP ........................................................................................................................................................................... 66
2.5.1 Server ...................................................................................................................................................................... 66
2.5.1.1 Mode .................................................................................................................................................................... 66
2.5.1.2 Excluded IP ........................................................................................................................................................... 67
2.5.1.3 Pool ...................................................................................................................................................................... 67
2.5.2 Snooping .................................................................................................................................................................. 68
2.5.3 Relay ........................................................................................................................................................................ 69
Security ................................................................................................................................................................ 70
2.6 Security ....................................................................................................................................................................... 70
2.6.1 Switch ...................................................................................................................................................................... 70
2.6.1.1 Users ..................................................................................................................................................................... 70
2.6.1.2 Privilege Level ....................................................................................................................................................... 71
2.6.1.3 Auth Method ........................................................................................................................................................ 72
2.6.1.4 SSH........................................................................................................................................................................ 73
2.6.1.5 HTTPS ................................................................................................................................................................... 73
2.6.1.6 Access Management ............................................................................................................................................ 73
2.6.1.7 SNMP .................................................................................................................................................................... 74
2.6.1.7.1 System ............................................................................................................................................................... 74
2.6.1.7.2 Trap ................................................................................................................................................................... 75
2.6.1.7.3 Communities ..................................................................................................................................................... 76
2.6.1.7.4 Users .................................................................................................................................................................. 76
2.6.1.7.5 Groups ............................................................................................................................................................... 78
2.6.1.7.6 Views ................................................................................................................................................................. 79
2.6.1.7.7 Access ................................................................................................................................................................ 79
2.6.1.8 RMON ................................................................................................................................................................... 80
2.6.1.8.1 Statistics ............................................................................................................................................................ 80
2.6.1.8.2 History ............................................................................................................................................................... 80
2.6.1.8.3 Alarm ................................................................................................................................................................. 80
2.6.1.8.4 Event ................................................................................................................................................................. 81
2.6.2 Network Security ..................................................................................................................................................... 82
2.6.2.1 Limit Control ......................................................................................................................................................... 82
2.6.2.2 NAS ....................................................................................................................................................................... 83
2.6.2.3 ACL........................................................................................................................................................................ 90
2.6.2.3.1 Ports .................................................................................................................................................................. 90
2.6.2.3.2 Rate Limiters ..................................................................................................................................................... 91
2.6.2.3.3 Access Control List ............................................................................................................................................. 92
2.6.2.4 IP Source Guard .................................................................................................................................................... 93
2.6.2.4.1 Configuration..................................................................................................................................................... 93
2.6.2.4.2 Static Table ........................................................................................................................................................ 93
2.6.2.5 ARP Inspection ..................................................................................................................................................... 94
2.6.2.5.1 Port Configuration ............................................................................................................................................. 94
2.6.2.5.2 VLAN Configuration ........................................................................................................................................... 95
2.6.2.5.3 Static Table ........................................................................................................................................................ 95
2.6.2.5.4 Dynamic Table ................................................................................................................................................... 95
2.6.3 AAA .......................................................................................................................................................................... 96
2.6.3.1 RADIUS ................................................................................................................................................................. 96
2.6.3.2 TACACS+ ............................................................................................................................................................... 98
Aggregation ......................................................................................................................................................... 99
2.7 Aggregation ................................................................................................................................................................ 99
2.7.1 Static ........................................................................................................................................................................ 99
2.7.2 LACP....................................................................................................................................................................... 100