Interlogix NS3702-24P-4S User Manual User Manual
Page 7
7
4.9.12 QCL Status ......................................................................................................................................................216
4.9.13 Storm Control Configuration ............................................................................................................................218
4.9.14 WRED..............................................................................................................................................................220
4.9.15 QoS Statistics ..................................................................................................................................................222
4.9.16 Voice VLAN Configuration ...............................................................................................................................223
4.9.17 Voice VLAN OUI Table.....................................................................................................................................226
4.10 Access Control Lists..............................................................................................................................228
4.10.1 Access Control List Status ...............................................................................................................................228
4.10.2 Access Control List Configuration....................................................................................................................230
4.10.3 ACE Configuration ...........................................................................................................................................232
4.10.4 ACL Ports Configuration ..................................................................................................................................243
4.10.5 ACL Rate Limiter Configuration .......................................................................................................................245
4.11 Authentication.........................................................................................................................................246
4.11.1 Understanding IEEE 802.1X Port-Based Authentication..................................................................................247
4.11.2 Authentication Configuration ............................................................................................................................250
4.11.3 Network Access Server Configuration..............................................................................................................252
4.11.4 Network Access Overview ...............................................................................................................................264
4.11.5 Network Access Statistics ................................................................................................................................265
4.11.6 RADIUS ...........................................................................................................................................................272
4.11.7 TACACS+ ........................................................................................................................................................275
4.11.8 RADIUS Overview ...........................................................................................................................................277
4.11.9 RADIUS Details ...............................................................................................................................................279
4.11.10 Windows Platform RADIUS Server Configuration..........................................................................................285
4.11.11 802.1X Client Configuration ...........................................................................................................................291
4.12 Security ...................................................................................................................................................294
4.12.1 Port Limit Control.............................................................................................................................................294
4.12.2 Access Management .......................................................................................................................................299
4.12.3 Access Management Statistics ........................................................................................................................300
4.12.4 HTTPs .............................................................................................................................................................302
4.12.5 SSH .................................................................................................................................................................302
4.12.6 Port Security Status .........................................................................................................................................303
4.12.7 Port Security Detail ..........................................................................................................................................306
4.12.8 DHCP Snooping ..............................................................................................................................................307
4.12.9 Snooping Table................................................................................................................................................309
4.12.10 IP Source Guard Configuration......................................................................................................................309
4.12.11 IP Source Guard Static Table ......................................................................................................................... 311